Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp62018imm; Tue, 17 Jul 2018 14:01:49 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfF7iLx24KvP/eqz+P22THj0bx6mDdYGDXdP7Ym90hEriWeXlNIUkI+kptOj5Ng97hmk3he X-Received: by 2002:a63:41c6:: with SMTP id o189-v6mr3135592pga.323.1531861309876; Tue, 17 Jul 2018 14:01:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531861309; cv=none; d=google.com; s=arc-20160816; b=daSwqT5FTdOpRwNVfbuEKGpPyXGeIrxTioczvfJLQe60DocRMkHFSAkqTCVGyaDD0M ZRL4tBidfT98lt889vXF9A4enwWf9E2s0pCNTzqQhOKYSudp/CP5KTy/xbst/aH7MK47 8HziLQSfVb3X4hO6NzbZ+GkB786RkUtPs//gXcB5wtyJsMege/o0TbeJ/FVBT5ao1kbq hu1IAtbrh4ODnuzQkWKlHZ3j+UdWSfzUlwef0aGqLLj2NVVFkI10pKxhPMrR1dgTf2a4 7EFrwYq0Q4gOogYO7ViG1QGjHUucY96uQzj/bgcD8u2MFSJCdjOlMwatwaQR/v+E0eD/ g3Pg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=Z5JYk6tRqjYfJuLRQ/U6rFKZ//PDaSgY9kHWyM3JcX8=; b=CyXamKeoSmiz7Ys6x6VcrgAL/7oanUO+UUkdEoJ4HO9xVeACW3zhkFWvAmw/tJViVQ n5ODYIqMYhdwuQs9ow8ecewMRT12ekps9UCBS04dx+sGsJ92h/gS0HQUcRB2oRK+9wyT jxJA45Pf9JWBC7CdaeFFjMJsIRVZR4/cMoUCLucKSIOmn4K7+IPO2Exb8iIiNrh2qf0A 6WP5dC4Fnw0MiNTWQG4n3Bb8jI/QJ0/EZ4d3eyPjpR9GFl2XTVliU1KyZGnBZoDwTg4H 2hSdKOznaw8v4UQ4+sh3+Pb9apDVE3oJqR8f9THErgN+pB6EHsM45WRKQRRqcgH0AKoZ txmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=WdmYb7vH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 13-v6si1696063ple.274.2018.07.17.14.01.34; Tue, 17 Jul 2018 14:01:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=WdmYb7vH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731081AbeGQVfQ (ORCPT + 99 others); Tue, 17 Jul 2018 17:35:16 -0400 Received: from mail-lf0-f68.google.com ([209.85.215.68]:42342 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729840AbeGQVfQ (ORCPT ); Tue, 17 Jul 2018 17:35:16 -0400 Received: by mail-lf0-f68.google.com with SMTP id u202-v6so1848375lff.9 for ; Tue, 17 Jul 2018 14:00:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Z5JYk6tRqjYfJuLRQ/U6rFKZ//PDaSgY9kHWyM3JcX8=; b=WdmYb7vHZKo49Dn7jhHuyP6VkkG7PetQa6INUMEM+Cx9dM1QkVHMqKY1tJbpdD88ST iY0Xqma+2N9opU82QoCMIxdn+7qGmufvO3Yr9f2M7ZE/HH9T2eUU63jipZTr+eKEqMFo JmFdGHa8UPkbY87SxELAV0mnOXEB5pOHMecOc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Z5JYk6tRqjYfJuLRQ/U6rFKZ//PDaSgY9kHWyM3JcX8=; b=MtzE6hCoQYkSqpv9nGjgeeye2L3LaguYOEHOBFeYAVzp8LkspdrzS8xMPpdkuVtnYo p1uBe8fIog+JBi2mnTJskCtarv6KssiWR3ff8k/b/Wg8o/8yDd6HhDymWxX56mMsbdV4 C/0MEwrfx/jtghVmC9bsBaVIa/ysEumj90wgju4Vd/P66Wrb55dyxkGXWzW7luc07ndJ +MACNoPSRLGeH7vPYNj2UW+z5UroMPURTzKhbYzcz0E5+f0xUq1e/4E+2arbDpGbOj5I jZFHRXrkIP9XdMbbQ1ZJU+qKnaXGJVUJw93ZkrSB8MNUZMD6t55egrKWN1uDG8aNPbCt FYRQ== X-Gm-Message-State: AOUpUlFLcNgkm698X05qR7/9EQurXzvdDoAgRayWT0DYJVrFXmYAcw3F p6n6ly9SqdhHEZw8c4BDRIsDlPuGzx4= X-Received: by 2002:a19:ea5c:: with SMTP id i89-v6mr2143589lfh.19.1531861247671; Tue, 17 Jul 2018 14:00:47 -0700 (PDT) Received: from mail-lf0-f47.google.com (mail-lf0-f47.google.com. [209.85.215.47]) by smtp.gmail.com with ESMTPSA id p11-v6sm312792ljc.50.2018.07.17.14.00.46 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Jul 2018 14:00:46 -0700 (PDT) Received: by mail-lf0-f47.google.com with SMTP id f18-v6so1855464lfc.2 for ; Tue, 17 Jul 2018 14:00:46 -0700 (PDT) X-Received: by 2002:a19:d754:: with SMTP id o81-v6mr2109744lfg.124.1531861245562; Tue, 17 Jul 2018 14:00:45 -0700 (PDT) MIME-Version: 1.0 References: <1531734237-27421-1-git-send-email-sayalil@codeaurora.org> <1531734237-27421-2-git-send-email-sayalil@codeaurora.org> In-Reply-To: <1531734237-27421-2-git-send-email-sayalil@codeaurora.org> From: Evan Green Date: Tue, 17 Jul 2018 14:00:09 