Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 45B35C433F5 for ; Wed, 15 Dec 2021 06:24:09 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232093AbhLOGYH (ORCPT ); Wed, 15 Dec 2021 01:24:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52314 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229622AbhLOGYG (ORCPT ); Wed, 15 Dec 2021 01:24:06 -0500 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee2:21ea]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9CD95C061574 for ; Tue, 14 Dec 2021 22:24:06 -0800 (PST) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits)) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4JDQF11kvJz4xhp; Wed, 15 Dec 2021 17:24:05 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ozlabs.org; s=201707; t=1639549445; bh=qiXGCAzrz/pJgKXFEgR/8Fui81/OF2GFjbfYGositFI=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=DvgoLu45d50zCmP+Nm5CMCCoXnCgFAVzT/+l+Vx9QARpuNvuDp4/gDwcrKlluyUBd vw+91LiG6BzcpdFwdouQjoOKQRCTazIeciMX0jgg/qRo8YodndUv/zI2S5n1iZAZp2 bXgN+w1ugoHYl+QQP/Vh/crTCq0GupaBW3XLxH4He6oue9KwdSZ4GTcA2VOxy0y6th Wzb8wPsNVoXliVc64ewfdS+eFG/xgAPRYh/t5PpKQteHh62wcdqCUZFPP5uPXtFfg1 /plFGgPlAWBjlgMsfX8d41nQ6Tyh9gRoDdr3GEazCmt/1r4r05YXLC7bXCz0C3tK/q MXf2Bii76ysdQ== Message-ID: Subject: Re: [PATCH 2/2] fsi: sbefifo: implement FSI_SBEFIFO_READ_TIMEOUT ioctl From: Amitay Isaacs To: Greg KH Cc: linux-kernel@vger.kernel.org, linux-fsi@lists.ozlabs.org, jk@ozlabs.org, joel@jms.id.au, alistair@popple.id.au, eajames@linux.ibm.com Date: Wed, 15 Dec 2021 17:24:05 +1100 In-Reply-To: References: <20211215005833.222841-1-amitay@ozlabs.org> <20211215005833.222841-2-amitay@ozlabs.org> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.42.2 (3.42.2-1.fc35) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2021-12-15 at 06:59 +0100, Greg KH wrote: > On Wed, Dec 15, 2021 at 11:58:33AM +1100, Amitay Isaacs wrote: > > FSI_SBEFIFO_READ_TIMEOUT ioctl sets the read timeout (in seconds) > > for > > the response to *the next* chip-op sent to sbe.  The timeout value > > is > > reset to default after the chip-op.  The timeout affects only the > > read() > > operation on sbefifo device fd. > > > > Signed-off-by: Amitay Isaacs > > --- > >  drivers/fsi/fsi-sbefifo.c | 42 > > +++++++++++++++++++++++++++++++++++++++ > >  include/uapi/linux/fsi.h  |  6 ++++++ > >  2 files changed, 48 insertions(+) > > > > diff --git a/drivers/fsi/fsi-sbefifo.c b/drivers/fsi/fsi-sbefifo.c > > index 9188161f440c..b2654b143b85 100644 > > --- a/drivers/fsi/fsi-sbefifo.c > > +++ b/drivers/fsi/fsi-sbefifo.c > > @@ -32,6 +32,8 @@ > >  #include > >  #include > >   > > +#include > > + > >  /* > >   * The SBEFIFO is a pipe-like FSI device for communicating with > >   * the self boot engine on POWER processors. > > @@ -134,6 +136,7 @@ struct sbefifo_user { > >         void                    *cmd_page; > >         void                    *pending_cmd; > >         size_t                  pending_len; > > +       uint32_t                read_timeout_ms; > > u32 please.  uint32_t is a userspace thing. Sure thing. > > >  }; > >   > >  static DEFINE_MUTEX(sbefifo_ffdc_mutex); > > @@ -796,6 +799,7 @@ static int sbefifo_user_open(struct inode > > *inode, struct file *file) > >                 return -ENOMEM; > >         } > >         mutex_init(&user->file_lock); > > +       user->read_timeout_ms = SBEFIFO_TIMEOUT_START_RSP; > >   > >         return 0; > >  } > > @@ -838,7 +842,11 @@ static ssize_t sbefifo_user_read(struct file > > *file, char __user *buf, > >         rc = mutex_lock_interruptible(&sbefifo->lock); > >         if (rc) > >                 goto bail; > > +       sbefifo->timeout_start_rsp_ms = user->read_timeout_ms; > >         