Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4516066pxj; Tue, 8 Jun 2021 16:42:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxhfXNU8oddUaYSo3bk3oPqYzar0WJUN0xtXI8QBfRTmVuq66zR8GlG8sGnD3l9LhxOUhHI X-Received: by 2002:a17:906:4a48:: with SMTP id a8mr26117370ejv.472.1623195724119; Tue, 08 Jun 2021 16:42:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623195724; cv=none; d=google.com; s=arc-20160816; b=rn9bZtk7FlF50MoPwHKxG+J1iW/wFWBABG2A3zbGfOIRwvazq/yZeiaG2fSsDw9gy+ bSJfvI5fbj+01z51RbbrN8IsrFlWzA2RV6aHwQYFbfQbdftonrEna1ZjoWUEa47qkerY sl90XWOmyg2BXhiHNiFxUcAOHcld+qg2iJkISFyJ8tX5oJa/EhobtHsQyqKweoO9BEd9 bnuhPK3+LWh1DeFFooL3wPkaKnVmkeWeSnHIfL4wpz/iH577KY4hNmQwgwS+oWU3frUN xte7MfXY2SOp0CSvioUCl+MJpXYvUL33CTaD5HpAZy5/mnKFoXn5lLWlMk0NUX9y6Lfp BYAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=hDFhnDxEtjMcaTbXERTDvsX/xKlhpV/0Oa1YnvfSBwI=; b=BEDwSQtujRYsKiPJgMbJcoLMI2Qd45KMDlfmURJBhvIgnwzm6m7YQI/m1zIvJVF0p8 pZmxapaYuGCpP0DVjOGjlUyx+pivBvrOUJ9UkqNCim7IENfys0k4ern/K4CP9vA+xpYn rbtC8XNhaulLjVVyeRgtDfhhN3dEqh/LBG0uGYbVvoSgeuwOia8r1CQnxdmCw/Y8sZGB p9g3qf09WlkCfIP7YZYLVwyjPvQWZbQl9Pdf3cXdLlm3FTcsJ6PnGGdQScGGjchkFATa 2uuPiYckXTytz1Ssi0iuqnYya+3nPbfdi23pMw9nZenG70gwa6qa9sVaiVYbwW88icQ5 cquQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@aj.id.au header.s=fm3 header.b=VzWccjlc; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b="dfNq/rDX"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id sa7si1081267ejb.345.2021.06.08.16.41.40; Tue, 08 Jun 2021 16:42:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@aj.id.au header.s=fm3 header.b=VzWccjlc; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b="dfNq/rDX"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231262AbhFHKuK (ORCPT + 99 others); Tue, 8 Jun 2021 06:50:10 -0400 Received: from new4-smtp.messagingengine.com ([66.111.4.230]:54857 "EHLO new4-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229937AbhFHKuJ (ORCPT ); Tue, 8 Jun 2021 06:50:09 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailnew.nyi.internal (Postfix) with ESMTP id EF2555804DB; Tue, 8 Jun 2021 06:48:15 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Tue, 08 Jun 2021 06:48:15 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aj.id.au; h=from :to:cc:subject:date:message-id:mime-version :content-transfer-encoding; s=fm3; bh=hDFhnDxEtjMcaTbXERTDvsX/xK lhpV/0Oa1YnvfSBwI=; b=VzWccjlcIu/Qm8khATcLiatSIK4IEbfYC2dsISfeeA i92SLTkNHZ08w6UN2FVP4ipS79QVHJtEsiLKKbtnK38U7fvk0jcdjNCOPz/LfW/z 4wlTdf2ko6wTDEcEQ+1IOtHLN046cfPgzC0YpWoaioH7zB/qO1WF57edoDzsxQ7d PhyIUXwSZnZKGggJSE10w5wfRgRwg8IYg0xWk15IG6datZfVaKfOE75QIFTrgK0u s6ZXWrwSN+Po9tvspuNKAQgj/Kn6U8Ly5foZoukqp8sFIYWGrn61G5rvL/DndudU r2HY4+VJo8HhnCsG6slFQfThm1sxwgGD1kh29VGnJB0g== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:date:from :message-id:mime-version:subject:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=hDFhnDxEtjMcaTbXE RTDvsX/xKlhpV/0Oa1YnvfSBwI=; b=dfNq/rDX+pHeucY114zvkey1sJz3QecR/ qNDIrc0HuESLEfqmxz6/EkN88sK+WySzZF89ZN3p//UakioEhSeHfGThGXNoAJl0 6ZhBe84FpBUzymjf8v2CryRjT8jxOD8FEa2gNQ+lHP+HKqzh3cT4WekBFssQTsGH n/8QVXgrbNs+TISI+ONjwA73IkN+dsv+pmIsojNShLKslMiWj7+5iXtjJ+Vz2QTi Dj/na/T/TuBCifp1FQW9yoAIVPHvf7ogrZm+pHSjHX0FJUzg1al2hQvNnAAr2ZVD bdMmGP3mpIjOKd7n6u1zP8X4nH9pKhIDCIKuVoUuk3fhuhcSuAUsA== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrfedtledgudeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefhvffufffkofgggfestdekredtre dttdenucfhrhhomheptehnughrvgifucflvghffhgvrhihuceorghnughrvgifsegrjhdr ihgurdgruheqnecuggftrfgrthhtvghrnhepieetheduveelhfdvvdejleeuhfelteevhe ffgfeitdefgeekjeefieevgfehhefgnecuffhomhgrihhnpehkvghrnhgvlhdrohhrghen ucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegrnhgurh gvfiesrghjrdhiugdrrghu X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Tue, 8 Jun 2021 06:48:06 -0400 (EDT) From: Andrew Jeffery To: openipmi-developer@lists.sourceforge.net, openbmc@lists.ozlabs.org, minyard@acm.org Cc: