Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2005488ybb; Thu, 2 Apr 2020 11:16:44 -0700 (PDT) X-Google-Smtp-Source: APiQypI60nOGOJVYIDyOOtQiPPnlaM/SRUInsJNLtUWDdLtxVq5oWAvDu91l5JkDVfVcXOZW5bUY X-Received: by 2002:aca:f07:: with SMTP id 7mr265318oip.68.1585851404577; Thu, 02 Apr 2020 11:16:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585851404; cv=none; d=google.com; s=arc-20160816; b=X/6RjbOGitEpavP+1qWrG6daqUDgU2bHohJ64Lf532MEPnczxdn2nl/a3ZBYQjIe6D l044ZoBoIlqZqYN/CE97Snp1bGm3KnW4DeiXgtJ/R1DBQWSFeWbPB/57+kP4GYqBodlc a1r/x62gDePRVn93dQjconqYjHEJMZG/W2umyk94EocGBK+ppvhJGY3YOA4hys/vCWsi XMC6MfMa1vKQIF7cQGEJpTEVhCkcN/mQ/s2UKGV7eUPn1ADbhr6y1T7pt/c0uWYnq0mU 4QACk/AgFUiGqn4BIQ/InVyXxC67kRrpYZ5gbjcDXyfvXyLG4/EyAXBc0ZGiV6i7H0gO 0tEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=XyD2GCXI5gciPit6wopCB+3aqxL9iQ7U2dnlinJ8VuA=; b=Le0YCKWjow0MQEJthhtp87uXZGteGs1StMX6pRv5AL6UeYpISdad6qsZfhOyK8G6Hu pGZiXP/VXO6xpQDRzVRrX1utnFOB3AnVnKk0rQjfLmBRx8eaXaqoUAfmN9XVow/Uff5y Y+Nc56g2lhJqSzvTwFsxnN1QS58vwz1/QpEE65Nj8Ea5CywpQSJIuPHWlu1O4dWYyK9H u5pTIkmSEYZ10RK2Tsd+kPVzx5ynwLZTO9g5xbsVvbkEihw+FAF1ikY6AMYTMsgxU3/6 NHmgycwvsX07P1RVUsnMBL6YaApV88AxW/0UXkU5wwrQGpjB/bd5lOmlN/Wvn3fqD/nA C0qA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=oxYMX8Mg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c11si3441939ots.150.2020.04.02.11.16.31; Thu, 02 Apr 2020 11:16:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=oxYMX8Mg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389500AbgDBR2j (ORCPT + 99 others); Thu, 2 Apr 2020 13:28:39 -0400 Received: from mx07-00178001.pphosted.com ([62.209.51.94]:47709 "EHLO mx07-00178001.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389021AbgDBR2i (ORCPT ); Thu, 2 Apr 2020 13:28:38 -0400 Received: from pps.filterd (m0046037.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 032HEAr5007586; Thu, 2 Apr 2020 19:28:31 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=st.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=STMicroelectronics; bh=XyD2GCXI5gciPit6wopCB+3aqxL9iQ7U2dnlinJ8VuA=; b=oxYMX8MgiDwkWLGrQKcFiSNBZHTR1oiJKiXp63fSVXFi/3Ht57J2ZjKO9v4ZqYuBK4IO IgnO429HEfTG5GeFyXe+9MfUwcbTwMVVxlnZrAIUZgKZQr0AzQ2eLtP7im+AofHQycXS co4sQHgNWepL3ggY02AsFV+coOJN/C9qT9T7jpjQ2bocKvhJ3wnJj+vtP/6IvuIstke4 NsIwdkUdIvMnHbMsTSj5P56zCUL6RdZszor7XNBuRD/qZSABSdkF55HJFi5x7u3M8Sr8 rKicBiVZpfsP8YaFf8X2KjDd095yYXquElLgXTI6l9580YLfv+lGH04HN+X8wxD0/3dL TA== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 301w81cmnb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 02 Apr 2020 19:28:31 +0200 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id C4737100034; Thu, 2 Apr 2020 19:28:26 +0200 (CEST) Received: from Webmail-eu.st.com (sfhdag3node1.st.com [10.75.127.7]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id A1B362BF9CF; Thu, 2 Apr 2020 19:28:26 +0200 (CEST) Received: from lmecxl0889.tpe.st.com (10.75.127.46) by SFHDAG3NODE1.st.com (10.75.127.7) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 2 Apr 2020 19:28:25 +0200 Subject: Re: [PATCH v2 1/2] remoteproc: Add character device interface To: Rishabh Bhatnagar , , , CC: , , References: <1585699438-14394-1-git-send-email-rishabhb@codeaurora.org> From: Arnaud POULIQUEN Message-ID: <5b1c8287-0077-87e7-9364-b1f5a104c9e3@st.com> Date: Thu, 2 Apr 2020 19:28:21 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <1585699438-14394-1-git-send-email-rishabhb@codeaurora.org> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.75.127.46] X-ClientProxiedBy: SFHDAG8NODE2.st.com (10.75.127.23) To SFHDAG3NODE1.st.com (10.75.127.7) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138,18.0.676 definitions=2020-04-02_07:2020-04-02,2020-04-02 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi On 4/1/20 