Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp11885119rwl; Tue, 3 Jan 2023 06:12:26 -0800 (PST) X-Google-Smtp-Source: AMrXdXv+51IcqARFzJEfUsvRBYv/d/LEfrC775Y8yWVsu6ALnztD85EPBXkqQo+XCiiIXBc1JOus X-Received: by 2002:a17:907:a08d:b0:7c0:dac7:36d8 with SMTP id hu13-20020a170907a08d00b007c0dac736d8mr39491030ejc.10.1672755146581; Tue, 03 Jan 2023 06:12:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672755146; cv=none; d=google.com; s=arc-20160816; b=bzp2yBvKxYDITAUGU6WBVXNxSY/cmBXlxUaVZ3WPGrQf7aK0vJLSwdT2lcECgRhPJk SsTHX56xSfDBYbVU4jnmoNW9kcHWHpM6H/gpyAE77XREldlLaFEiwJAMwAM3L+c70N+7 Mu/dbjVAL+TVWb7Vw2QRcNeuvJdJAOgLaHVdJdD2BQ/yPJIwMZktc9iCweduug5mg9Ml Hd2DsLwwF4SqmsUANOHPYzcKkeT2sPwigOaUHdxTFqCzABHBFMzSjDvmKPkpvI198ubW DlbDRxIy5Q7EdNmbz1V/kZYFzP73GoVzItnNu7dyDgNBA1PA3ZCtO4yEDFQ+8X8kW3a/ np1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=JvnhIL5oAgmZkSvjtm2o52Uw3QrIZiofYAehETdAz6A=; b=XoJDb3L3uuy2PqJYFO3k2KdRIclA7KxDOO6TNZZz9CsaPQ+wa7bR1t5m/bS5L/KhWH uIArwhy4bqo1kell5u7/l0tC72yIzPhXqR7ndNAnvi+oCuIOV7a4Z21b/EFCJBeJn05H VD+be3g8LAag6nkRzbWBeZo58VSB82DLuV7G+1U/jrXfP19jFPaq3CHdmQvemEnxdCtB R5SLbn8Q+m1k2ONNwAEY1AmOXixQTqzu3E7FW5o99PKrbYmYEz+H/QpFGGyv8Hu476fY tfLDe+pmpbwkqh8ov9g7jQLJGpztER3uQTaEJSCWojODlHnrmOLu46IADWoTJREelDVM JJFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=8ZsumrgG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qb39-20020a1709077ea700b007fcfcf3b8a4si27983825ejc.353.2023.01.03.06.12.12; Tue, 03 Jan 2023 06:12:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=8ZsumrgG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237817AbjACOIv (ORCPT + 60 others); Tue, 3 Jan 2023 09:08:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56378 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237782AbjACOIi (ORCPT ); Tue, 3 Jan 2023 09:08:38 -0500 Received: from mx07-00178001.pphosted.com (mx08-00178001.pphosted.com [91.207.212.93]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D4421117A; Tue, 3 Jan 2023 06:08:37 -0800 (PST) Received: from pps.filterd (m0046660.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 303AaKiI020960; Tue, 3 Jan 2023 15:08:04 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foss.st.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding : content-type; s=selector1; bh=JvnhIL5oAgmZkSvjtm2o52Uw3QrIZiofYAehETdAz6A=; b=8ZsumrgGQyHXjFoCmYfLFRZk9oYXaCC2MCshXMjR5ZRmCs+pt7YHqsmeschXDS0bXEP6 nGm1FBCfGM6vGdKdP9PsWcueoLZ+zzF3GC4NYZEmT8i8dWqE0yru6ENuB/bAsWCuk1FR f+J1A7DCaKYHLMtzvLLNs+InrY3h/u9DJ/AcReBgz87h6CB5bylJtodwkvatMS3fav6W vOZURgGqZYz+GXckvzLOjxwJkt1zLL5mcHZgdXv1EwkRjpJsusnprOFNiZbfG0Bkk7bX 33Bpiv3xBzrWHGK38pn05qvkPvCfFUR45gluM/ghjpa+i6/Mcss26erou9Lt5zF+DUpr oQ== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com (PPS) with ESMTPS id 3mtb3e5hax-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 03 Jan 2023 15:08:04 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 59C9010002A; Tue, 3 Jan 2023 15:08:03 +0100 (CET) Received: from Webmail-eu.st.com (shfdag1node3.st.com [10.75.129.71]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 50595224401; Tue, 3 Jan 2023 15:08:03 +0100 (CET) Received: from localhost (10.48.0.157) by SHFDAG1NODE3.st.com (10.75.129.