<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/firmware/qcom, branch master</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=master</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2026-04-02T21:09:01Z</updated>
<entry>
<title>firmware: qcom: scm: Allow QSEECOM on Lenovo IdeaCentre Mini X</title>
<updated>2026-04-02T21:09:01Z</updated>
<author>
<name>Bjorn Andersson</name>
<email>bjorn.andersson@oss.qualcomm.com</email>
</author>
<published>2026-04-02T02:31:27Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a31ad9339eff4ce401dec816b01a94b4e3c47898'/>
<id>urn:sha1:a31ad9339eff4ce401dec816b01a94b4e3c47898</id>
<content type='text'>
The Hamoa-based Lenovo IdeaCentre Mini X provides the same UEFI variable
access through uefisecapp as other Hamoa devices, add it to the
allowlist.

Reviewed-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;
Signed-off-by: Bjorn Andersson &lt;bjorn.andersson@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260401-ideacentre-v2-3-5745fe2c764e@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Register gunyah watchdog device</title>
<updated>2026-03-30T14:10:24Z</updated>
<author>
<name>Hrishabh Rajput</name>
<email>hrishabh.rajput@oss.qualcomm.com</email>
</author>
<published>2026-03-11T05:46:30Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=07b9712339e3ce1d183adef996c0f317adc9848d'/>
<id>urn:sha1:07b9712339e3ce1d183adef996c0f317adc9848d</id>
<content type='text'>
To restrict Gunyah watchdog initialization to Qualcomm platforms running
under the Gunyah Hypervisor, register the watchdog device in the QCOM
SCM driver.

When Gunyah is not present or Gunyah emulates MMIO-based watchdog, we
expect Qualcomm watchdog or ARM SBSA watchdog device to be present in
the devicetree. First, we make sure we're running under the Gunyah
Hypervisor. Then we move to check if any of the above mentioned
watchdog device nodes are present, if not then we proceed to register
the SMC-based Gunyah watchdog device.

Reviewed-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;
Tested-by: Shivendra Pratap &lt;shivendra.pratap@oss.qualcomm.com&gt;
Tested-by: Neil Armstrong &lt;neil.armstrong@linaro.org&gt;
Signed-off-by: Hrishabh Rajput &lt;hrishabh.rajput@oss.qualcomm.com&gt;
Signed-off-by: Pavankumar Kondeti &lt;pavan.kondeti@oss.qualcomm.com&gt;
Tested-by: Mukesh Ojha &lt;mukesh.ojha@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260311-gunyah_watchdog-v8-1-4c1c0689de22@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Allow QSEECOM on Mahua CRD</title>
<updated>2026-03-30T13:58:25Z</updated>
<author>
<name>Gopikrishna Garmidi</name>
<email>gopikrishna.garmidi@oss.qualcomm.com</email>
</author>
<published>2026-03-23T06:27:39Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=0ff62b7f1b355d4cc0568d73e5911683bdcfe1e7'/>
<id>urn:sha1:0ff62b7f1b355d4cc0568d73e5911683bdcfe1e7</id>
<content type='text'>
Add Mahua CRD board to the QSEECOM allowlist for enabling access to
efivars and uefi bootloader.

Signed-off-by: Gopikrishna Garmidi &lt;gopikrishna.garmidi@oss.qualcomm.com&gt;
Reviewed-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260322-mahua-qcom_scm-support-v1-1-00c50db332ee@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom_scm: don't opencode kmemdup</title>
<updated>2026-03-23T14:07:59Z</updated>
<author>
<name>Mukesh Ojha</name>
<email>mukesh.ojha@oss.qualcomm.com</email>
</author>
<published>2026-03-10T14:02:55Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e32701726c0e6312aabd83aa1c00f59b0d7df276'/>
<id>urn:sha1:e32701726c0e6312aabd83aa1c00f59b0d7df276</id>
<content type='text'>
Lets not opencode kmemdup which is reported by coccinelle tool.
Fix it using kmemdup.

cocci warnings: (new ones prefixed by &gt;&gt;)
&gt;&gt; drivers/firmware/qcom/qcom_scm.c:916:11-18: WARNING opportunity for kmemdup

Fixes: 8b9d2050cfa0 ("firmware: qcom_scm: Add qcom_scm_pas_get_rsc_table() to get resource table")
Reported-by: kernel test robot &lt;lkp@intel.com&gt;
Closes: https://lore.kernel.org/oe-kbuild-all/202601142144.HvSlBSI9-lkp@intel.com/
Reviewed-by: Konrad Dybcio &lt;konrad.dybcio@oss.qualcomm.com&gt;
Signed-off-by: Mukesh Ojha &lt;mukesh.ojha@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260310140255.2520230-1-mukesh.ojha@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Allow QSEECOM on Glymur CRD</title>
<updated>2026-03-18T12:35:38Z</updated>
<author>
<name>Pankaj Patil</name>
<email>pankaj.patil@oss.qualcomm.com</email>
</author>
<published>2026-02-25T12:07:24Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=87a1698cb80650e47b41ca78a78ce06870cba631'/>
<id>urn:sha1:87a1698cb80650e47b41ca78a78ce06870cba631</id>
<content type='text'>
Add glymur-crd to QSEECOM allowlist for enabling access to efivars and
uefi bootloader

