From patchwork Wed Jun 28 10:26:34 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Viresh Kumar X-Patchwork-Id: 106509 Delivered-To: patch@linaro.org Received: by 10.140.101.44 with SMTP id t41csp838502qge; Wed, 28 Jun 2017 03:27:42 -0700 (PDT) X-Received: by 10.84.241.135 with SMTP id b7mr2056331pll.107.1498645662638; Wed, 28 Jun 2017 03:27:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1498645662; cv=none; d=google.com; s=arc-20160816; b=LoEakmUHSNX0LjauTOZLTh0TzGy4bmicC2o7yB87pmqoXcYIJXf1IXtqmcosr53ue/ 5oCUtaMxN8i2dcT2pHh+g+XOVLzz02b7dEUeIDBsIesWcV7WZEyKWfXwdt5a1ELb6tD2 a+w8evoetaDH7R0VUo7ir9MbTXOKKNU8dRigO4vAqBO8ChViOkA28Qftxj0E3m8vOMpD iN6tozxwbDqauuzRWSsBDZhEhSe6h+e7Yv76wiIr2bOAqNIwq80cWW50Yw1dAVoHkrBC Uaw630aEhKRXW+xjPzug9zcr/6nj6UVGtlBs4J+/CQtO6xu0ROz2bpgdWm7W+TPrnzwb QPJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=yHGVxR0ImpHL1ASJ1ASxaYPSqi7SLzyamyC+9vaqDfs=; b=M/TBhHJi/372PHhwmlm7Knm7eC34UPrUj+3bKFwgxFxceC2/NyMUT62mdeby9jWabS /wXW9ic1JyfpW7lDClWe9juctRqRNcK3YhlaRXkvknMfga2IhhHbPz86cut3D6vJLZmu KL8sCWH/HG93Eu2DRBa8urPAa4JZwJDqf51m0uqjBrBrguloRwzFsxDDc9zcyVmDG2OA Rhl4H3hEfqYofrfgO+QU0RpbbWYtG/JHp+HxpsvWm4bvyR63IGBUPeuRhxyiESWhqUNI zCn7NiZF5YmXBYrQnybuAUDn3i9VSLBwEsrzhUJNxMSUeo1/Jyj8PiFDAmsXB0PlGUgg 1KdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.b=MK439bkQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m63si1320730pfk.76.2017.06.28.03.27.42; Wed, 28 Jun 2017 03:27:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.b=MK439bkQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751875AbdF1K12 (ORCPT + 25 others); Wed, 28 Jun 2017 06:27:28 -0400 Received: from mail-pf0-f173.google.com ([209.85.192.173]:33773 "EHLO mail-pf0-f173.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751742AbdF1K1N (ORCPT ); Wed, 28 Jun 2017 06:27:13 -0400 Received: by mail-pf0-f173.google.com with SMTP id e7so31376712pfk.0 for ; Wed, 28 Jun 2017 03:27:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :in-reply-to:references; bh=yHGVxR0ImpHL1ASJ1ASxaYPSqi7SLzyamyC+9vaqDfs=; b=MK439bkQOshqvnh4UelE8RrWO08Xgwc9qttIH/diig2fchgzNnNclYxVI4NlvuOpWF i2KMO/hhM968olk+MhcEZ2UtJG1vGxRWiebESdKLOBhrnQQM7VND83KZFsRi/ZO3j6Pn GBZZFgLA7WwvA+OdT1Mk1P2Jyv1nAFZdcvPwM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:in-reply-to:references; bh=yHGVxR0ImpHL1ASJ1ASxaYPSqi7SLzyamyC+9vaqDfs=; b=rOieSr3ssJJ7Jcr1kJR41gKfMAOW6gaX+L34bOnj/3GqGrYUNhOCZwHT6P3I6woPSy jQLpxbOwLmqB3am6LXP8Ys26PcQaCAovj9c5M2WEKRBaWnZxr7U3hpDcmqejurrekc1r BWOSwm7W8r1oYOaFTFDUo3rxQVJ+jr81uuvzF4fwKY3hnxB6vDQH8vxCROLExCaNqT1X OfRvB/QP4aoB57eHzxn0gg60DYzKdoCP8tNQOqKegkHqFe+EIOubngw/cxDQhoyHvOzf HLmoETw7hoc5YuysgpgOKkAMKaDoewiFY5jSgQaAoI8ej62Uhe2GQ29nT158iYrD0uKl tYCg== X-Gm-Message-State: AKS2vOxlvT4OTouiGLbEKHp5YsbLoG8tJkn0HlXvWcKTCZRxsS457lCS BFqExwSf9Fya17mn X-Received: by 10.98.41.130 with SMTP id p124mr9935169pfp.220.1498645632219; Wed, 28 Jun 2017 03:27:12 -0700 (PDT) Received: from localhost ([122.171.238.149]) by smtp.gmail.com with ESMTPSA id 66sm4054975pfm.82.2017.06.28.03.27.11 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Jun 2017 03:27:11 -0700 (PDT) From: Viresh Kumar To: Greg Kroah-Hartman Cc: Viresh Kumar , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Rafael Wysocki , Vincent Guittot , Stephen