Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1226077imm; Wed, 20 Jun 2018 13:58:53 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJ9sZBrgujDlLz9DDD/JeFsiy0GeLRI4hnTjwgfPK7si7tDdJhtkfJcr7+zacPeBHulBlcN X-Received: by 2002:a17:902:b81:: with SMTP id 1-v6mr25818882plr.164.1529528333874; Wed, 20 Jun 2018 13:58:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529528333; cv=none; d=google.com; s=arc-20160816; b=SY8As46hG4g6/dMCcjpaDuN3gfUq/Dl7LOSlKx1HKivg69k2inUaxuA1vHfTyk0uzJ cYRuXsy/6oueWa1Dz/E2UjN9ThXDCewFUf05HbiUyZJSc+fN63ctqmEx+hoFbwdZCXBJ DLrtmKtsJ2wKtRgR0BDXGCj+Fq1JOQLiOivxWTvEHBVmk3VnwdzEKIPw4my1X5/66cBi w0CaEKsu6I+cbXb3zS4LIG/pFshSnXwH52gUQBJbHOFfHxv0RsN7JbF1hGod/pvfJyGP wVD02oZIkrxqQVGVbBCZXKz8PnIG3a47lujUdfBIbwsueD5VpQjhwWYAcNzhf/CBUSwY eT/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=Xx/ehL8fy/t4ymEOYTThRAQrpQ+hwb/Wv9n8i0S9Yo8=; b=ArtnVSyB5tXCLcJhZc3MZuqHVkf0Fyikmnu2qWUHXbhyxNGVxAJLU97X8JhTMDnf+p bY027vu7NEhZjTzMsAbVtVpXFFL21ZLHZRbn0EdqYIr5JD9E3ZNVrjS5aMr1WBY/kRY6 hYJIiFmrrUWQkF/+IoqaY8cfuoxmwgOHgCCFWcvwzPlt61en63JIkeXNcjOhtODQzK9s 6P13dJM+1zqFpYf+Hicutxzi0GfgwP1/trrL//ObIc1OuZpwXy6TpAxoyqQn0YM2CeyT WMMuOuc/0fbDAGSH8G4Cx/20EE+iP0y0UfGwLlZvNQOuAi1g2eqSh/ZdyCj4woGm9HRT QJXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=aVN3rl64; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j6-v6si2559671pgf.679.2018.06.20.13.58.39; Wed, 20 Jun 2018 13:58:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=aVN3rl64; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933232AbeFTU56 (ORCPT + 99 others); Wed, 20 Jun 2018 16:57:58 -0400 Received: from mail-lf0-f66.google.com ([209.85.215.66]:35625 "EHLO mail-lf0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932953AbeFTU55 (ORCPT ); Wed, 20 Jun 2018 16:57:57 -0400 Received: by mail-lf0-f66.google.com with SMTP id i15-v6so1387618lfc.2 for ; Wed, 20 Jun 2018 13:57:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Xx/ehL8fy/t4ymEOYTThRAQrpQ+hwb/Wv9n8i0S9Yo8=; b=aVN3rl64bLivDbMdM8y6yasxM241LL7SWDIMvpWBNH7OLYAabbYGYs2MtzmZce0lRq MUSPvYrJZawdryf1r2XB3WodlfcAlV8jpu7p60AGeSOyC+0jXkwlxGDSglpdpGhDownV NP9GfDw5k6DQ7QkMmbYHMs/ZlKiWnnheIsUeFRcTiLYN/426DxbO5hkRjMtWMwNJfFNx na6lSSCJhWzu3cAapj9ENc2LL6TPgw5LPZj5ypTD18TVyXZcf2yZY0ceZQMfm+mxIGPo kmKeSOErlqhCjKaC4sdddCsHvwb4jXbCD6H0XxLjooPm/5EsTgAQM8B8kL2mXh+JlKNT uxVw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Xx/ehL8fy/t4ymEOYTThRAQrpQ+hwb/Wv9n8i0S9Yo8=; b=GkA7NimyH/crsD5A/3r8ggWt6UdLbyD/qKeSHLW+S8acvwp+YG786POi8C3HKvWidq pMueUb+J8MNH46njGgfkptJezVvxyqKHCWKKieikOo+qanj6QVI6UY4sQnAUyOb0HAn2 Ci2p23VtcN8ENnyREmDLlNM0g9PPsGJ110x8jjKfpEemzCMs24+g3QFA+Pyo78w6HGDJ TLIXdJzxjNNtmuHwVyxnc34PBeMlhBxiE5uItXOJjlpVoaEL2n0vtXmCfMV6uiRZ+k0E /KkhWbCYwBbHaQI0DfC21YNvQIFJpmM/KlrFO0r0615qxshRjxPHMZshTbVJY/dMwmZr TIUA== X-Gm-Message-State: APt69E213KiMgvk9bI0ut6gc/hD368SREH/r8WNDENyf0p8xUlnQy6N7 10MZYTHyOlUNozxAXfEjWb9BmYbPi6f+keTT8Bw= X-Received: by 2002:a19:ccc6:: with SMTP id c189-v6mr4896001lfg.88.1529528275538; Wed, 20 Jun 2018 13:57:55 -0700 (PDT) MIME-Version: 1.0 References: <20180605004354.247410-1-egranata@google.com> <20180618063534.GG31141@dell> In-Reply-To: <20180618063534.GG31141@dell> From: Dmitry Torokhov Date: Wed, 20 Jun 2018 13:57:44 -0700 Message-ID: Subject: Re: [PATCH v3] cros_ec: cleanup dependency chain for cros_ec modules To: Lee Jones , egranata@google.com Cc: lkml , egranata@chromium.org, Benson Leung , Olof Johansson , Gwendal Grignou Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jun 17, 2018 at 11:37 PM Lee Jones wrote: > > On Mon, 04 Jun 2018, Enrico Granata wrote: > > > From: Enrico Granata > > > > If