Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2142474yba; Fri, 19 Apr 2019 13:01:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkXi9Cw4YzOz0fgkqXHTjyzD1bU/N/QUh9EhMkte7rmhXRgub2DQNZmFszBlSk8XANixUe X-Received: by 2002:a63:30c5:: with SMTP id w188mr5693923pgw.76.1555704103864; Fri, 19 Apr 2019 13:01:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555704103; cv=none; d=google.com; s=arc-20160816; b=FR7MomFVrblT6r0MrhWoqm9bBVlVe++Yz0Uiu01d33J65lgPH86c5PrsnvK5h09YSM fqy0555imc7HKo70sQPGRtHQNs9COJL3rIoPcQ2LtRj0Tv/ECFIISJ5Y0ZvumOTXAtfR bEOe6/g8YjORhzpac4RpO0s31ja1X7GNV24BzPAgsAc1oOgheav+NvXehhIUC7Ja3/wl keybSaLVb5srdlUImdPlhuHcPpu+JrkbZxqrvXPqeQEXVcZA7W/X0nFQR68fWQf/3BdS xdbEyBJGZh6riLTE6X2CNdYKv/VZ4LMtFp4uuGHJ11b2VTAQJyW/t2J2e8ls4OTJfjA0 L0Fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=zEmYG42997fsyjaYaZmaE1ykRnRfersPFJ/oD0sTshA=; b=C15TJSh39lJXdQYC7+mwL+j4eDBwYcDlglONnkUaOoHUrijtXjjLHWQlhF3f4UiJYw nl73fttJSulWy5ktXqoL2qSz8gMcPaf4QsOVNKriB7yDz5bbnczBlzUJdRC38X+zlFF3 DQ0Fig/h2MK8bVdODhKZegb7K9IHMBuiP243ldZeijq0jMtn26l2e1f//rSnViaomX5R DZK+tRvhmH+KS52HbkGbQx4RvHPyfH8/CSGRLaXMNO/5k8blBelpbyP1LAuDbAamb/kd zH37MVf75P3Ri4BBbNvm2qcAqrCGbOlewsnSVW3MF65NTl18MWpx/Y11/kzvN9T/5AcJ jOwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=odEyI40I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k62si5514437pgd.444.2019.04.19.13.01.28; Fri, 19 Apr 2019 13:01:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=odEyI40I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727417AbfDST7Q (ORCPT + 99 others); Fri, 19 Apr 2019 15:59:16 -0400 Received: from mail-qt1-f194.google.com ([209.85.160.194]:34555 "EHLO mail-qt1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726075AbfDST7P (ORCPT ); Fri, 19 Apr 2019 15:59:15 -0400 Received: by mail-qt1-f194.google.com with SMTP id k2so6510542qtm.1 for ; Fri, 19 Apr 2019 12:59:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=zEmYG42997fsyjaYaZmaE1ykRnRfersPFJ/oD0sTshA=; b=odEyI40IMvi5MP7tCDzVdVz1h+UaPSmAnGKHWYL7fBgaugTj+icrxtGTbsirJXeW6A X9KcgDI1v/VUw1c4nl3KmC4Rxsnc/49z2OdwF4YNtoqKI1QfHVkmg/SRM+CskNooaPuo ohJMA0w4+y2400eQgKBYsJ9zR0firFE70aSZK1EfKHosfYjfK8S0IPB8tlawT0xD+X2y QmZo6N4Pk2xtnQJVDYYL8UdW5r8yOwpLWMEgH1r0GW/ZcseINxpycBYqTkrZNTnBGCM3 Ctg9/4/q51urI4JKXl8ZogisRkjcnBpRcPjl4+cL5sfU4n3MNVqEKyG/H92S9blTQz6U Rmng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=zEmYG42997fsyjaYaZmaE1ykRnRfersPFJ/oD0sTshA=; b=bRAJ77mbYPF9YFTuvvMIiPgcnpEjZFhc5oB6ql9kD/JogqBGyFS367pGVo2TFni4UB rzZVeJavUypJK0b4//HxXk+h31Y7fZtIbjTvT1T5FyMIohUXHN4+lIH4+xeK3YUVIxkn 6xe05LQZ+QoEdK6il2aEcTOe4WdvciNCcIWgHk49UeKhyCVP5ZaAxgLjv/O0KqdI48+9 B+whdZhUtIb8jA+0iOvwuHuCfurAT7XPnY1K9BPWziMcOfYNPnVQjI7ckqhxBGFBtFjF 6wru8s/Aato9X9ECpDybt8KaolXPX7DBJo/W6TIyIL4w0aifn+kIRgNwcUVSIQN/GprU GV5A== X-Gm-Message-State: APjAAAURF1BOmJQq5ASs/m2fotEuYOvMW5IXg9rUHLyiGDBKFQhbzwez chg2oSgW0ynz7wQEizjdxgPIlRTjGYlMmPL+RsxpjSzIJ74= X-Received: by 2002:aed:3ac2:: with SMTP id