From patchwork Mon Feb 19 09:02:33 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel van Vugt X-Patchwork-Id: 202973 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2685:b0:108:e6aa:91d0 with SMTP id mn5csp1162247dyc; Mon, 19 Feb 2024 01:03:26 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUFAe1K1QxrxVgbA1GAD02h33LYyMvh9ecsByJObxXQjTuRc7p850ct3brILnD/Yi7jj41iVqhpJ7ULgffO92HwITlGqg== X-Google-Smtp-Source: AGHT+IHegtJsxyYKmvJqvvXbEYN48p3jFASfQK4YTfmGQ/PYPcVhR/kNE6WfgRkrofnvpqC1yAAe X-Received: by 2002:a05:6402:891:b0:564:6a00:d119 with SMTP id e17-20020a056402089100b005646a00d119mr1626124edy.15.1708333406503; Mon, 19 Feb 2024 01:03:26 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708333406; cv=pass; d=google.com; s=arc-20160816; b=Otcow+wIGvhaNL66ftAMW9lclN+GMFhKaR00IZf+Nup8mt3Cqs6SD1zX6PRF4tZi7U uZfldVp1Q5FBLpw1E+JfV+rR6w+28tjx/U1p/iGatGmvGGmExc89zjdWM9hWhrm3J1wG 3wwIZqlXpbHOYCMgOxLpPY0jEGk06021LDJ56NfUg7rwQZz1r79aQ8rbPUi+z+JGSMyW c+wyQLrJCOm24Y64SdlE1e+1cO8tewgD1AFR3iAy7IL0Tghb1UjZ8PHVbVc5q+ijZMgr QJYozgTpE1T1wVQCEs2klZDe+sxe0FO13AdJiUjiSkLggV5303k2d/wL4D+F7AP65tdv 8YXA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=qrYMi74bcCPFGEWKyxCuYJeZThHsF8LjYHDib4wabmI=; fh=PUHnZ+LY1brhY0jxlnS5zLBiXFMOPZ00S7vqIg36DTM=; b=Qv7etn/p2mbS3S/30xUI/AWz2X3xdlUSha1+MhLdOKB6/a4F0C4q2Lo6tAywnip8EK 72ixt8C4mAm1Amuht3SfMa1nHmz8ab7DtqpW/BaClye9QTydyelqFIyGtFVqKuDJeVqV MdcFBxlbKKdaKL2uj6dkA5llJRCcDWOBLHpMVhkvK8zIUXSlkLLX496bEkj8zkZlFtok aW9TBkG/8HD1PYhB5b9ROOkZVUnpUrtANJNxfWcFFh3lVaAi14X3PE8774uQhcHJwbZw GP9k3A5Wl58wRAVS5CUkkM/criQ7F5mDmhWhu7o8KoBbSLKzgO6+eTdqEbISomN+8dLW u9iw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=Al4oZOn0; arc=pass (i=1 spf=pass spfdomain=canonical.com dkim=pass dkdomain=canonical.com dmarc=pass fromdomain=canonical.com); spf=pass (google.com: domain of linux-kernel+bounces-70986-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-70986-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id t21-20020aa7d715000000b00563f1559c6asi2285262edq.158.2024.02.19.01.03.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Feb 2024 01:03:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-70986-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=Al4oZOn0; arc=pass (i=1 spf=pass spfdomain=canonical.com dkim=pass dkdomain=canonical.com dmarc=pass fromdomain=canonical.com); spf=pass (google.com: domain of linux-kernel+bounces-70986-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-70986-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 2436A1F22EB4 for ; Mon, 19 Feb 2024 09:03:26 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E5A2622338; Mon, 19 Feb 2024 09:03:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b="Al4oZOn0" Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6B2431CD1F; Mon, 19 Feb 2024 09:03:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.125.188.121 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708333392; cv=none; b=Z4dOK8WnZ39wFZyUvARSZ6+TWq2UML2akWhtDyxDY6INIv0iG7tacYruune7MISmepW4cJqniNS5N0oyVIS6yfDdf/cl6oZPkNbwnWmFXJ2wKGiZ99Ay7+7IzpGDtuOySLvlPKVJgCEF+Hkpaoc/ha0T2pTJZeQynvN2mn5VqIM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708333392; c=relaxed/simple; bh=CV4GH9UNJ6zNQc6c5xVZP+xrV8bnxAF5VgMaNZ9XGwg=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ErjP29qPeCIAT4yaF5t2D6yd7hcxHTc9pzQvrbYZrfyoEoqwloH3EpDiUGbcDPX10WlfY6QzgJSV/TNYVfpf+qmnIBpicj3QuswNvaBQOIptj7EJYroCK5heuDKGljvPJSLg5bzaxjKZAqTaLQRoqd02LTIc2GnGQwZB8crTpJQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com; spf=pass