From patchwork Wed Feb 9 16:32:35 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Walle X-Patchwork-Id: 1590513 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; secure) header.d=walle.cc header.i=@walle.cc header.a=rsa-sha256 header.s=mail2016061301 header.b=RnIBXlYc; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org (client-ip=2404:9400:2:0:216:3eff:fee1:b9f1; helo=lists.ozlabs.org; envelope-from=linuxppc-dev-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org; receiver=) Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee1:b9f1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4Jv57b2BH7z9sFk for ; Thu, 10 Feb 2022 03:34:35 +1100 (AEDT) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4Jv57Z6LLWz3cPh for ; Thu, 10 Feb 2022 03:34:34 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; secure) header.d=walle.cc header.i=@walle.cc header.a=rsa-sha256 header.s=mail2016061301 header.b=RnIBXlYc; dkim-atps=neutral X-Original-To: linuxppc-dev@lists.ozlabs.org Delivered-To: linuxppc-dev@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=walle.cc (client-ip=176.9.125.105; helo=ssl.serverraum.org; envelope-from=michael@walle.cc; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; secure) header.d=walle.cc header.i=@walle.cc header.a=rsa-sha256 header.s=mail2016061301 header.b=RnIBXlYc; dkim-atps=neutral Received: from ssl.serverraum.org (ssl.serverraum.org [176.9.125.105]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4Jv5601nRrz30L1 for ; Thu, 10 Feb 2022 03:33:10 +1100 (AEDT) Received: from mwalle01.kontron.local. (unknown [213.135.10.150]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id EA05E223E9; Wed, 9 Feb 2022 17:33:05 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1644424386; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=vRgDzyrEmORjs4lHu8d04Tc0LhNc+y24W6ANyXI3vdA=; b=RnIBXlYcGHC6A/9nYoCBX5vjaPeIE7KRT9I/YsK8krwYDdnhDQkq61q7FWFKfPrSYwe3r7 iS/5hRjpmKmACrDknRZcPCvid2xs/KOT02HMuQzcUmi7xY5Bu2/R7xTNTnOkTjIWXIedv4 XoPjI6j4L5JqjdTYOR0sf91pGMnvpaU= From: Michael Walle To: linuxppc-dev@lists.ozlabs.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 0/7] soc: fsl: guts: cleanups and serial_number support Date: Wed, 9 Feb 2022 17:32:35 +0100 Message-Id: <20220209163242.430265-1-michael@walle.cc> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-BeenThere: linuxppc-dev@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ulf Hansson , Arnd Bergmann , Li Yang , Michael Walle , Sudeep Holla , Dan Carpenter Errors-To: linuxppc-dev-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "Linuxppc-dev" This series converts the guts driver from a platform driver to just an core_initcall. The driver itself cannot (or rather should never) be unloaded because others depends on detecting the current SoC revision to apply chip errata. Other SoC drivers do it the same way. Overall I got rid of all the global static variables. The last patch finally adds unique id support to the guts driver. But because the binding [1] for the security fuse processor is still pending, it is marked as RFC. [1] https://lore.kernel.org/linux-devicetree/20220127163728.3650648-2-michael@walle.cc/ changes since v1: - call kfree() in error case, thanks Dan - add missing of_node_put(np), thanks Dan Michael Walle (7): soc: fsl: guts: machine variable might be unset soc: fsl: guts: remove module_exit() and fsl_guts_remove() soc: fsl: guts: embed fsl_guts_get_svr() in probe() soc: fsl: guts: allocate soc_dev_attr on the heap soc: fsl: guts: use of_root instead of own reference soc: fsl: guts: drop platform driver soc: fsl: guts: add serial_number support drivers/soc/fsl/guts.c | 219 ++++++++++++++++++++++------------------- 1 file changed, 118 insertions(+), 101 deletions(-) Acked-by: Arnd Bergmann