Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp400393ybz; Tue, 21 Apr 2020 11:12:27 -0700 (PDT) X-Google-Smtp-Source: APiQypIb0/EW4qp9AAgI1S+GO8phXhZIOqMkPqDqF54dz7WiaD0AMe4PfZgHVjDEV0lVyJuvxBXQ X-Received: by 2002:a50:bc16:: with SMTP id j22mr20685162edh.257.1587492747141; Tue, 21 Apr 2020 11:12:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587492747; cv=none; d=google.com; s=arc-20160816; b=DpsnY8OQeZAn36EbLPSXrAM8VR3rt1m7hmveyxzHV73U9wFW/5ubMzpZzvf32nftpE m0pOSQdylliKqes5G8SJhN7FOVEMcZJkAx+6gXVO9H9HivwT2drs2vAG35YKRqmeOWKp SGUajx/CQYpl/QQOPYyNT8Xm5/HzRUOQCNyjPbac+N0odgNuTWXISgKAW22aXwm7GQ97 8XgRS6LI2axcBdzdskAvxVd/RZY5cIAx9AZD/ardsJ5dT9i1mcGOdixhekADYRNWRH7T r7QJzPBUjsfPNVnuFpIh9KzRuPsCL4ZDRKsOkotb4aKHimohE0hYRfKSzWlVJ6QSWPQj CAvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dmarc-filter:dkim-signature; bh=zUI7auhlg0GkkupnouKSnIQeAmLOzov/C9tFRIXsNj4=; b=Wgy46O6SfpdBrnFEwo2iWzGlRVrSECMxFNla6eQx4qfzyj8Eq2zAkUGtFVik8m1nE5 7axDovYIkDKZo9LM01IfN5poZROoS+RFB91GQTI98igGRclNzptIU6ECiUM7SXoXeLGd fufG7WmzGSCfmdrAfKQZoC3Qfhmb9092BHFa2xwmGdBqebs7DFsnruqiozIfpmBj8p+T 8AQxyLDQEgvYFCFjlGC6Nsv4PX5E4ZNjq/nzcxKY7Vw5XVjEkzdeB2CgXGuH1homLDAJ yyawXfzkXItci5QWmmp2RS82YdM836E0KD0C/rVXXa4182t+FDRcuzygmdxpJFVcBaev uyUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=bFlwP4t1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v20si2386756edb.416.2020.04.21.11.12.03; Tue, 21 Apr 2020 11:12:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=bFlwP4t1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729259AbgDUSKm (ORCPT + 99 others); Tue, 21 Apr 2020 14:10:42 -0400 Received: from mail26.static.mailgun.info ([104.130.122.26]:14783 "EHLO mail26.static.mailgun.info" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725930AbgDUSKm (ORCPT ); Tue, 21 Apr 2020 14:10:42 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1587492640; h=References: In-Reply-To: Message-Id: Date: Subject: Cc: To: From: Sender; bh=zUI7auhlg0GkkupnouKSnIQeAmLOzov/C9tFRIXsNj4=; b=bFlwP4t1JFrSPA9xI7NeM6KGqyTj5FdSyTkYSaYoEdFYB6WH0ovtnU3ZdTh5Qd0iFPE+O/NS GBcuyc8q77tX4HGf9vLgO0V3hM+6wtnCsAIl0dzv3i5LnhNYnpBFPlIVvg9vLDqxLxlttgI+ gy1q0c+ipa+DrxW038vsQlBQyOU= X-Mailgun-Sending-Ip: 104.130.122.26 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by mxa.mailgun.org with ESMTP id 5e9f3712.7f70bb7ebb20-smtp-out-n04; Tue, 21 Apr 2020 18:10:26 -0000 (UTC) Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 3356FC432C2; Tue, 21 Apr 2020 18:10:26 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=ALL_TRUSTED,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.0 Received: from rishabhb-linux.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: rishabhb) by smtp.codeaurora.org (Postfix) with ESMTPSA id BB6F3C433D2; Tue, 21 Apr 2020 18:10:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org BB6F3C433D2 Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=rishabhb@codeaurora.org From: Rishabh Bhatnagar To: linux-remoteproc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: bjorn.andersson@linaro.org, mathieu.poirier@linaro.org, ohad@wizery.com, tsoni@codeaurora.org, psodagud@codeaurora.org, sidgup@codeaurora.org, Rishabh Bhatnagar Subject: [PATCH v3 1/2] remoteproc: Add remoteproc character device interface Date: Tue, 21 Apr 2020 11:10:17 -0700 Message-Id: <1587492618-15896-2-git-send-email-rishabhb@codeaurora.org> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1587492618-15896-1-git-send-email-rishabhb@codeaurora.org> References: <1587492618-15896-1-git-send-email-rishabhb@codeaurora.