Received: by 2002:a05:7412:3b8b:b0:fc:a2b0:25d7 with SMTP id nd11csp2898043rdb; Mon, 12 Feb 2024 23:53:01 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUyAeAJusTp14e9Gqqx5KBDntim3UmBy0juZV4uun6/9RUFgIwtL/pRrA1FGhnubkNDbQvwaM3ifBtV8JwOeBRwDoxbejBOhCu915nv+g== X-Google-Smtp-Source: AGHT+IENAav+1gxn3G3tVR7UF3VmgdCp8nyi/z6jJl1G1H426mNIY5T4ydh/R3ZTxiZiOJhdjUWL X-Received: by 2002:a17:90a:6d90:b0:298:ab03:275e with SMTP id a16-20020a17090a6d9000b00298ab03275emr1451326pjk.5.1707810781467; Mon, 12 Feb 2024 23:53:01 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707810781; cv=pass; d=google.com; s=arc-20160816; b=wzqfeGgM/Dt+qrMpSb9eHNTpPOcOi5fzBOtTFhopVIrWOQEfgRV28d9OaOA8qCsUKo LznEhrrAYvE/xrtYY93sJ4ADBvhW0IW/3OsYVGBnNbaCQWeHUCE8tjlQWNTYx3RN8w2h AgL695928n6Gs7gpWjqLbrkvfof7j2j8cLjsPQF/JU7x9sSzUV8sp9TaE+SZPAV0JlJu hCy6ooZ02KOC4AWkkDWVrhE8/yXE3/ayU97VvqAfJWMaTxH1YesCywUsR1tIRsJKl9xq n5wf0kB+4XVo8vAGuR1Zo4EqxVpwTHbCYk6VQObiT+a10COncQr1I6Oa3tHeFckRx0q6 YHKw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:autocrypt:from:references:cc :to:content-language:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature; bh=4gUdl2/6yyUfOH9+d0TxWj7DiTsTpgfUjt65todPL28=; fh=VwVwXNz12CeS1TO/HdOXbrTi5Q2i+gP35cCVvi92Z/s=; b=Rcc/Dvj+Ai3K4j+DY17KAUOhPyOBTCbmhNODPMlt5eyxrsXj9LPagLk8DgdhbqWE54 GLsXvrOdIjWL757YWBQaW+WSOUJMUaG/lAzW7CMubMpbr6S5NoCLZpeT/dBc7DS2p5qN CsSRJW8llZiCcmfK2FApI61ar97gfNVY+0Qv1EA8BqqyZxllqSF7YN+H8f3ouzvBFI3/ seFIWgGTCsH/YSyQF9f28pHX6EFgTTAJK7Sgf4E0GoGrRoMSc7wgM5p6UrU2qFOEsmMH txElE/28n/xVceJqKPRoEytzamQj301NV7tWFsSBFjfeJTjcZomWkLmdDFJy6lKV46AW vXcQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=qgHRw08G; arc=pass (i=1 spf=pass spfdomain=linaro.org dkim=pass dkdomain=linaro.org dmarc=pass fromdomain=linaro.org); spf=pass (google.com: domain of linux-kernel+bounces-63060-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-63060-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org X-Forwarded-Encrypted: i=2; AJvYcCXEIm1xSrqSszXSuOePCqjY3gOsrV+7+kZTjKOAfpZVvVsouB1v5RZW3VbX6Mo9Jr1Hn0Cxm0KlWXRPeHUz24tXjoIvp8WUkwur+RaMWw== Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id o11-20020a17090ac70b00b0029666a75eb4si1637839pjt.17.2024.02.12.23.53.