2:03 AM, Rishabh Bhatnagar wrote: > Add the character device interface for userspace applications. > This interface can be used in order to boot up and shutdown > remote subsystems. Currently there is only a sysfs interface > which the userspace clients can use. If a usersapce application > crashes after booting the remote processor does not get any > indication about the crash. It might still assume that the > application is running. For example modem uses remotefs service > to fetch data from disk/flash memory. If the remotefs service > crashes, modem keeps on requesting data which might lead to a > crash. Adding a character device interface makes the remote > processor tightly coupled with the user space application. > A crash of the application leads to a close on the file descriptors > therefore shutting down the remoteproc. Sorry I'm late in the discussion, I hope I've gone through the whole discussion so I don't reopen a closed point... Something here is not crystal clear to me so I'd rather share it... I suppose that you the automatic restart of the application is not possible to stop and restart the remote processor... Why this use case can not be solved by a process monitor or a service in userland that detects the application crash and stop the remote firmware using the sysfs interface? I just want to be sure that there is no alternative to this, because having two ways for application to shutdown the firmware seems to me confusing... What about the opposite service, mean inform the application that the remote processor is crashed? Do you identify such need? or the "auto" crash recovery is sufficient? Thanks, Arnaud > > Signed-off-by: Rishabh Bhatnagar > --- > drivers/remoteproc/Kconfig | 9 +++ > drivers/remoteproc/Makefile | 1 + > drivers/remoteproc/remoteproc_cdev.c | 100 +++++++++++++++++++++++++++++++ > drivers/remoteproc/remoteproc_internal.h | 22 +++++++ > include/linux/remoteproc.h | 2 + > 5 files changed, 134 insertions(+) > create mode 100644 drivers/remoteproc/remoteproc_cdev.c > > diff --git a/drivers/remoteproc/Kconfig b/drivers/remoteproc/Kconfig > index de3862c..6374b79 100644 > --- a/drivers/remoteproc/Kconfig > +++ b/drivers/remoteproc/Kconfig > @@ -14,6 +14,15 @@ config REMOTEPROC > > if REMOTEPROC > > +config REMOTEPROC_CDEV > + bool "Remoteproc character device interface" > + help > + Say y here to have a character device interface for Remoteproc > + framework. Userspace can boot/shutdown remote processors through > + this interface. > + > + It's safe to say N if you don't want to use this interface. > + > config IMX_REMOTEPROC > tristate "IMX6/7 remoteproc support" > depends on ARCH_MXC > diff --git a/drivers/remoteproc/Makefile b/drivers/remoteproc/Makefile > index e30a1b1..b7d4f77 100644 > --- a/drivers/remoteproc/Makefile > +++ b/drivers/remoteproc/Makefile > @@ -9,6 +9,7 @@ remoteproc-y += remoteproc_debugfs.o > remoteproc-y += remoteproc_sysfs.o > remoteproc-y += remoteproc_virtio.o > remoteproc-y += remoteproc_elf_loader.o > +obj-$(CONFIG_REMOTEPROC_CDEV) += remoteproc_cdev.o > obj-$(CONFIG_IMX_REMOTEPROC) += imx_rproc.o > obj-$(CONFIG_MTK_SCP) += mtk_scp.o mtk_scp_ipi.o > obj-$(CONFIG_OMAP_REMOTEPROC) += omap_remoteproc.o > diff --git a/drivers/remoteproc/remoteproc_cdev.c b/drivers/remoteproc/remoteproc_cdev.c > new file mode 100644 > index 0000000..8182bd1 > --- /dev/null > +++ b/drivers/remoteproc/remoteproc_cdev.c > @@ -0,0 +1,100 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Character device interface driver for Remoteproc framework. > + * > + * Copyright (c) 2020, The Linux Foundation. All rights reserved. > + */ > + > +#include > +#include > +#include > +#include > +#include > + > +#include "remoteproc_internal.h" > + > +#define