Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp415113ybk; Wed, 13 May 2020 03:36:47 -0700 (PDT) X-Google-Smtp-Source: APiQypJ44iLWkuE202eY+nM76Xl54i/xKOkNAvZF3MgadbNb37xLow0aQMGBXjRJyu6B6KV3HrWW X-Received: by 2002:a50:d1c4:: with SMTP id i4mr17180442edg.344.1589366206923; Wed, 13 May 2020 03:36:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589366206; cv=none; d=google.com; s=arc-20160816; b=lKWtYOOHieRHSVKUA9xh92plCtTPARZCLwLrtIH1od6AB3kjwm/uQx3BUQrK2DDDAV Q+EFwcvjWgblvn71r1pflpUL0qMcvsLUvJRdJT0B5x1hvqC8mXHukrqVKflBDQ0wF4NH hkT0fThirdwnDy1LQUazaZL+PJdk8ybTTRb+URlWO/+1WhlABenqQidlCM/Smp0eAzMc zX4+6CC4LjDRYMaZQ1Bzo6L1pxXnZzVuGabDV7W3LW7r5g7tG1n9m3SkEX7AoINj8uA1 ggYPlN174gHFt/sZChfUrjTPkObVBv1ak5wphexX9XIm8DP7YvucW4PyaZbvMDSmZoFa 1Ekw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=RAYZx92zrU+XEe1c66bMex9zzQrfW8p1ZDJSPXKhkxg=; b=MeEI9HTKaQXRGMwBkbFd0Fdf7HPck4F+QNBY6aximL7GNNoiq5jr+AJh6sO1i+3qqx +VL9/49ZRBpf3zCaLPN1vQAcvB2vkjj9RgveRrPiBccYYl6/GqVVxNjrRdXZz/tErtcw 9/H+CtMTHgRIkMnm8ZVARdH5n328e1AEnKP/fs7p2jgUehLnxhV5K/z6TM2sMIEoD+yp xDkIwxt2kncc9s+ZMSbLQxz+dtyxtiGggW1R63+/6UoGvDXCVXinS4D/Nnl2ybuHGeGW Ky4rxfK/kKdgMdCMl3bu0oxwFSfqMlelb3sbgTkcpFutzImzDMz40/YQSjvGK3swreGk YeJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=uQuO6RtH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f13si2771484ejh.360.2020.05.13.03.36.17; Wed, 13 May 2020 03:36:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=uQuO6RtH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730149AbgEMKeS (ORCPT + 99 others); Wed, 13 May 2020 06:34:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728258AbgEMKeR (ORCPT ); Wed, 13 May 2020 06:34:17 -0400 Received: from mail-wm1-x343.google.com (mail-wm1-x343.google.com [IPv6:2a00:1450:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CAFEDC061A0E for ; Wed, 13 May 2020 03:34:16 -0700 (PDT) Received: by mail-wm1-x343.google.com with SMTP id g12so27879308wmh.3 for ; Wed, 13 May 2020 03:34:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=RAYZx92zrU+XEe1c66bMex9zzQrfW8p1ZDJSPXKhkxg=; b=uQuO6RtH84Sdte9oQ6z12C173539QDB3JFLHZvwnWliYctpNhh7U3d3BWSmnM3PQcW 2TihzvWsRZT+drxcJBKvCJhGlYnMVB+1Vea4v+CCdpnO08hlkBK5gR5iHl6wLluHIkWs aiJcjamaQDMNCKx/TRLEdfgdq6uga+a6GGIRhP0XeTMdk80d1sTjO8rc5DepupocSZdD z1sIANLCNepEeRKZKLNTVpC28i/xhU+CAFKHWOQMgUzDXP93oyxlo6Glp8/5KMFmIkoP 5hd2RDMyZKBWjXaVnk0wfYOBObymhyhNWM3uYTHfsxmW1LdI8Kof2hifz6ZrGzn2kd+d SMZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=RAYZx92zrU+XEe1c66bMex9zzQrfW8p1ZDJSPXKhkxg=; b=J17UHkdxEriFLggoCdJfmtwQrojuJVBOEUEwzSy1bpNs9eGqzb+tHjDUvc/n6nvyUV DX7bVEi674EnL2cD7+5czk39nfn3TctiPUIhbcOR76o+lENKcOnJEhGLCTHvo3nDFFnT 1cn/vLwTlZbpoTVx6mY8PevmXhWSOtLiVeqNou0kga+Dr7A21HIkJY/5whwAXqYthYud rIAZ9Ock0Efg8ngSnZFh5covZFXZVhPLDJYQQX5rGVReQzMerD89PO+2ui0EnGnRH55s a1Nt4uGLVfId/LOo8f5wX33Uf0OHv5VzOi3hsfJAAy49+TSO2KxqTxbHz0P+xFj1aWy5 6LIw== X-Gm-Message-State: AGi0PuZ82m3d/C1RrNSi/8B/K8KvDdHJttBVNBFb1x1ZnwRZsYsrPOU7 q1ZBrXb/zf+yli2G5H7b0AYQZGE42gQ= X-Received: by 2002:a1c:2ed3:: with SMTP id u202mr40266117wmu.77.1589366054922; Wed, 13 May 2020 03:34:14 -0700 (PDT) Received: from [192.168.86.34] (cpc89974-aztw32-2-0-cust43.18-1.cable.virginm.net. [86.30.250.44]) by smtp.googlemail.com with ESMTPSA id c25sm34270101wmb.44.2020.05.13.03.34.13 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 13 May 2020 03:34:14 -0700 (PDT) Subject: Re: [PATCH v2 4/6] nvmem: add support for the Khadas MCU Programmable User Memory To: Neil Armstrong Cc: linux-amlogic@lists.infradead.org, linux-pm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org References: <20200512132613.31507-1-narmstrong@baylibre.com> <20200512132613.31507-5-narmstrong@baylibre.com> From: Srinivas Kandagatla Message-ID: <09026bde-0ae7-b1a4-835f-bf2481199398@linaro.org> Date: Wed, 13 May 2020 11:34:13 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20200512132613.31507-5-narmstrong@baylibre.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/05/2020 14:26, Neil Armstrong wrote: > The new Khadas VIM2, VIM3 and Edge boards embeds an on-board microcontroller > offering a 56bytes User Programmable NVMEM array. > > This array needs a password to be writable, thus a password sysfs file > has been added on the device node to unlock the NVMEM. Is this one time programmable? Or does it need to be unlocked for every read/write? How can you make sure that the memory is unlocked before making attempt to read/write? > > The default 6bytes password id: "Khadas" > > This implements the user NVMEM devices as cell of the Khadas MCU MFD driver. > > Signed-off-by: Neil Armstrong > --- > drivers/nvmem/Kconfig | 8 ++ > drivers/nvmem/Makefile | 2 + > drivers/nvmem/khadas-mcu-user-mem.c | 128 ++++++++++++++++++++++++++++ > 3 files changed, 138 insertions(+) > create mode 100644 drivers/nvmem/khadas-mcu-user-mem.c > > diff --git a/drivers/nvmem/Kconfig b/drivers/nvmem/Kconfig > index d7b7f6d688e7..92cd4f6aa931 100644 > --- a/drivers/nvmem/Kconfig > +++ b/drivers/nvmem/Kconfig > @@ -67,6 +67,14 @@ config JZ4780_EFUSE > To compile this driver as a module, choose M here: the module > will be called nvmem_jz4780_efuse. > > +config NVMEM_KHADAS_MCU_USER_MEM > + tristate "Khadas MCU User programmable memory support" > + depends on MFD_KHADAS_MCU > + depends on REGMAP > + help > + This is a driver for the MCU User programmable memory > + available on the Khadas VIM and Edge boards. > + > config NVMEM_LPC18XX_EEPROM > tristate "NXP LPC18XX EEPROM Memory Support" > depends on ARCH_LPC18XX || COMPILE_TEST > diff --git a/drivers/nvmem/Makefile b/drivers/nvmem/Makefile > index a7c377218341..0516a309542d 100644 > --- a/drivers/nvmem/Makefile > +++ b/drivers/nvmem/Makefile > @@ -17,6 +17,8 @@ obj-$(CONFIG_NVMEM_IMX_OCOTP_SCU) += nvmem-imx-ocotp-scu.o > nvmem-imx-ocotp-scu-y := imx-ocotp-scu.o > obj-$(CONFIG_JZ4780_EFUSE) += nvmem_jz4780_efuse.o > nvmem_jz4780_efuse-y := jz4780-efuse.o > +obj-$(CONFIG_NVMEM_KHADAS_MCU_USER_MEM) += nvmem-khadas-mcu-user-mem.o > +nvmem-khadas-mcu-user-mem-y := khadas-mcu-user-mem.o > obj-$(CONFIG_NVMEM_LPC18XX_EEPROM) += nvmem_lpc18xx_eeprom.o > nvmem_lpc18xx_eeprom-y := lpc18xx_eeprom.o > obj-$(CONFIG_NVMEM_LPC18XX_OTP) += nvmem_lpc18xx_otp.o > diff --git a/drivers/nvmem/khadas-mcu-user-mem.c b/drivers/nvmem/khadas-mcu-user-mem.c > new file mode 100644 > index 000000000000..a1d5ae9a030c > --- /dev/null > +++ b/drivers/nvmem/khadas-mcu-user-mem.c > @@ -0,0 +1,128 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Driver for Khadas MCU User programmable Memory > + * > + * Copyright (C) 2020 BayLibre SAS > + * Author(s): Neil Armstrong > + */ > + > +#include Why do we need this header? > +#include > +#include > +#include > +#include > +#include > +#include > + > +static int