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Feb 2024 23:53:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-63060-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=qgHRw08G; arc=pass (i=1 spf=pass spfdomain=linaro.org dkim=pass dkdomain=linaro.org dmarc=pass fromdomain=linaro.org); spf=pass (google.com: domain of linux-kernel+bounces-63060-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-63060-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 95AC6283F86 for ; Tue, 13 Feb 2024 07:53:00 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A574717980; Tue, 13 Feb 2024 07:52:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="qgHRw08G" Received: from mail-lf1-f52.google.com (mail-lf1-f52.google.com [209.85.167.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7573A175A4 for ; Tue, 13 Feb 2024 07:52:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.167.52 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707810771; cv=none; b=io98MnTtfbZXbYFnW8z8/9yCfn/CYDW9yLN2yJu96zRTkEHQqOy8dBKT2kWKzrJ1EKEJZTK3g5aIc1NbEEw3T3yG5xejaLzkA2AV88AvWhV6U2RZBtnSywYXasepGkczFcPfumSj/ch64lfdPcGQx1GHQwK56obtDxSd2eyNd94= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707810771; c=relaxed/simple; bh=9p7YWmkMT2ZQ1y3hqYiB0H2HUZg7hqi/cq7zDlSBiUQ=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=UhDYNlDhsmJg+dSt/281nh9g2lICMR+8ENwROe2SgFbV/P9WgJe+dg4FbNBxsJCaAVUMAqxRcSd2/07GKi1xdQUrXtl7QQ4Ju7FdLn0uQjMofSgAtUsOrI/9TvcrQTgafVyKfZYfljf6y0hqKyZKtlM2fmonQ5TuOAu3dsCfsEI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org; spf=pass smtp.mailfrom=linaro.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b=qgHRw08G; arc=none smtp.client-ip=209.85.167.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linaro.org Received: by mail-lf1-f52.google.com with SMTP id 2adb3069b0e04-5114fa38434so4447348e87.0 for ; Mon, 12 Feb 2024 23:52:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1707810767; x=1708415567; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:autocrypt:from:references:cc :to:content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=4gUdl2/6yyUfOH9+d0TxWj7DiTsTpgfUjt65todPL28=; b=qgHRw08GboD0J38CWGZgXeugye72IuguctRWezymCwQZEYeO44njMBT/AqVKTfUT0m ePiXCXLRkRwmveCpg90VQKEZIEP6hlnopkJLtT4YOvj1VQNC3jIBqSk+gMMUd2fn6mSx YrEADepWhynDHzV2CEkhD1EJ6x6+JpgeG50UXVXyZ0uF7RHnSAvaEbZggROc/HJNMnvy HvMlK61NA5kgyapsx1IbdXhMxxwdWCMFaWN7TQrBWJbataUMFZTl9CaMvoEOTiPID8mU sWxCo2aWdZ9hd/aTvvfQLSn0X4gCkPqbYYAGWU/0+lcXdCssyw4oRqCXOQfag5uoj6wD p6Vg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707810767; x=1708415567; h=content-transfer-encoding:in-reply-to:autocrypt:from:references:cc :to:content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=4gUdl2/6yyUfOH9+d0TxWj7DiTsTpgfUjt65todPL28=; b=H5fNVqpCUFjFYpsQfz/6oukpbIWTJBdadRvtNJORGU66i4k7+PjccbUFqOmgRML+Qi