Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp438564rdb; Thu, 21 Dec 2023 13:53:30 -0800 (PST) X-Google-Smtp-Source: AGHT+IFMlZOlobZ7g+6odeg7FFCeBw7905TH9GrN4dDoduP0rZDGjnyghQRijK52d+bA8y3NfmzR X-Received: by 2002:aa7:86cc:0:b0:6d2:c20d:8ca4 with SMTP id h12-20020aa786cc000000b006d2c20d8ca4mr422717pfo.32.1703195610030; Thu, 21 Dec 2023 13:53:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703195610; cv=none; d=google.com; s=arc-20160816; b=DDf8X7KK3gnqgQrA8+7k8tLmzIrt07u1avzzuVdLew1AHg9/7GeVwOmIbFo4QYauwA yi4i3ZEeHuZTYv3UFhYq2vT6nED/SovdowgMrz//Qpckab8wSkUqtjOd7/kKivPQt7aq 3fgJpI4U32Cb78CMx58Cq/fcKThwveb6lLGMoOzWUtX8U0p/JQ7kwD/6Dq0jHiW6tAcT eT22V2xVTqgSDrM3DTEP0mw0UNzzfBySa6/t0hIxUnl3/+xVAHzcFyQhBEDVevNo+mEh AyZKLT8shhaI7rEmWvAfwoEpinh+2YciARzjU0BlbnkOcyaITdHzTOp2IR5LAAH0jDBJ SSrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=xJP3DtfG5xxJATG9dM73wxYYtbp6Wj2QYQmEpAZSoqg=; fh=zD7mDNC8G3LSusRN4f+XGAwby7+CLMqfzpLkSNIhrPc=; b=KNlrUlw0nPcuu/IPiyWFe976SgG+jCgmbcqhbe0Nu5ltKZCX233+Tw8ceYDEcMRFyU YOVOQaZgIBHEdBJt2r+MCXaFEuFtsHN7wwQBQgJLDNIltK2KiclUlH/KlajIspJr0D2t 7tnPjqmaMdnGNIB5e59chJnc8rZaPdiizhoEm9DzpBhv4nemXCZEMCQdyPkKAOQ6b5Kq cBb3XMzl93ocEHfqS5tTrAxR9669zyXU6YlJeH41LK/X/CqjEWFPUZvf7YuUt+gZ+G5M s8DPc2uCBEJYUvdzfx2eJPdeH24vnsFOXENX7SuWhuDhyrLiBpCfI0PY6N5qrvxsJk80 FCBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@kernel.org header.s=k20201202 header.b=uEViCGtr; spf=pass (google.com: domain of linux-crypto+bounces-952-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-crypto+bounces-952-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id v12-20020aa799cc000000b006d460f00f1asi2166002pfi.224.2023.12.21.13.53.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Dec 2023 13:53:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-952-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=fail header.i=@kernel.org header.s=k20201202 header.b=uEViCGtr; spf=pass (google.com: domain of linux-crypto+bounces-952-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-crypto+bounces-952-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id AB967287A8D for ; Thu, 21 Dec 2023 21:53:29 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5307977F08; Thu, 21 Dec 2023 21:53:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="uEViCGtr" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DD70876DB6; Thu, 21 Dec 2023 21:53:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1801DC433C7; Thu, 21 Dec 2023 21:53:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1703195600; bh=oZSWHV9/fUgOL3A+sAmJmZiWKNutaR5jooGY1ED6QmU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=uEViCGtrWqKue/uBwhlbauDjVJTF0cLSlsa8/fFBeRVcppTb2uuSJQaZwZPn8qTJO ODOXEPf9U6d95gW6U3/ydvH+oAx72igXQDdo/e01QXTZ3n5FTgLKh5YiYPNUOfJQx9 fXukp7MK71p0HNTed54HdnwJkeqdzY/BvndNkiaSndNBrVYPoZykzZCIGDjPJ60eEi os5zqYGK6NHqynpMgxz304G/qmvueP9ju0FHY6UrHsJjzgG6Zx/pZ6Mq70G4tpjsoQ fcYNxA/uqwIb9xAFypOTrc9yTdkiFv+2rOMwEy4mNqmIkzHIWJPWcRH0W1dUyfeDhi 7XdSvArPmvvnw== Received: (nullmailer pid 156117 invoked by uid 1000); Thu, 21 Dec 2023 21:53:16 -0000 Date: Thu, 21 Dec 2023 15:53:16 -0600 From: Rob Herring To: Gatien Chevallier Cc: Oleksii_Moisieiev@epam.com, gregkh@linuxfoundation.org, herbert@gondor.apana.org.au, davem@davemloft.net, krzysztof.kozlowski+dt@linaro.org, conor+dt@kernel.org, alexandre.torgue@foss.st.com, vkoul@kernel.org, jic23@kernel.org, olivier.moysan@foss.st.com, arnaud.pouliquen@foss.st.com, mchehab@kernel.org, fabrice.gasnier@foss.st.com, andi.shyti@kernel.org, ulf.hansson@linaro.org, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, hugues.fruchet@foss.st.com, lee@kernel.org, will@kernel.org, catalin.marinas@arm.com, arnd@kernel.org, richardcochran@gmail.com, Frank Rowand , peng.fan@oss.nxp.com, lars@metafoo.de, rcsekar@samsung.com, wg@grandegger.com, mkl@pengutronix.de, linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, dmaengine@vger.kernel.org, linux-i2c@vger.kernel.org, linux-iio@vger.kernel.org, alsa-devel@alsa-project.org, linux-medi@web.codeaurora.org, a@vger.kernel.org, linux-mmc@vger.kernel.org, netdev@vger.kernel.org, linux-phy@lists.infradead.org, linux-serial@vger.kernel.org, linux-spi@vger.kernel.org, linux-usb@vger.kernel.org Subject: Re: [PATCH v8 03/13] dt-bindings: bus: document RIFSC Message-ID: <20231221215316.GA155023-robh@kernel.org> References: <20231212152356.345703-1-gatien.chevallier@foss.st.com> <20231212152356.345703-4-gatien.chevallier@foss.st.com> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231212152356.345703-4-gatien.chevallier@foss.st.com> On Tue, Dec 12, 2023 at 04:23:46PM +0100, Gatien Chevallier wrote: > Document RIFSC (RIF security controller). RIFSC is a firewall controller > composed of different kinds of hardware resources. > > Signed-off-by: Gatien Chevallier > --- > > Changes in V6: > - Renamed access-controller to access-controllers > - Removal of access-control-provider property > - Removal of access-controller and access-controller-names > declaration in the patternProperties field. Add > additionalProperties: true in this field. > > Changes in V5: > - Renamed feature-domain* to access-control* > > Changes in V2: > - Corrected errors highlighted by Rob's robot > - No longer define the maxItems for the "feature-domains" > property > - Fix example (node name, status) > - Declare "feature-domain-names" as an optional > property for child nodes > - Fix description of "feature-domains" property > > .../bindings/bus/st,stm32mp25-rifsc.yaml | 96 +++++++++++++++++++ > 1 file changed, 96 insertions(+) > create mode 100644 Documentation/devicetree/bindings/bus/st,stm32mp25-rifsc.yaml > > diff --git a/Documentation/devicetree/bindings/bus/st,stm32mp25-rifsc.yaml b/Documentation/devicetree/bindings/bus/st,stm32mp25-rifsc.yaml > new file mode 100644 > index 000000000000..95aa7f04c739 > --- /dev/null > +++ b/Documentation/devicetree/bindings/bus/st,stm32mp25-rifsc.yaml > @@ -0,0 +1,96 @@ > +# SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) > +%YAML 1.2 > +--- > +$id: http://devicetree.org/schemas/bus/st,stm32mp25-rifsc.yaml# > +$schema: http://devicetree.org/meta-schemas/core.yaml# > + > +title: STM32 Resource isolation framework security controller > + > +maintainers: > + - Gatien Chevallier > + > +description: | > + Resource isolation framework (RIF) is a comprehensive set of hardware blocks > + designed to enforce and manage isolation of STM32 hardware resources like > + memory and peripherals. > + > + The RIFSC (RIF security controller) is composed of three sets of registers, > + each managing a specific set of hardware resources: > + - RISC registers associated with RISUP logic (resource isolation device unit > + for peripherals), assign all non-RIF aware peripherals to zero, one or > + any security domains (secure, privilege, compartment). > + - RIMC registers: associated with RIMU logic (resource isolation master > + unit), assign all non RIF-aware bus master to one security domain by > + setting secure, privileged and compartment information on the system bus. > + Alternatively, the RISUP logic controlling the device port access to a > + peripheral can assign target bus attributes to this peripheral master port > + (supported attribute: CID). > + - RISC registers associated with RISAL logic (resource isolation device unit > + for address space - Lite version), assign address space subregions to one > + security domains (secure, privilege, compartment). > + > +properties: > + compatible: > + contains: > + const: st,stm32mp25-rifsc This needs to be exact and include 'simple-bus'. You'll need a custom 'select' with the above to avoid matching all other 'simple-bus' cases. With that, Reviewed-by: Rob Herring