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH V6] scsi: ufs: Add configfs support for UFS provisioning To: sayalil@codeaurora.org Cc: subhashj@codeaurora.org, cang@codeaurora.org, vivek.gautam@codeaurora.org, Rajendra Nayak , Vinayak Holikatti , jejb@linux.vnet.ibm.com, martin.petersen@oracle.com, asutoshd@codeaurora.org, riteshh@codeaurora.org, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, jlbec@evilplan.org, hch@lst.de Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Sayali, On Mon, Jul 16, 2018 at 2:44 AM Sayali Lokhande wrote: > > This patch adds configfs support to provision UFS device at > runtime. This feature can be primarily useful in factory or > assembly line as some devices may be required to be configured > multiple times during initial system development phase. > Configuration Descriptors can be written multiple times until > bConfigDescrLock attribute is zero. > > Configuration descriptor buffer consists of Device and Unit > descriptor configurable parameters which are parsed from vendor > specific provisioning file and then passed via configfs node at > runtime to provision ufs device. > CONFIG_CONFIGFS_FS needs to be enabled for using this feature. > > Usage: > 1) To read current configuration descriptor : > cat /config/XXXX.ufshc/ufs_provision > 2) To provision ufs device: > echo > /config/XXXX.ufshc/ufs_provision > > Signed-off-by: Sayali Lokhande > --- > Documentation/ABI/testing/configfs-driver-ufs | 18 +++ > drivers/scsi/ufs/Kconfig | 10 ++ > drivers/scsi/ufs/Makefile | 1 + > drivers/scsi/ufs/ufs-configfs.c | 162 ++++++++++++++++++++++++++ > drivers/scsi/ufs/ufshcd.c | 2 + > drivers/scsi/ufs/ufshcd.h | 19 +++ > 6 files changed, 212 insertions(+) > create mode 100644 Documentation/ABI/testing/configfs-driver-ufs > create mode 100644 drivers/scsi/ufs/ufs-configfs.c > ... > diff --git a/drivers/scsi/ufs/ufs-configfs.c b/drivers/scsi/ufs/ufs-configfs.c > new file mode 100644 > index 0000000..3e9837a > --- /dev/null > +++ b/drivers/scsi/ufs/ufs-configfs.c > @@ -0,0 +1,162 @@ > +// SPDX-License-Identifier: GPL-2.0+ > +// Copyright (c) 2018, Linux Foundation. > + > +#include > +#include > +#include > + > +#include "ufs.h" > +#include "ufshcd.h" > + > +static inline struct ufs_hba *config_item_to_hba(struct config_item *item) > +{ > + struct config_group *group = to_config_group(item); > + struct configfs_subsystem *subsys = to_configfs_subsystem(group); > + struct ufs_hba *hba = container_of(subsys, struct ufs_hba, subsys); > + > + return hba ? hba : NULL; Can this ever return NULL? to_config_group() and to_configfs_subsystem() guard against null, but container_of does not, which would make hba a small negative value. The conditional would needs to be subsys ? hba : NULL. > +} > + > +static ssize_t ufs_provision_show(struct config_item *item, char *buf) > +{ > + u8 desc_buf[QUERY_DESC_CONFIGURATION_DEF_SIZE] = {0}; > + int buff_len = QUERY_DESC_CONFIGURATION_DEF_SIZE; > + int i, ret, curr_len = 0; > + struct ufs_hba *hba = config_item_to_hba(item); > + > + if (!hba) > + return snprintf(buf, PAGE_SIZE, "ufs hba is NULL!