smtp.mailfrom=canonical.com; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b=Al4oZOn0; arc=none smtp.client-ip=185.125.188.121 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=canonical.com Received: from dragon.fritz.box (unknown [58.7.187.102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 51F753FFCB; Mon, 19 Feb 2024 09:02:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1708333382; bh=qrYMi74bcCPFGEWKyxCuYJeZThHsF8LjYHDib4wabmI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Al4oZOn0ScbIR3AVLorfwEDF/5CS85wWgFVY3g4D7ozov/IfnGT0akRSxUmy80iY8 AIGO2ImJUtycicQQ0NWjANNxfA25Aez0V0SFYMzYJekRQjRpEYLofpXccbzv+Xnehq QRNVg9DeYX4WuNl7vJwzrOOEvvliQm/9X+0PaoI62CfumZv8aNBj/7fjxHkhBi7v4h iOYalDVjncZyQUSlH3vF9kqqiMbEnqQh/ZCh2WVt4YKCjutmP2Ah4Z2mI4o1XNpM25 sRQJYuxePHHme5hXF6zzuDeUo8Nsnmk4smFnYeFaElHDGZrfEdKAENnrJfD4mGrL5r rLL8F6ja+Lccg== From: Daniel van Vugt To: Cc: Daniel van Vugt , Greg Kroah-Hartman , Helge Deller , linux-fbdev@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH v4 1/2] dummycon: Add dummycon_(un)register_switch_notifier Date: Mon, 19 Feb 2024 17:02:33 +0800 Message-ID: <20240219090239.22568-1-daniel.van.vugt@canonical.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791317409934886054 X-GMAIL-MSGID: 1791317409934886054 To detect switch attempts before a real console exists. This will be used for the same purpose as dummycon_(un)register_output_notifier, for fbcon to detect a more polite time to take over. Signed-off-by: Daniel van Vugt --- drivers/video/console/dummycon.c | 35 +++++++++++++++++++++++++++----- include/linux/console.h | 2 ++ 2 files changed, 32 insertions(+), 5 deletions(-) diff --git a/drivers/video/console/dummycon.c b/drivers/video/console/dummycon.c index 14af5d9e13..55e9b600ce 100644 --- a/drivers/video/console/dummycon.c +++ b/drivers/video/console/dummycon.c @@ -83,6 +83,32 @@ static int dummycon_blank(struct vc_data *vc, int blank, int mode_switch) /* Redraw, so that we get putc(s) for output done while blanked */ return 1; } + +/* This is protected by the console_lock */ +static RAW_NOTIFIER_HEAD(dummycon_switch_nh); + +void dummycon_register_switch_notifier(struct notifier_block *nb) +{ + WARN_CONSOLE_UNLOCKED(); + + raw_notifier_chain_register(&dummycon_switch_nh, nb); +} + +void dummycon_unregister_switch_notifier(struct notifier_block *nb) +{ + WARN_CONSOLE_UNLOCKED(); + + raw_notifier_chain_unregister(&dummycon_switch_nh, nb); +} + +static int dummycon_switch(struct vc_data *vc) +{ + WARN_CONSOLE_UNLOCKED(); + + raw_notifier_call_chain(&dummycon_switch_nh, 0, vc); + + return 0; +} #else static void dummycon_putc(struct vc_data *vc, int c, int ypos, int xpos) { } static void dummycon_putcs(struct vc_data *vc, const unsigned short *s, @@ -91,6 +117,10 @@ static int dummycon_blank(struct vc_data *vc, int blank, int mode_switch) { return 0; } +static int dummycon_switch(struct vc_data *vc) +{ + return 0; +} #endif static const char *dummycon_startup(void) @@ -120,11 +150,6 @@ static bool dummycon_scroll(struct vc_data *vc, unsigned int top, return false; } -static int dummycon_switch(struct vc_data *vc) -{ - return 0; -} - /* * The console `switch' structure for the dummy console * diff --git a/include/linux/console.h b/include/linux/console.h index 779d388af8..8fd70ae623 100644 --- a/include/linux/console.h +++ b/include/linux/console.h @@ -531,5 +531,7 @@ extern void console_init(void); /* For deferred console takeover */ void dummycon_register_output_notifier(struct notifier_block *nb); void dummycon_unregister_output_notifier(struct notifier_block *nb); +void dummycon_register_switch_notifier(struct notifier_block *nb); +void dummycon_unregister_switch_notifier(struct notifier_block *nb); #endif /* _LINUX_CONSOLE_H */ From patchwork Mon Feb 19 09:02:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel van Vugt X-Patchwork-Id: 202974 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2685:b0:108:e6aa:91d0 with SMTP id mn5csp1162421dyc; Mon, 19 Feb 2024 01:03:54 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVXnJ5uHM1ty1nTTihzZ53lYDv+D150081uLp1MlxmZ84b9FKjpQ8tkKKirWuTrPNiLFh0P5vc0pAXdMg7Slufxp95mWQ== X-Google-Smtp-Source: AGHT+IHg0zLooMidOq+kptn6c4O1kkHtWtHZfGPQxJpc1tEL2x5RuIZGaJnKBI5DDURRpmOGutXb X-Received: by 2002:a05:6a00:2e12:b0:6e1:4085:dd4f with SMTP id fc18-20020a056a002e1200b006e14085dd4fmr7778390pfb.25.1708333434651; Mon, 19 Feb 2024 01:03:54 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708333434; cv=pass; d=google.com; s=arc-20160816; b=havcicFuXrv6HQEVGYY6jwBdn+KCKqqkpIqubQB5A3QPRvLx7AhOZuPwwgRXCE/Cdz sDhdy3S9jZwIrJsqwhsyECCTAYSdC7pswZWG46ODBN5zq0ftV/gOF4nVOUSR5t6N5y+v E4Nehj5MTSWj0HKicK6X817Z/loXv+HEnDDiqQ3CyMtVaOM8lzv8bwfOgGX2DZ9OKjQY XlkG9/6LZKQfqRI1GwRxttYRZATO2msn7nYGEyzkBtWxKZY6x53kH4xZALLloZ3WNmKO 4gVbAkOgQSUwYgTlQpca07ukDWBRfZSQRP8s4jl25LDXhgpqAnadht1RS+8vT6A/H7l5 f9Gw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=kQhfdLR3qGyplgiIkg8pJk0Ou4Y1K7ya0QDBpb51jFU=; fh=Qa/cVRZnoXDN1UuQRYQ9vUCgzW5DfXTVab581REjPxk=; b=GCwf/6AehjmjqRtMBFnJxKMLbtZV/xoNsc7xJ7L8zgGl/fd93i31bOiDOu6++P+zxn 34H/z2DvJXirNH5FBeNscmio5L7/3HSmYDvScO86Ml2E4f8bDBxOOn6UU70Xyi1tkOw+ LPHkDQB2LXXOnIJ6cQ8TiTYo490U+zpYkNK9fhLuE2mz9oCiwB13mhDgqFsHG4MmkJNk 9uJpF/bdFfqCXxJWx970DVunvsvG6HbLvlCpSAenmR5wHgYmmFGXH1jIz4e3Uye2qKwR z2/hFwlHwdDuKkEiqEEnIGeZ61cQfd1SxBWA6SouxdYqHM/gEIykpj2TCxPSFM4QNiMl KkBQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=iVHcZXmQ; arc=pass (i=1 spf=pass spfdomain=canonical.com dkim=pass dkdomain=canonical.com dmarc=pass fromdomain=canonical.com); spf=pass (google.com: domain of linux-kernel+bounces-70987-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-70987-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id n123-20020a632781000000b005dcbba492aasi4253959pgn.736.2024.02.19.01.03.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Feb 2024 01:03:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-70987-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=iVHcZXmQ; arc=pass (i=1 spf=pass spfdomain=canonical.com dkim=pass dkdomain=canonical.com dmarc=pass fromdomain=canonical.com); spf=pass (google.com: domain of linux-kernel+bounces-70987-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-70987-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 66EF128309C for ; Mon, 19 Feb 2024 09:03:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CCDB123749; Mon, 19 Feb 2024 09:03:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b="iVHcZXmQ" Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 10BDB22338; Mon, 19 Feb 2024 09:03:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.125.188.121 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708333412; cv=none; b=WHVOboF8WDquekUXaU4fb1ikL70ZPlEkpp2UwBd0NZzh/CdQQKVV1xPLe2s9yCUKaw0NLjnhMKPydqWK05gkW21F1tTVVdlA3VJhe2pdtCiklQya2NiufHrKmVMGntsbXEw+ZZlhVnVkfz0I1kuN0BN67RJtn2RxB0NzpNviMag= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708333412; c=relaxed/simple; bh=GPN8Mk6AjKdJprvHnW5OkPBaRiGS9zcym0UU+Uw2+sU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=odiODHZyPv84LwItsb5RdmgcRMLTErxD2HREk4Kbj6CUFERtrr6gsnbJ44iP2PdidE9hcXDh2C7kKfTeFp+gBEisBrnOW9/V7yFSG6wHeIsd0XNBrMhXGrMXIlGxvc+RbaA7H2TZAgkNaOlykEoi7yqpsFszruLrPwGLsZPJzrw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com; spf=pass