Re: [PATCH] arm64: dts: qcom: sc7180: Drop the unused non-MSA SID

2020-07-08 Thread Doug Anderson
Hi, On Tue, Jun 30, 2020 at 1:20 AM Sibi Sankar wrote: > > Having a non-MSA (Modem Self-Authentication) SID bypassed breaks modem > sandboxing i.e if a transaction were to originate from it, the hardware > memory protections units (XPUs) would fail to flag them (any transaction > originating from

Re: [PATCH] arm64: dts: qcom: sc7180: Drop the unused non-MSA SID

2020-06-30 Thread Sai Prakash Ranjan
On 2020-06-30 13:49, Sibi Sankar wrote: Having a non-MSA (Modem Self-Authentication) SID bypassed breaks modem sandboxing i.e if a transaction were to originate from it, the hardware memory protections units (XPUs) would fail to flag them (any transaction originating from modem are historically