diff mbox series

[PATCHv5] drivers: tee: i2c: support the NXP SE05x probe errata

Message ID 20220830195645.1070639-1-jorge@foundries.io
State Changes Requested
Delegated to: Tom Rini
Headers show
Series [PATCHv5] drivers: tee: i2c: support the NXP SE05x probe errata | expand

Commit Message

Jorge Ramirez-Ortiz, Foundries Aug. 30, 2022, 7:56 p.m. UTC
Early instantiation of this I2C device would lock up when being
probed.

 https://www.nxp.com/docs/en/errata/SE050_Erratasheet.pdf
 3.2.2
   In scenarios of detecting I2C ICs on the bus using an empty
   I2C frame containing only the address the SE050 will block
   the I2C bus.

Tested on STM32MP1

Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
Acked-by: Oleksandr Suvorov <oleksandr.suvorov@foundries.io>
---

 v5: address Kconfig issue with select (remove)
 v4: address build issue when feature not enabled
 v3,2,1: no changes (were part of a patchset)

 drivers/tee/optee/Kconfig | 13 ++++++++++++
 drivers/tee/optee/i2c.c   | 44 +++++++++++++++++++++++++++++++++++----
 2 files changed, 53 insertions(+), 4 deletions(-)

Comments

Tom Rini Sept. 14, 2022, 10:11 p.m. UTC | #1
On Tue, Aug 30, 2022 at 09:56:45PM +0200, Jorge Ramirez-Ortiz wrote:

> Early instantiation of this I2C device would lock up when being
> probed.
> 
>  https://www.nxp.com/docs/en/errata/SE050_Erratasheet.pdf
>  3.2.2
>    In scenarios of detecting I2C ICs on the bus using an empty
>    I2C frame containing only the address the SE050 will block
>    the I2C bus.
> 
> Tested on STM32MP1
> 
> Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
> Acked-by: Oleksandr Suvorov <oleksandr.suvorov@foundries.io>

This fails causes failure to build on sandbox:
https://source.denx.de/u-boot/u-boot/-/jobs/496922#L51
Jorge Ramirez-Ortiz, Foundries Sept. 15, 2022, 4:53 a.m. UTC | #2
On 14/09/22, Tom Rini wrote:
> On Tue, Aug 30, 2022 at 09:56:45PM +0200, Jorge Ramirez-Ortiz wrote:
> 
> > Early instantiation of this I2C device would lock up when being
> > probed.
> > 
> >  https://www.nxp.com/docs/en/errata/SE050_Erratasheet.pdf
> >  3.2.2
> >    In scenarios of detecting I2C ICs on the bus using an empty
> >    I2C frame containing only the address the SE050 will block
> >    the I2C bus.
> > 
> > Tested on STM32MP1
> > 
> > Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
> > Acked-by: Oleksandr Suvorov <oleksandr.suvorov@foundries.io>
> 
> This fails causes failure to build on sandbox:
> https://source.denx.de/u-boot/u-boot/-/jobs/496922#L51

um, will send an updated patch - sorry about it.
does that sandbox uses different build flags?

> 
> -- 
> Tom
Tom Rini Sept. 15, 2022, 12:48 p.m. UTC | #3
On Thu, Sep 15, 2022 at 06:53:42AM +0200, Jorge Ramirez-Ortiz, Foundries wrote:
> On 14/09/22, Tom Rini wrote:
> > On Tue, Aug 30, 2022 at 09:56:45PM +0200, Jorge Ramirez-Ortiz wrote:
> > 
> > > Early instantiation of this I2C device would lock up when being
> > > probed.
> > > 
> > >  https://www.nxp.com/docs/en/errata/SE050_Erratasheet.pdf
> > >  3.2.2
> > >    In scenarios of detecting I2C ICs on the bus using an empty
> > >    I2C frame containing only the address the SE050 will block
> > >    the I2C bus.
> > > 
> > > Tested on STM32MP1
> > > 
> > > Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
> > > Acked-by: Oleksandr Suvorov <oleksandr.suvorov@foundries.io>
> > 
> > This fails causes failure to build on sandbox:
> > https://source.denx.de/u-boot/u-boot/-/jobs/496922#L51
> 
> um, will send an updated patch - sorry about it.
> does that sandbox uses different build flags?