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.13; Tue, 3 Jan 2023 15:08:03 +0100 From: Patrick Delaunay To: Alexandre TORGUE , Rob Herring , Krzysztof Kozlowski , Maxime Coquelin , Srinivas Kandagatla CC: Lionel DEBIEVE , Amelie DELAUNAY , Etienne CARRIERE , Fabrice GASNIER , Patrick Delaunay , , , , Subject: [PATCH v4 0/3] nvmem: stm32: add OP-TEE support for STM32MP13x Date: Tue, 3 Jan 2023 15:05:18 +0100 Message-ID: <20230103140521.187678-1-patrick.delaunay@foss.st.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.48.0.157] X-ClientProxiedBy: SHFCAS1NODE2.st.com (10.75.129.73) To SHFDAG1NODE3.st.com (10.75.129.71) X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2023-01-03_04,2023-01-03_02,2022-06-22_01 X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The v4 patchset is rebased on next-20221226. This serie update the NVMEM BSEC driver to be compatible with STM32MP13x SoC and the trusted application STM32MP BSEC in OP-TEE This serie solve issue in initial support of STM32MP131 (using BSEC STM32MP15 compatible) and so it break the STM32MP13x DTS compatible. I create this serie for more efficient review, including support for STM32MP15x. The first patches of the V1 series is already merged: "dt-bindings: nvmem: add new stm32mp13 compatible for stm32-romem" This STM32MP13x DTS break is acceptable as - the STM32MP13x SoC is not yet available outside STMicroelectronics (not official) - the same patch is already integrated or modifications are in progress in the other users (arm-trusted-firmware/TF-A, OP-TEE and U-Boot) of stm32mp131 device tree. It is the good time to correct this issue before the real availability of the SoC and before full support of STM32MP13x SoC in Linux kernel. Regards Patrick Changes in v4: - fixe warning reported by kernel test robot for 64 bits support in drivers/nvmem/stm32-bsec-optee-ta.c:260:18: warning: format '%d' expects argument of type 'int', but argument 4 has type 'size_t' Changes in v3: - add a separate file stm32-bsec-optee-ta.c with STM32MP BSEC TA communication functions to avoid #if in romem driver. - use of_find_compatible_node in optee_presence_check function instead of of_find_node_by_path("/firmware/optee") Changes in v2: - rebase series on linux-next/master - minor update after V1 revue Changes in v1: - update commit message to indicate DTS break reason. Patrick Delaunay (3): ARM: dts: stm32mp13: fix compatible for BSEC nvmem: stm32: add OP-TEE support for STM32MP13x nvmem: stm32: detect bsec pta presence for STM32MP15x arch/arm/boot/dts/stm32mp131.dtsi | 2 +- drivers/nvmem/Kconfig | 11 + drivers/nvmem/Makefile | 1 + drivers/nvmem/stm32-bsec-optee-ta.c | 298 ++++++++++++++++++++++++++++ drivers/nvmem/stm32-bsec-optee-ta.h | 80 ++++++++ drivers/nvmem/stm32-romem.c | 83 +++++++- 6 files changed, 471 insertions(+), 4 deletions(-) create mode 100644 drivers/nvmem/stm32-bsec-optee-ta.c create mode 100644 drivers/nvmem/stm32-bsec-optee-ta.h base-commit: c76083fac3bae1a87ae3d005b5cb1cbc761e31d5 prerequisite-patch-id: 5aaa8fffbdd16871143808180b3932d80f4045d0 prerequisite-patch-id: ae711dc528e191e4751cbb7402041fc5f185d6b3 -- 2.25.1