Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp84307iof; Sun, 5 Jun 2022 21:53:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzvKyP4Fe7pDWnSOrnalo43/a6lZslAiTe05j8nctn9CbaV/13xCDQlqNz53TBU1v4piMgr X-Received: by 2002:a17:903:240c:b0:153:c8df:7207 with SMTP id e12-20020a170903240c00b00153c8df7207mr22277732plo.44.1654491189991; Sun, 05 Jun 2022 21:53:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654491189; cv=none; d=google.com; s=arc-20160816; b=ffVpxlEYNTLKG9legemzHmd9s3PZHpewd+YsUJCO+nKyORal9MZ6nU5r/V5nl70zo/ BlydOnfMIo2O/8P7FXzlGET9PMAQqxS11PI7zT8ItQj8nD790wToHNNxQk+hrGMORx0K 2To3vPOsc4I8eljTQheSPkISBd9XdocmwHaO5MZWCktFYsP3bIQGJxUIl2uqNXYUBJkE HYwVUBgy5dBe1XFLmlIow3Eq6E99reZH9V+BVEQQKLotXze/IuNNPptjuVFqrgNWWgAj wa+42MDyoiQ4HGhWUkkOGZrY66edrrt7qhQRLowdyG4vZW6W6H4abp308oDxJvgrBG5N P5vQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=n5xCoOmxcQUfNePekICBtm8yRcNAbJSdXliXE0/s6bo=; b=zsNUcBH/lrTpXXRs8DtB5DstVUk19sTRLfXWI4u240T0wTAiICaEgR7qD7QW2WjIAB MNktGozPeKFChm0Hr3r0U5CDeDsyC4HNGkxfvbu57CGR9IX4MsQN6RIOcXbFt7zPPU33 Rb+Z4LaTBiP85P1yjtwgBaJ6CfQF+6+csZyFyTaQnzRBqNjKSjjoa3FMhHWpyZJzHJpS cfRbTf2Tp4IyoZG1HZTG/IH3LmoQ8KYKGGABwoAvaZsrmN29W0M897+W5sayDiBb0wt4 3ytHxPFdO88W4te5y6BO2zA/DP96jUhEcrK+JX3Ooh2VKcwvGEQdI8f9j3r/a1TMVBKQ 7B1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id 68-20020a620647000000b0051b5cc7403dsi17912692pfg.27.2022.06.05.21.53.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 05 Jun 2022 21:53:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 16397B8BF4; Sun, 5 Jun 2022 21:08:13 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245014AbiFCOBK (ORCPT + 99 others); Fri, 3 Jun 2022 10:01:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33030 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241285AbiFCOBJ (ORCPT ); Fri, 3 Jun 2022 10:01:09 -0400 Received: from mail-oi1-f170.google.com (mail-oi1-f170.google.com [209.85.167.170]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1233B3A194; Fri, 3 Jun 2022 07:01:07 -0700 (PDT) Received: by mail-oi1-f170.google.com with SMTP id l84so10478976oif.10; Fri, 03 Jun 2022 07:01:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=n5xCoOmxcQUfNePekICBtm8yRcNAbJSdXliXE0/s6bo=; b=imGIdAMcY9YJjq7uUOuRN6k6+3/s4EhOaGAOoMwhhtqycDfNxz06BewkwuqnJFfYVf F6bHRN1RYtiDOiJ8sAVUdI5SUWBSCyfxAhjJJhr5sWNSRdPzefHGzT31ouGACl8khc7n utS30Vvhgh94GZ5GNwdLvZ/G4pDy36ARDmYweTZ3znSut+XIZ6kRwuElCL1u1jViYZhV DJ/XW7hAEopMtzbe2e8SZm8IqDJUwcLGaXq/uxzds0PYc2PhApBv3NHMKuA8sNuReqpM cfLmv7bd95fOL67FXyQzjyAN4hnrXlqwpRTdYM2K36F8vTE6Qpw9ctebvgsqaXKa1wrH bATQ== X-Gm-Message-State: AOAM533fU57EpXF9SJv2IksarzZZat43BHr6sGM+yDTn+kxLvb0bLWbq D05O28qkpHA05E9Vs+r9hImzezX80w== X-Received: by 2002:a05:6808:f08:b0:32c:157:ef98 with SMTP id m8-20020a0568080f0800b0032c0157ef98mr5421440oiw.140.1654264866277; Fri, 03 Jun 2022 07:01:06 -0700 (PDT) Received: from robh.at.kernel.org (66-90-144-107.dyn.grandenetworks.net. [66.90.144.107]) by smtp.gmail.com with ESMTPSA id d12-20020a4ad34c000000b0040ebba81054sm3770887oos.46.2022.06.03.07.01.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Jun 2022 07:01:05 -0700 (PDT) Received: (nullmailer pid 273368 invoked by uid 1000); Fri, 03 Jun 2022 14:01:04 -0000 Date: Fri, 3 Jun 2022 09:01:04 -0500 From: Rob Herring To: Stefano Stabellini Cc: Oleksii Moisieiev , "devicetree@vger.kernel.org" , Sudeep Holla , Cristian Marussi , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH v3 0/1] dt-bindings: Add device-perms property description Message-ID: <20220603140104.GA243231-robh@kernel.org> References: <20220601193956.GA234900-robh@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 02, 2022 at 06:19:00PM -0700, Stefano Stabellini wrote: > On Wed, 1 Jun 2022, Rob Herring wrote: > > On Thu, May 05, 2022 at 11:23:50AM +0000, Oleksii Moisieiev wrote: > > > Introduce device-perms property which is intended to set the device > > > permissions for the System Management interfaces. > > > An example of this interface is SCMI (System Control and Management > > > Interface) which controls clocks/power-domains/resets etc from the > > > Firmware. This property sets the device_id to set the device permissions > > > for the Fimware using BASE_SET_DEVICE_PERMISSIONS message (see 4.2.2.10 of [0]). > > > > Is that an exhaustive list of controls? Seems like there would be a > > GET_DEVICE_PERMISSIONS. > > > > > Device permissions management described in DEN 0056, Section 4.2.2.10 [0]. > > > Given parameter should set the device_id, needed to set device > > > permissions in the Firmware. > > > This property is used by trusted Agent to set permissions for the devices, > > > passed-through to the non-trusted Agents. Trusted Agent will use device-perms to > > > set the Device permissions for the Firmware (See Section 4.2.2.10 [0] > > > for details). > > > Agents concept is described in Section 4.2.1 [0]. > > > > As I said on the call discussing this, this looks very similar to other > > proposals wanting to control or check permissions on devices handled by > > some provider. While the consumer of the binding is different in various > > proposals, that doesn't really matter from a DT perspective. DT is just > > describing some type of connection between nodes. So I'm looking for > > collaboration here with folks that have made prior proposals. To put it > > another way, for a new common binding like this, I want to see more than > > one user. > > Do you have a pointer to another similar proposal or the name of someone > that might be interested and might be having a second use-case for this? ST folks who were on the call... IIRC from earlier SystemDT calls, that Xilinx had a similar need? Here's the various proposals I found: https://lore.kernel.org/all/20200701132523.32533-1-benjamin.gaignard@st.com/ https://lore.kernel.org/all/20190318100605.29120-1-benjamin.gaignard@st.com/ https://lore.kernel.org/all/20180227140926.22996-1-benjamin.gaignard@st.com/ The h/w in question is the ETZPC or TZPC. I would guess the SCMI interface was designed with this h/w in mind. Rob