o60mr3247300qte.158.1555677395126; Fri, 19 Apr 2019 05:36:35 -0700 (PDT) MIME-Version: 1.0 References: <20190318100605.29120-1-benjamin.gaignard@st.com> <20190318104343.GA15574@e107155-lin> In-Reply-To: From: Benjamin Gaignard Date: Fri, 19 Apr 2019 14:36:24 +0200 Message-ID: Subject: Re: [RESEND PATCH 0/7] Introduce bus domains controller framework To: Sudeep Holla Cc: Benjamin Gaignard , Mark Brown , Rob Herring , Arnd Bergmann , Shawn Guo , s.hauer@pengutronix.de, Fabio Estevam , Loic PALLARDY , Greg Kroah-Hartman , Linux Kernel Mailing List , linux-imx@nxp.com, kernel@pengutronix.de, Linux ARM Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le lun. 18 mars 2019 =C3=A0 12:05, Benjamin Gaignard a =C3=A9crit : > > Le lun. 18 mars 2019 =C3=A0 11:43, Sudeep Holla a = =C3=A9crit : > > > > On Mon, Mar 18, 2019 at 11:05:58AM +0100, Benjamin Gaignard wrote: > > > Bus domains controllers allow to divided system on chip into multiple= domains > > > that can be used to select by who hardware blocks could be accessed. > > > A domain could be a cluster of CPUs (or coprocessors), a range of add= resses or > > > a group of hardware blocks. > > > > > > Framework architecture is inspirated by pinctrl framework: > > > - a default configuration could be applied before bind the driver > > > - configurations could be apllied dynamically by drivers > > > - device node provides the bus domains configurations > > > > > > An example of bus domains controller is STM32 ETZPC hardware block > > > which got 3 domains: > > > - secure: hardware blocks are only accessible by software running on = trust > > > zone. > > > - non-secure: hardware blocks are accessible by non-secure software (= i.e. > > > linux kernel). > > > - coprocessor: hardware blocks are only accessible by the corpocessor= . > > > Up to 94 hardware blocks of the soc could be managed by ETZPC and > > > assigned to one of the three domains. > > > > > > > You fail to explain why do we need this in non-secure Linux ? > > You need to have solid reasons as why this can't be done in secure > > firmware. And yes I mean even on arm32. On platforms with such hardware > > capabilities you will need some secure firmware to be running and these > > things can be done there. I don't want this enabled for ARM64 at all, > > firmware *has to deal* with this. > > We use ETZPC to define if hardware blocks can be used by Cortex A7 or Cor= tex M4 > (both non-secure) on STM32MP1 SoC, this new framework allow to change har= dware > block split at runtime. This could be done even on non-secure world > because their is > nothing critical to change hardware blocks users. > For example you can do "complex" tasks like display pipe configuration > on Cortex A7 > where linux is running and handover the control of this hardware block > to Cortex M4 to > offload drawing on framebuffer. > Gentle ping to get more feedback on this series Benjamin > Benjamin > > > > > -- > > Regards, > > Sudeep