smtp.mailfrom=canonical.com; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b=iVHcZXmQ; arc=none smtp.client-ip=185.125.188.121 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=canonical.com Received: from dragon.fritz.box (unknown [58.7.187.102]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id CE8B23FFCB; Mon, 19 Feb 2024 09:03:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1708333408; bh=kQhfdLR3qGyplgiIkg8pJk0Ou4Y1K7ya0QDBpb51jFU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=iVHcZXmQo7IsnzjNyp460QrosKoV/xU7lHU7R+KlQqDk17uxXD7TxGTqgKArpvZWg znkJWdPT5Aar1ubS8CqJZuGS0qxispCALk9DIEOsKkeryBpmN+qO62+cWKkRnAgjoX 8zXe/tn2lmIiWmtgaPY1t9devOiX5jobe9lL6rAXd5EU/ahXc4jRWZeMGe3+NlC86l xTZriajSGckLS0lZ8ZzwZ5m2UamNlLXywN/+44/o27fCxS2OvKDh9MgqexxhgjfNmM knMfD7nlywRtSmwFKFrvFTWOlY20KLaSCzm8wMLIYXJzj0lGJdwV2TZ49lwIrQXC2A dIrsXGb+HCiCg== From: Daniel van Vugt To: Cc: Daniel van Vugt , Mario Limonciello , Greg Kroah-Hartman , Helge Deller , Daniel Vetter , =?utf-8?q?Th?= =?utf-8?q?omas_Hellstr=C3=B6m?= , Jani Nikula , Maxime Ripard , linux-fbdev@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH v4 2/2] fbcon: Defer console takeover for splash screens to first switch Date: Mon, 19 Feb 2024 17:02:34 +0800 Message-ID: <20240219090239.22568-2-daniel.van.vugt@canonical.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240219090239.22568-1-daniel.van.vugt@canonical.com> References: <20240219090239.22568-1-daniel.van.vugt@canonical.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1789777232791267970 X-GMAIL-MSGID: 1791317439651982250 Until now, deferred console takeover only meant defer until there is output. But that risks stepping on the toes of userspace splash screens as console messages may appear before the splash screen. This becomes more likely the later the splash screen starts, but even systems whose splash exists in initrd may not be not immune because they still rely on racing against all possible kernel messages that might trigger the fbcon takeover. And those kernel messages are hardware dependent so what boots silently on one machine may not be so quiet on the next. We also want to shield users from seeing warnings about their hardware/firmware that they don't always have the power to fix themselves, and may not be deemed worthy of fixing by the vendor. So now we check the command line for the expectation of userspace splash (CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER_CONDITION) and if present then defer fbcon's takeover until the first console switch. In the case of Plymouth, its value would typically be "splash". This keeps the boot experience clean and silent so long as the command line requests so. Closes: https://bugs.launchpad.net/bugs/1970069 Cc: Mario Limonciello Signed-off-by: Daniel van Vugt Tested-by: Mario Limonciello --- v2: Added Kconfig option instead of hard coding "splash". v3: Default to disabled, not "splash". If enabled then take over on switch rather than on first output after switch. v4: Elaborate more in the commit message about races and Kconfig. Also move these revision comments below the line marker. --- drivers/video/console/Kconfig | 12 +++++++++ drivers/video/fbdev/core/fbcon.c | 44 +++++++++++++++++++++++++++++--- 2 files changed, 