Message ID | 20230106170430.1214186-1-patrick.delaunay@foss.st.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4e01:0:0:0:0:0 with SMTP id p1csp927955wrt; Fri, 6 Jan 2023 09:08:25 -0800 (PST) X-Google-Smtp-Source: AMrXdXs7XkR1HwGgjNDXoo4lUuASCiii5gZ+YZSDjdNwjkt/3os+ZHket/0zI61RCR2aViYy2mIH X-Received: by 2002:a62:1482:0:b0:581:bae0:d5d5 with SMTP id 124-20020a621482000000b00581bae0d5d5mr28761852pfu.9.1673024905536; Fri, 06 Jan 2023 09:08:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673024905; cv=none; d=google.com; s=arc-20160816; b=RvyjepT6HucGBEh42lzCBTPXYig7Ztlmrop09IRmbVERv32hwlZ3lNuu7XJFIVfzrZ PuSjEzlXGft60k+MuTsWaPQvJc15KNicL375rEtb4Lmne3MtmUU/pe8C03B1v60D5OyB 7fLf1TctqPjOgAp6cuG7zcYxTNnuowMyu9ExjLmKq7LhFiXSEm1VuZop594Z5o9DCQCs s/azrNFxb6UE4XcI5vn5hfS3pNBPWwpUGsPJplwCWp2PusIAeC3xKyy0tSOYBbbJtVQT w9ZnSR8mDMtBE5dAIrjWrw88/MiMA2nThrWwKpC3rFIgiJAiuRGxuch3NHanlPRM+Ke9 2UPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=PA0/87LbgDri/GrG5DEhMEC6AP+3ANPUvqEs9eeMOgM=; b=U1JysWg9WF0VxjyyHj5IIDbx7MRuuWEQt6r2HEayhJmykwZGGMGeVG0hZsZZ4C/4eZ a94brl4fMPhFR1F4tPyF700ba4Lo7DWMMhPM4ZO6BHoChY4TY76aR+kAzRibenoWyfIQ 2HL5XeyNlz3KZEOwtt7ayFPFmadzWZ7afkV8B5zYXaYMGR4fggToZQ/2wCcw8j8u5jHu TItrNWBXrxggqV7Dq6xu2MHziJYknxZHRv5+WOOPaggwRIINMjenDE7/8SICN8CEwp6+ uB/6Pd4UVv7T0byw9MWozLIYRwoWqws4xSXow5i5elcwD1rQHncX3q3BnqVqyWSY9Hvc GWXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=3pcjCz84; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t17-20020a62ea11000000b00576505a484csi1598278pfh.336.2023.01.06.09.08.11; Fri, 06 Jan 2023 09:08:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=3pcjCz84; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235610AbjAFRFc (ORCPT <rfc822;tmhikaru@gmail.com> + 99 others); Fri, 6 Jan 2023 12:05:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43740 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235443AbjAFRFC (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 6 Jan 2023 12:05:02 -0500 Received: from mx07-00178001.pphosted.com (mx07-00178001.pphosted.com [185.132.182.106]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 34D3A7CBCC; Fri, 6 Jan 2023 09:04:58 -0800 (PST) Received: from pps.filterd (m0288072.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 306C1gpC020107; Fri, 6 Jan 2023 18:04:41 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foss.st.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding : content-type; s=selector1; bh=PA0/87LbgDri/GrG5DEhMEC6AP+3ANPUvqEs9eeMOgM=; b=3pcjCz84DU+kDFFjl4GCNMDlKgo1+w9VSh7mUcY9+biUm/GsqaUmfoxMP1ffiyEWAAJ2 Jo/ADI2GDb0hXS3FkVbZDxi2LY4tuMA6Sm8JkDkqPvRvkXpnid0IHzutpCuc1rolSMVE 34Ifd1g5ibkFCFd81ofWQR/y6hQYKfX+fvaZwI8crJqgqjhqjsGaafbK1ved4p158R1c LQ0drNthpzgwWwQjDOhpi+r2D/uqJWw8WHO5wMK+9fCm2RISWtJe20h+iZZtGhwNzEzU +SmZAnWsY6wumg+IMLSqfWrOzinAVqzJOHryb5eOifEXROEZtXfVk2XXTe7pjEvmsVBf 4A== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com (PPS) with ESMTPS id 3mtbcqgw2u-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 06 Jan 2023 18:04:41 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id D96B5100034; Fri, 6 Jan 2023 18:04:40 +0100 (CET) Received: from Webmail-eu.st.com (shfdag1node3.st.com [10.75.129.71]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id D3F60219D9E; Fri, 6 Jan 2023 18:04:40 +0100 (CET) Received: from localhost (10.48.0.157) by SHFDAG1NODE3.st.com (10.75.129.