one builds the Chrome EC support as modules, there is no explicit > > dependency chain amongst the several modules (LPC, CHARDEV, CORE, ...) > > > > This makes it possible - for instance - to rmmod cros_ec_core, even though > > cros_ec_dev actively uses it for data transport to the EC chip. > > > > This commit makes two changes in an attempt to address this: > > a) moves cros_ec_proto.c as part of the CORE module; this removes the > > possibility of unloading cros_ec_core while cros_ec_dev is using it; > > b) enables cros_ec_core to explicitly register a runtime dependency on > > the kernel module that is using its cmd and pkt transfer functions > > > > Series-to: LKML > > Series-cc: gwendal@google.com > > Signed-off-by: Enrico Granata > > --- > > drivers/mfd/Kconfig | 1 - > > drivers/mfd/Makefile | 2 +- > > drivers/mfd/cros_ec.c | 18 ++++++++++++++++-- > > drivers/mfd/cros_ec_i2c.c | 1 + > > drivers/{platform/chrome => mfd}/cros_ec_proto.c | 0 > > drivers/mfd/cros_ec_spi.c | 1 + > > drivers/platform/chrome/Kconfig | 5 ----- > > drivers/platform/chrome/Makefile | 1 - > > drivers/platform/chrome/cros_ec_lpc.c | 1 + > > include/linux/mfd/cros_ec.h | 2 ++ > > 10 files changed, 22 insertions(+), 10 deletions(-) > > rename drivers/{platform/chrome => mfd}/cros_ec_proto.c (100%) > > > > diff --git a/drivers/mfd/Kconfig b/drivers/mfd/Kconfig > > index b860eb5aa194..a8daa2072ae6 100644 > > --- a/drivers/mfd/Kconfig > > +++ b/drivers/mfd/Kconfig > > @@ -194,7 +194,6 @@ config MFD_CROS_EC > > tristate "ChromeOS Embedded Controller" > > select MFD_CORE > > select CHROME_PLATFORMS > > - select CROS_EC_PROTO > > depends on X86 || ARM || ARM64 || COMPILE_TEST > > help > > If you say Y here you get support for the ChromeOS Embedded > > diff --git a/drivers/mfd/Makefile b/drivers/mfd/Makefile > > index d9d2cf0d32ef..20537bd27695 100644 > > --- a/drivers/mfd/Makefile > > +++ b/drivers/mfd/Makefile > > @@ -12,7 +12,7 @@ obj-$(CONFIG_MFD_SM501) += sm501.o > > obj-$(CONFIG_MFD_ASIC3) += asic3.o tmio_core.o > > obj-$(CONFIG_MFD_BCM590XX) += bcm590xx.o > > obj-$(CONFIG_MFD_BD9571MWV) += bd9571mwv.o > > -cros_ec_core-objs := cros_ec.o > > +cros_ec_core-objs := cros_ec.o cros_ec_proto.o > > cros_ec_core-$(CONFIG_ACPI) += cros_ec_acpi_gpe.o > > obj-$(CONFIG_MFD_CROS_EC) += cros_ec_core.o > > obj-$(CONFIG_MFD_CROS_EC_I2C) += cros_ec_i2c.o > > diff --git a/drivers/mfd/cros_ec.c b/drivers/mfd/cros_ec.c > > index d61024141e2b..9660dc0fc079 100644 > > --- a/drivers/mfd/cros_ec.c > > +++ b/drivers/mfd/cros_ec.c > > @@ -168,8 +168,19 @@ int cros_ec_register(struct cros_ec_device *ec_dev) > > */ > > err = cros_ec_sleep_event(ec_dev, 0); > > if (err < 0) > > - dev_dbg(ec_dev->dev, "Error %d clearing sleep event to ec", > > - err); > > + dev_dbg(dev, "Error %d clearing sleep event to ec", err); > > This change is unrelated to the patch. > > > + if (ec_dev->xfer_fcn_owner != NULL) { > > if (ec_dev->xfer_fcn_owner) ? > > > + err = try_module_get(ec_dev->xfer_fcn_owner); > > + if (err < 0) { > > This logic is wrong. try_module_get() returns a bool. I do not think this is needed at all: the transport drivers (i2c, api) are using cros_ec_register() provided by cros_ec core, which should bump up refcount on cros_ec core module preventing it from unloading. And unloading transport driver should unregister EC instance, stopping IO. If cros_ec_dev is not prepared to handle "dead" devices - it is issue for cros_ec_dev to solve. By the way, it is not solvable my disallowing module unloading: one can always tear down a device by manually unbinding driver via sysfs. Thanks. -- Dmitry