NUM_RPROC_DEVICES 64 > +static dev_t rproc_cdev; > +static DEFINE_IDA(cdev_minor_ida); > + > +static int rproc_cdev_open(struct inode *inode, struct file *file) > +{ > + struct rproc *rproc; > + > + rproc = container_of(inode->i_cdev, struct rproc, char_dev); > + > + if (!rproc) > + return -EINVAL; > + > + if (rproc->state == RPROC_RUNNING) > + return -EBUSY; > + > + return rproc_boot(rproc); > +} > + > +static int rproc_cdev_release(struct inode *inode, struct file *file) > +{ > + struct rproc *rproc; > + > + rproc = container_of(inode->i_cdev, struct rproc, char_dev); > + > + if (!rproc || rproc->state != RPROC_RUNNING) > + return -EINVAL; > + > + rproc_shutdown(rproc); > + > + return 0; > +} > + > +static const struct file_operations rproc_fops = { > + .open = rproc_cdev_open, > + .release = rproc_cdev_release, > +}; > + > +int rproc_char_device_add(struct rproc *rproc) > +{ > + int ret, minor; > + dev_t cdevt; > + > + minor = ida_simple_get(&cdev_minor_ida, 0, NUM_RPROC_DEVICES, > + GFP_KERNEL); > + if (minor < 0) { > + dev_err(&rproc->dev, "%s: No more minor numbers left! rc:%d\n", > + __func__, minor); > + return -ENODEV; > + } > + > + cdev_init(&rproc->char_dev, &rproc_fops); > + rproc->char_dev.owner = THIS_MODULE; > + > + cdevt = MKDEV(MAJOR(rproc_cdev), minor); > + ret = cdev_add(&rproc->char_dev, cdevt, 1); > + if (ret < 0) > + ida_simple_remove(&cdev_minor_ida, minor); > + > + rproc->dev.devt = cdevt; > + return ret; > +} > + > +void rproc_char_device_remove(struct rproc *rproc) > +{ > + __unregister_chrdev(MAJOR(rproc->dev.devt), MINOR(rproc->dev.devt), 1, > + "rproc"); > + ida_simple_remove(&cdev_minor_ida, MINOR(rproc->dev.devt)); > +} > + > +void __init rproc_init_cdev(void) > +{ > + int ret; > + > + ret = alloc_chrdev_region(&rproc_cdev, 0, NUM_RPROC_DEVICES, "rproc"); > + if (ret < 0) { > + pr_err("Failed to alloc rproc_cdev region, err %d\n", ret); > + return; > + } > +} > + > +void __exit rproc_exit_cdev(void) > +{ > + __unregister_chrdev(MAJOR(rproc_cdev), 0, NUM_RPROC_DEVICES, "rproc"); > +} > diff --git a/drivers/remoteproc/remoteproc_internal.h b/drivers/remoteproc/remoteproc_internal.h > index 493ef92..28d61a1 100644 > --- a/drivers/remoteproc/remoteproc_internal.h > +++ b/drivers/remoteproc/remoteproc_internal.h > @@ -47,6 +47,27 @@ struct dentry *rproc_create_trace_file(const char *name, struct rproc *rproc, > int rproc_init_sysfs(void); > void rproc_exit_sysfs(void); > > +#ifdef CONFIG_REMOTEPROC_CDEV > +void rproc_init_cdev(void); > +void rproc_exit_cdev(void); > +int rproc_char_device_add(struct rproc *rproc); > +void rproc_char_device_remove(struct rproc *rproc); > +#else > +static inline void rproc_init_cdev(void) > +{ > +} > +static inline void rproc_exit_cdev(void) > +{ > +} > +static inline int rproc_char_device_add(struct rproc *rproc) > +{ > + return 0; > +} > +static inline void rproc_char_device_remove(struct rproc *rproc) > +{ > +} > +#endif > + > void rproc_free_vring(struct rproc_vring *rvring); > int rproc_alloc_vring(struct rproc_vdev *rvdev, int i); > > @@ -63,6 +84,7 @@ struct resource_table *rproc_elf_find_loaded_rsc_table(struct rproc *rproc, > struct rproc_mem_entry * > rproc_find_carveout_by_name(struct rproc *rproc, const char *name, ...); > > + > static inline > int rproc_fw_sanity_check(struct rproc *rproc, const struct firmware *fw) > { > diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h > index 16ad666..c4ca796 100644 > --- a/include/linux/remoteproc.h > +++ b/include/linux/remoteproc.h > @@ -37,6 +37,7 @@ > > #include > #include > +#include > #include > #include > #include > @@ -514,6 +515,7 @@ struct rproc { > bool auto_boot; > struct list_head dump_segments; > int nb_vdev; > + struct cdev char_dev; > }; > > /** >