It's normal sandbox. There's a chance I either mis-applied it (it didn't
apply cleanly), or one of the few other patches I'm testing in that
branch and about to push to next changed something.
diff mbox series

Patch

diff --git a/drivers/tee/optee/Kconfig b/drivers/tee/optee/Kconfig
index d03028070b..8b02b71be2 100644
--- a/drivers/tee/optee/Kconfig
+++ b/drivers/tee/optee/Kconfig
@@ -37,6 +37,19 @@  config OPTEE_TA_SCP03
 	help
 	  Enables support for controlling (enabling, provisioning) the
 	  Secure Channel Protocol 03 operation in the OP-TEE SCP03 TA.
+
+config TEE_I2C_NXP_SE05X_ERRATA
+	bool "Enable NXP SE05X Errata"
+	default n
+	help
+	 This config prevents the I2C trampoline driver from probing
+	 on every transfer.
+
+config TEE_I2C_NXP_SE05X_ERRATA_IN_BUS
+	int "I2C bus where to apply the NXP SE05X errata"
+	depends on TEE_I2C_NXP_SE05X_ERRATA
+	default 0
+
 endmenu
 
 endif
diff --git a/drivers/tee/optee/i2c.c b/drivers/tee/optee/i2c.c
index ef4e10f991..e1b2534909 100644
--- a/drivers/tee/optee/i2c.c
+++ b/drivers/tee/optee/i2c.c
@@ -3,13 +3,18 @@ 
  * Copyright (c) 2020 Foundries.io Ltd
  */
 
+#define LOG_CATEGORY UCLASS_I2C
+
 #include <common.h>
 #include <dm.h>
 #include <i2c.h>
+#include <stdlib.h>
 #include <tee.h>
 #include "optee_msg.h"
 #include "optee_private.h"
 
+#define NXP_SE05X_ADDR 0x48
+
 static int check_xfer_flags(struct udevice *chip, uint tee_flags)
 {
 	uint flags;
@@ -30,6 +35,30 @@  static int check_xfer_flags(struct udevice *chip, uint tee_flags)
 	return 0;
 }
 
+static struct udevice *get_chip_dev(int bnum, int addr)
+{
+	struct udevice *chip;
+	struct udevice *bus;
+
+#if defined(CONFIG_TEE_I2C_NXP_SE05X_ERRATA)
+	if (bnum == CONFIG_TEE_I2C_NXP_SE05X_ERRATA_IN_BUS &&
+	    addr == NXP_SE05X_ADDR) {
+		if (uclass_get_device_by_seq(UCLASS_I2C, bnum, &bus))
+			return NULL;
+
+		if (i2c_get_chip(bus, addr, 0, &chip))
+			return NULL;
+
+		return chip;
+	}
+#endif
+
+	if (i2c_get_chip_for_busnum(bnum, addr, 0, &chip))
+		return NULL;
+
+	return chip;
+}
+
 void optee_suppl_cmd_i2c_transfer(struct optee_msg_arg *arg)
 {
 	const u8 attr[] = {
@@ -38,7 +67,8 @@  void optee_suppl_cmd_i2c_transfer(struct optee_msg_arg *arg)
 		OPTEE_MSG_ATTR_TYPE_RMEM_INOUT,
 		OPTEE_MSG_ATTR_TYPE_VALUE_OUTPUT,
 	};
-	struct udevice *chip_dev;
+	struct udevice *chip_dev = NULL;
+
 	struct tee_shm *shm;
 	u8 *buf;
 	int ret;
@@ -56,9 +86,9 @@  void optee_suppl_cmd_i2c_transfer(struct optee_msg_arg *arg)
 	if (!buf)
 		goto bad;
 
-	if (i2c_get_chip_for_busnum((int)arg->params[0].u.value.b,
-				    (int)arg->params[0].u.value.c,
-				    0, &chip_dev))
+	chip_dev = get_chip_dev((int)arg->params[0].u.value.b,
+				(int)arg->params[0].u.value.c);
+	if (!chip_dev)
 		goto bad;
 
 	if (check_xfer_flags(chip_dev, arg->params[1].u.value.a))
@@ -66,10 +96,16 @@  void optee_suppl_cmd_i2c_transfer(struct optee_msg_arg *arg)
 
 	switch (arg->params[0].u.value.a) {
 	case OPTEE_MSG_RPC_CMD_I2C_TRANSFER_RD:
+		log_debug("OPTEE_MSG_RPC_CMD_I2C_TRANSFER_RD %d\n",
+			  (size_t)arg->params[2].u.rmem.size);
+
 		ret = dm_i2c_read(chip_dev, 0, buf,
 				  (size_t)arg->params[2].u.rmem.size);
 		break;
 	case OPTEE_MSG_RPC_CMD_I2C_TRANSFER_WR:
+		log_debug("OPTEE_MSG_RPC_CMD_I2C_TRANSFER_WR %d\n",
+			  (size_t)arg->params[2].u.rmem.size);
+
 		ret = dm_i2c_write(chip_dev, 0, buf,
 				   (size_t)arg->params[2].u.rmem.size);
 		break;