Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp765615ybh; Wed, 15 Jul 2020 14:52:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwCBjxapT/LuhdRju92Wl8fwZieabWSE2PnbZJYCR6qAe7hPEV74IPB7gPF+LgQc0nBHHjI X-Received: by 2002:a17:906:c35a:: with SMTP id ci26mr860757ejb.451.1594849956891; Wed, 15 Jul 2020 14:52:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594849956; cv=none; d=google.com; s=arc-20160816; b=nlpYCj/SqY29ouie8NGeiSCbqT2h9mm2yQJZIIIq245YXji8xPFaABzi03FyHkOeb9 6pfpjkoLFYCUv696tZ8ruhjzz9lWozcKatxh4/AbAHtPymQ9euxrv/8UdoIefNrl5hIr Ws7KdXfq5EIxVioyA/51+o7d/emtV1+VV3mWfR4DULAHkNb/LYISLlHd3g+4mM4i63WH UbcBVggpSvaR7BMRVCaFM9NtiIjQpVR4JIwNoj6WJN9MYqTX3h0rwaDmNPEyeGvCzc5c +Bd3oT2cJpqN88/YkhSwnwdCyoVCrmcO+IRjsu1c5ekhidJ9VlnJveNcUI+SQI3AgD94 zjDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=QzDFoqxCCdJl02SyMD7+5QDFAoX8VFzMDMSwd9JNjVA=; b=YqsS4xAeziLkdS9TnOQHqdy/rF3cCcv2tOIEaHhW+lLEDRdGJhjYjbTef0lAJ6uk5t xC3yqoxLwSQDwdMyX9P0uakfRmUSYjFROdYI7ACL8vyOm58uMXUygOoKMDIxwXK08eFv dSuEg3lTTFzxhMAjykPLq1tOrV+MiKee5zA/Eu04ZEy6XtL+Awtc2iPTQnM2NG3ulrZj wMMEaUCY1YYLh5T8WyCfbf6DKHCZH9aOzwldwCny0/SYetaNdzyD4Ga1IiBGD4OU+Xan LIsUTdB3ucIoFSPOpDPlwGtJ5amqJSw1MUYDIVr3bbX5r9q7CxugXykYv68iElkcU1Tp ulHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=dp9BP5rH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gu17si1933706ejb.132.2020.07.15.14.52.11; Wed, 15 Jul 2020 14:52:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=dp9BP5rH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727788AbgGOVvz (ORCPT + 99 others); Wed, 15 Jul 2020 17:51:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726356AbgGOVvx (ORCPT ); Wed, 15 Jul 2020 17:51:53 -0400 Received: from mail-pg1-x543.google.com (mail-pg1-x543.google.com [IPv6:2607:f8b0:4864:20::543]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 68EACC061755 for ; Wed, 15 Jul 2020 14:51:53 -0700 (PDT) Received: by mail-pg1-x543.google.com with SMTP id n5so3762275pgf.7 for ; Wed, 15 Jul 2020 14:51:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=QzDFoqxCCdJl02SyMD7+5QDFAoX8VFzMDMSwd9JNjVA=; b=dp9BP5rH8LbiA+AvyK71a6G61cQeDEvl+G2fBlWAiegvFVKfrr84+m72JOEV7Xn4ea Ck1NjJ0cQGsroN5ujyLTdlw2O+FfpkU+CgcUxOKmKoRn+j2Uf8iX5B5LVh4YHRZYGBCf cLvvR/3/manh/9STL2RSYE79BfcqLIyu8apejQe0G/T7plANcxy9f8fT+hqnJ1evxCu4 p8/N66oiF5aujU46GpSeHlM5jXw8JNchbaFRh4bi4tPaCf6RfB4JKMeDeEiX6e6b3ohX 8suXtjhAePDc9VfZStvxf+2oisKfA27fatzFyYakfUI4B0U+I7I3Dq82XfqeW5Fny4R3 6Qyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=QzDFoqxCCdJl02SyMD7+5QDFAoX8VFzMDMSwd9JNjVA=; b=WJXJDhiKPXzOZ8LTZuLqsu5t97LoB5mdywwmTwn1rZQcrPEr7A7DoNHEfTEk35+Z4Y eOrE9QwpGLElqSOXrLiAL2pXzHox6elRA1j+zFuuxhm1/Wz1gHNAwXskI4Sn8paHMmjg 2+JmBpgbzJk2MDx3+NmHRtlD/fOGMggZB587jTmVIeKZ9jjmKIChs7EYeTStUw6FWZTz ECjmdTfirwcJUuHcUm8CRoApyem/cZGcjJctLTESrArnV3KTGpqSjwEC9utpCo9cFJY3 pl+SGG6qxlQovKh4PFlayrfxARrseqDVxeSgb0DTRbAyJktLJ6UxB5v7T1Sz3IRZM8+y 4SJw== X-Gm-Message-State: AOAM532I2xZJ2Fot6raxIwsrViVPvinRwxHf1NZH7vud5jCVRmQCP2Yv dkXNxZktAnug2RsG9JKcw4fhvA== X-Received: by 2002:a62:8c54:: with SMTP id m81mr1041470pfd.215.1594849912767; Wed, 15 Jul 2020 14:51:52 -0700 (PDT) Received: from xps15 (S0106002369de4dac.cg.shawcable.net. [68.147.8.254]) by smtp.gmail.com with ESMTPSA id w71sm2866119pfd.6.2020.07.15.14.51.