devicetree@vger.kernel.org, tmaimon77@gmail.com, linux-aspeed@lists.ozlabs.org, avifishman70@gmail.com, venture@google.com, linux-kernel@vger.kernel.org, tali.perry1@gmail.com, robh+dt@kernel.org, chiawei_wang@aspeedtech.com, linux-arm-kernel@lists.infradead.org, benjaminfair@google.com, arnd@arndb.de, zweiss@equinix.com, joel@jms.id.au, KWLIU@nuvoton.com Subject: [PATCH v4 00/16] ipmi: Allow raw access to KCS devices Date: Tue, 8 Jun 2021 20:17:41 +0930 Message-Id: <20210608104757.582199-1-andrew@aj.id.au> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, This is the 4th spin of the series refactoring the keyboard-controller-style device drivers in the IPMI subsystem. v3 can be found at: https://lore.kernel.org/lkml/20210510054213.1610760-1-andrew@aj.id.au/ v4: * Makes kcs_bmc_add_device() return an error if no client successfully initialised with respect to the binding of the device driver * Retains the existing single-open semantics (v3 allowed multiple-open) * Fixes the OBE macro for the NPCM7xx KCS driver * Cleans up Yoda-style masks (mask constant on the LHS rather than RHS) * Cleans up includes in kcs_bmc_client.h * Adds some comments to the SerIO adapter to clarify object lifetimes Previously: Changes in v3: * The series was rebased onto v5.13-rc1 * v5.13-rc1 includes Chiawei's patches reworking the LPC devicetree bindings, so they're no-longer required in the series. * After some discussion with Arnd[1] and investigating the serio subsystem, I've replaced the "raw" KCS driver (patch 16/21 in v2) with a serio adaptor (patch 11/16 in this series). The adaptor allows us to take advantage of the existing chardevs provided by serio. [1] https://lore.kernel.org/linux-arm-kernel/37e75b07-a5c6-422f-84b3-54f2bea0b917@www.fastmail.com/ Changes in v2 include: * A rebase onto v5.12-rc2 * Incorporation of off-list feedback on SerIRQ configuration from Chiawei * Further validation on hardware for ASPEED KCS devices 2, 3 and 4 * Lifting the existing single-open constraint of the IPMI chardev * Fixes addressing Rob's feedback on the conversion of the ASPEED KCS binding to dt-schema * Fixes addressing Rob's feedback on the new aspeed,lpc-interrupts property definition for the ASPEED KCS binding Please test and review! Andrew Andrew Jeffery (16): ipmi: kcs_bmc_aspeed: Use of match data to extract KCS properties ipmi: kcs_bmc: Make status update atomic ipmi: kcs_bmc: Rename {read,write}_{status,data}() functions ipmi: kcs_bmc: Split out kcs_bmc_cdev_ipmi ipmi: kcs_bmc: Turn the driver data-structures inside-out ipmi: kcs_bmc: Split headers into device and client ipmi: kcs_bmc: Strip private client data from struct kcs_bmc ipmi: kcs_bmc: Decouple the IPMI chardev from the core ipmi: kcs_bmc: Allow clients to control KCS IRQ state ipmi: kcs_bmc: Enable IBF on open ipmi: kcs_bmc: Add serio adaptor dt-bindings: ipmi: Convert ASPEED KCS binding to schema dt-bindings: ipmi: Add optional SerIRQ property to ASPEED KCS devices ipmi: kcs_bmc_aspeed: Implement KCS SerIRQ configuration ipmi: kcs_bmc_aspeed: Fix IBFIE typo from datasheet ipmi: kcs_bmc_aspeed: Optionally apply status address .../bindings/ipmi/aspeed,ast2400-kcs-bmc.yaml | 106 +++ .../bindings/ipmi/aspeed-kcs-bmc.txt | 33 - drivers/char/ipmi/Kconfig | 27 + drivers/char/ipmi/Makefile | 2 + drivers/char/ipmi/kcs_bmc.c | 523 ++++----------- drivers/char/ipmi/kcs_bmc.h | 92 +-- drivers/char/ipmi/kcs_bmc_aspeed.c | 633 +++++++++++++----- drivers/char/ipmi/kcs_bmc_cdev_ipmi.c | 568 ++++++++++++++++ drivers/char/ipmi/kcs_bmc_client.h | 45 ++ drivers/char/ipmi/kcs_bmc_device.h | 22 + drivers/char/ipmi/kcs_bmc_npcm7xx.c | 92 ++- drivers/char/ipmi/kcs_bmc_serio.c | 157 +++++ 12 files changed, 1594 insertions(+), 706 deletions(-) create mode 100644 Documentation/devicetree/bindings/ipmi/aspeed,ast2400-kcs-bmc.yaml delete mode 100644 Documentation/devicetree/bindings/ipmi/aspeed-kcs-bmc.txt create mode 100644 drivers/char/ipmi/kcs_bmc_cdev_ipmi.c create mode 100644 drivers/char/ipmi/kcs_bmc_client.h create mode 100644 drivers/char/ipmi/kcs_bmc_device.h create mode 100644 drivers/char/ipmi/kcs_bmc_serio.c -- 2.30.2