Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp673111ybg; Tue, 28 Jul 2020 16:09:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyTW4UW8Tdr3y6+TDgGax5KmNkdEiKdjlXnKBqOe5oStU7RFY61pMTRq6GtD73Znd7k1Ot5 X-Received: by 2002:a17:906:284e:: with SMTP id s14mr28066959ejc.498.1595977748906; Tue, 28 Jul 2020 16:09:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595977748; cv=none; d=google.com; s=arc-20160816; b=MLVkKEsEcd80GBGIJiZGlrAuUNgpx1u4FRwy1JZa/t7Uiv5KfskSaMiz8WzFiuqxoT Nu9SR+Gh9T8chSzW83CH1tkknFv6T6cyyqK9dmz1QfugbxDoi2tInu4rDaX8IXRXqXFh xeU6+mOPtJfIwLiU275rT+q6J1cYUPL8f0FDgGSF4rvJwmfAuoi6luNfc2tnJTD44ymb TJj2gEDY1uo1D+0uZ4C0upI1bt5ndtyfME9HF2/fyjIxaVzf29N8SrwpUAuPZ9r6NC73 lsY9cDqR5iX1IpzS5M6KCo/RFZVv+48xzNTzuVWQhOCyE5XL1OJe+XLHrJ4VokCLeV6b g9kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dmarc-filter:dkim-signature; bh=0QJhT2AZCDG6FsNDABfmZCqFbYWXnKYJTT5/9e1DdMk=; b=utx6vF797zRrxjBeuhUbrvgGOo3xFGbmc40AfrPgbpDnvEXB/bKETOpWfF2BNjsYGj SdExnQBm56O/fvW2JvNsrnDHmsesXCioKJCk8T5bYkTW2DuQWXbpCEhTRMdwVWdaXa3/ sRerw1KStV+wapEkW3zMoTzg8anmR6XxDR4IrHH8WvS+r7PysywiI97FCgtaQpngeYSB 25kSZ01e9e48hMTUVcnUsa8Q+Vqp4pxJJG0kV/qUKn+vjSlV5VXERT5eO5Exnf6An28W eOSCu6ceiyeyygwFJam27JGrXpd7WvDSqNeZs9deoQhSnZHClAuJLvknjMVsNR4ym5gg XX5Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=ALxbZUdj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q20si14576ejb.5.2020.07.28.16.08.46; Tue, 28 Jul 2020 16:09:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=ALxbZUdj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729967AbgG1XIh (ORCPT + 99 others); Tue, 28 Jul 2020 19:08:37 -0400 Received: from m43-7.mailgun.net ([69.72.43.7]:17887 "EHLO m43-7.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729819AbgG1XIh (ORCPT ); Tue, 28 Jul 2020 19:08:37 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1595977715; h=References: In-Reply-To: Message-Id: Date: Subject: Cc: To: From: Sender; bh=0QJhT2AZCDG6FsNDABfmZCqFbYWXnKYJTT5/9e1DdMk=; b=ALxbZUdjf2KeJ/MmJ5q8gYo7qFPcpUFIe6Zkuuj7q5AjGGGgDYsR9ja+z2qioWXqOW9gPBf/ q47Ib7WAcjJB4OYZ4qtor80IZuaTFoNF4QEfLd2q6JfbEyxS/M1+lIWTLp4NWuv7utMdXjO6 boYXWvB9Sh96qdPc2btkvlpn0/w= X-Mailgun-Sending-Ip: 69.72.43.7 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n13.prod.us-west-2.postgun.com with SMTP id 5f20afeb98acebb4e93f3864 (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Tue, 28 Jul 2020 23:08:27 GMT Received: by smtp.codeaurora.org (Postfix, from userid 1001) id C70F3C433C6; Tue, 28 Jul 2020 23:08:26 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=ALL_TRUSTED,SPF_NONE, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from rishabhb-linux.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: rishabhb) by smtp.codeaurora.org (Postfix) with ESMTPSA id B21D7C433CB; Tue, 28 Jul 2020 23:08:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org B21D7C433CB Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=rishabhb@codeaurora.org From: Rishabh Bhatnagar To: linux-remoteproc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: bjorn.andersson@linaro.org, mathieu.poirier@linaro.org, tsoni@codeaurora.org, psodagud@codeaurora.org, sidgup@codeaurora.org, Rishabh Bhatnagar Subject: [PATCH 2/2] remoteproc: Move recovery debugfs entry to sysfs Date: Tue, 28 Jul 2020 16:08:17 -0700 Message-Id: <1595977697-15389-3-git-send-email-rishabhb@codeaurora.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1595977697-15389-1-git-send-email-rishabhb@codeaurora.org> References: <1595977697-15389-1-git-send-email-rishabhb@codeaurora.