Boyd , Mark Brown , Shiraz Hashim , Rob Herring , rnayak@codeaurora.org Subject: [RFC 1/5] drivers: Add boot constraints core Date: Wed, 28 Jun 2017 15:56:34 +0530 Message-Id: <24921f2a6a86cb9b2b3a1cae86649180bc116a62.1498642745.git.viresh.kumar@linaro.org> X-Mailer: git-send-email 2.13.0.71.gd7076ec9c9cb In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Some devices are powered ON by the bootloaders before the bootloader handovers control to Linux. It maybe important for those devices to keep working until the time a Linux device driver probes the device and reconfigure its resources. A typical example of that can be the LCD controller, which is used by the bootloaders to show image(s) while the device is booting into Linux. The LCD controller can be using some resources, like clk, regulators, etc, that are shared between several devices. These shared resources should be programmed so that all the users of them are satisfied. If some user (X) driver gets probed before the LCD controller driver in this case, then it may end up reconfiguring these resources to ranges satisfying the current users (only user X) and that can make the LCD screen unstable. This patch introduces the concept of boot-constraints, which will be set by the bootloaders and the kernel will satisfy them until the time driver for such a device is probed (successfully or unsuccessfully). The list of boot constraint types is empty for now, and will be added by a later patch. Only two routines are exposed by the boot constraints core for now: - boot_constraint_add(): This will be called by parts of the kernel (before the device is probed) to set the constraints. - boot_constraints_remove(): This is called only by the driver core after a device is probed successfully or unsuccessfully. Special handling is done here for deffered probing. Signed-off-by: Viresh Kumar --- drivers/base/Kconfig | 11 +++ drivers/base/Makefile | 1 + drivers/base/boot_constraint.c | 210 ++++++++++++++++++++++++++++++++++++++++ drivers/base/dd.c | 20 ++-- include/linux/boot_constraint.h | 28 ++++++ 5 files changed, 263 insertions(+), 7 deletions(-) create mode 100644 drivers/base/boot_constraint.c create mode 100644 include/linux/boot_constraint.h -- 2.13.0.71.gd7076ec9c9cb diff --git a/drivers/base/Kconfig b/drivers/base/Kconfig index d718ae4b907a..d71217a91793 100644 --- a/drivers/base/Kconfig +++ b/drivers/base/Kconfig @@ -339,4 +339,15 @@ config CMA_ALIGNMENT endif +config BOOT_CONSTRAINTS + bool "Boot constraints for devices" + default y + help + This enables boot constraints detection for devices. These constraints + are (normally) set by the Bootloader and must be satisfied by the + kernel until the relevant device driver is probed. Once the driver is + probed, the constraint is dropped. + + If unsure, say Y. + endmenu diff --git a/drivers/base/Makefile b/drivers/base/Makefile index f2816f6ff76a..6094b3b75184 100644 --- a/drivers/base/Makefile +++ b/drivers/base/Makefile @@ -5,6 +5,7 @@ obj-y := component.o core.o bus.o dd.o syscore.o \ cpu.o firmware.o init.o map.o devres.o \ attribute_container.o transport_class.o \ topology.o container.o property.o cacheinfo.o +obj-$(CONFIG_BOOT_CONSTRAINTS) += boot_constraint.o obj-$(CONFIG_DEVTMPFS) += devtmpfs.o