Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp9876155rwl; Wed, 11 Jan 2023 11:11:20 -0800 (PST) X-Google-Smtp-Source: AMrXdXvJX9PCbs9dxtmDzuI5Q5lt3rNC9DupuiFJDVl5xEqFhVmPF/6C6A1Hs+jo7bYE6SEzDE3K X-Received: by 2002:a17:90b:1d83:b0:226:821d:b82a with SMTP id pf3-20020a17090b1d8300b00226821db82amr34662799pjb.12.1673464279761; Wed, 11 Jan 2023 11:11:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673464279; cv=none; d=google.com; s=arc-20160816; b=fSqNIZGZ2gfbgE97rQImeWbeq++NOxgrGGB/wVinEiazu3CI2351lEgvZ/wNwgavNU Nx8wMavDVFxjnh/UN3g6qUt+YZwbq4OLB5nLC+1q9JCy5k13HyF50tc0sUd5AT+HE6zg V6OIPtUb8Wk4nqqQC02CzFuyzWIFveYknWO5e++kAX+EoS0grSa/WM/3IMSZl70w39B5 le7iBkDgJ/V6p2JHQ5l98wt6O19VwQhBNHfDx91CNm0FSlW5kWkGX8royJDn6q5fXgnh Ivj5wtZFhIW7QhT++tlBcW7neEta0xDtx3vA3kIasZ/QLYljB1OrH79NEjmLLX9CEa+U IY5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:date:to:cc:from:subject:references :in-reply-to:content-transfer-encoding:mime-version:message-id :dkim-signature; bh=576SEdDOHXhYoUIgnxE+yGWSRtull3XcBKtrmzbOEf8=; b=tW09eoIaIvYm6aLCZNU8QMHTFThyHoX+FH/OoNikzVaZ4VA/Pzlrpmj3T4A6P0ttZg MdL1FtnsMDXpLKq9rBwWQBTHVCBN4ELuP+skdvq2CqM9vp/kf/lMAHrBOzhWmv4kwkmf KMgv5nO24qPQyA2M0vB03EZvHrRg3YFccddkwPXNQmpgWyXh4tHaf0AauDbf31TIJ0Ew q5bPSVCKBK4+v/ikJpBGhXZRAPdMH96Q/fH7plf/V3RcC+oxOgq0zaPp1U9LxQMuAgjs Tl/A05+ZKpnSMkJVaxJ+wD1iThFn/8JwKSAV5Q2TC8B83k/vF4n+208e7KfR9iWsHRcL qssg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KKAoYr6n; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l191-20020a6391c8000000b004b2b138fff9si10310379pge.47.2023.01.11.11.11.13; Wed, 11 Jan 2023 11:11:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KKAoYr6n; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234496AbjAKShh (ORCPT + 51 others); Wed, 11 Jan 2023 13:37:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41196 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231602AbjAKShd (ORCPT ); Wed, 11 Jan 2023 13:37:33 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07AB7EE04; Wed, 11 Jan 2023 10:37:33 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9B3B461DB1; Wed, 11 Jan 2023 18:37:32 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E1B28C433EF; Wed, 11 Jan 2023 18:37:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1673462252; bh=576SEdDOHXhYoUIgnxE+yGWSRtull3XcBKtrmzbOEf8=; h=In-Reply-To:References:Subject:From:Cc:To:Date:From; b=KKAoYr6n7Z4ZwKhCtcgysV52ra4x1GiVba5yd8drH9I/4etVMMztv2/SJ/EBo2+QN +jbsHeU3F25WT6HQ+yZtWHG+wKPlyCaFqyHCKvYGJsfETqhqXDK7Rqbk3jkEesv7Hx 3i+B2cuAFDP8hDqhwf3XoJUll/GnGC4vAtEuZrGUksBXr8FGHQqsbiiSH9sgV96//y FG8CE1uHWFLkfNoLp7jvKfAzEN7wV97wqsvpasyns5JQWICi9vd0lKwMI/lj4XRAeS vXhHtpz5pM6EbH1wq/RpHQfhca5J5A7lj0b91I8X3jiOA5qvfrs8Nhs13MR+n5Y4mT pcPgfMQppacgg== Message-ID: <57d1f58c4c6cca793d629d5776b477d0.sboyd@kernel.org> Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable In-Reply-To: <20230110114540.2975540-1-me@linux.beauty> References: <20230110114540.2975540-1-me@linux.beauty> Subject: Re: [PATCH] clk: create write_enable file to control clk rate write and other dangerous ops permission From: Stephen Boyd Cc: Li Chen , linux-clk@vger.kernel.org, linux-kernel@vger.kernel.org To: Li Chen , Michael Turquette Date: Wed, 11 Jan 2023 10:37:29 -0800 User-Agent: alot/0.10 X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Li Chen (2023-01-10 03:45:39) > From: Li Chen >=20 > It's common requirement for bsp debug/test to change clk rate from usersp= ace. >=20 > Currently, we must define CLKOCK_ALLOW_WRITE_DEBUGFS then re-compile kern= el > to allow this feature. Let's replace it with a "write_enable" file to > allow enable it at runtime. Nak. This design is intentional.