Signed-off-by: Pankaj Patil &lt;pankaj.patil@oss.qualcomm.com&gt;
Reviewed-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260225-qseecom_glymur-v1-1-0cafc709e2ef@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scom: Simplify mutex with guard</title>
<updated>2026-03-18T12:20:21Z</updated>
<author>
<name>Krzysztof Kozlowski</name>
<email>krzysztof.kozlowski@oss.qualcomm.com</email>
</author>
<published>2026-02-16T09:15:28Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=d98b978446d249df1a662b4fef4c0bbfa1d650b8'/>
<id>urn:sha1:d98b978446d249df1a662b4fef4c0bbfa1d650b8</id>
<content type='text'>
Simplify error path unlocking mutex with the guard.

Signed-off-by: Krzysztof Kozlowski &lt;krzysztof.kozlowski@oss.qualcomm.com&gt;
Reviewed-by: Konrad Dybcio &lt;konrad.dybcio@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260216091525.107935-6-krzysztof.kozlowski@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: uefisecapp: Annotate acquiring locks for context tracking</title>
<updated>2026-03-18T12:20:21Z</updated>
<author>
<name>Krzysztof Kozlowski</name>
<email>krzysztof.kozlowski@oss.qualcomm.com</email>
</author>
<published>2026-02-16T09:15:27Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=4bfb0ec11e20b9354beabf1b9f3e70e926c407bd'/>
<id>urn:sha1:4bfb0ec11e20b9354beabf1b9f3e70e926c407bd</id>
<content type='text'>
qcuefi_acquire() and qcuefi_release() end with mutex locked or unlocked
respectively, so annotate them so the lock usage will be tracked by
context tracking tools.

Note that mutex is tracked since commit 370f0a345a70 ("locking/mutex:
Support Clang's context analysis").

Signed-off-by: Krzysztof Kozlowski &lt;krzysztof.kozlowski@oss.qualcomm.com&gt;
Reviewed-by: Konrad Dybcio &lt;konrad.dybcio@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260216091525.107935-5-krzysztof.kozlowski@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: uefisecapp: Simplify mutex with guard</title>
<updated>2026-03-18T12:20:21Z</updated>
<author>
<name>Krzysztof Kozlowski</name>
<email>krzysztof.kozlowski@oss.qualcomm.com</email>
</author>
<published>2026-02-16T09:15:26Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=055d79affa436d83a6e0d3ca6d054f11a7e3d4c1'/>
<id>urn:sha1:055d79affa436d83a6e0d3ca6d054f11a7e3d4c1</id>
<content type='text'>
Simplify error path unlocking mutex with the guard.

Signed-off-by: Krzysztof Kozlowski &lt;krzysztof.kozlowski@oss.qualcomm.com&gt;
Reviewed-by: Konrad Dybcio &lt;konrad.dybcio@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260216091525.107935-4-krzysztof.kozlowski@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Allow QSEECOM on ECS LIVA QC710</title>
<updated>2026-03-04T19:38:27Z</updated>
<author>
<name>Val Packett</name>
<email>val@packett.cool</email>
</author>
<published>2026-01-20T23:30:13Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=34a49e8508b5d00816d25fe3758b474471e7e051'/>
<id>urn:sha1:34a49e8508b5d00816d25fe3758b474471e7e051</id>
<content type='text'>
Allow this machine to access efivars through qseecom/uefisecapp.

Reviewed-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;
Signed-off-by: Val Packett &lt;val@packett.cool&gt;
Link: https://lore.kernel.org/r/20260120234029.419825-11-val@packett.cool
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Allow QSEECOM on PURWA-IOT-EVK</title>
<updated>2026-03-04T19:21:06Z</updated>
<author>
<name>Yijie Yang</name>
<email>yijie.yang@oss.qualcomm.com</email>
</author>
<published>2026-02-02T07:35:46Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=0924a6fba19c8f4bbbe2e228a4fb5ae4bdb6d8ab'/>
<id>urn:sha1:0924a6fba19c8f4bbbe2e228a4fb5ae4bdb6d8ab</id>
<content type='text'>
Add the Purwa-IoT-EVK board to the list to enable access to EFI variables.

Guarantee that subsystems relying on SCM services can access secure-world
features. This change improves reliability and prevents missing
functionality or boot-time issues by making service availability explicit.

Reviewed-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;
Signed-off-by: Yijie Yang &lt;yijie.yang@oss.qualcomm.com&gt;
Reviewed-by: Abel Vesa &lt;abel.vesa@oss.qualcomm.com&gt;
Link: https://lore.kernel.org/r/20260202073555.1345260-2-yijie.yang@oss.qualcomm.com
Signed-off-by: Bjorn Andersson &lt;andersson@kernel.org&gt;
</content>
</entry>
</feed>
