Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3930334ybg; Mon, 21 Oct 2019 00:45:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqwmLtuL108T7BdSDytKxYtLJOkiO6ZS8YAKoiBNUhiJgZJSqbjEz5AFbQNpMgVN75aoiTiz X-Received: by 2002:a17:906:1cce:: with SMTP id i14mr5020516ejh.296.1571643914328; Mon, 21 Oct 2019 00:45:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571643914; cv=none; d=google.com; s=arc-20160816; b=fV14ChfCfRjouyS1p7teATtBMqPaqqI+X7Ypbly+h+4/pezNCiMgy4DJAhrXG9+tWy 85JvmFqe7/6YEXTrsGl1LBBoowAwrnyWWqmffIrCISgBLY/Ms0pxLSDlyfY7zZy2anAE LES3He8M8wxMZ1kYha586cV+/NZLRak01YYcVTxnAaC0N4nkB8KrStwLAVmRNVArjxsW hZO+Y+IESaokBFdrLFP9wc4sh+10zrcYTFJV2HmRtafpqbmvAZxRCQWZxM9cdif6SFZT oCnNEfOSSAA5jAs6AVa+n7Yagkz38t3omOpEOIp/L2TAxjnaN0UH8sj2x9RTIqyi03Xx 8ruw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=oWryXEqoZmTDyrNGX6x02oGFKsUMuXJ9PBt4f6QDd44=; b=rAKaXb3lVJohtXHRuBI2dgPjrfFYPafe2TR8AM3CHrwnJTmOQyVk46gyvOvPGtTvo8 dnKBJUbXZsHqqItQ510soM7m0kaQsgCshMjZcwBAaX2Q76uh/EumLJXKYFgvu/MuAFEL PSjT1KZ5HjBfceCXy2CJO1fabInEpWKwZyndJ5btjx9imlb9RTYkfeH/t6tGDC4/3t+V gQcx2Il4oHef24qJjpVWkvpVGBBvaj5ikjHiTTYb8Xs09YAORRspuYKvYK3wseRn4B8q PhowUfoV65RPhftsMCLZksJDn14b7nsmuV2uBIV0NmhEvDsrS6HAS4opFuYhdpSp2MnF O4Xg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id kt5si8261029ejb.283.2019.10.21.00.44.49; Mon, 21 Oct 2019 00:45:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727239AbfJUHom (ORCPT + 99 others); Mon, 21 Oct 2019 03:44:42 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:59820 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727047AbfJUHol (ORCPT ); Mon, 21 Oct 2019 03:44:41 -0400 Received: from localhost (unknown [IPv6:2a01:e0a:2c:6930:5cf4:84a1:2763:fe0d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: bbrezillon) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 8DF67289F08; Mon, 21 Oct 2019 08:44:39 +0100 (BST) Date: Mon, 21 Oct 2019 09:44:35 +0200 From: Boris Brezillon To: masonccyang@mxic.com.tw Cc: bbrezillon@kernel.org, computersforpeace@gmail.com, dwmw2@infradead.org, frieder.schrempf@kontron.de, gregkh@linuxfoundation.org, juliensu@mxic.com.tw, linux-kernel@vger.kernel.org, linux-mtd@lists.infradead.org, marcel.ziswiler@toradex.com, marek.vasut@gmail.com, "Miquel Raynal" , richard@nod.at, tglx@linutronix.de, vigneshr@ti.com Subject: Re: [PATCH RFC 2/3] mtd: rawnand: Add support Macronix Block Protection function Message-ID: <20191021094435.78f4b16e@collabora.com> In-Reply-To: References: <1568793387-25199-1-git-send-email-masonccyang@mxic.com.tw> <1568793387-25199-2-git-send-email-masonccyang@mxic.com.tw> <20191007104511.5aa7b8f2@xps13> <20191007112442.783e4fbe@xps13> <20191008170249.06bd45ce@xps13> Organization: Collabora X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 21 Oct 2019 15:23:57 +0800 masonccyang@mxic.com.tw wrote: > Hi Miquel, > > > > > > > Then fill-in these two hooks from the manufacturer code, without > the > > > > > postponed init. > > > > > > > > > > > > > But in the final of nand_scan_tail(), mtd->_lock/_unlock will be > > > > filled by NULL, right ? > > > > > > The NAND core should set mtd->_lock/_unlock() to NAND specific hooks > so > > > that the MTD layer is abstracted and and drivers do not see it. Then, > > > in the NAND helper, either there is no specific hook defined by a > > > manufacturer driver and you return -ENOTSUPP, or you execute the > > > defined hook. > > > > okay, patch specific manufacturer _lock/_unlock driver > > in nand_manufacturer_init(); > > > > and in the final of nand_scan_tail() > > if (!mtd->_lock) > > mtd->_lock = NULL; > > if (!mtd->_unlock) > > mtd->_unlock = NULL; > > > I'm still considering of post_init() in nand_scan_tail() for > MTD layer default call-back function replacement because > there would be more call-back functions need it. > i.e., > MTD->_lock/_unlokc > MTD->_suspend/_resume Again, that's something that needs to be abstracted so that both the NAND manufacturer driver and the NAND controller driver can take appropriate actions on suspend/resume operations. > NTD->_point/_unpoint ->_point/_unpoint() are irrelevant for a NAND chip. > ... > > > actually, my patch series are including MTD->_locl/_unlock and > MTD->_suspend/_resume. how do you think ? Miquel was suggesting to add nand_chip->{lock,unlock,is_locked}() methods that would be implemented by the NAND manufacturer drivers, and have generic wrappers implemented in nand_base.c: static int nand_lock(struct mtd_info *mtd, loff_t ofs, uint64_t len) { struct nand_chip *chip = mtd_to_nand(mtd); if (!chip->lock) return -ENOTSUPP; return chip->lock(chip, ofs, len); } ... If you do that, you won't need this post_init() hook.