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add the character device interface into remoteproc framework. This interface can be used in order to boot/shutdown remote subsystems and provides a basic ioctl based interface to implement supplementary functionality. An ioctl call is implemented to enable the shutdown on release feature which will allow remote processors to be shutdown when the controlling userpsace application crashes or hangs. Signed-off-by: Rishabh Bhatnagar --- Documentation/userspace-api/ioctl/ioctl-number.rst | 1 + drivers/remoteproc/Kconfig | 9 ++ drivers/remoteproc/Makefile | 1 + drivers/remoteproc/remoteproc_cdev.c | 143 +++++++++++++++++++++ drivers/remoteproc/remoteproc_internal.h | 21 +++ include/linux/remoteproc.h | 3 + include/uapi/linux/remoteproc_cdev.h | 20 +++ 7 files changed, 198 insertions(+) create mode 100644 drivers/remoteproc/remoteproc_cdev.c create mode 100644 include/uapi/linux/remoteproc_cdev.h diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst index 2e91370..412b2a0 100644 --- a/Documentation/userspace-api/ioctl/ioctl-number.rst +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst @@ -337,6 +337,7 @@ Code Seq# Include File Comments 0xB4 00-0F linux/gpio.h 0xB5 00-0F uapi/linux/rpmsg.h 0xB6 all linux/fpga-dfl.h +0xB7 all uapi/linux/remoteproc_cdev.h 0xC0 00-0F linux/usb/iowarrior.h 0xCA 00-0F uapi/misc/cxl.h 0xCA 10-2F uapi/misc/ocxl.h diff --git a/drivers/remoteproc/Kconfig b/drivers/remoteproc/Kconfig index de3862c..6374b79 100644 --- a/drivers/remoteproc/Kconfig +++ b/drivers/remoteproc/Kconfig @@ -14,6 +14,15 @@ config REMOTEPROC if REMOTEPROC +config REMOTEPROC_CDEV + bool "Remoteproc character device interface" + help + Say y here to have a character device interface for Remoteproc + framework. Userspace can boot/shutdown remote processors through + this interface. + + It's safe to say N if you don't want to use this interface. + config IMX_REMOTEPROC tristate "IMX6/7 remoteproc support" depends on ARCH_MXC diff --git a/drivers/remoteproc/Makefile b/drivers/remoteproc/Makefile index e30a1b1..b7d4f77 100644 --- a/drivers/remoteproc/Makefile +++ b/drivers/remoteproc/Makefile @@ -9,6 +9,7 @@ remoteproc-y += remoteproc_debugfs.o remoteproc-y += remoteproc_sysfs.o remoteproc-y += remoteproc_virtio.o remoteproc-y += remoteproc_elf_loader.o +obj-$(CONFIG_REMOTEPROC_CDEV) += remoteproc_cdev.o obj-$(CONFIG_IMX_REMOTEPROC) += imx_rproc.o obj-$(CONFIG_MTK_SCP) += mtk_scp.o mtk_scp_ipi.o obj-$(CONFIG_OMAP_REMOTEPROC) += omap_remoteproc.o diff --git a/drivers/remoteproc/remoteproc_cdev.c b/drivers/remoteproc/remoteproc_cdev.c new file mode 100644 index 0000000..65142ec --- /dev/null +++ b/drivers/remoteproc/remoteproc_cdev.c @@ -0,0 +1,143 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Character device interface driver for Remoteproc framework. + * + * Copyright (c) 2020, The Linux Foundation. All rights reserved. + */ + +#include +#include +#include +#include +#include +#include +#include + +#include "remoteproc_internal.h" + +#define NUM_RPROC_DEVICES 64 +static dev_t rproc_major; + +static ssize_t rproc_cdev_write(struct file *filp, const char __user *buf, + size_t len, loff_t *pos) +{ + struct rproc *rproc = container_of(filp->f_inode->i_cdev, + struct rproc, char_dev); + int ret = 0; + char cmd[10]; + + if (!len || len > sizeof(cmd)) + return -EINVAL; + + ret = copy_from_user(cmd, buf, sizeof(cmd)); + if (ret) + return -EFAULT; + + if (sysfs_streq(cmd, "start")) { + if (rproc->state == RPROC_RUNNING) + return -EBUSY; + + ret = rproc_boot(rproc); + if (ret) + dev_err(&rproc->dev, "Boot failed:%d\n", ret); + } else if (sysfs_streq(cmd, "stop")) { + if (rproc->state == RPROC_OFFLINE) + return -ENXIO; + + rproc_shutdown(rproc); + } else { + dev_err(&rproc->dev, "Unrecognized option\n"); + ret = -EINVAL; + } + + return ret ? ret : len; +} + +static long rproc_device_ioctl(struct file *filp, unsigned int ioctl, + unsigned long arg) +{ + struct rproc *rproc = container_of(filp->f_inode->i_cdev, + struct rproc, char_dev); + void __user *argp = (void __user *)arg; + int ret; + bool param; + + switch (ioctl) { + case RPROC_SET_SHUTDOWN_ON_RELEASE: + ret = copy_from_user(¶m, argp, sizeof(bool)); + if (ret) { + dev_err(&rproc->dev, "Data copy from userspace failed\n"); + return -EINVAL; + } + rproc->cdev_put_on_release = param; + break; + case RPROC_GET_SHUTDOWN_ON_RELEASE: + ret = copy_to_user(argp, &rproc->cdev_put_on_release, + sizeof(bool)); + if (ret) { + dev_err(&rproc->dev, "Data copy to userspace failed\n"); + return -EINVAL; + } + break; + default: + dev_err(&rproc->dev, "Unsupported ioctl\n"); + return -EINVAL; + } + return 0; +} + +static int rproc_cdev_release(struct inode *inode, struct file *filp) +{ + struct rproc *rproc = container_of(inode->i_cdev, struct rproc, + char_dev); + + if (rproc->cdev_put_on_release && rproc->state != RPROC_OFFLINE) + rproc_shutdown(rproc); + + return 0; +} + + +static const struct file_operations rproc_fops = { + .write = rproc_cdev_write, + .unlocked_ioctl = rproc_device_ioctl, + .release = rproc_cdev_release, +}; + +int rproc_char_device_add(struct rproc *rproc) +{ + int ret; + dev_t cdevt; + + cdev_init(&rproc->char_dev, &rproc_fops); + rproc->char_dev.owner = THIS_MODULE; + + cdevt = MKDEV(MAJOR(rproc_major), rproc->index); + ret = cdev_add(&rproc->char_dev, cdevt, 1); + if (ret < 0) + goto out; + + rproc->dev.devt = cdevt; +out: + return ret; +} + +void rproc_char_device_remove(struct rproc *rproc) +{ + __unregister_chrdev(MAJOR(rproc->dev.devt), rproc->index, 1, "rproc"); +} + +void __init rproc_init_cdev(void) +{ + int ret; + + ret = alloc_chrdev_region(&rproc_major, 0, NUM_RPROC_DEVICES, "rproc"); + if (ret < 0) + pr_err("Failed to alloc rproc_cdev region, err %d\n", ret); +} + +void __exit rproc_exit_cdev(void) +{ + unregister_chrdev_region(MKDEV(MAJOR(rproc_major), 0), + NUM_RPROC_DEVICES); +} diff --git a/drivers/remoteproc/remoteproc_internal.h b/drivers/remoteproc/remoteproc_internal.h index 493ef92..fb9d891 100644 --- a/drivers/remoteproc/remoteproc_internal.h +++ b/drivers/remoteproc/remoteproc_internal.h @@ -47,6 +47,27 @@ struct dentry *rproc_create_trace_file(const char *name, struct rproc *rproc, int rproc_init_sysfs(void); void rproc_exit_sysfs(void); +#ifdef CONFIG_REMOTEPROC_CDEV +void rproc_init_cdev(void); +void rproc_exit_cdev(void); +int rproc_char_device_add(struct rproc *rproc); +void rproc_char_device_remove(struct rproc *rproc); +#else +static inline void rproc_init_cdev(void) +{ +} +static inline void rproc_exit_cdev(void) +{ +} +static inline int rproc_char_device_add(struct rproc *rproc) +{ + return 0; +} +static inline void rproc_char_device_remove(struct rproc *rproc) +{ +} +#endif + void rproc_free_vring(struct rproc_vring *rvring); int rproc_alloc_vring(struct rproc_vdev *rvdev, int i); diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h index 16ad666..9bd2ff5 100644 --- a/include/linux/remoteproc.h +++ b/include/linux/remoteproc.h @@ -40,6 +40,7 @@ #include #include #include +#include #include /** @@ -514,6 +515,8 @@ struct rproc { bool auto_boot; struct list_head dump_segments; int nb_vdev; + struct cdev char_dev; + bool cdev_put_on_release; }; /** diff --git a/include/uapi/linux/remoteproc_cdev.h b/include/uapi/linux/remoteproc_cdev.h new file mode 100644 index 0000000..3975120 --- /dev/null +++ b/include/uapi/linux/remoteproc_cdev.h @@ -0,0 +1,20 @@ +/* SPDX-License-Identifier: GPL-2.0-only WITH Linux-syscall-note */ +/* + * IOCTLs for Remoteproc's character device interface. + * + * Copyright (c) 2020, The Linux Foundation. All rights reserved. + */ + + +#ifndef _UAPI_REMOTEPROC_CDEV_H_ +#define _UAPI_REMOTEPROC_CDEV_H_ + +#include +#include + +#define RPROC_MAGIC 0xB7 + +#define RPROC_SET_SHUTDOWN_ON_RELEASE _IOW(RPROC_MAGIC, 1, int) +#define RPROC_GET_SHUTDOWN_ON_RELEASE _IOR(RPROC_MAGIC, 2, int) + +#endif -- The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project