khadas_mcu_user_mem_read(void *context, unsigned int offset, > + void *val, size_t bytes) > +{ > + struct khadas_mcu *khadas_mcu = context; > + > + return regmap_bulk_read(khadas_mcu->map, > + KHADAS_MCU_USER_DATA_0_REG + offset, > + val, bytes); > +} > + > +static int khadas_mcu_user_mem_write(void *context, unsigned int offset, > + void *val, size_t bytes) > +{ > + struct khadas_mcu *khadas_mcu = context; > + > + return regmap_bulk_write(khadas_mcu->map, > + KHADAS_MCU_USER_DATA_0_REG + offset, > + val, bytes); > +} > + > +static ssize_t password_store(struct device *dev, struct device_attribute *attr, > + const char *buf, size_t count) > +{ > + struct khadas_mcu *khadas_mcu = dev_get_drvdata(dev); > + int i, ret; > + > + if (count < 6) > + return -EINVAL; Possibly this magic 6 value needs proper define. An additional check here for > 6 would be better as well. > + > + ret = regmap_write(khadas_mcu->map, KHADAS_MCU_PASSWD_START_REG, 1); > + if (ret) > + return ret; > + > + for (i = 0 ; i < 6 ; ++i) { > + ret = regmap_write(khadas_mcu->map, > + KHADAS_MCU_CHECK_USER_PASSWD_REG, > + buf[i]); > + if (ret) > + goto out; > + } > + > + ret = regmap_write(khadas_mcu->map, KHADAS_MCU_PASSWD_START_REG, 0); > + if (ret) > + return ret; > + > + return count; > +out: > + regmap_write(khadas_mcu->map, KHADAS_MCU_PASSWD_START_REG, 0); > + > + return ret; > +} > + > +static DEVICE_ATTR_WO(password); > + > +static struct attribute *khadas_mcu_user_mem_sysfs_attributes[] = { > + &dev_attr_password.attr, > + NULL, > +}; > + > +static const struct attribute_group khadas_mcu_user_mem_sysfs_attr_group = { > + .attrs = khadas_mcu_user_mem_sysfs_attributes, > +}; > + > +static int khadas_mcu_user_mem_probe(struct platform_device *pdev) > +{ > + struct khadas_mcu *khadas_mcu = dev_get_drvdata(pdev->dev.parent); You could probably get away with dependency of this structure and the header itself by directly getting hold of regmap from parent device. > + struct device *dev = &pdev->dev; > + struct nvmem_device *nvmem; > + struct nvmem_config *econfig; > + > + econfig = devm_kzalloc(dev, sizeof(*econfig), GFP_KERNEL); > + if (!econfig) > + return -ENOMEM; > + > + econfig->dev = pdev->dev.parent; > + econfig->name = dev_name(pdev->dev.parent); > + econfig->stride = 1; > + econfig->word_size = 1; > + econfig->reg_read = khadas_mcu_user_mem_read; > + econfig->reg_write = khadas_mcu_user_mem_write; > + econfig->size = 56; define 56 to make it more readable! > + econfig->priv = khadas_mcu; > + > + platform_set_drvdata(pdev, khadas_mcu); > + > + nvmem = devm_nvmem_register(&pdev->dev, econfig); > + if (IS_ERR(nvmem)) > + return PTR_ERR(nvmem); > + > + return sysfs_create_group(&pdev->dev.kobj, > + &khadas_mcu_user_mem_sysfs_attr_group); > +} > + > +static const struct platform_device_id khadas_mcu_user_mem_id_table[] = { > + { .name = "khadas-mcu-user-mem", }, > + {}, > +}; > +MODULE_DEVICE_TABLE(platform, khadas_mcu_user_mem_id_table); > + > +static struct platform_driver khadas_mcu_user_mem_driver = { > + .probe = khadas_mcu_user_mem_probe, > + .driver = { > + .name = "khadas-mcu-user-mem", > + }, > + .id_table = khadas_mcu_user_mem_id_table, > +}; > + > +module_platform_driver(khadas_mcu_user_mem_driver); > + > +MODULE_AUTHOR("Neil Armstrong "); > +MODULE_DESCRIPTION("Khadas MCU User MEM driver"); > +MODULE_LICENSE("GPL v2"); >