BUU2QukxSJJp5lM4bd52K4isOggqunh1xOthekJ2UKL86udTqa7kdF7deY6W73E6wrPt qf6I5AuEBUg+dmPJEl0TUy+p1cVg/2SXJDVpmE3f0xI65fz6NkKs7aS8bYOg++3khLLE k6SLEQSrewfTUCnf531aauqUnKy2Bik/8ENCLDOcHMbEZKtr5q+myTCGWUN/HIkxNbsH fiNQ3KC5SgKaUShhCDnR8OiXC99igm5PJUfLcxnywnCuQI5zwQ/rJTYBo03865HuCNua Z+VA== X-Forwarded-Encrypted: i=1; AJvYcCUj6n/rnCVyUZVmaH/Nap7/U5bUKRHr+bCxkw7pjuPwL4HoE6V8oUqXP2/xD0bEWEMeBfKwpCsQp5dduNvFoL84Gws3jLow7+UZzbh8 X-Gm-Message-State: AOJu0YyVwNfj2uwBk10L7DvDBHDaHaHTu4whC18s5SXyul5J+LFKYWvd phGZVF/LwnKpMzp6POsFbJOJsgOCiKOqi9mHdWQb6tR8qRXgWcfP0qwg3zmUV2s= X-Received: by 2002:ac2:41ca:0:b0:511:1ed7:61b8 with SMTP id d10-20020ac241ca000000b005111ed761b8mr6112291lfi.30.1707810767434; Mon, 12 Feb 2024 23:52:47 -0800 (PST) X-Forwarded-Encrypted: i=1; AJvYcCWfIDnmXSHQs9RC0eoASbW20HKcbnPj50wh9FUN+kizs9ao1dURas9VwCeuqxtwEPZiIacvm72Kz/N2AH8XlcscBWq097C+iovnIqNPr3UMBdL2bFx2qExOObM64qvpdYTDNQ9R4wwN+Lxn6tfOEpfDEh6CFdUz5PQxfkviU+upojm3mmHslvGf7v9yZF5bDo8hJTunE+RnVWwmJsR+nhknn/OksnjmvQrz5GPf2u1R2nRQ53QBf7glwaooK098HUxr+LaeRNaRJQfffjTscWqoetkIko+m+yIGtl4Cjf44CYRVBg81DMHN6eHjo1qfbM8FqlFsqUgbVbZrUzbNUmQ5BkajBhJAft7WSbMrhE155Vkh36wku3aUkds= Received: from [192.168.1.20] ([178.197.223.6]) by smtp.gmail.com with ESMTPSA id jx6-20020a05600c578600b0040ffd94cd27sm10703773wmb.45.2024.02.12.23.52.46 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 12 Feb 2024 23:52:47 -0800 (PST) Message-ID: <989661f0-f539-43c3-a332-13c0e99ed7b9@linaro.org> Date: Tue, 13 Feb 2024 08:52:45 +0100 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH 06/12] memory: stm32-fmc2-ebi: add RIF support Content-Language: en-US To: Christophe Kerello , miquel.raynal@bootlin.com, richard@nod.at, vigneshr@ti.com, robh+dt@kernel.org, krzysztof.kozlowski+dt@linaro.org, conor+dt@kernel.org Cc: linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, devicetree@vger.kernel.org References: <20240212174822.77734-1-christophe.kerello@foss.st.com> <20240212174822.77734-7-christophe.kerello@foss.st.com> From: Krzysztof Kozlowski Autocrypt: addr=krzysztof.kozlowski@linaro.org; keydata= xsFNBFVDQq4BEAC6KeLOfFsAvFMBsrCrJ2bCalhPv5+KQF2PS2+iwZI8BpRZoV+Bd5kWvN79 cFgcqTTuNHjAvxtUG8pQgGTHAObYs6xeYJtjUH0ZX6ndJ33FJYf5V3yXqqjcZ30FgHzJCFUu JMp7PSyMPzpUXfU12yfcRYVEMQrmplNZssmYhiTeVicuOOypWugZKVLGNm0IweVCaZ/DJDIH gNbpvVwjcKYrx85m9cBVEBUGaQP6AT7qlVCkrf50v8bofSIyVa2xmubbAwwFA1oxoOusjPIE J3iadrwpFvsZjF5uHAKS+7wHLoW9hVzOnLbX6ajk5Hf8Pb1m+VH/E8bPBNNYKkfTtypTDUCj