Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp894250rwp; Thu, 13 Jul 2023 02:54:47 -0700 (PDT) X-Google-Smtp-Source: APBJJlFMbf9d5TEukq/4UW/tacq2vkp0bSFK0oQ0StfQMFGJa4Cq2ntwgY4T121fU+W5YOGiO6SE X-Received: by 2002:a05:6a20:96cc:b0:12d:1fba:faca with SMTP id hq12-20020a056a2096cc00b0012d1fbafacamr1021021pzc.28.1689242087321; Thu, 13 Jul 2023 02:54:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689242087; cv=none; d=google.com; s=arc-20160816; b=i1rq9Myy/EQUuyqB5/aZO8gvivKfd1Q1o1oJTSLQB60YeJJO5+KNIlbXbME5M878gd KUgejeagbFFf+eDapUwqroMtTHt699LONT/GLaVZuzUVvu8swmTtfZdT/3H5MOLG9K6X hi73GKuBnoY+fTs0zZiTKelKlZX/dLnTBbVmGTLFV0WAd4MSmWuLM7TTL/hLKA1TKNGE kts8WDSJxrocj68cwLH0DjxLLPRpLtlEumJvHrLG5A2C+yJQml9XSN9fOAxymX/k9Ysq drNnv0OapqvTPucSjMxB9g3VRjL7s2VWrr957NkXteSEdiPuEyecRtrK1nammwTav3bJ pX1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=4n03VlwqNrTzGxnzSe3ZU7Gn2htAMkWYJH1ovqAe1uk=; fh=xxVogdFCVv4dR4K05uU2IkT9bUDuqEvFtDBmLVQcRRg=; b=gHnbihYse57Mfti6E2Nzl6UdkIKDOR3euV1RFQYqxx/0+a9plAjfW+cZIQn5gH2p8U CEwItPFfmEK38Mi2Sp3d2nbDgYE4NYfZPhkpMtGRZNU8QBA50pswB3nf8JwYc+58DwaI yw8QpegDIp9powqS5upBvBfgYKEAuuoNlnfyHVJ/8Qb17gHaWaL2+6iBcb1/O+wMxdaq T7UxHwt6IlSu43WaNuom2DJA9eVR/3V1idLoWE5ecPV9sF1yQ71JcierDmoTgn9+w7xw ygZk6jiXwEOI5YRTa2d2UMpYG+GsAY4YCEz3icCAs9qdeTv8HkftQ7kQSqKjY6AoG4EM psKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=gNtOQxpI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s4-20020a056a0008c400b0068286737babsi5067532pfu.178.2023.07.13.02.54.35; Thu, 13 Jul 2023 02:54:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=gNtOQxpI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233832AbjGMJhR (ORCPT + 99 others); Thu, 13 Jul 2023 05:37:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57140 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233881AbjGMJhN (ORCPT ); Thu, 13 Jul 2023 05:37:13 -0400 Received: from relay8-d.mail.gandi.net (relay8-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::228]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E5115211C for ; Thu, 13 Jul 2023 02:37:10 -0700 (PDT) Received: by mail.gandi.net (Postfix) with ESMTPSA id F37451BF207; Thu, 13 Jul 2023 09:37:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=gm1; t=1689241029; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4n03VlwqNrTzGxnzSe3ZU7Gn2htAMkWYJH1ovqAe1uk=; b=gNtOQxpIUU3NyuNaletbc9HPDxJSzj1Ztx+wzywiX5PSiuOBkc26oFy2XNX7gyiJqxCbid 35RF32A0Szbpupb5gtiR4Q5X91vCyJ+bUqLV6/seQDXeWDBFbSnUttzt+3e10zsJcv90eU Kt0+7QPL7Uk9zwjw9iY37pRL2jj69w2Ily/RpDR5yolDfEEFiydnam5b8K94qohtPyJZ1G wjjKwhF4MHY9YfJWaxkuV3BAhKGBPuL3etK/1LTkcB31t/IxU7wPgTLp8XrOGZDhRLelTZ QUIfvjZzFX0EzvedBP3dkVCexBtSpDo65CxKl42r2ZWnyxEbkL5SFh9uyi1gGg== Date: Thu, 13 Jul 2023 11:37:07 +0200 From: Miquel Raynal To: Srinivas Kandagatla Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, Thomas Petazzoni , Robert Marko , Luka Perkov Subject: Re: [PATCH RESEND v5 2/2] nvmem: core: Expose cells through sysfs Message-ID: <20230713113707.6ae8c5de@xps-13> In-Reply-To: <0affe06b-08ad-aadf-c936-2c93b5e2b904@linaro.org> References: <20230713075508.485072-1-miquel.raynal@bootlin.com> <20230713075508.485072-4-miquel.raynal@bootlin.com> <0affe06b-08ad-aadf-c936-2c93b5e2b904@linaro.org> Organization: Bootlin X-Mailer: Claws Mail 4.0.0 (GTK+ 3.