Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3101462ybb; Mon, 6 Apr 2020 02:01:59 -0700 (PDT) X-Google-Smtp-Source: APiQypKt8O/svO8hFo2L0vyTTFQQX+PhnQUSA1SjE1rAR9HuyI04PopdgCkm066tJVW75dbFIAQg X-Received: by 2002:a9d:18f:: with SMTP id e15mr15649695ote.42.1586163719276; Mon, 06 Apr 2020 02:01:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586163719; cv=none; d=google.com; s=arc-20160816; b=CGKyQ74oGGzlZtETJN2fe/MK16DCO1lcytcwoV6oKvDncPTJi3AkJW6bbZ4dSRB99w CvXsAhsRXT734HUwTKgZkrRqZrXoQ7c18pHkcMRgozbXsAqh4+ECvj7NGcxipBS4ZlHV B9G242E9qcg/jfmfnM9bboJcdsXF+j4+Q9lBVytmxxL8YPRxU4Xk1GquS75C5YbdhyTB N2IEreJbHeE6BitoKe4xqL8jJRKm+0qWOAcg4eBpI2qanJyNOQitPtPYWkyBnEj9YCyS Dz7r/w2wM2g2B0zduTZZL4MU8p8EsJMyqp/QhXLVAgwtywvMAzt9gUS8iP37QvY2mORa qtSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=6QHhTjFxtxkp8tj/LjsrGruU3oxIic4Teunk0HCLW6Q=; b=XeXoK+VcAdJ10ziRDyWTA5b7OvH033VXWUTueHJqU+I2qFJE9JAe2PRUxTzQaUbkt/ WKg1nPpPK/1tn8FF7hvoupOZP2Caf3Z+rTofZHlRmSX7s3TUY1QaGMMgerAA5lBrjJN7 yywATH1XfGMwmDn019Pof5XE/JgbDORLU5h+7pAshECHdJXgxxqnd0ZfLl1KMedBQJ/A ElkkvDMzk9PON+Kiu832KjMadoTpNlPrBzsXyt/HncmGzyXHxz+V8S6YLkCHlTMjAHr2 M9tExU2veuUwPellir3ExbgtsBLT0iDbdOv6Chp1pp9fV6pTQ7o7dvdTefHDr3wVMtVL QurA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=faxwMOnM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e11si7040468oib.152.2020.04.06.02.01.46; Mon, 06 Apr 2020 02:01:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=faxwMOnM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726795AbgDFJBT (ORCPT + 99 others); Mon, 6 Apr 2020 05:01:19 -0400 Received: from mx07-00178001.pphosted.com ([62.209.51.94]:9644 "EHLO mx07-00178001.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726533AbgDFJBS (ORCPT ); Mon, 6 Apr 2020 05:01:18 -0400 Received: from pps.filterd (m0046037.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0368weOD009790; Mon, 6 Apr 2020 11:01:10 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=st.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=STMicroelectronics; bh=6QHhTjFxtxkp8tj/LjsrGruU3oxIic4Teunk0HCLW6Q=; b=faxwMOnMsSPI8jQ/dAKkTCPgmfJRQDlmqqeo99eGNqhsznpEIAm8oq+OBHEjCHt+RhTP E2wrWzDZzS1G5wzCgEfeN5rGSNcgO0XthS7EWMQF0Tnugpz8nvhltu/zA6RMk9Mk4XEa UrgL3s/bFny66DgZtcYSlWVPCesjQDX0P/sGFTv6hvjb6IurJC4wZr8biWX0cEiYMNfV 0SgEZV/evhft0StI5L8L0t24JJX5sjlWhTUOSIINzDrH4NyXblkggCl7ks394O7iKQnb vgVCnY5xL6QxdhRH/7FFVTfgadZtB/jsR8Dni+1mryJaAiVFgDyWbThQKolPU3Fn0PD0 Ww== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 306g0w0vtt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 06 Apr 2020 11:01:10 +0200 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 50962100034; Mon, 6 Apr 2020 11:01:06 +0200 (CEST) Received: from Webmail-eu.st.com (sfhdag3node1.st.com [10.75.127.7]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 14F992AE6CD; Mon, 6 Apr 2020 11:01:06 +0200 (CEST) Received: from lmecxl0889.tpe.st.com (10.75.127.45) by SFHDAG3NODE1.st.com (10.75.127.7) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 6 Apr 2020 11:01:04 +0200 Subject: Re: [PATCH v2 1/2] remoteproc: Add character device interface To: CC: , , , , , References: <1585699438-14394-1-git-send-email-rishabhb@codeaurora.org> <5b1c8287-0077-87e7-9364-b1f5a104c9e3@st.com> <6261646b2e0c4d9c8a30900b2f475890@codeaurora.org> From: Arnaud POULIQUEN Message-ID: <730c75c9-15e2-19c5-d97a-190bf1e6ffaa@st.com> Date: Mon, 6 Apr 2020 11:01:03 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <6261646b2e0c4d9c8a30900b2f475890@codeaurora.org> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.75.127.45] X-ClientProxiedBy: SFHDAG3NODE1.st.com (10.75.127.7) To SFHDAG3NODE1.st.com (10.75.127.7) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138,18.0.676 definitions=2020-04-06_05:2020-04-03,2020-04-06 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/3/20 9:13 PM, rishabhb@codeaurora.org wrote: > On 2020-04-02 10:28, Arnaud POULIQUEN wrote: >> Hi >> >> On 4/1/20 2:03 AM, Rishabh Bhatnagar wrote: >>> Add the character device interface for userspace applications. >>> This interface can be used in order to boot up and shutdown >>> remote subsystems. Currently there is only a sysfs interface >>> which the userspace clients can use. If a usersapce application >>> crashes after booting the remote processor does not get any >>> indication about the crash. It might still assume that the >>> application is running. For example modem uses remotefs service >>> to fetch data from disk/flash memory. If the remotefs service >>> crashes, modem keeps on requesting data which might lead to a >>> crash. Adding a character device interface makes the remote >>> processor tightly coupled with the user space application. >>> A crash of the application leads to a close on the file descriptors >>> therefore shutting down the remoteproc. >> >> Sorry I'm late in the discussion, I hope I've gone through the whole >> discussion so I don't reopen a closed point... >> >> Something here is not crystal clear to me so I'd rather share it... >> >> I suppose that you the automatic restart of the application is not possible to >> stop and restart the remote processor... > Yes correct, while we wait for the application to restart we might observe a > fatal crash. >> >> Why this use case can not be solved by a process monitor or a service >> in userland that detects the application crash and stop the remote >> firmware using >> the sysfs interface? >> > What happens in the case where the process monitor itself crashes? This is > actually the approach we follow in our downstream code. We have a central entity > in userspace that controls bootup/shutdown of some remote processors based on the > votes from userspace clients. We have observed cases where this entity > itself crashes and remote processors are left hanging. Your description makes me feel like this patch is only a workaround of something that should be fixed in the userland, even if i understand that hanging is one of the most critical problem and have to be fixed. For instance, how to handle several applications that interact with the remote processor ( e.g. rpmsg service applications) how to stop and restart everything. Using the char device would probaly resolve only a part of the issue... I'm not aware about your environment and i'm not a userland expert. But what i still not understand why a parent process can not do the job... I just test a simple script on my side that treat the kill -9 of an application ("cat" in my case). #start the remote firmware cp $1 /lib/firmware/ echo $1> /sys/class/remoteproc/remoteproc0/firmware echo start >/sys/class/remoteproc/remoteproc0/state #your binary cat /dev/kmsg # stop the remote firmware in case of crash (and potentially some other apps) echo stop >/sys/class/remoteproc/remoteproc0/state Anyway, it's just my feeling, let other people give their feedback. >> I just want to be sure that there is no alternative to this, because >> having two ways >> for application to shutdown the firmware seems to me confusing... > Does making this interface optional/configurable helps? >> >> What about the opposite