NYcd27tjnXfG+SDs/EXNUAIRefCyvaRG7oRYF3Ec+2RgQDRnmmjCjoQNbFrJvJkFHlPeHaeS BosGY+XWKydnmsfY7SSnjAzLUGAFhLd/XDVpb1Een2XucPpKvt9ORF+48gy12FA5GduRLhQU vK4tU7ojoem/G23PcowM1CwPurC8sAVsQb9KmwTGh7rVz3ks3w/zfGBy3+WmLg++C2Wct6nM Pd8/6CBVjEWqD06/RjI2AnjIq5fSEH/BIfXXfC68nMp9BZoy3So4ZsbOlBmtAPvMYX6U8VwD TNeBxJu5Ex0Izf1NV9CzC3nNaFUYOY8KfN01X5SExAoVTr09ewARAQABzTRLcnp5c3p0b2Yg S296bG93c2tpIDxrcnp5c3p0b2Yua296bG93c2tpQGxpbmFyby5vcmc+wsGUBBMBCgA+FiEE m9B+DgxR+NWWd7dUG5NDfTtBYpsFAmI+BxMCGwMFCRRfreEFCwkIBwIGFQoJCAsCBBYCAwEC HgECF4AACgkQG5NDfTtBYptgbhAAjAGunRoOTduBeC7V6GGOQMYIT5n3OuDSzG1oZyM4kyvO XeodvvYv49/ng473E8ZFhXfrre+c1olbr1A8pnz9vKVQs9JGVa6wwr/6ddH7/yvcaCQnHRPK mnXyP2BViBlyDWQ71UC3N12YCoHE2cVmfrn4JeyK/gHCvcW3hUW4i5rMd5M5WZAeiJj3rvYh v8WMKDJOtZFXxwaYGbvFJNDdvdTHc2x2fGaWwmXMJn2xs1ZyFAeHQvrp49mS6PBQZzcx0XL5 cU9ZjhzOZDn6Apv45/C/lUJvPc3lo/pr5cmlOvPq1AsP6/xRXsEFX/SdvdxJ8w9KtGaxdJuf rpzLQ8Ht+H0lY2On1duYhmro8WglOypHy+TusYrDEry2qDNlc/bApQKtd9uqyDZ+rx8bGxyY qBP6bvsQx5YACI4p8R0J43tSqWwJTP/R5oPRQW2O1Ye1DEcdeyzZfifrQz58aoZrVQq+innR aDwu8qDB5UgmMQ7cjDSeAQABdghq7pqrA4P8lkA7qTG+aw8Z21OoAyZdUNm8NWJoQy8m4nUP gmeeQPRc0vjp5JkYPgTqwf08cluqO6vQuYL2YmwVBIbO7cE7LNGkPDA3RYMu+zPY9UUi/ln5 dcKuEStFZ5eqVyqVoZ9eu3RTCGIXAHe1NcfcMT9HT0DPp3+ieTxFx6RjY3kYTGLOwU0EVUNc NAEQAM2StBhJERQvgPcbCzjokShn0cRA4q2SvCOvOXD+0KapXMRFE+/PZeDyfv4dEKuCqeh0 hihSHlaxTzg3TcqUu54w2xYskG8Fq5tg3gm4kh1Gvh1LijIXX99ABA8eHxOGmLPRIBkXHqJY oHtCvPc6sYKNM9xbp6I4yF56xVLmHGJ61KaWKf5KKWYgA9kfHufbja7qR0c6H79LIsiYqf92 H1HNq1WlQpu/fh4/XAAaV1axHFt/dY/2kU05tLMj8GjeQDz1fHas7augL4argt4e+jum3Nwt yupodQBxncKAUbzwKcDrPqUFmfRbJ7ARw8491xQHZDsP82JRj4cOJX32sBg8nO2N5OsFJOcd 5IE9v6qfllkZDAh1Rb1h6DFYq9dcdPAHl4zOj9EHq99/CpyccOh7SrtWDNFFknCmLpowhct9 5ZnlavBrDbOV0W47gO33WkXMFI4il4y1+Bv89979rVYn8aBohEgET41SpyQz7fMkcaZU+ok/ +HYjC/qfDxT7tjKXqBQEscVODaFicsUkjheOD4BfWEcVUqa+XdUEciwG/SgNyxBZepj41oVq FPSVE+Ni2tNrW/e16b8mgXNngHSnbsr6pAIXZH3qFW+4TKPMGZ2rZ6zITrMip+12jgw4mGjy 5y06JZvA02rZT2k9aa7i9dUUFggaanI09jNGbRA/ABEBAAHCwXwEGAEKACYCGwwWIQSb0H4O DFH41ZZ3t1Qbk0N9O0FimwUCYDzvagUJFF+UtgAKCRAbk0N9O0Fim9JzD/0auoGtUu4mgnna oEEpQEOjgT7l9TVuO3Qa/SeH+E0m55y5Fjpp6ZToc481za3xAcxK/BtIX5Wn1mQ6+szfrJQ6 59y2io437BeuWIRjQniSxHz1kgtFECiV30yHRgOoQlzUea7FgsnuWdstgfWi6LxstswEzxLZ Sj1EqpXYZE4uLjh6dW292sO+j4LEqPYr53hyV4I2LPmptPE9Rb9yCTAbSUlzgjiyyjuXhcwM qf3lzsm02y7Ooq+ERVKiJzlvLd9tSe4jRx6Z6LMXhB21fa5DGs/tHAcUF35hSJrvMJzPT/+u /oVmYDFZkbLlqs2XpWaVCo2jv8+iHxZZ9FL7F6AHFzqEFdqGnJQqmEApiRqH6b4jRBOgJ+cY qc+rJggwMQcJL9F+oDm3wX47nr6jIsEB5ZftdybIzpMZ5V9v45lUwmdnMrSzZVgC4jRGXzsU EViBQt2CopXtHtYfPAO5nAkIvKSNp3jmGxZw4aTc5xoAZBLo0OV+Ezo71pg3AYvq0a3/oGRG KQ06ztUMRrj8eVtpImjsWCd0bDWRaaR4vqhCHvAG9iWXZu4qh3ipie2Y0oSJygcZT7H3UZxq fyYKiqEmRuqsvv6dcbblD8ZLkz1EVZL6djImH5zc5x8qpVxlA0A0i23v5QvN00m6G9NFF0Le D2GYIS41Kv4Isx2dEFh+/Q== In-Reply-To: <20240212174822.77734-7-christophe.kerello@foss.st.