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Jul 2020 14:51:51 -0700 (PDT) Date: Wed, 15 Jul 2020 15:51:49 -0600 From: Mathieu Poirier To: Siddharth Gupta Cc: agross@kernel.org, bjorn.andersson@linaro.org, ohad@wizery.com, corbet@lwn.net, linux-remoteproc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, tsoni@codeaurora.org, psodagud@codeaurora.org, rishabhb@codeaurora.org, linux-doc@vger.kernel.org Subject: Re: [PATCH v4 1/2] remoteproc: Add remoteproc character device interface Message-ID: <20200715215149.GA3267350@xps15> References: <1594148870-27276-1-git-send-email-sidgup@codeaurora.org> <1594148870-27276-2-git-send-email-sidgup@codeaurora.org> <20200715201839.GA3204081@xps15> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200715201839.GA3204081@xps15> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 15, 2020 at 02:18:39PM -0600, Mathieu Poirier wrote: > On Tue, Jul 07, 2020 at 12:07:49PM -0700, Siddharth Gupta wrote: > > Add the character device interface into remoteproc framework. > > This interface can be used in order to boot/shutdown remote > > subsystems and provides a basic ioctl based interface to implement > > supplementary functionality. An ioctl call is implemented to enable > > the shutdown on release feature which will allow remote processors to > > be shutdown when the controlling userpsace application crashes or hangs. > > > > Signed-off-by: Rishabh Bhatnagar > > Signed-off-by: Siddharth Gupta > > --- > > Documentation/userspace-api/ioctl/ioctl-number.rst | 1 + > > drivers/remoteproc/Kconfig | 9 ++ > > drivers/remoteproc/Makefile | 1 + > > drivers/remoteproc/remoteproc_cdev.c | 146 +++++++++++++++++++++ > > drivers/remoteproc/remoteproc_internal.h | 28 ++++ > > include/linux/remoteproc.h | 5 + > > include/uapi/linux/remoteproc_cdev.h | 37 ++++++ > > 7 files changed, 227 insertions(+) > > create mode 100644 drivers/remoteproc/remoteproc_cdev.c > > create mode 100644 include/uapi/linux/remoteproc_cdev.h > > > > diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst > > index 59472cd..2a19883 100644 > > --- a/Documentation/userspace-api/ioctl/ioctl-number.rst > > +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst > > @@ -339,6 +339,7 @@ Code Seq# Include File Comments > > 0xB4 00-0F linux/gpio.h > > 0xB5 00-0F uapi/linux/rpmsg.h > > 0xB6 all linux/fpga-dfl.h > > +0xB7 all uapi/linux/remoteproc_cdev.h > > 0xC0 00-0F linux/usb/iowarrior.h > > 0xCA 00-0F uapi/misc/cxl.h > > 0xCA 10-2F uapi/misc/ocxl.h > > diff --git a/drivers/remoteproc/Kconfig b/drivers/remoteproc/Kconfig > > index c4d1731..652060f 100644 > > --- a/drivers/remoteproc/Kconfig > > +++ b/drivers/remoteproc/Kconfig > > @@ -14,6 +14,15 @@ config REMOTEPROC > > > > if REMOTEPROC > > > > +config REMOTEPROC_CDEV > > + bool "Remoteproc character device interface" > > + help > > + Say y here to have a character device interface for the remoteproc > > + framework. Userspace can boot/shutdown remote processors through > > + this interface. > > + > > + It's safe to say N if you