arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi | 6 ++++++ 1 file changed, 6 insertions(+)
Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware
of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach
ensures secure SE assignment and access control, it limits flexibility for
developers who need to enable various protocols on different SEs.
Add the firmware-name property to QUPv3 nodes in the device tree to enable
firmware loading from the Linux environment. Handle SE assignments and
access control permissions directly within Linux, removing the dependency
on TrustZone.
Signed-off-by: Xueyao An <xueyao.an@oss.qualcomm.com>
---
arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi b/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi
index 1a9e930c0496..c26eaf187b17 100644
--- a/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi
+++ b/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi
@@ -458,14 +458,20 @@ &pcie6a_phy {
};
&qupv3_0 {
+ firmware-name = "qcom/x1e80100/qupv3fw.elf";
+
status = "okay";
};
&qupv3_1 {
+ firmware-name = "qcom/x1e80100/qupv3fw.elf";
+
status = "okay";
};
&qupv3_2 {
+ firmware-name = "qcom/x1e80100/qupv3fw.elf";
+
status = "okay";
};
--
2.34.1
On 26-03-27 16:53:17, Xueyao An wrote: > Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware > of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach > ensures secure SE assignment and access control, it limits flexibility for > developers who need to enable various protocols on different SEs. > > Add the firmware-name property to QUPv3 nodes in the device tree to enable > firmware loading from the Linux environment. Handle SE assignments and > access control permissions directly within Linux, removing the dependency > on TrustZone. > > Signed-off-by: Xueyao An <xueyao.an@oss.qualcomm.com> Hopefully, there is a DT binding schema update that goes with this... Reviewed-by: Abel Vesa <abel.vesa@oss.qualcomm.com>
I sincerely apologize for the confusion and any inconvenience caused. This patch has already been upstreamed, so please kindly ignore it. Thank you very much for your understanding, and sorry again for the oversight. 在 2026/3/27 23:21, Abel Vesa 写道: > On 26-03-27 16:53:17, Xueyao An wrote: >> Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware >> of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach >> ensures secure SE assignment and access control, it limits flexibility for >> developers who need to enable various protocols on different SEs. >> >> Add the firmware-name property to QUPv3 nodes in the device tree to enable >> firmware loading from the Linux environment. Handle SE assignments and >> access control permissions directly within Linux, removing the dependency >> on TrustZone. >> >> Signed-off-by: Xueyao An <xueyao.an@oss.qualcomm.com> > Hopefully, there is a DT binding schema update that goes with this... > > Reviewed-by: Abel Vesa <abel.vesa@oss.qualcomm.com>
On 3/27/26 9:53 AM, Xueyao An wrote: > Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware > of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach > ensures secure SE assignment and access control, it limits flexibility for > developers who need to enable various protocols on different SEs. > > Add the firmware-name property to QUPv3 nodes in the device tree to enable > firmware loading from the Linux environment. Handle SE assignments and > access control permissions directly within Linux, removing the dependency > on TrustZone. > > Signed-off-by: Xueyao An <xueyao.an@oss.qualcomm.com> > --- Reviewed-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com> Konrad
© 2016 - 2026 Red Hat, Inc.