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 12/02/2024 18:48, Christophe Kerello wrote: > The FMC2 revision 2 supports security and isolation compliant with > the Resource Isolation Framework (RIF). From RIF point of view, > the FMC2 is composed of several independent resources, listed below, > which can be assigned to different security and compartment domains: > - 0: Common FMC_CFGR register. > - 1: EBI controller for Chip Select 1. > - 2: EBI controller for Chip Select 2. > - 3: EBI controller for Chip Select 3. > - 4: EBI controller for Chip Select 4. > - 5: NAND controller. > > regmap_update_bits(ebi->regmap, reg, mask, setup ? mask : 0); > > return 0; > @@ -990,6 +1023,107 @@ static const struct stm32_fmc2_prop stm32_fmc2_child_props[] = { > }, > }; > > +static int stm32_fmc2_ebi_check_rif(struct stm32_fmc2_ebi *ebi, u32 resource) > +{ > + u32 seccfgr, cidcfgr, semcr; > + int cid; > + > + if (ebi->majrev < FMC2_VERR_MAJREV_2) > + return 0; > + > + if (resource >= FMC2_MAX_RESOURCES) > + return -EINVAL; > + > + regmap_read(ebi->regmap, FMC2_SECCFGR, &seccfgr); No checking of read value? > + if (seccfgr & BIT(resource)) { Then on read failure this is random stack junk. > + if (resource) > + dev_err(ebi->dev, "resource %d is configured as secure\n", > + resource); > + > + return -EACCES; > + } > + > + regmap_read(ebi->regmap, FMC2_CIDCFGR(resource), &cidcfgr); > + if (!(cidcfgr & FMC2_CIDCFGR_CFEN)) > + /* CID filtering is turned off: access granted */ > + return 0; > + > + if (!(cidcfgr & FMC2_CIDCFGR_SEMEN)) { > + /* Static CID mode */ > + cid = FIELD_GET(FMC2_CIDCFGR_SCID, cidcfgr); > + if (cid != FMC2_CID1) { > + if (resource) > + dev_err(ebi->dev, "static CID%d set for resource %d\n", > + cid, resource); > + > + return -EACCES; > + } > + > + return 0; > + } > + > + /* Pass-list with semaphore mode */ > + if (!(cidcfgr & FMC2_CIDCFGR_SEMWLC1)) { > + if (resource) > + dev_err(ebi->dev, "CID1 is block-listed for resource %d\n", > + resource); > + > + return -EACCES; > + } > + > + regmap_read(ebi->regmap, FMC2_SEMCR(resource), &semcr); > + if (!