Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1482227pxb; Sat, 30 Oct 2021 14:49:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7IbsWj9bsQc+lzpEqLmz9feeua70Gg3HTvxZTXEuJlDHIabdf+p9rPdil38/Pv+WT68LP X-Received: by 2002:a05:6402:27ca:: with SMTP id c10mr27106932ede.25.1635630596090; Sat, 30 Oct 2021 14:49:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635630596; cv=none; d=google.com; s=arc-20160816; b=ltLTFwGT/ZeiaExAmqr1QyLQkp1puUzTmL3emrl5TKPchrXDP7VnszGHzt5la1TiHT zo0xZx6jMzR9ryr9tezbJUT+TpIDx+YdthQl5AYmR59dAqcrqEiI+Nfl3rMHe9lrkaYI hTWms/BPt8QnkD1CjBvAGgSjAQy5q4JOWffmQkA4o0s80Jryu1LOKYe6kiKKmtTApOOt wkCDD4YoYZFc8iH4dh82r4OcR3TcDcq4aWLKF0nm2NYGEQ9g/E6ug5FX86voQRuYdoi3 16k5fEvsjkBytXaLCSBwhs8TXybBgfdVbyxxfHRR420puhPLJIx/OUqibJdFdvxdMtgm 9fgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=J41aB8wnVzUyYkl9TdJp6S6albwmZIUBVcTKiMmV20c=; b=WiqKfmcT9pAmdtdBFNJ2yrYgKtLXg+bkD7jfZZMXg9ptNXvv1SactGgXetDCpE/Sdh ZxQ3I9t5UBJ3xGgYECPCGxcycC4a7PZZVB7h/Kcq8nYK1/k+tQ3In8R3TmJ3gk1ARWAd NnoZ1P4L58/HPqWiaOLziQtR/zPdSek+CTlPc26FQwQ+8qzVwQ2OkUaM2tT6yUmfSbIx IU3SfOyF4bZmByo+Zh2O32CTGZhSX2jrhbB92VL3ydiAnSBjKiibxZaVbZIuMurGRSxq 3JPVLH/dty20ymyd4kXMVsPBg/f9mgboReSqAffY1tkMHdvLKSvPtVWjsvZ6bARCNKi4 Ov0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass (test mode) header.i=@o2.pl header.s=1024a header.b=qByEAzM5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=o2.pl Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h26si10242507edw.33.2021.10.30.14.49.32; Sat, 30 Oct 2021 14:49:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass (test mode) header.i=@o2.pl header.s=1024a header.b=qByEAzM5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=o2.pl Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231985AbhJ3VuI (ORCPT + 99 others); Sat, 30 Oct 2021 17:50:08 -0400 Received: from mx-out.tlen.pl ([193.222.135.142]:53815 "EHLO mx-out.tlen.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232031AbhJ3VuF (ORCPT ); Sat, 30 Oct 2021 17:50:05 -0400 Received: (wp-smtpd smtp.tlen.pl 22699 invoked from network); 30 Oct 2021 23:47:32 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=o2.pl; s=1024a; t=1635630452; bh=J41aB8wnVzUyYkl9TdJp6S6albwmZIUBVcTKiMmV20c=; h=From:To:Cc:Subject; b=qByEAzM5Yii74ZxyXmj4n50JJOKFfb0oZD7fnfXKejF0J8Wo/cL8zOSTI6/ZnY1/s mBNmQvrXpG122TC93X3zGiR9/3kaS/0ORZ6GXLtV9zxVFsbqWPSuaoTJqVSU5hNYgC HPnFlFAQvkuuetSuqYdcBiu+by/iYaxCPz87GWx0= Received: from ablz112.neoplus.adsl.tpnet.pl (HELO localhost.localdomain) (mat.jonczyk@o2.pl@[83.7.219.112]) (envelope-sender ) by smtp.tlen.pl (WP-SMTPD) with SMTP for ; 30 Oct 2021 23:47:32 +0200 From: =?UTF-8?q?Mateusz=20Jo=C5=84czyk?= To: linux-rtc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: =?UTF-8?q?Mateusz=20Jo=C5=84czyk?= , Alessandro Zummo , Alexandre Belloni Subject: [PATCH v3 3/7] rtc-mc146818-lib: extract mc146818_do_avoiding_UIP Date: Sat, 30 Oct 2021 23:46:31 +0200 Message-Id: <20211030214636.49602-4-mat.jonczyk@o2.pl> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20211030214636.49602-1-mat.jonczyk@o2.pl> References: <20211030214636.49602-1-mat.jonczyk@o2.pl> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-WP-MailID: 411033780c427c532372b7d6549c5fc6 X-WP-AV: skaner antywirusowy Poczty o2 X-WP-SPAM: NO 0000000 [QZP0] Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Function mc146818_get_time() contains an elaborate mechanism of reading