Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3630668ybl; Mon, 27 Jan 2020 07:31:54 -0800 (PST) X-Google-Smtp-Source: APXvYqx6en1Wuvvea6rCvm78U/kSYOxyjE9QYaIp6t73NuUYQ7CByR0LWtkmPcFZgvnnh96dtAvq X-Received: by 2002:a05:6808:2ce:: with SMTP id a14mr7950111oid.82.1580139114633; Mon, 27 Jan 2020 07:31:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580139114; cv=none; d=google.com; s=arc-20160816; b=B2mso40VgVNuiILQdntqMoA9fQ2KHbQTK+ZuwBU4drqc9Y6jnZuW7PJEh8J5rWIRU2 IgGU90eXslQtib1G+Qgt4wGwQUWSHbcVSgNhYYsaPV1+1xaWy2CRWA1RhuBxxEHwtslA jWs5sqiJZ8B/Bhn74KJhbx7ctdp8Z47g2J+In5xps2TlMZn4Ovw+hZJ/UIU/TwJ/2F04 k3uPgMTqE/UT8MneIqj2ApyvP9yOJmeOyk2eM7rQZ661X0FGAb/5vGCaP/uxoqZgWlDC QKqmUrEFPRBBGWG+hdJWZDM3iQWkqqQBEuMf/EWJHD2AfphnHxUVNgOpBWIbcy3pX2AV WMvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=3P8xkPQqNU+b/OX8/wl2OtJYYJ0abrRX09+u8a+RrJk=; b=EWpa/urM5vGXlKHgT6VrJbhQfwStV8SwReH4WJ3j1FA9WUo1R5bC6yccuM/c0caYRM xjc8tZpDr/vzfKx5p7+ZBc/jVTXlsCsZqbs5QmEr7/NSkwff7EmwzG3J8GEVDnQ7eWlh I14jdMKtFr81PnAj3zJ1NWzBJBgxZwFhNHDYRek7hXXyzgQFIUm9gpnoDneJ2A5ddSE8 QhtFLL0ShXbaKZOCXzxdSG4Q+qCtnPvhJOMqzc0EHa7C9fQvUkB4mS/fC+VVtgCyqwUF BmxUnCpcdWt7MykdB1898DfwbqnjFH9wW0u3ZrYsI1jvCEqDs2G8gvC/dZNeXor+dcP1 wNVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b10si7219361otq.183.2020.01.27.07.31.42; Mon, 27 Jan 2020 07:31:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729473AbgA0P3n (ORCPT + 99 others); Mon, 27 Jan 2020 10:29:43 -0500 Received: from bhuna.collabora.co.uk ([46.235.227.227]:33012 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729146AbgA0P3n (ORCPT ); Mon, 27 Jan 2020 10:29:43 -0500 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: eballetbo) with ESMTPSA id 2F431293C86 Subject: Re: [PATCH 1/4] platform/chrome: Add EC command msg wrapper To: Prashant Malani , bleung@chromium.org Cc: linux-kernel@vger.kernel.org References: <20200125012105.59903-1-pmalani@chromium.org> <20200125012105.59903-2-pmalani@chromium.org> From: Enric Balletbo i Serra Message-ID: Date: Mon, 27 Jan 2020 16:29:38 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.3.0 MIME-Version: 1.0 In-Reply-To: <20200125012105.59903-2-pmalani@chromium.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Prashant, Many thanks for this patch. On 25/1/20 2:21, Prashant Malani wrote: > Many callers of cros_ec_cmd_xfer_status() use a similar set up of > allocating and filling a message buffer and then copying any received > data to a target buffer. > cros_ec_cmd_xfer_status is already a wrapper, I dislike the idea of having three ways to do the same (cros_ec_cmd_xfer, cros_ec_cmd_xfer_status and this new one). I like the idea of have a wrapper that embeds the message allocation but we should not confuse users with different calls that does the same. So, I am for a change like this but I'd like to have all the users calling the same wrapper (unless there is a good reason to not use it). A proposed roadmap (to be discussed) for this would be. 1. Replace all the remaining "cros_ec_cmd_xfer" calls with "cros_ec_cmd_xfer_status". 