(semcr & FMC2_SEMCR_SEM_MUTEX)) { > + regmap_update_bits(ebi->regmap, FMC2_SEMCR(resource), > + FMC2_SEMCR_SEM_MUTEX, FMC2_SEMCR_SEM_MUTEX); > + regmap_read(ebi->regmap, FMC2_SEMCR(resource), &semcr); > + } > + > + cid = FIELD_GET(FMC2_SEMCR_SEMCID, semcr); > + if (cid != FMC2_CID1) { > + if (resource) > + dev_err(ebi->dev, "resource %d is already used by CID%d\n", > + resource, cid); > + > + return -EACCES; > + } > + > + ebi->sem_taken |= BIT(resource); > + > + return 0; > +} > + > +static void stm32_fmc2_ebi_put_sems(struct stm32_fmc2_ebi *ebi) > +{ > + unsigned int resource; > + > + if (ebi->majrev < FMC2_VERR_MAJREV_2) > + return; > + > + for (resource = 0; resource < FMC2_MAX_RESOURCES; resource++) { > + if (!(ebi->sem_taken & BIT(resource))) > + continue; > + > + regmap_update_bits(ebi->regmap, FMC2_SEMCR(resource), > + FMC2_SEMCR_SEM_MUTEX, 0); > + } > +} > + > +static void stm32_fmc2_ebi_get_sems(struct stm32_fmc2_ebi *ebi) > +{ > + unsigned int resource; > + > + if (ebi->majrev < FMC2_VERR_MAJREV_2) > + return; > + > + for (resource = 0; resource < FMC2_MAX_RESOURCES; resource++) { > + if (!(ebi->sem_taken & BIT(resource))) > + continue; > + > + regmap_update_bits(ebi->regmap, FMC2_SEMCR(resource), > + FMC2_SEMCR_SEM_MUTEX, FMC2_SEMCR_SEM_MUTEX); > + } > +} > + > static int stm32_fmc2_ebi_parse_prop(struct stm32_fmc2_ebi *ebi, > struct device_node *dev_node, > const struct stm32_fmc2_prop *prop, > @@ -1057,6 +1191,9 @@ static void stm32_fmc2_ebi_save_setup(struct stm32_fmc2_ebi *ebi) > unsigned int cs; > > for (cs = 0; cs < FMC2_MAX_EBI_CE; cs++) { > + if (!(ebi->bank_assigned & BIT(cs))) > + continue; > + > regmap_read(ebi->regmap, FMC2_BCR(cs), &ebi->bcr[cs]); > regmap_read(ebi->regmap, FMC2_BTR(cs), &ebi->btr[cs]); > regmap_read(ebi->regmap, FMC2_BWTR(cs), &ebi->bwtr[cs]); > @@ -1064,7 +1201,7 @@ static void stm32_fmc2_ebi_save_setup(struct stm32_fmc2_ebi *ebi) > > if (ebi->majrev < FMC2_VERR_MAJREV_2) > regmap_read(ebi->regmap, FMC2_PCSCNTR, &ebi->pcscntr); > - else > + else if (ebi->access_granted) > regmap_read(ebi->regmap, FMC2_CFGR, &ebi->cfgr); > } > > @@ -1073,6 +1210,9 @@ static void stm32_fmc2_ebi_set_setup(struct stm32_fmc2_ebi *ebi) > unsigned int cs; > > for (cs = 0; cs < FMC2_MAX_EBI_CE; cs++) { > + if (!