Marek Vasut <[email protected]> writes:

> On 2/27/26 1:07 PM, Kamlesh Gurudasani wrote:
>> The SCMI clock protocol version was only being fetched when CLK_CCF
>> was enabled. On non-CCF platforms, the probe function returned early
>> without fetching the version, leaving priv->version as 0.
>> 
>> This caused issues because code paths like scmi_clk_gate() and
>> scmi_clk_get_permissions() depend on priv->version to determine
>> which protocol message format to use, even in non-CCF mode.
>> 
>> Fix this by moving the scmi_generic_protocol_version() call before
>> the CLK_CCF check, ensuring the version is fetched for both CCF and
>> non-CCF platforms.
> Which platforms are these non-CCF platforms you refer to ? Which 
> platforms are broken right now ? Those details should be included in the 
> CM .
We noticed this on am62lx_evm which is yet to be upstreamed.

It should fail for all "CONFIG_SCMI_FIRMWARE" "~CONFIG_CLK_CCF"

But the failure case "0" is favoring the devices which are using scmi
clock protocol version less than 0x20001 (or 0x30000).

I can't really say if following devices use SCMI Server version greater
than 0x20001 and are getting affected by this. 

As am62lx_evm is not upstreamed yet, not sure if I should add that in
commit message. Let me know what you think.

Devices with "CONFIG_SCMI_FIRMWARE" "~CONFIG_CLK_CCF":
am62lx_evm cm3588-nas-rk3588 coolpi-4b-rk3588s coolpi-cm5-evb-rk3588
coolpi-cm5-genbook-rk3588 evb-rk3588 gameforce-ace-rk3588s
generic-rk3588 jaguar-rk3588 khadas-edge2-rk3588s mnt-reform2-rk3588
nanopc-t6-rk3588 nanopi-r6c-rk3588s nanopi-r6s-rk3588s neu6a-io-rk3588
neu6b-io-rk3588 nova-rk3588s odroid-m2-rk3588s orangepi-5-max-rk3588
orangepi-5-plus-rk3588 orangepi-5-rk3588s orangepi-5-ultra-rk3588
quartzpro64-rk3588 rock-5-itx-rk3588 rock-5c-rk3588s
rock5a-rk3588s rock5b-rk3588 sige7-rk3588 stm32mp15-odyssey stm32mp15
stm32mp15_trusted tiger-rk3588 toybrick-rk3588 turing-rk1-rk3588

Regards,
Kamlesh

Reply via email to