\n"); Maybe just fail, rather than successfully returning something unexpected. > + > + ret = ufshcd_query_descriptor_retry(hba, UPIU_QUERY_OPCODE_READ_DESC, > + QUERY_DESC_IDN_CONFIGURATION, 0, 0, desc_buf, &buff_len); > + > + if (ret) > + return snprintf(buf, PAGE_SIZE, > + "Failed reading descriptor. desc_idn %d, opcode %x ret %d\n", > + QUERY_DESC_IDN_CONFIGURATION, > + UPIU_QUERY_OPCODE_READ_DESC, ret); Same here, failing is probably better than returning unexpected text. > + > + for (i = 0; i < buff_len; i++) > + curr_len += snprintf((buf + curr_len), (PAGE_SIZE - curr_len), > + "0x%x ", desc_buf[i]); > + > + return curr_len; > +} > + > +ssize_t ufshcd_desc_configfs_store(struct ufs_hba *hba, > + const char *buf, size_t count) > +{ > + char *strbuf; > + char *strbuf_copy; > + u8 desc_buf[QUERY_DESC_CONFIGURATION_DEF_SIZE] = {0}; > + int buff_len = QUERY_DESC_CONFIGURATION_DEF_SIZE; > + char *token; > + int i, ret, value; > + u32 bConfigDescrLock = 0; > + > + /* reserve one byte for null termination */ > + strbuf = kmalloc(count + 1, GFP_KERNEL); > + if (!strbuf) > + return -ENOMEM; > + > + strbuf_copy = strbuf; > + strlcpy(strbuf, buf, count + 1); > + > + if (!hba) > + goto out; > + > + /* Just return if bConfigDescrLock is already set */ > + ret = ufshcd_query_attr(hba, UPIU_QUERY_OPCODE_READ_ATTR, > + QUERY_ATTR_IDN_CONF_DESC_LOCK, 0, 0, &bConfigDescrLock); > + if (ret) > + goto out; > + > + if (bConfigDescrLock) { > + dev_err(hba->dev, "%s: bConfigDescrLock already set to %u, cannot re-provision device!\n", > + __func__, bConfigDescrLock); > + goto out; > + } > + > + for (i = 0; i < QUERY_DESC_CONFIGURATION_DEF_SIZE; i++) { > + token = strsep(&strbuf, " "); > + if (!token && i) > + break; > + > + ret = kstrtoint(token, 0, &value); > + if (ret) { > + dev_err(hba->dev, "%s: kstrtoint failed %d %s\n", > + __func__, ret, token); > + break; > + } > + desc_buf[i] = (u8)value; > + } > + > + /* Write configuration descriptor to provision ufs */ > + ret = ufshcd_query_descriptor_retry(hba, UPIU_QUERY_OPCODE_WRITE_DESC, > + QUERY_DESC_IDN_CONFIGURATION, 0, 0, desc_buf, &buff_len); > + > + if (!ret) > + dev_err(hba->dev, "%s: UFS Provisioning done, reboot now!\n", > + __func__); > + > +out: > + kfree(strbuf_copy); > + return count; > +} > + > +static ssize_t ufs_provision_store(struct config_item *item, > + const char *buf, size_t count) > +{ > + struct ufs_hba *hba = config_item_to_hba(item); > + > + return ufshcd_desc_configfs_store(hba, buf, count); > +} > + > +static struct configfs_attribute ufshcd_attr_provision = { > + .ca_name = "ufs_provision", > + .ca_mode = 0644, > + .ca_owner = THIS_MODULE, > + .show = ufs_provision_show, > + .store = ufs_provision_store, > +}; > + > +static struct configfs_attribute *ufshcd_attrs[] = { > + &ufshcd_attr_provision, > + NULL, > +}; > + > +static struct config_item_type ufscfg_type = { > + .ct_attrs = ufshcd_attrs, > + .ct_owner = THIS_MODULE, > +}; > + > +static struct configfs_subsystem ufscfg_subsys = { > + .su_group = { > + .cg_item = { > + .ci_type = &ufscfg_type, > + }, > + }, > +}; > + > +int ufshcd_configfs_init(struct ufs_hba *hba, const char *name) > +{ > + int ret; > + struct configfs_subsystem *subsys = &hba->subsys; > + > + strncpy(ufscfg_subsys.su_group.cg_item.ci_namebuf, name, strlen(name)); > + subsys->su_group = ufscfg_subsys.su_group; > + config_group_init(&subsys->su_group); > + mutex_init(&subsys->su_mutex); > + ret = configfs_register_subsystem(subsys); Are the configfs folks okay with adding a new top level directory for each host controller in the system? It might be better to have a single top level directory of ufs, and then each controller as a subdirectory underneath that. I'll defer to whatever the maintainers think here. > + if (ret) > + pr_err("Error %d while registering subsystem %s\n", > + ret, > + subsys->su_group.cg_item.ci_namebuf); > + > + return ret; > +} > + > +void ufshcd_configfs_exit(void) > +{ > + configfs_unregister_subsystem(&ufscfg_subsys); > +} -Evan