(ebi->bank_assigned & BIT(cs))) > + continue; > + > regmap_write(ebi->regmap, FMC2_BCR(cs), ebi->bcr[cs]); > regmap_write(ebi->regmap, FMC2_BTR(cs), ebi->btr[cs]); > regmap_write(ebi->regmap, FMC2_BWTR(cs), ebi->bwtr[cs]); > @@ -1080,7 +1220,7 @@ static void stm32_fmc2_ebi_set_setup(struct stm32_fmc2_ebi *ebi) > > if (ebi->majrev < FMC2_VERR_MAJREV_2) > regmap_write(ebi->regmap, FMC2_PCSCNTR, ebi->pcscntr); > - else > + else if (ebi->access_granted) > regmap_write(ebi->regmap, FMC2_CFGR, ebi->cfgr); So this is kind of half-allowed-half-not. How is it supposed to work with !access_granted? You configure some registers but some not. So will it work or not? If yes, why even needing to write to FMC2_CFGR! > } > > @@ -1124,7 +1264,8 @@ static void stm32_fmc2_ebi_enable(struct stm32_fmc2_ebi *ebi) > u32 mask = ebi->majrev < FMC2_VERR_MAJREV_2 ? FMC2_BCR1_FMC2EN : > FMC2_CFGR_FMC2EN; > > - regmap_update_bits(ebi->regmap, reg, mask, mask); > + if (ebi->access_granted) > + regmap_update_bits(ebi->regmap, reg, mask, mask); > } > > static void stm32_fmc2_ebi_disable(struct stm32_fmc2_ebi *ebi) > @@ -1133,7 +1274,8 @@ static void stm32_fmc2_ebi_disable(struct stm32_fmc2_ebi *ebi) > u32 mask = ebi->majrev < FMC2_VERR_MAJREV_2 ? FMC2_BCR1_FMC2EN : > FMC2_CFGR_FMC2EN; > > - regmap_update_bits(ebi->regmap, reg, mask, 0); > + if (ebi->access_granted) > + regmap_update_bits(ebi->regmap, reg, mask, 0); > } > > static int stm32_fmc2_ebi_setup_cs(struct stm32_fmc2_ebi *ebi, > @@ -1190,6 +1332,13 @@ static int stm32_fmc2_ebi_parse_dt(struct stm32_fmc2_ebi *ebi) > return -EINVAL; > } > > + ret = stm32_fmc2_ebi_check_rif(ebi, bank + 1); > + if (ret) { > + dev_err(dev, "bank access failed: %d\n", bank); > + of_node_put(child); > + return ret; > + } > + > if (bank < FMC2_MAX_EBI_CE) { > ret = stm32_fmc2_ebi_setup_cs(ebi, child, bank); > if (ret) { > @@ -1261,6 +1410,23 @@ static int stm32_fmc2_ebi_probe(struct platform_device *pdev) > regmap_read(ebi->regmap, FMC2_VERR, &verr); > ebi->majrev = FIELD_GET(FMC2_VERR_MAJREV, verr); > > + /* Check if CFGR register can be modified */ > + ret = stm32_fmc2_ebi_check_rif(ebi, 0); > + if (!ret) > + ebi->access_granted = true; I don't understand why you need to store it. If access is not granted, what else is to do for this driver? Why even probing it? Why enabling clocks and keep everything running if it cannot work? > + > + /* In case of CFGR is secure, just check that the FMC2 is enabled */ > + if (!ebi->access_granted) { This is just "else", isn't it? > + u32 sr; > + > + regmap_read(ebi->regmap, FMC2_SR, &sr); > + if (sr & FMC2_SR_ISOST) { > + dev_err(dev, "FMC2 is not ready to be used.\n"); > + ret = -EACCES; > + goto err_release; > + } > + } > + > ret = stm32_fmc2_ebi_parse_dt(ebi); > Best regards, Krzysztof