Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3630427pxk; Tue, 29 Sep 2020 01:56:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxYg18zKSpWYbhLFzALGMofbQMpewy4rg/SGVtbU1PmY2ZZobp4GOvhHNlaK9A1vdjWHiya X-Received: by 2002:aa7:c504:: with SMTP id o4mr2192382edq.82.1601369798998; Tue, 29 Sep 2020 01:56:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601369798; cv=none; d=google.com; s=arc-20160816; b=lTL4IZ6F4aT+0/4tZg5U9SAm8GhvszIdb2yXRy4m57lLBfXtX61CR5URUJTyOYt46P SAz9Sl8KlCr+NaEffTdw8hsefOO1Qz6/mkNnfH6lNHYdrYTDEhG4iald23GNVHzf+xRt C/vR01BWdO9nismA1lQeKIpN09juMq0E+LYVN60hygZCNaCeGoZdHLvi22qqnYO9yDrT 6TUvu7psd/kSfEzowl75bGIopZp3dgVn6AdMejsSTVUyfNvwVt/vGbFqJK/cY6xhjQEa 7NhUQvHpb1Z+Q7fW8EkCSfPfOu3BxaoqVtg9sdYmnllM97eEFagzA20siLGwKNz5ODHz +GuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=0/+AOhXmTBINK5wfkV+uifXz0xBp7C6ya6BxyMBaeAQ=; b=vV8AMaCWZbCJJybqt+yhiEBvU1+opcwfOLTagv2RhCsQm8l2drBi1RAwx91sNrSuPp +34F9pibteMh0nHuPE6jgcZHVjTQUtv9TX7UDukjUXH2wGNw7GWVtIV9I4NEiK+N4Bc1 cbRthmviL6hh29HFefS82Y/w/IOgXQ8ievEdS903PH98RuAPCvov+6yW/TriwjOlOwBO H33ykpoEK75BvqOi0BViE5wF3qybpPNKCWoWrp33U97Ff50I40We1ZJGVl3b9UDusw8x Q4qLQ3oPH5r9Lw+gpPMAk4OZ8ybfTFaUSEdzpaRLIJPHR/FX7Ic/+Dn/8j3n6zMT19e+ OZDw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y12si2224066edv.98.2020.09.29.01.56.16; Tue, 29 Sep 2020 01:56:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727881AbgI2IzP (ORCPT + 99 others); Tue, 29 Sep 2020 04:55:15 -0400 Received: from inva021.nxp.com ([92.121.34.21]:53962 "EHLO inva021.nxp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727767AbgI2IzK (ORCPT ); Tue, 29 Sep 2020 04:55:10 -0400 Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 837A5200264; Tue, 29 Sep 2020 10:55:08 +0200 (CEST) Received: from inva024.eu-rdc02.nxp.com (inva024.eu-rdc02.nxp.com [134.27.226.22]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 769BE201589; Tue, 29 Sep 2020 10:55:08 +0200 (CEST) Received: from fsr-ub1864-111.ea.freescale.net (fsr-ub1864-111.ea.freescale.net [10.171.82.141]) by inva024.eu-rdc02.nxp.com (Postfix) with ESMTP id 23D662032C; Tue, 29 Sep 2020 10:55:08 +0200 (CEST) From: Diana Craciun To: linux-kernel@vger.kernel.org, laurentiu.tudor@nxp.com Cc: stuyoder@gmail.com, leoyang.li@nxp.com, gregkh@linuxfoundation.org, linux-arm-kernel@lists.infradead.org, Diana Craciun Subject: [PATCH v5 09/13] bus/fsl-mc: Add a container setup function Date: Tue, 29 Sep 2020 11:54:37 +0300 Message-Id: <20200929085441.17448-10-diana.craciun@oss.nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200929085441.17448-1-diana.craciun@oss.nxp.com> References: <20200929085441.17448-1-diana.craciun@oss.nxp.com> X-Virus-Scanned: ClamAV using ClamSMTP Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Both DPRC driver and VFIO driver use the same initialization code for the DPRC. Introduced a new function which groups this initialization code. The function is exported and may be used by VFIO as well. Signed-off-by: Diana Craciun --- drivers/bus/fsl-mc/dprc-driver.c | 71 ++++++++++++++++++++++---------- include/linux/fsl/mc.h | 2 + 2 files changed, 51 insertions(+), 22 deletions(-) diff --git a/drivers/bus/fsl-mc/dprc-driver.c b/drivers/bus/fsl-mc/dprc-driver.c index 516119c8121a..9e4088209cfe 100644 --- a/drivers/bus/fsl-mc/dprc-driver.c +++ b/drivers/bus/fsl-mc/dprc-driver.c @@ -588,25 +588,24 @@ static int dprc_setup_irq(struct fsl_mc_device *mc_dev) } /** - * dprc_probe - callback invoked when a DPRC is being bound to this driver + * dprc_setup - opens and creates a mc_io for DPRC * * @mc_dev: Pointer to fsl-mc device representing a DPRC * * It opens the physical DPRC in the MC. - * It scans the DPRC to discover the MC objects contained in it. - * It creates the interrupt pool for the MC bus associated with the DPRC. - * It configures the interrupts for the DPRC device itself. + * It configures the DPRC portal used to communicate with MC */ -static int dprc_probe(struct fsl_mc_device *mc_dev) + +int dprc_setup(struct fsl_mc_device *mc_dev) { - int error; - size_t region_size; struct device *parent_dev = mc_dev->dev.parent; struct fsl_mc_bus *mc_bus = to_fsl_mc_bus(mc_dev); + struct irq_domain *mc_msi_domain; bool mc_io_created = false; bool msi_domain_set = false; u16 major_ver, minor_ver; - struct irq_domain *mc_msi_domain; + size_t region_size; + int error; if (!is_fsl_mc_bus_dprc(mc_dev)) return -EINVAL; @@ -681,35 +680,63 @@ static int dprc_probe(struct fsl_mc_device *mc_dev) goto error_cleanup_open; } + return 0; + +error_cleanup_open: + (void)dprc_close(mc_dev->mc_io, 0, mc_dev->mc_handle); + +error_cleanup_msi_domain: + if (msi_domain_set) + dev_set_msi_domain(&mc_dev->dev, NULL); + + if (mc_io_created) { + fsl_destroy_mc_io(mc_dev->mc_io); + mc_dev->mc_io = NULL; + } + + return error; +} +EXPORT_SYMBOL_GPL(dprc_setup); + +/** + * dprc_probe - callback invoked when a DPRC is being bound to this driver + * + * @mc_dev: Pointer to fsl-mc device representing a DPRC + * + * It opens the physical DPRC in the MC. + * It scans the DPRC to discover the MC objects contained in it. + * It creates the interrupt pool for the MC bus associated with the DPRC. + * It configures the interrupts for the DPRC device itself. + */ +static int dprc_probe(struct fsl_mc_device *mc_dev) +{ + int error; + + error = dprc_setup(mc_dev); + if (error < 0) + return error; + /* * Discover MC objects in DPRC object: */ error = dprc_scan_container(mc_dev, true); if (error < 0) - goto error_cleanup_open; + goto dprc_cleanup; /* * Configure interrupt for the DPRC object associated with this MC bus: */ error = dprc_setup_irq(mc_dev); if (error < 0) - goto error_cleanup_open; + goto scan_cleanup; dev_info(&mc_dev->dev, "DPRC device bound to driver"); return 0; -error_cleanup_open: - (void)dprc_close(mc_dev->mc_io, 0, mc_dev->mc_handle); - -error_cleanup_msi_domain: - if (msi_domain_set) - dev_set_msi_domain(&mc_dev->dev, NULL); - - if (mc_io_created) { - fsl_destroy_mc_io(mc_dev->mc_io); - mc_dev->mc_io = NULL; - } - +scan_cleanup: + device_for_each_child(&mc_dev->dev, NULL, __fsl_mc_device_remove); +dprc_cleanup: + dprc_cleanup(mc_dev); return error; } diff --git a/include/linux/fsl/mc.h b/include/linux/fsl/mc.h index 5519a510b8c9..e99d181ee4cd 100644 --- a/include/linux/fsl/mc.h +++ b/include/linux/fsl/mc.h @@ -540,6 +540,8 @@ void dprc_remove_devices(struct fsl_mc_device *mc_bus_dev, int dprc_cleanup(struct fsl_mc_device *mc_dev); +int dprc_setup(struct fsl_mc_device *mc_dev); + /* * Data Path Buffer Pool (DPBP) API * Contains initialization APIs and runtime control APIs for DPBP -- 2.17.1