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Expose recovery mechanism through sysfs rather than exposing through debugfs. Some operating systems may limit access to debugfs through access policies. This restricts user access to recovery mechanism, hence move it to sysfs. Signed-off-by: Rishabh Bhatnagar --- Documentation/ABI/testing/sysfs-class-remoteproc | 36 +++++++++++ drivers/remoteproc/remoteproc_debugfs.c | 77 ------------------------ drivers/remoteproc/remoteproc_sysfs.c | 57 ++++++++++++++++++ 3 files changed, 93 insertions(+), 77 deletions(-) diff --git a/Documentation/ABI/testing/sysfs-class-remoteproc b/Documentation/ABI/testing/sysfs-class-remoteproc index 812582a..16c5267 100644 --- a/Documentation/ABI/testing/sysfs-class-remoteproc +++ b/Documentation/ABI/testing/sysfs-class-remoteproc @@ -98,3 +98,39 @@ Description: Remote processor coredump configuration Writing "disable" will disable the coredump collection for that remoteproc. + +What: /sys/class/remoteproc/.../recovery +Date: July 2020 +Contact: Rishabh Bhatnagar +Description: Remote processor recovery mechanism + + Reports the recovery mechanism of the remote processor, + which will be one of: + + "enabled" + "disabled" + + "enabled" means, the remote processor will be automatically + recovered whenever it crashes. Moreover, if the remote + processor crashes while recovery is disabled, it will + be automatically recovered too as soon as recovery is enabled. + + "disabled" means, a remote processor will remain in a crashed + state if it crashes. This is useful for debugging purposes; + without it, debugging a crash is substantially harder. + + Writing this file controls the recovery mechanism of the + remote processor. The following options can be written: + + "enabled" + "disabled" + "recover" + + Writing "enabled" will enable recovery and recover the remote + processor if its crashed. + + Writing "disabled" will disable recovery and if crashed the + remote processor will remain in crashed state. + + Writing "recover" will trigger an immediate recovery if the + remote processor is in crashed state. diff --git a/drivers/remoteproc/remoteproc_debugfs.c b/drivers/remoteproc/remoteproc_debugfs.c index 732770e..71194a0 100644 --- a/drivers/remoteproc/remoteproc_debugfs.c +++ b/drivers/remoteproc/remoteproc_debugfs.c @@ -84,81 +84,6 @@ static const struct file_operations rproc_name_ops = { .llseek = generic_file_llseek, }; -/* expose recovery flag via debugfs */ -static ssize_t rproc_recovery_read(struct file *filp, char __user *userbuf, - size_t count, loff_t *ppos) -{ - struct rproc *rproc = filp->private_data; - char *buf = rproc->recovery_disabled ? "disabled\n" : "enabled\n"; - - return simple_read_from_buffer(userbuf, count, ppos, buf, strlen(buf)); -} - -/* - * By writing to the 'recovery' debugfs entry, we control the behavior of the - * recovery mechanism dynamically. The default value of this entry is "enabled". - * - * The 'recovery' debugfs entry supports these commands: - * - * enabled: When enabled, the remote processor will be automatically - * recovered whenever it crashes. Moreover, if the remote - * processor crashes while recovery is disabled, it will - * be automatically recovered too as soon as recovery is enabled. - * - * disabled: When disabled, a remote processor will remain in a crashed - * state if it crashes. This is useful for debugging purposes; - * without it, debugging a crash is substantially harder. - * - * recover: This function will trigger an immediate recovery if the - * remote processor is in a crashed state, without changing - * or checking the recovery state (enabled/disabled). - * This is useful during debugging sessions, when one expects - * additional crashes to happen after enabling recovery. In this - * case, enabling recovery will make it hard to debug subsequent - * crashes, so it's recommended to keep recovery disabled, and - * instead use the "recover" command as needed. - */ -static ssize_t -rproc_recovery_write(struct file *filp, const char __user *user_buf, - size_t count, loff_t *ppos) -{ - struct rproc *rproc = filp->private_data; - char buf[10]; - int ret; - - if (count < 1 || count > sizeof(buf)) - return -EINVAL; - - ret = copy_from_user(buf, user_buf, count); - if (ret) - return -EFAULT; - - /* remove