2. Modify cros_ec_cmd_xfer_status to embed the message allocation. Thanks, Enric > Create a utility function that performs this setup so that callers can > use this function instead. > > Signed-off-by: Prashant Malani > --- > drivers/platform/chrome/cros_ec_proto.c | 53 +++++++++++++++++++++ > include/linux/platform_data/cros_ec_proto.h | 5 ++ > 2 files changed, 58 insertions(+) > > diff --git a/drivers/platform/chrome/cros_ec_proto.c b/drivers/platform/chrome/cros_ec_proto.c > index da1b1c4504333..8ef3b7d27d260 100644 > --- a/drivers/platform/chrome/cros_ec_proto.c > +++ b/drivers/platform/chrome/cros_ec_proto.c > @@ -5,6 +5,7 @@ > > #include > #include > +#include > #include > #include > #include > @@ -570,6 +571,58 @@ int cros_ec_cmd_xfer_status(struct cros_ec_device *ec_dev, > } > EXPORT_SYMBOL(cros_ec_cmd_xfer_status); > > +/** > + * cros_ec_send_cmd_msg() - Utility function to send commands to ChromeOS EC. > + * @ec: EC device struct. > + * @version: Command version number (often 0). > + * @command: Command ID including offset. > + * @outdata: Data to be sent to the EC. > + * @outsize: Size of the &outdata buffer. > + * @indata: Data to be received from the EC. > + * @insize: Size of the &indata buffer. > + * > + * This function is a wrapper around &cros_ec_cmd_xfer_status, and performs > + * some of the common work involved with sending a command to the EC. This > + * includes allocating and filling up a &struct cros_ec_command message buffer, > + * and copying the received data to another buffer. > + * > + * Return: The number of bytes transferred on success or negative error code. > + */ > +int cros_ec_send_cmd_msg(struct cros_ec_device *ec, unsigned int version, > + unsigned int command, void *outdata, > + unsigned int outsize, void *indata, > + unsigned int insize) > +{ > + struct cros_ec_command *msg; > + int ret; > + > + msg = kzalloc(sizeof(*msg) + max(outsize, insize), GFP_KERNEL); > + if (!msg) > + return -ENOMEM; > + > + msg->version = version; > + msg->command = command; > + msg->outsize = outsize; > + msg->insize = insize; > + > + if (outdata && outsize > 0) > + memcpy(msg->data, outdata, outsize); > + > + ret = cros_ec_cmd_xfer_status(ec, msg); > + if (ret < 0) { > + dev_warn(ec->dev, "Command failed: %d\n", msg->result); > + goto cleanup; > + } > + > + if (insize) > + memcpy(indata, msg->data, insize); > + > +cleanup: > + kfree(msg); > + return ret; > +} > +EXPORT_SYMBOL(cros_ec_send_cmd_msg); > + > static int get_next_event_xfer(struct cros_ec_device *ec_dev, > struct cros_ec_command *msg, > struct ec_response_get_next_event_v1 *event, > diff --git a/include/linux/platform_data/cros_ec_proto.h b/include/linux/platform_data/cros_ec_proto.h > index 30098a5515231..166ce26bdd79e 100644 > --- a/include/linux/platform_data/cros_ec_proto.h > +++ b/include/linux/platform_data/cros_ec_proto.h > @@ -201,6 +201,11 @@ int cros_ec_cmd_xfer(struct cros_ec_device *ec_dev, > int cros_ec_cmd_xfer_status(struct cros_ec_device *ec_dev, > struct cros_ec_command *msg); > > +int cros_ec_send_cmd_msg(struct cros_ec_device *ec_dev, unsigned int version, > + unsigned int command, void *outdata, > + unsigned int outsize, void *indata, > + unsigned int insize); > + > int cros_ec_register(struct cros_ec_device *ec_dev); > > int cros_ec_unregister(struct cros_ec_device *ec_dev); >