obj-$(CONFIG_DMA_CMA) += dma-contiguous.o obj-y += power/ diff --git a/drivers/base/boot_constraint.c b/drivers/base/boot_constraint.c new file mode 100644 index 000000000000..38740b8499ba --- /dev/null +++ b/drivers/base/boot_constraint.c @@ -0,0 +1,210 @@ +/* + * This takes care of boot time constraints, normally set by the Bootloader. + * + * Copyright (C) 2017 Linaro. + * Viresh Kumar + * + * This file is released under the GPLv2. + */ + +#define pr_fmt(fmt) "Boot Constraints: " fmt + +#include +#include +#include +#include +#include +#include +#include + +struct constraint { + struct constraint_dev *cdev; + struct list_head node; + enum boot_constraint_type type; + + int (*add)(struct constraint *constraint, void *data); + void (*remove)(struct constraint *constraint); + void *private; +}; + +struct constraint_dev { + struct device *dev; + struct list_head node; + struct list_head constraints; +}; + +#define for_each_constraint(_constraint, _temp, _cdev) \ + list_for_each_entry_safe(_constraint, _temp, &_cdev->constraints, node) + +/* Global list of all constraint devices currently registered */ +static LIST_HEAD(constraint_devices); +static DEFINE_MUTEX(constraint_devices_mutex); + +/* Forward declarations of constraints */ + + +/* Boot constraints core */ + +static struct constraint_dev *constraint_device_find(struct device *dev) +{ + struct constraint_dev *cdev; + + list_for_each_entry(cdev, &constraint_devices, node) { + if (cdev->dev == dev) + return cdev; + } + + return NULL; +} + +static struct constraint_dev *constraint_device_allocate(struct device *dev) +{ + struct constraint_dev *cdev; + + cdev = kzalloc(sizeof(*cdev), GFP_KERNEL); + if (!cdev) + return ERR_PTR(-ENOMEM); + + cdev->dev = dev; + INIT_LIST_HEAD(&cdev->node); + INIT_LIST_HEAD(&cdev->constraints); + + list_add(&cdev->node, &constraint_devices); + + return cdev; +} + +static void constraint_device_free(struct constraint_dev *cdev) +{ + list_del(&cdev->node); + kfree(cdev); +} + +static struct constraint_dev *constraint_device_get(struct device *dev) +{ + struct constraint_dev *cdev; + + cdev = constraint_device_find(dev); + if (cdev) + return cdev; + + cdev = constraint_device_allocate(dev); + if (IS_ERR(cdev)) { + dev_err(dev, "Failed to add constraint dev (%ld)\n", + PTR_ERR(cdev)); + } + + return cdev; +} + +static void constraint_device_put(struct constraint_dev *cdev) +{ + if (!list_empty(&cdev->constraints)) + return; + + constraint_device_free(cdev); +} + +static struct constraint *constraint_allocate(struct constraint_dev *cdev, + enum boot_constraint_type type) +{ + struct constraint *constraint; + int (*add)(struct constraint *constraint, void *data); + void (*remove)(struct constraint *constraint); + + switch (type) { + default: + return ERR_PTR(-EINVAL); + } + + constraint = kzalloc(sizeof(*constraint), GFP_KERNEL); + if (!constraint) + return ERR_PTR(-ENOMEM); + + constraint->cdev = cdev; + constraint->type = type; + constraint->add = add; + constraint->remove = remove; + INIT_LIST_HEAD(&constraint->node); + + list_add(&constraint->node, &cdev->constraints); + + return constraint; +} + +static void constraint_free(struct constraint *constraint) +{ + list_del(&constraint->node); + kfree(constraint); +} + +int