Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp390747rdg; Thu, 12 Oct 2023 08:31:41 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH3nk7q+pZ9/exukVEYpKXtQi90JgQ0m4q4B2KP3dT9dM/9fFaDx+G2o9//tcWlcOa3W77D X-Received: by 2002:a05:651c:11c5:b0:2bf:fa16:3aa3 with SMTP id z5-20020a05651c11c500b002bffa163aa3mr14189362ljo.25.1697124701011; Thu, 12 Oct 2023 08:31:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697124700; cv=none; d=google.com; s=arc-20160816; b=SUQuXbWAwRBEHzKsAxk0BmlYesnkQRx7BA72Z5DFj+vGRYzyLiduDXgRXJTH5jPaU4 IP3SwFpGzctNlkj77fRYW1t4qlRewJofbylHIQeEUFsXAHhoM9s3NC/l3FlQ+WB+d2S0 gMKcXleHr6/8iEg5yWMZ9JWa3Ytx3Jbv00mJapuFJjZXLykz4dzwdpDtWiVWfHVL4hWh w/vY6gd98uiMSEKtmF4eh4qnsuM3woP7bJ+u4T2GY+TxI76V92IXDV/XAQ4NIs1q5FrH ma6MW3nvAiPV3bjVNkfPBAR/DabwdJCpXbwMnoi+r6Q5PtlsUshSiI6kiUDDUcNMK7G/ ToMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=CrPkqnxXhP5sofkaEMm2v8Oi8aERwzD38hldEAW4roM=; fh=Ut7CjbgCw8Xz/Ln8xkDXa7WAbNqAWjH0OPc6mIqUTT4=; b=Zisy93yf0l3pALMzD2REqsHTfSLgtvPO36WGMduTrvy+TzRRCrdKoBHhxHpOLmGgqE 3+PcFaGPr40UeGM0xVtAAfi2sH6mrVh6zr07DlBZYO8JZny71k/dXOensKUaXroQrq/6 qnFrhJkj4pB6HinG05IuzkWFAnzlOuKsFYyeHas/WNsh12csEFZLUxcX6w/cVTpgLzKI iEu0SlX3zZNFniuNduNCTHEMNdlAJ2VzmgL1s4uaLdlUOEB190xO8yYtfzX/YVsRaAGd kl6OS/EMohPnQEclqZfqXCaH5QQTIcbmbvv4YTsnIovtjcx4XzDJtijnK/jtvtuiVgWJ LJwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=sNlqy8im; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id e26-20020a2e985a000000b002c13857b110si4553620ljj.103.2023.10.12.08.31.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 12 Oct 2023 08:31:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=sNlqy8im; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id C922381C19C5; Thu, 12 Oct 2023 08:30:20 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1379448AbjJLPaT (ORCPT + 99 others); Thu, 12 Oct 2023 11:30:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1379229AbjJLPaS (ORCPT ); Thu, 12 Oct 2023 11:30:18 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5AA29C0; Thu, 12 Oct 2023 08:30:17 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 65F77C433C8; Thu, 12 Oct 2023 15:30:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697124617; bh=ZtcSIbjB2WpeZfQRyCvdpc+0MAvoSIsAVFQJFGWoAZY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=sNlqy8imXhwlW5ogqsGatXLJh6x3ULy2dxsaSxs56ggFVkTV6XlGelwtvmknbj7Xu ShUCZ/8OXslZolbuuvyrBlxLrcJ01GSlmz7CSJEaxf3rAcgbPMbnfuFHufU09E90RW 5ApYEGyJHTTls7cFvAibnKaw6QYJ/MgybICMj+V6qAR0vsGzNnF3N6loiEvhXeakbo Tc8RBxaMuLt9cw9IyN5cmf2yVbPk/7zrWOf/NIL+18Z146Hj24oQ+EZR236LNiKgxH rW8s1EpB9lyTQA3S/nGP0hy8u95XFa9UJYnNgK7IXnZV4NIWHKMv5YsKgXN/Jehq6j lkrAiKBqcY2gw== Received: (nullmailer pid 821925 invoked by uid 1000); Thu, 12 Oct 2023 15:30:12 -0000 Date: Thu, 12 Oct 2023 10:30:12 -0500 From: Rob Herring To: Gatien CHEVALLIER Cc: Oleksii_Moisieiev@epam.com, gregkh@linuxfoundation.org, herbert@gondor.apana.org.au, davem@davemloft.net, krzysztof.kozlowski+dt@linaro.org, conor+dt@kernel.org, alexandre.torgue@foss.st.com, vkoul@kernel.org, jic23@kernel.org, olivier.moysan@foss.st.com, arnaud.pouliquen@foss.st.com, mchehab@kernel.org, fabrice.gasnier@foss.st.com, andi.shyti@kernel.org, ulf.hansson@linaro.org, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, hugues.fruchet@foss.st.com, lee@kernel.org, will@kernel.org, catalin.marinas@arm.com, arnd@kernel.org, richardcochran@gmail.com, Frank