rc = __sbefifo_submit(sbefifo, user->pending_cmd, cmd_len, > > &resp_iter); > > +       /* Reset the read timeout after a single chip-op */ > > +       sbefifo->timeout_start_rsp_ms = SBEFIFO_TIMEOUT_START_RSP; > > +       user->read_timeout_ms = SBEFIFO_TIMEOUT_START_RSP; > >         mutex_unlock(&sbefifo->lock); > >         if (rc < 0) > >                 goto bail; > > @@ -847,6 +855,7 @@ static ssize_t sbefifo_user_read(struct file > > *file, char __user *buf, > >         rc = len - iov_iter_count(&resp_iter); > >   bail: > >         sbefifo_release_command(user); > > +       user->read_timeout_ms = 0; > >         mutex_unlock(&user->file_lock); > >         return rc; > >  } > > @@ -928,12 +937,45 @@ static int sbefifo_user_release(struct inode > > *inode, struct file *file) > >         return 0; > >  } > >   > > +static int sbefifo_read_timeout(struct sbefifo_user *user, void > > __user **argp) > > +{ > > +       uint32_t timeout; > > u32 > > > + > > +       if (get_user(timeout, (__u32 __user *)argp)) > > +               return -EFAULT; > > +       if (timeout < 10 || timeout > 120) > > +               return -EINVAL; > > + > > +       user->read_timeout_ms = timeout * 1000; /* user timeout is > > in sec */ > > +       return 0; > > +} > > + > > +static long sbefifo_user_ioctl(struct file *file, unsigned int > > cmd, unsigned long arg) > > +{ > > +       struct sbefifo_user *user = file->private_data; > > +       void __user **argp = (void __user *)arg; > > +       int rc = -ENOTTY; > > + > > +       if (!user) > > +               return -EINVAL; > > + > > +       mutex_lock(&user->file_lock); > > +       switch (cmd) { > > +       case FSI_SBEFIFO_READ_TIMEOUT: > > +               rc = sbefifo_read_timeout(user, argp); > > +               break; > > +       } > > +       mutex_unlock(&user->file_lock); > > +       return rc; > > +} > > Why do you have to have an ioctl for a single thing like this? This timeout needs to be set for only certain write/read operations (referred as sbe chip-ops) done via open fd for sbefifo device. There can be multiple simultaneous users of the device, and the timeout should only be applied to specific chip-ops as user requests. > > > + > >  static const struct file_operations sbefifo_fops = { > >         .owner          = THIS_MODULE, > >         .open           = sbefifo_user_open, > >         .read           = sbefifo_user_read, > >         .write          = sbefifo_user_write, > >         .release        = sbefifo_user_release, > > +       .unlocked_ioctl = sbefifo_user_ioctl, > >  }; > >   > >  static void sbefifo_free(struct device *dev) > > diff --git a/include/uapi/linux/fsi.h b/include/uapi/linux/fsi.h > > index da577ecd90e7..3e00874ace22 100644 > > --- a/include/uapi/linux/fsi.h > > +++ b/include/uapi/linux/fsi.h > > @@ -55,4 +55,10 @@ struct scom_access { > >  #define FSI_SCOM_WRITE _IOWR('s', 0x02, struct scom_access) > >  #define FSI_SCOM_RESET _IOW('s', 0x03, __u32) > >   > > +/* > > + * /dev/sbefifo* ioctl interface > > + */ > > + > > +#define FSI_SBEFIFO_READ_TIMEOUT       _IOW('s', 0x00, __u32) > > Where have you documented this new user/kernel api? What's the best location to add the information? I would prefer to add this information along with the FSI ioctl, but could not find it in Documentation/. > > And why not just use a sysfs file for something like this?  > I guess sysfs interface would be useful for setting a global property, rather than a parameter affecting individual operation. > > thanks, > > greg k-h Thanks. Amitay. -- I know you believe you understand what you think I wrote. But I am not sure you realise that what you read is not what I meant.