the RTC time while no RTC update is in progress. It turns out that reading the RTC alarm clock also requires avoiding the RTC update (see following patches). Therefore, the mechanism in mc146818_get_time() should be reused - so extract it into a separate function. The logic in mc146818_do_avoiding_UIP() is same as in mc146818_get_time() except that after every if (CMOS_READ(RTC_FREQ_SELECT) & RTC_UIP) { there is now "mdelay(1)". To avoid producing an unreadable diff, mc146818_get_time() will be refactored to use mc146818_do_avoiding_UIP() in the next patch. Signed-off-by: Mateusz Jończyk Cc: Alessandro Zummo Cc: Alexandre Belloni --- drivers/rtc/rtc-mc146818-lib.c | 69 ++++++++++++++++++++++++++++++++++ include/linux/mc146818rtc.h | 3 ++ 2 files changed, 72 insertions(+) diff --git a/drivers/rtc/rtc-mc146818-lib.c b/drivers/rtc/rtc-mc146818-lib.c index b50612ce1a6d..946ad43a512c 100644 --- a/drivers/rtc/rtc-mc146818-lib.c +++ b/drivers/rtc/rtc-mc146818-lib.c @@ -8,6 +8,75 @@ #include #endif +/* + * Execute a function while the UIP (Update-in-progress) bit of the RTC is + * unset. + * + * Warning: callback may be executed more then once. + */ +bool mc146818_do_avoiding_UIP(mc146818_callback_t callback, void *param) +{ + int i; + unsigned long flags; + unsigned char seconds; + + for (i = 0; i < 10; i++) { + spin_lock_irqsave(&rtc_lock, flags); + + /* + * Check whether there is an update in progress during which the + * readout is unspecified. The maximum update time is ~2ms. Poll + * every msec for completion. + * + * Store the second value before checking UIP so a long lasting + * NMI which happens to hit after the UIP check cannot make + * an update cycle invisible. + */ + seconds = CMOS_READ(RTC_SECONDS); + + if (CMOS_READ(RTC_FREQ_SELECT) & RTC_UIP) { + spin_unlock_irqrestore(&rtc_lock, flags); + mdelay(1); + continue; + } + + /* Revalidate the above readout */ + if (seconds != CMOS_READ(RTC_SECONDS)) { + spin_unlock_irqrestore(&rtc_lock, flags); + continue; + } + + if (callback) + callback(seconds, param); + + /* + * Check for the UIP bit again. If it is set now then + * the above values may contain garbage. + */ + if (CMOS_READ(RTC_FREQ_SELECT) & RTC_UIP) { + spin_unlock_irqrestore(&rtc_lock, flags); + mdelay(1); + continue; + } + + /* + * A NMI might have interrupted the above sequence so check + * whether the seconds value has changed which indicates that + * the NMI took longer than the UIP bit was set. Unlikely, but + * possible and there is also virt... + */ + if (seconds != CMOS_READ(RTC_SECONDS)) { + spin_unlock_irqrestore(&rtc_lock, flags); + continue; + } + spin_unlock_irqrestore(&rtc_lock, flags); + + return true; + } + return false; +} +EXPORT_SYMBOL_GPL(mc146818_do_avoiding_UIP); + /* * If the UIP (Update-in-progress) bit of the RTC is set for more then * 10ms, the RTC is apparently broken or not present. diff --git a/include/linux/mc146818rtc.h b/include/linux/mc146818rtc.h index 69c80c4325bf..c0cea97461a0 100644 --- a/include/linux/mc146818rtc.h +++ b/include/linux/mc146818rtc.h @@ -127,4 +127,7 @@ bool mc146818_does_rtc_work(void); unsigned int mc146818_get_time(struct rtc_time *time); int mc146818_set_time(struct rtc_time *time); +typedef void (*mc146818_callback_t)(unsigned char seconds, void *param); +bool mc146818_do_avoiding_UIP(mc146818_callback_t callback, void *param); + #endif /* _MC146818RTC_H */ -- 2.25.1