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.13; Fri, 6 Jan 2023 18:04:37 +0100 From: Patrick Delaunay <patrick.delaunay@foss.st.com> To: Alexandre TORGUE <alexandre.torgue@foss.st.com>, Rob Herring <robh+dt@kernel.org>, Krzysztof Kozlowski <krzysztof.kozlowski+dt@linaro.org>, Maxime Coquelin <mcoquelin.stm32@gmail.com>, Srinivas Kandagatla <srinivas.kandagatla@linaro.org> CC: Etienne CARRIERE <etienne.carriere@linaro.org>, Fabrice GASNIER <fabrice.gasnier@foss.st.com>, Amelie DELAUNAY <amelie.delaunay@foss.st.com>, Lionel DEBIEVE <lionel.debieve@foss.st.com>, Patrick Delaunay <patrick.delaunay@foss.st.com>, <devicetree@vger.kernel.org>, <linux-arm-kernel@lists.infradead.org>, <linux-kernel@vger.kernel.org>, <linux-stm32@st-md-mailman.stormreply.com> Subject: [PATCH v5 0/3] nvmem: stm32: add OP-TEE support for STM32MP13x Date: Fri, 6 Jan 2023 18:04:27 +0100 Message-ID: <20230106170430.1214186-1-patrick.delaunay@foss.st.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.48.0.157] X-ClientProxiedBy: SHFCAS1NODE2.st.com (10.75.129.73) To SHFDAG1NODE3.st.com (10.75.129.71) X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2023-01-06_11,2023-01-06_01,2022-06-22_01 X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1754293763229484778?= X-GMAIL-MSGID: =?utf-8?q?1754293763229484778?= |
Series |
nvmem: stm32: add OP-TEE support for STM32MP13x
|
|
Message
Patrick Delaunay
Jan. 6, 2023, 5:04 p.m. UTC
The v5 patchset is rebased on next-20221226. This serie update the NVMEM BSEC driver to be compatible with STM32MP13x SoC and the trusted application STM32MP BSEC in OP-TEE This serie solve issue in initial support of STM32MP131 (using BSEC STM32MP15 compatible) and so it break the STM32MP13x DTS compatible. I create this serie for more efficient review, including support for STM32MP15x. The first patches of the V1 series is already merged: "dt-bindings: nvmem: add new stm32mp13 compatible for stm32-romem" This STM32MP13x DTS break is acceptable as - the STM32MP13x SoC is not yet available outside STMicroelectronics (not official) - the same patch is already integrated or modifications are in progress in the other users (arm-trusted-firmware/TF-A, OP-TEE and U-Boot) of stm32mp131 device tree. It is the good time to correct this issue before the real availability of the SoC and before full support of STM32MP13x SoC in Linux kernel. Regards Patrick Changes in v5: - minor changes after Etienne Carierre review (comments, change %x to %#x, remove goto to out_tee_session) - update the BSEC SMC detection logic in stm32_romem_probe() after Etienne Carierre review to support NVMEM probe after OP-TEE probe Changes in v4: - fixe warning reported by kernel test robot for 64 bits support in drivers/nvmem/stm32-bsec-optee-ta.c:260:18: warning: format '%d' expects argument of type 'int', but argument 4 has type 'size_t' Changes in v3: - add a separate file stm32-bsec-optee-ta.c with STM32MP BSEC TA communication functions to avoid #if in romem driver. - use of_find_compatible_node in optee_presence_check function instead of of_find_node_by_path("/firmware/optee") Changes in v2: - rebase series on linux-next/master - minor update after V1 revue Changes in v1: - update commit message to indicate DTS break reason. Patrick Delaunay (3): ARM: dts: stm32mp13: fix compatible for BSEC nvmem: stm32: add OP-TEE support for STM32MP13x nvmem: stm32: detect bsec pta presence for STM32MP15x arch/arm/boot/dts/stm32mp131.dtsi | 2 +- drivers/nvmem/Kconfig | 11 + drivers/nvmem/Makefile | 1 + drivers/nvmem/stm32-bsec-optee-ta.c | 298 ++++++++++++++++++++++++++++ drivers/nvmem/stm32-bsec-optee-ta.h | 80 ++++++++ drivers/nvmem/stm32-romem.c | 84 +++++++- 6 files changed, 472 insertions(+), 4 deletions(-) create mode 100644 drivers/nvmem/stm32-bsec-optee-ta.c create mode 100644 drivers/nvmem/stm32-bsec-optee-ta.h base-commit: c76083fac3bae1a87ae3d005b5cb1cbc761e31d5 prerequisite-patch-id: 5aaa8fffbdd16871143808180b3932d80f4045d0 prerequisite-patch-id: ae711dc528e191e4751cbb7402041fc5f185d6b3