[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <jof6sunnfydjp34o543jnhwz3zmjn32f6cwre3etbn27ov2mxl@mdzkojaqeteq>
Date: Fri, 30 Aug 2024 10:51:17 +0300
From: Dmitry Baryshkov <dmitry.baryshkov@...aro.org>
To: Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
Cc: Griffin Kroah-Hartman <griffin@...ah.com>, amahesh@....qualcomm.com,
linux-arm-msm@...r.kernel.org, dri-devel@...ts.freedesktop.org, linux-kernel@...r.kernel.org,
stable <stable@...nel.org>, Ekansh Gupta <quic_ekangupt@...cinc.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Joel Selvaraj <joelselvaraj.oss@...il.com>
Subject: Re: [PATCH] Revert "misc: fastrpc: Restrict untrusted app to attach
to privileged PD"
On Thu, Aug 15, 2024 at 03:55:01PM GMT, Srinivas Kandagatla wrote:
>
>
> On 15/08/2024 10:49, Griffin Kroah-Hartman wrote:
> > This reverts commit bab2f5e8fd5d2f759db26b78d9db57412888f187.
> >
> > Joel reported that this commit breaks userspace and stops sensors in
> > SDM845 from working. Also breaks other qcom SoC devices running postmarketOS.
> >
> > Cc: stable <stable@...nel.org>
> > Cc: Ekansh Gupta <quic_ekangupt@...cinc.com>
> > Cc: Dmitry Baryshkov <dmitry.baryshkov@...aro.org>
> > Cc: Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
> > Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
> > Reported-by: Joel Selvaraj <joelselvaraj.oss@...il.com>
> > Link: https://lore.kernel.org/r/9a9f5646-a554-4b65-8122-d212bb665c81@umsystem.edu
> > Signed-off-by: Griffin Kroah-Hartman <griffin@...ah.com>
> > ---
>
>
> Lets fix this properly by updating existing device tree entries and bindings
> to enforce misuse of "qcom,non-secure-domain" on all Qcom SoC's.
It is not possible. We must remain compatible with existing DTs.
>
> As this patch is only doing part of the job and breaking existing platforms,
>
> Acked-by: Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
>
> --srini
>
>
>
--
With best wishes
Dmitry
Powered by blists - more mailing lists