Rowand , peng.fan@oss.nxp.com, linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, dmaengine@vger.kernel.org, linux-i2c@vger.kernel.org, linux-iio@vger.kernel.org, alsa-devel@alsa-project.org, linux-media@vger.kernel.org, linux-mmc@vger.kernel.org, netdev@vger.kernel.org, linux-p.hy@lists.infradead.org, linux-serial@vger.kernel.org, linux-spi@vger.kernel.org, linux-usb@vger.kernel.org Subject: Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards Message-ID: <20231012153012.GA698406-robh@kernel.org> References: <20231010125719.784627-1-gatien.chevallier@foss.st.com> <20231010125719.784627-11-gatien.chevallier@foss.st.com> <20231010184212.GA1221641-robh@kernel.org> <8f1b6915-68be-a525-c5d5-37f0983c14de@foss.st.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8f1b6915-68be-a525-c5d5-37f0983c14de@foss.st.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Thu, 12 Oct 2023 08:30:21 -0700 (PDT) On Wed, Oct 11, 2023 at 10:49:58AM +0200, Gatien CHEVALLIER wrote: > Hi Rob, > > On 10/10/23 20:42, Rob Herring wrote: > > On Tue, Oct 10, 2023 at 02:57:18PM +0200, Gatien Chevallier wrote: > > > ETZPC is a firewall controller. Put all peripherals filtered by the > > > ETZPC as ETZPC subnodes and reference ETZPC as an > > > access-control-provider. > > > > > > For more information on which peripheral is securable or supports MCU > > > isolation, please read the STM32MP15 reference manual. > > > > > > Signed-off-by: Gatien Chevallier > > > --- > > > > > > Changes in V6: > > > - Renamed access-controller to access-controllers > > > - Removal of access-control-provider property > > > > > > Changes in V5: > > > - Renamed feature-domain* to access-control* > > > > > > arch/arm/boot/dts/st/stm32mp151.dtsi | 2756 +++++++++++++------------ > > > arch/arm/boot/dts/st/stm32mp153.dtsi | 52 +- > > > arch/arm/boot/dts/st/stm32mp15xc.dtsi | 19 +- > > > 3 files changed, 1450 insertions(+), 1377 deletions(-) > > > > This is not reviewable. Change the indentation and any non-functional > > change in one patch and then actual changes in another. > > Ok, I'll make it easier to read. > > > > > This is also an ABI break. Though I'm not sure it's avoidable. All the > > devices below the ETZPC node won't probe on existing kernel. A > > simple-bus fallback for ETZPC node should solve that. > > > > I had one issue when trying with a simple-bus fallback that was the > drivers were probing even though the access rights aren't correct. > Hence the removal of the simple-bus compatible in the STM32MP25 patch. But it worked before, right? So the difference is you have either added new devices which need setup or your firmware changed how devices are setup (or not setup). Certainly can't fix the latter case. You just need to be explicit about what you are doing to users. > Even though a node is tagged with the OF_POPULATED flag when checking > the access rights with the firewall controller, it seems that when > simple-bus is probing, there's no check of this flag. It shouldn't. Those flags are for creating the devices (or not) and removing only devices of_platform_populate() created. > of_platform_populate() checks and sets the OF_POPULATED_BUS flag. > Maybe that is my error and the firewall bus populate should set > OF_POPULATED_BUS instead of OF_POPULATED. Is that correct? Shrug. Off hand, I'd say probably not, but am not certain. Rob