don't want to use this interface. > > + > > config IMX_REMOTEPROC > > tristate "IMX6/7 remoteproc support" > > depends on ARCH_MXC > > diff --git a/drivers/remoteproc/Makefile b/drivers/remoteproc/Makefile > > index e8b886e..311ae3f 100644 > > --- a/drivers/remoteproc/Makefile > > +++ b/drivers/remoteproc/Makefile > > @@ -9,6 +9,7 @@ remoteproc-y += remoteproc_debugfs.o > > remoteproc-y += remoteproc_sysfs.o > > remoteproc-y += remoteproc_virtio.o > > remoteproc-y += remoteproc_elf_loader.o > > +obj-$(CONFIG_REMOTEPROC_CDEV) += remoteproc_cdev.o > > obj-$(CONFIG_IMX_REMOTEPROC) += imx_rproc.o > > obj-$(CONFIG_INGENIC_VPU_RPROC) += ingenic_rproc.o > > obj-$(CONFIG_MTK_SCP) += mtk_scp.o mtk_scp_ipi.o > > diff --git a/drivers/remoteproc/remoteproc_cdev.c b/drivers/remoteproc/remoteproc_cdev.c > > new file mode 100644 > > index 0000000..8a0eb47 > > --- /dev/null > > +++ b/drivers/remoteproc/remoteproc_cdev.c > > @@ -0,0 +1,146 @@ > > +// SPDX-License-Identifier: GPL-2.0-only > > +/* > > + * Character device interface driver for Remoteproc framework. > > + * > > + * Copyright (c) 2020, The Linux Foundation. All rights reserved. > > + */ > > + > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > Alphabetical order please. > > > + > > +#include "remoteproc_internal.h" > > + > > +#define NUM_RPROC_DEVICES 64 > > +static dev_t rproc_major; > > + > > +static ssize_t rproc_cdev_write(struct file *filp, const char __user *buf, size_t len, loff_t *pos) > > +{ > > + struct rproc *rproc = container_of(filp->f_inode->i_cdev, struct rproc, char_dev); > > + int ret = 0; > > + char cmd[10]; > > + > > + if (!len || len > sizeof(cmd)) > > + return -EINVAL; > > + > > + ret = copy_from_user(cmd, buf, sizeof(cmd)); > > + if (ret) > > + return -EFAULT; > > + > > + if (sysfs_streq(cmd, "start")) { > > + if (rproc->state == RPROC_RUNNING) > > + return -EBUSY; > > + > > + ret = rproc_boot(rproc); > > + if (ret) > > + dev_err(&rproc->dev, "Boot failed:%d\n", ret); > > + } else if (sysfs_streq(cmd, "stop")) { > > + if (rproc->state != RPROC_RUNNING) > > + return -EINVAL; > > + > > + rproc_shutdown(rproc); > > + } else { > > + dev_err(&rproc->dev, "Unrecognized option\n"); > > + ret = -EINVAL; > > + } > > + > > + return ret ? ret : len; > > +} > > + > > +static long rproc_device_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) > > +{ > > + struct rproc *rproc = container_of(filp->f_inode->i_cdev, struct rproc, char_dev); > > + void __user *argp = compat_ptr(arg); > > + int ret; > > + int32_t param; > > + > > + switch (ioctl) { > > + case RPROC_SET_SHUTDOWN_ON_RELEASE: > > + ret = copy_from_user(¶m, argp, sizeof(int32_t)); > > + if (ret) { > > + dev_err(&rproc->dev, "Data copy from userspace failed\n"); > > + return -EFAULT; > > + } > > + mutex_lock(&rproc->lock); > > + rproc->cdev_put_on_release = param ? true : false; > > + mutex_unlock(&rproc->lock); > > + break; > > + case RPROC_GET_SHUTDOWN_ON_RELEASE: > > + mutex_lock(&rproc->lock); > > + ret = copy_to_user(argp, &rproc->cdev_put_on_release, sizeof(bool)); > > + mutex_unlock(&rproc->lock); > > + if (ret) { > > + dev_err(&rproc->dev, "Data copy to userspace