52 insertions(+), 4 deletions(-) diff --git a/drivers/video/console/Kconfig b/drivers/video/console/Kconfig index bc31db6ef7..2f9435335f 100644 --- a/drivers/video/console/Kconfig +++ b/drivers/video/console/Kconfig @@ -138,6 +138,18 @@ config FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER by the firmware in place, rather then replacing the contents with a black screen as soon as fbcon loads. +config FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER_CONDITION + string "Command line parameter to defer takeover to first switch" + depends on FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER + default "" + help + If enabled this defers further the framebuffer console taking over + until the first console switch has occurred. And even then only if + the specified parameter is found on the command line. This ensures + fbcon does not interrupt userspace splash screens such as Plymouth + which may be yet to start rendering at the time of the first console + output. + config STI_CONSOLE bool "STI text console" depends on PARISC && HAS_IOMEM diff --git a/drivers/video/fbdev/core/fbcon.c b/drivers/video/fbdev/core/fbcon.c index 1183e7a871..e5d841ab03 100644 --- a/drivers/video/fbdev/core/fbcon.c +++ b/drivers/video/fbdev/core/fbcon.c @@ -76,6 +76,7 @@ #include /* For counting font checksums */ #include #include +#include #include "fbcon.h" #include "fb_internal.h" @@ -3348,7 +3349,7 @@ static int fbcon_output_notifier(struct notifier_block *nb, { WARN_CONSOLE_UNLOCKED(); - pr_info("fbcon: Taking over console\n"); + pr_info("fbcon: Taking over console for output\n"); dummycon_unregister_output_notifier(&fbcon_output_nb); @@ -3357,6 +3358,27 @@ static int fbcon_output_notifier(struct notifier_block *nb, return NOTIFY_OK; } + +#ifdef CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER_CONDITION +static int initial_console; +static struct notifier_block fbcon_switch_nb; + +static int fbcon_switch_notifier(struct notifier_block *nb, + unsigned long action, void *data) +{ + struct vc_data *vc = data; + + WARN_CONSOLE_UNLOCKED(); + + if (vc->vc_num != initial_console) { + pr_info("fbcon: Taking over console for switch\n"); + dummycon_unregister_switch_notifier(&fbcon_switch_nb); + schedule_work(&fbcon_deferred_takeover_work); + } + + return NOTIFY_OK; +} +#endif #endif static void fbcon_start(void) @@ -3368,8 +3390,18 @@ static void fbcon_start(void) deferred_takeover = false; if (deferred_takeover) { - fbcon_output_nb.notifier_call = fbcon_output_notifier; - dummycon_register_output_notifier(&fbcon_output_nb); +#ifdef CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER_CONDITION + if (cmdline_find_option_bool(boot_command_line, + CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER_CONDITION)) { + initial_console = fg_console; + fbcon_switch_nb.notifier_call = fbcon_switch_notifier; + dummycon_register_switch_notifier(&fbcon_switch_nb); + } else +#endif + { + fbcon_output_nb.notifier_call = fbcon_output_notifier; + dummycon_register_output_notifier(&fbcon_output_nb); + } return; } #endif @@ -3416,8 +3448,12 @@ void __exit fb_console_exit(void) { #ifdef CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER console_lock(); - if (deferred_takeover) + if (deferred_takeover) { dummycon_unregister_output_notifier(&fbcon_output_nb); +#ifdef CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER_CONDITION + dummycon_unregister_switch_notifier(&fbcon_switch_nb); +#endif + } console_unlock(); cancel_work_sync(&fbcon_deferred_takeover_work);