boot_constraint_add(struct device *dev, enum boot_constraint_type type, + void *data) +{ + struct constraint_dev *cdev; + struct constraint *constraint; + int ret; + + mutex_lock(&constraint_devices_mutex); + + /* Find or add the cdev type first */ + cdev = constraint_device_get(dev); + if (IS_ERR(cdev)) { + ret = PTR_ERR(cdev); + goto unlock; + } + + constraint = constraint_allocate(cdev, type); + if (IS_ERR(constraint)) { + dev_err(dev, "Failed to add constraint type: %d (%ld)\n", type, + PTR_ERR(constraint)); + ret = PTR_ERR(constraint); + goto put_cdev; + } + + /* Set constraint */ + ret = constraint->add(constraint, data); + if (ret) + goto free_constraint; + + dev_dbg(dev, "Added boot constraint-type (%d)\n", type); + + mutex_unlock(&constraint_devices_mutex); + + return 0; + +free_constraint: + constraint_free(constraint); +put_cdev: + constraint_device_put(cdev); +unlock: + mutex_unlock(&constraint_devices_mutex); + + return ret; +} +EXPORT_SYMBOL_GPL(boot_constraint_add); + +static void constraint_remove(struct constraint *constraint) +{ + constraint->remove(constraint); + constraint_free(constraint); +} + +void boot_constraints_remove(struct device *dev) +{ + struct constraint_dev *cdev; + struct constraint *constraint, *temp; + + mutex_lock(&constraint_devices_mutex); + + cdev = constraint_device_find(dev); + if (!cdev) + goto unlock; + + for_each_constraint(constraint, temp, cdev) + constraint_remove(constraint); + + constraint_device_put(cdev); +unlock: + mutex_unlock(&constraint_devices_mutex); +} diff --git a/drivers/base/dd.c b/drivers/base/dd.c index 4882f06d12df..4eb9d183d647 100644 --- a/drivers/base/dd.c +++ b/drivers/base/dd.c @@ -17,6 +17,7 @@ * This file is released under the GPLv2 */ +#include #include #include #include @@ -381,15 +382,20 @@ static int really_probe(struct device *dev, struct device_driver *drv) */ devices_kset_move_last(dev); - if (dev->bus->probe) { + if (dev->bus->probe) ret = dev->bus->probe(dev); - if (ret) - goto probe_failed; - } else if (drv->probe) { + else if (drv->probe) ret = drv->probe(dev); - if (ret) - goto probe_failed; - } + + /* + * Remove boot constraints for both successful and unsuccessful probe(), + * except for the case where EPROBE_DEFER is returned by probe(). + */ + if (ret != -EPROBE_DEFER) + boot_constraints_remove(dev); + + if (ret) + goto probe_failed; if (test_remove) { test_remove = false; diff --git a/include/linux/boot_constraint.h b/include/linux/boot_constraint.h new file mode 100644 index 000000000000..41b5a62d2dbb --- /dev/null +++ b/include/linux/boot_constraint.h @@ -0,0 +1,28 @@ +/* + * Boot constraints header. + * + * Copyright (C) 2017 Linaro. + * Viresh Kumar + * + * This file is released under the GPLv2 + */ + +#include +#include + +struct device; + +enum boot_constraint_type { + BOOT_CONSTRAINT_NONE, +}; + +#ifdef CONFIG_BOOT_CONSTRAINTS +int boot_constraint_add(struct device *dev, enum boot_constraint_type type, + void *data); +void boot_constraints_remove(struct device *dev); +#else +static inline int boot_constraint_add(struct device *dev, + enum boot_constraint_type type, void *data) +{ return -EINVAL; } +static inline void boot_constraints_remove(struct device *dev) {} +#endif