failed\n"); > > + return -EFAULT; > > + } > > + break; > > + default: > > + dev_err(&rproc->dev, "Unsupported ioctl\n"); > > + return -EINVAL; > > + } > > + > > + return 0; > > +} > > + > > +static int rproc_cdev_release(struct inode *inode, struct file *filp) > > +{ > > + struct rproc *rproc = container_of(inode->i_cdev, struct rproc, char_dev); > > + bool release; > > + > > + mutex_lock(&rproc->lock); > > + release = rproc->cdev_put_on_release; > > + mutex_unlock(&rproc->lock); > > + > > + if (release && rproc->state == RPROC_RUNNING) > > I think the state of the processor should also be acquired when the lock is > held. There is still a chance ->state can change between the time the lock is > released and rproc_shutdown() is called but that's a known problem for which > patches have been sent out. > > > + rproc_shutdown(rproc); > > + > > + return 0; > > +} > > + > > +static const struct file_operations rproc_fops = { > > + .write = rproc_cdev_write, > > + .compat_ioctl = rproc_device_ioctl, > > + .release = rproc_cdev_release, > > +}; > > + > > +int rproc_char_device_add(struct rproc *rproc) > > +{ > > + int ret; > > + dev_t cdevt; > > + > > + cdev_init(&rproc->char_dev, &rproc_fops); > > + rproc->char_dev.owner = THIS_MODULE; > > + > > + cdevt = MKDEV(rproc_major, rproc->index); > > + ret = cdev_add(&rproc->char_dev, cdevt, 1); Trying this patchset on my side gave me the following splat[1]. After finding the root case I can't understand how you haven't see it on your side when you tested the feature. [1]. https://pastebin.com/aYTUUCdQ > > + if (ret < 0) > > + goto out; > > + > > + rproc->dev.devt = cdevt; > > +out: > > + return ret; > > +} > > + > > +void rproc_char_device_remove(struct rproc *rproc) > > +{ > > + __unregister_chrdev(rproc_major, rproc->index, 1, "remoteproc"); > > +} > > + > > +void __init rproc_init_cdev(void) > > +{ > > + int ret; > > + > > + ret = alloc_chrdev_region(&rproc_major, 0, NUM_RPROC_DEVICES, "remoteproc"); > > + if (ret < 0) > > + pr_err("Failed to alloc rproc_cdev region, err %d\n", ret); > > +} > > + > > +void __exit rproc_exit_cdev(void) > > +{ > > + unregister_chrdev_region(MKDEV(rproc_major, 0), NUM_RPROC_DEVICES); > > Please go back to the comment I made on this during my last review and respin. After digging in the code while debugging the above problem, I don't see how unregistering the chrdev region the way it is done here would have worked. > > > +} > > diff --git a/drivers/remoteproc/remoteproc_internal.h b/drivers/remoteproc/remoteproc_internal.h > > index 4ba7cb5..f091ddc 100644 > > --- a/drivers/remoteproc/remoteproc_internal.h > > +++ b/drivers/remoteproc/remoteproc_internal.h > > @@ -47,6 +47,34 @@ extern struct class rproc_class; > > int rproc_init_sysfs(void); > > void rproc_exit_sysfs(void); > > > > +#ifdef CONFIG_REMOTEPROC_CDEV > > +void rproc_init_cdev(void); > > +void rproc_exit_cdev(void); > > +int rproc_char_device_add(struct rproc *rproc); > > +void rproc_char_device_remove(struct rproc *rproc); > > +#else > > +static inline void rproc_init_cdev(void) > > +{ > > +} > > + > > +static inline void rproc_exit_cdev(void) > > +{ > > +} > > + > > +/* > > + * The character device interface is an optional feature, if it is not enabled > > + * the function should not return an error. > > + */ > > +static inline int rproc_char_device_add(struct rproc *rproc) > > +{ > > + return 0; > > +} > > + > > +static inline void rproc_char_device_remove(struct rproc *rproc) > > +{ > > +} > > +#endif > > + > > void rproc_free_vring(struct rproc_vring *rvring); > > int rproc_alloc_vring(struct rproc_vdev *rvdev, int i); > > > > diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h > > index e7b7bab..669cbfb 100644 > > --- a/include/linux/remoteproc.h > > +++ b/include/linux/remoteproc.h > > @@ -40,6 +40,7 @@ > > #include > > #include > > #include > > +#include > > Move this above completion.h > > With all of the above modifications: > > Reviewed-by: Mathieu Poirier I'm taking that back - this patch needs some fixing... > > > #include > > > > /** > > @@ -488,6 +489,8 @@ struct rproc_dump_segment { > > * @auto_boot: flag to indicate if remote processor should be auto-started > > * @dump_segments: list of segments in the firmware > > * @nb_vdev: number of vdev currently handled by rproc > > + * @char_dev: character device of the rproc > > + * @cdev_put_on_release: flag to indicate if remoteproc should be shutdown on @char_dev release > > */ > > struct rproc { > > struct list_head node; > > @@ -523,6 +526,8 @@ struct rproc { > > int nb_vdev; > > u8 elf_class; > > u16 elf_machine; > > + struct cdev char_dev; > > + bool cdev_put_on_release; > > }; > > > > /** > > diff --git a/include/uapi/linux/remoteproc_cdev.h b/include/uapi/linux/remoteproc_cdev.h > > new file mode 100644 > > index 0000000..c43768e > > --- /dev/null > > +++ b/include/uapi/linux/remoteproc_cdev.h > > @@ -0,0 +1,37 @@ > > +/* SPDX-License-Identifier: GPL-2.0-only WITH Linux-syscall-note */ > > +/* > > + * IOCTLs for Remoteproc's character device interface. > > + * > > + * Copyright (c) 2020, The Linux Foundation. All rights reserved. > > + */ > > + > > +#ifndef _UAPI_REMOTEPROC_CDEV_H_ > > +#define _UAPI_REMOTEPROC_CDEV_H_ > > + > > +#include > > +#include > > + > > +#define RPROC_MAGIC 0xB7 > > + > > +/* > > + * The RPROC_SET_SHUTDOWN_ON_RELEASE ioctl allows to enable/disable the shutdown of a remote > > + * processor automatically when the controlling userpsace closes the char device interface. > > + * > > + * input parameter: integer > > + * 0 : disable automatic shutdown > > + * other : enable automatic shutdown > > + */ > > +#define RPROC_SET_SHUTDOWN_ON_RELEASE _IOW(RPROC_MAGIC, 1, __s32) > > + > > +/* > > + * The RPROC_GET_SHUTDOWN_ON_RELEASE ioctl gets information about whether the automatic shutdown of > > + * a remote processor is enabled or disabled when the controlling userspace closes the char device > > + * interface. > > + * > > + * output parameter: integer > > + * 0 : automatic shutdown disable > > + * other : automatic shutdown enable > > + */ > > +#define RPROC_GET_SHUTDOWN_ON_RELEASE _IOR(RPROC_MAGIC, 2, __s32) > > + > > +#endif > > -- > > Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, > > a Linux Foundation Collaborative Project > >