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-GND-Sasl: miquel.raynal@bootlin.com X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Srinivas, srinivas.kandagatla@linaro.org wrote on Thu, 13 Jul 2023 10:16:46 +0100: > This one seems to be an extra patch in the series :-) True /o\ It got mixed with the real series during the "resend"... > > > > On 13/07/2023 08:55, Miquel Raynal wrote: > > The binary content of nvmem devices is available to the user so in the > > easiest cases, finding the content of a cell is rather easy as it is > > just a matter of looking at a known and fixed offset. However, nvmem > > layouts have been recently introduced to cope with more advanced > > situations, where the offset and size of the cells is not known in > > advance or is dynamic. When using layouts, more advanced parsers are > > used by the kernel in order to give direct access to the content of each > > cell, regardless of its position/size in the underlying > > device. Unfortunately, these information are not accessible by users, > > unless by fully re-implementing the parser logic in userland. > > > > Let's expose the cells and their content through sysfs to avoid these > > situations. Of course the relevant NVMEM sysfs Kconfig option must be > > enabled for this support to be available. > > > > Not all nvmem devices expose cells. Indeed, the .bin_attrs attribute > > group member will be filled at runtime only when relevant and will > > remain empty otherwise. In this case, as the cells attribute group will > > be empty, it will not lead to any additional folder/file creation. > > > > Exposed cells are read-only. There is, in practice, everything in the > > core to support a write path, but as I don't see any need for that, I > > prefer to keep the interface simple (and probably safer). The interface > > is documented as being in the "testing" state which means we can later > > add a write attribute if though relevant. > > > > There is one limitation though: if a layout is built as a module but is > > not properly installed in the system and loaded manually with insmod > > while the nvmem device driver was built-in, the cells won't appear in > > sysfs. But if done like that, the cells won't be usable by the built-in > > kernel drivers anyway. > > > > Signed-off-by: Miquel Raynal > > Reviewed-by: Greg Kroah-Hartman > > --- > > drivers/nvmem/core.c | 121 ++++++++++++++++++++++++++++++++++++++++--- > > 1 file changed, 113 insertions(+), 8 deletions(-) > > > > diff --git a/drivers/nvmem/core.c b/drivers/nvmem/core.c > > index 3f8c7718412b..8b49b12501e2 100644 > > --- a/drivers/nvmem/core.c > > +++ b/drivers/nvmem/core.c > > @@ -325,6 +325,43 @@ static umode_t nvmem_bin_attr_is_visible(struct kobject *kobj, > > return nvmem_bin_attr_get_umode(nvmem); > > } > > > +static struct nvmem_cell *nvmem_create_cell(struct nvmem_cell_entry *entry, > > + const char *id, int index); > > + > > +static ssize_t nvmem_cell_attr_read(struct file *filp, struct kobject *kobj, > > + struct bin_attribute *attr, char *buf, > > + loff_t pos, size_t count) > > +{ > > + struct nvmem_cell_entry *entry; > > + struct nvmem_cell *cell = NULL; > > + size_t cell_sz, read_len; > > + void *content; > > + > > + entry = attr->private; > > + cell = nvmem_create_cell(entry, entry->name, 0); > > + if (IS_ERR(cell)) > > + return PTR_ERR(cell); > > + > > + if (!cell) > > + return -EINVAL; > > + > > + content = nvmem_cell_read(cell, &cell_sz); > > + if (IS_ERR(content)) { > > + read_len = PTR_ERR(content); > > + goto destroy_cell; > > + } > > + > > + read_len = min_t(unsigned int, cell_sz - pos, count); > > + memcpy(buf, content + pos, read_len); > > + kfree(content); > > + > > +destroy_cell: > > + kfree_const(cell->id); > > + kfree(cell); > > + > > + return read_len; > > +} > > + > > /* default read/write permissions */ > > static struct bin_attribute bin_attr_rw_nvmem = { > > .attr = { > > @@ -346,8 +383,14 @@ static const struct attribute_group nvmem_bin_group = { > > .is_bin_visible = nvmem_bin_attr_is_visible, > > }; > > > +/* Cell attributes will be dynamically allocated */ > > +static struct attribute_group nvmem_cells_group = { > > + .name = "cells", > > +}; > > + > > static const struct attribute_group *nvmem_dev_groups[] = { > > &nvmem_bin_group, > > + &nvmem_cells_group, > > NULL, > > }; > > > @@ -406,6 +449,58 @@ static void nvmem_sysfs_remove_compat(struct nvmem_device *nvmem, > > device_remove_bin_file(nvmem->base_dev, &nvmem->eeprom); > > } > > > +static int nvmem_populate_sysfs_cells(struct nvmem_device *nvmem) > > +{ > > + struct bin_attribute **cells_attrs, *attrs; > > + struct nvmem_cell_entry *entry; > > + unsigned int ncells = 0, i = 0; > > + int ret = 0; > > + > > + mutex_lock(&nvmem_mutex); > > + > > + if (list_empty(&nvmem->cells)) > > + goto unlock_mutex; > > + > > + /* Allocate an array of attributes with a sentinel */ > > + ncells = list_count_nodes(&nvmem->cells); > > + cells_attrs = devm_kcalloc(&nvmem->dev, ncells + 1, > > + sizeof(struct bin_attribute *), GFP_KERNEL); > > + if (!cells_attrs) { > > + ret = -ENOMEM; > > + goto unlock_mutex; > > + } > > + > > + attrs = devm_kcalloc(&nvmem->dev, ncells, sizeof(struct bin_attribute), GFP_KERNEL); > > + if (!attrs) { > > + ret = -ENOMEM; > > + goto unlock_mutex; > > + } > > + > > + /* Initialize each attribute to take the name and size of the cell */ > > + list_for_each_entry(entry, &nvmem->cells, node) { > > + sysfs_bin_attr_init(&attrs[i]); > > + attrs[i].attr.name = devm_kstrdup(&nvmem->dev, entry->name, GFP_KERNEL); > > + attrs[i].attr.mode = 0444; > > + attrs[i].size = entry->bytes; > > + attrs[i].read = &nvmem_cell_attr_read; > > + attrs[i].private = entry; > > + if (!attrs[i].attr.name) { > > + ret = -ENOMEM; > > + goto unlock_mutex; > > + } > > + > > + cells_attrs[i] = &attrs[i]; > > + i++; > > + } > > + > > + nvmem_cells_group.bin_attrs = cells_attrs; > > + > > +unlock_mutex: > > + mutex_unlock(&nvmem_mutex); > > + > > + return ret; > > +} > > + > > #else /* CONFIG_NVMEM_SYSFS */ > > > static int nvmem_sysfs_setup_compat(struct nvmem_device *nvmem, > > @@ -998,20 +1093,30 @@ struct nvmem_device *nvmem_register(const struct nvmem_config *config) > > if (rval) > > goto err_remove_cells; > > > + rval = nvmem_add_cells_from_layout(nvmem); > > + if (rval) > > + goto err_remove_cells; > > + > > + rval = nvmem_add_cells_from_fixed_layout(nvmem); > > + if (rval) > > + goto err_remove_cells; > > + > > + rval = nvmem_add_cells_from_layout(nvmem); > > + if (rval) > > + goto err_remove_cells; > > + > > +#ifdef CONFIG_NVMEM_SYSFS > > + rval = nvmem_populate_sysfs_cells(nvmem); > > + if (rval) > > + goto err_remove_cells; > > +#endif > > + > > dev_dbg(&nvmem->dev, "Registering nvmem device %s\n", config->name); > > > rval = device_add(&nvmem->dev); > > if (rval) > > goto err_remove_cells; > > > - rval = nvmem_add_cells_from_fixed_layout(nvmem); > > - if (rval) > > - goto err_remove_cells; > > - > > - rval = nvmem_add_cells_from_layout(nvmem); > > - if (rval) > > - goto err_remove_cells; > > - > > blocking_notifier_call_chain(&nvmem_notifier, NVMEM_ADD, nvmem); > > > return nvmem;