service, mean inform the application that the remote >> processor is crashed? >> Do you identify such need? or the "auto" crash recovery is sufficient? > Auto recovery works perfectly for us. Although there is a mechanism in > place using QMI(Qualcomm MSM interface) that can notify clients about remote > processor crash. Thanks for the information. Regards Arnaud >> >> Thanks, >> Arnaud >>> >>> Signed-off-by: Rishabh Bhatnagar >>> --- >>>  drivers/remoteproc/Kconfig               |   9 +++ >>>  drivers/remoteproc/Makefile              |   1 + >>>  drivers/remoteproc/remoteproc_cdev.c     | 100 +++++++++++++++++++++++++++++++ >>>  drivers/remoteproc/remoteproc_internal.h |  22 +++++++ >>>  include/linux/remoteproc.h               |   2 + >>>  5 files changed, 134 insertions(+) >>>  create mode 100644 drivers/remoteproc/remoteproc_cdev.c >>> >>> diff --git a/drivers/remoteproc/Kconfig b/drivers/remoteproc/Kconfig >>> index de3862c..6374b79 100644 >>> --- a/drivers/remoteproc/Kconfig >>> +++ b/drivers/remoteproc/Kconfig >>> @@ -14,6 +14,15 @@ config REMOTEPROC >>> >>>  if REMOTEPROC >>> >>> +config REMOTEPROC_CDEV >>> +    bool "Remoteproc character device interface" >>> +    help >>> +      Say y here to have a character device interface for Remoteproc >>> +      framework. Userspace can boot/shutdown remote processors through >>> +      this interface. >>> + >>> +      It's safe to say N if you don't want to use this interface. >>> + >>>  config IMX_REMOTEPROC >>>      tristate "IMX6/7 remoteproc support" >>>      depends on ARCH_MXC >>> diff --git a/drivers/remoteproc/Makefile b/drivers/remoteproc/Makefile >>> index e30a1b1..b7d4f77 100644 >>> --- a/drivers/remoteproc/Makefile >>> +++ b/drivers/remoteproc/Makefile >>> @@ -9,6 +9,7 @@ remoteproc-y                += remoteproc_debugfs.o >>>  remoteproc-y                += remoteproc_sysfs.o >>>  remoteproc-y                += remoteproc_virtio.o >>>  remoteproc-y                += remoteproc_elf_loader.o >>> +obj-$(CONFIG_REMOTEPROC_CDEV)        += remoteproc_cdev.o >>>  obj-$(CONFIG_IMX_REMOTEPROC)        += imx_rproc.o >>>  obj-$(CONFIG_MTK_SCP)            += mtk_scp.o mtk_scp_ipi.o >>>  obj-$(CONFIG_OMAP_REMOTEPROC)        += omap_remoteproc.o >>> diff --git a/drivers/remoteproc/remoteproc_cdev.c b/drivers/remoteproc/remoteproc_cdev.c >>> new file mode 100644 >>> index 0000000..8182bd1 >>> --- /dev/null >>> +++ b/drivers/remoteproc/remoteproc_cdev.c >>> @@ -0,0 +1,100 @@ >>> +// SPDX-License-Identifier: GPL-2.0-only >>> +/* >>> + * Character device interface driver for Remoteproc framework. >>> + * >>> + * Copyright (c) 2020, The Linux Foundation. All rights reserved. >>> + */ >>> + >>> +#include >>> +#include >>> +#include >>> +#include >>> +#include >>> + >>> +#include "remoteproc_internal.h" >>> + >>> +#define NUM_RPROC_DEVICES    64 >>> +static dev_t rproc_cdev; >>> +static DEFINE_IDA(cdev_minor_ida); >>> + >>> +static int rproc_cdev_open(struct inode *inode, struct file *file) >>> +{ >>> +    struct rproc *rproc; >>> + >>> +    rproc = container_of(inode->i_cdev, struct rproc, char_dev); >>> + >>> +    if (!rproc) >>> +        return -EINVAL; >>> + >>> +    if (rproc->state == RPROC_RUNNING) >>> +        return -EBUSY; >>> + >>> +    return rproc_boot(rproc); >>> +} >>> + >>> +static int rproc_cdev_release(struct inode *inode, struct file *file) >>> +{ >>> +    struct rproc *rproc; >>> + >>> +    rproc = container_of(inode->i_cdev, struct rproc, char_dev); >>> + >>> +    if (!rproc || rproc->state != RPROC_RUNNING) >>> +        