end of line */ - if (buf[count - 1] == '\n') - buf[count - 1] = '\0'; - - if (!strncmp(buf, "enabled", count)) { - /* change the flag and begin the recovery process if needed */ - rproc->recovery_disabled = false; - rproc_trigger_recovery(rproc); - } else if (!strncmp(buf, "disabled", count)) { - rproc->recovery_disabled = true; - } else if (!strncmp(buf, "recover", count)) { - /* begin the recovery process without changing the flag */ - rproc_trigger_recovery(rproc); - } else { - return -EINVAL; - } - - return count; -} - -static const struct file_operations rproc_recovery_ops = { - .read = rproc_recovery_read, - .write = rproc_recovery_write, - .open = simple_open, - .llseek = generic_file_llseek, -}; /* expose the crash trigger via debugfs */ static ssize_t @@ -329,8 +254,6 @@ void rproc_create_debug_dir(struct rproc *rproc) debugfs_create_file("name", 0400, rproc->dbg_dir, rproc, &rproc_name_ops); - debugfs_create_file("recovery", 0600, rproc->dbg_dir, - rproc, &rproc_recovery_ops); debugfs_create_file("crash", 0200, rproc->dbg_dir, rproc, &rproc_crash_ops); debugfs_create_file("resource_table", 0400, rproc->dbg_dir, diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c index 40949a0..49b846e 100644 --- a/drivers/remoteproc/remoteproc_sysfs.c +++ b/drivers/remoteproc/remoteproc_sysfs.c @@ -10,6 +10,62 @@ #define to_rproc(d) container_of(d, struct rproc, dev) +/* expose recovery flag via sysfs */ +static ssize_t recovery_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct rproc *rproc = to_rproc(dev); + + return sprintf(buf, "%s", rproc->recovery_disabled ? "disabled\n" : "enabled\n"); +} + +/* + * By writing to the 'recovery' sysfs entry, we control the behavior of the + * recovery mechanism dynamically. The default value of this entry is "enabled". + * + * The 'recovery' sysfs entry supports these commands: + * + * enabled: When enabled, the remote processor will be automatically + * recovered whenever it crashes. Moreover, if the remote + * processor crashes while recovery is disabled, it will + * be automatically recovered too as soon as recovery is enabled. + * + * disabled: When disabled, a remote processor will remain in a crashed + * state if it crashes. This is useful for debugging purposes; + * without it, debugging a crash is substantially harder. + * + * recover: This function will trigger an immediate recovery if the + * remote processor is in a crashed state, without changing + * or checking the recovery state (enabled/disabled). + * This is useful during debugging sessions, when one expects + * additional crashes to happen after enabling recovery. In this + * case, enabling recovery will make it hard to debug subsequent + * crashes, so it's recommended to keep recovery disabled, and + * instead use the "recover" command as needed. + */ +static ssize_t recovery_store(struct device *dev, + struct device_attribute *attr, + const char *buf, size_t count) +{ + struct rproc *rproc = to_rproc(dev); + + if (sysfs_streq(buf, "enabled")) { + /* change the flag and begin the recovery process if needed */ + rproc->recovery_disabled = false; + rproc_trigger_recovery(rproc); + } else if (sysfs_streq(buf, "disabled")) { + rproc->recovery_disabled = true; + } else if (sysfs_streq(buf, "recover")) { + /* begin the recovery process without changing the flag */ + rproc_trigger_recovery(rproc); + } else { + return -EINVAL; + } + + return count; +} +static DEVICE_ATTR_RW(recovery); + /* * A coredump-configuration-to-string lookup table, for exposing a * human readable configuration via sysfs. Always keep in sync with @@ -201,6 +257,7 @@ static ssize_t name_show(struct device *dev, struct device_attribute *attr, static DEVICE_ATTR_RO(name); static struct attribute *rproc_attrs[] = { + &dev_attr_recovery.attr, &dev_attr_coredump.attr, &dev_attr_firmware.attr, &dev_attr_state.attr, -- The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project