return -EINVAL; >>> + >>> +    rproc_shutdown(rproc); >>> + >>> +    return 0; >>> +} >>> + >>> +static const struct file_operations rproc_fops = { >>> +    .open = rproc_cdev_open, >>> +    .release = rproc_cdev_release, >>> +}; >>> + >>> +int rproc_char_device_add(struct rproc *rproc) >>> +{ >>> +    int ret, minor; >>> +    dev_t cdevt; >>> + >>> +    minor = ida_simple_get(&cdev_minor_ida, 0, NUM_RPROC_DEVICES, >>> +                   GFP_KERNEL); >>> +    if (minor < 0) { >>> +        dev_err(&rproc->dev, "%s: No more minor numbers left! rc:%d\n", >>> +            __func__, minor); >>> +        return -ENODEV; >>> +    } >>> + >>> +    cdev_init(&rproc->char_dev, &rproc_fops); >>> +    rproc->char_dev.owner = THIS_MODULE; >>> + >>> +    cdevt = MKDEV(MAJOR(rproc_cdev), minor); >>> +    ret = cdev_add(&rproc->char_dev, cdevt, 1); >>> +    if (ret < 0) >>> +        ida_simple_remove(&cdev_minor_ida, minor); >>> + >>> +    rproc->dev.devt = cdevt; >>> +    return ret; >>> +} >>> + >>> +void rproc_char_device_remove(struct rproc *rproc) >>> +{ >>> +    __unregister_chrdev(MAJOR(rproc->dev.devt), MINOR(rproc->dev.devt), 1, >>> +                "rproc"); >>> +    ida_simple_remove(&cdev_minor_ida, MINOR(rproc->dev.devt)); >>> +} >>> + >>> +void __init rproc_init_cdev(void) >>> +{ >>> +    int ret; >>> + >>> +    ret = alloc_chrdev_region(&rproc_cdev, 0, NUM_RPROC_DEVICES, "rproc"); >>> +    if (ret < 0) { >>> +        pr_err("Failed to alloc rproc_cdev region, err %d\n", ret); >>> +        return; >>> +    } >>> +} >>> + >>> +void __exit rproc_exit_cdev(void) >>> +{ >>> +    __unregister_chrdev(MAJOR(rproc_cdev), 0, NUM_RPROC_DEVICES, "rproc"); >>> +} >>> diff --git a/drivers/remoteproc/remoteproc_internal.h b/drivers/remoteproc/remoteproc_internal.h >>> index 493ef92..28d61a1 100644 >>> --- a/drivers/remoteproc/remoteproc_internal.h >>> +++ b/drivers/remoteproc/remoteproc_internal.h >>> @@ -47,6 +47,27 @@ struct dentry *rproc_create_trace_file(const char *name, struct rproc *rproc, >>>  int rproc_init_sysfs(void); >>>  void rproc_exit_sysfs(void); >>> >>> +#ifdef CONFIG_REMOTEPROC_CDEV >>> +void rproc_init_cdev(void); >>> +void rproc_exit_cdev(void); >>> +int rproc_char_device_add(struct rproc *rproc); >>> +void rproc_char_device_remove(struct rproc *rproc); >>> +#else >>> +static inline void rproc_init_cdev(void) >>> +{ >>> +} >>> +static inline void rproc_exit_cdev(void) >>> +{ >>> +} >>> +static inline int rproc_char_device_add(struct rproc *rproc) >>> +{ >>> +    return 0; >>> +} >>> +static inline void  rproc_char_device_remove(struct rproc *rproc) >>> +{ >>> +} >>> +#endif >>> + >>>  void rproc_free_vring(struct rproc_vring *rvring); >>>  int rproc_alloc_vring(struct rproc_vdev *rvdev, int i); >>> >>> @@ -63,6 +84,7 @@ struct resource_table *rproc_elf_find_loaded_rsc_table(struct rproc *rproc, >>>  struct rproc_mem_entry * >>>  rproc_find_carveout_by_name(struct rproc *rproc, const char *name, ...); >>> >>> + >>>  static inline >>>  int rproc_fw_sanity_check(struct rproc *rproc, const struct firmware *fw) >>>  { >>> diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h >>> index 16ad666..c4ca796 100644 >>> --- a/include/linux/remoteproc.h >>> +++ b/include/linux/remoteproc.h >>> @@ -37,6 +37,7 @@ >>> >>>  #include >>>  #include >>> +#include >>>  #include >>>  #include >>>  #include >>> @@ -514,6 +515,7 @@ struct rproc { >>>      bool auto_boot; >>>      struct list_head dump_segments; >>>      int nb_vdev; >>> +    struct cdev char_dev; >>>  }; >>> >>>  /** >>>