Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4707531imm; Wed, 30 May 2018 10:21:41 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK/XDIQawXY/x/+hC3sNqRyav7IU4GmjzPdONooh79eTGVY5FMAAomDZ+BLioOfTWyFE1sW X-Received: by 2002:a62:ae13:: with SMTP id q19-v6mr3561631pff.155.1527700901059; Wed, 30 May 2018 10:21:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527700901; cv=none; d=google.com; s=arc-20160816; b=qCKKzHfFUr8JHJjDB1FPXmItO7OxtEZE++KKibCj+OM9OlaKnV3gw7EY8KAnkSzfed ProK9J3FswyQjpLd8C5GOZ9oNU1dD1X72VkJrG29jwhdN8TiAVLz5qBaTH06To2blazd UOY/vZbnchmVOU6RyYpp/HtWlhJfwsBAQSJMVSWFWIXD6KwVd0tkQJDc87ee/suUbaVR 0cc/i7whtuITUn/zDTKhddyThNpb8j4jOjt0KyoT/xASKLJ5Bc03L1Aa8iRiNbr2+0Ph ByUyhmNqXP1OBwsL9ohOksBG2+YxzaLbol8Q5rcM4Y6uwYzBVRfCGnTdfpATLcayv2hQ gMOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to :subject:cc:to:from:date:arc-authentication-results; bh=b0Vh5HjZVRGG21O+ZOBmIdM0LvlPX7cuzJVYlX1Jx04=; b=J0zpN+0f456Xol+6/1HgEJ08XGCl1pmY+5SzN3xGYQ8MSENYg9d7q2P5lzovwwYKyx UyuSqP4yorYgMtpJ44Vl2wu9RxbyQJf49e+fSoN74sfTDkdfdGvWqjIijr68/BGQJITy oDgpt99a3ENu+V6cgZuaoV6LcjTsJxeipK1qdD9H8EdZ47jW4el8JD/fRUtNgRrYlYGa Lqu4CosOCBEfCIVL2LEakHrAbtG+M7NDcIhJWuijMsOkELiRWvHagK7pAb9Bt8E6FM8a 0MDTd6vuUUs4wOluHCwVdpaWeKawPlXwOnUt+4cxCF6U3PN9pi6TOy/jwffjxdpsLwLj 5DMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1-v6si34419146pld.218.2018.05.30.10.21.26; Wed, 30 May 2018 10:21:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753752AbeE3RVF (ORCPT + 99 others); Wed, 30 May 2018 13:21:05 -0400 Received: from iolanthe.rowland.org ([192.131.102.54]:37078 "HELO iolanthe.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1752850AbeE3RVC (ORCPT ); Wed, 30 May 2018 13:21:02 -0400 Received: (qmail 4848 invoked by uid 2102); 30 May 2018 13:21:02 -0400 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 30 May 2018 13:21:02 -0400 Date: Wed, 30 May 2018 13:21:02 -0400 (EDT) From: Alan Stern X-X-Sender: stern@iolanthe.rowland.org To: Martin Liu cc: gregkh@linuxfoundation.org, , , , , , Subject: Re: [PATCH v4] driver core: hold dev's parent lock when needed In-Reply-To: <20180530163135.50081-1-liumartin@google.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 31 May 2018, Martin Liu wrote: > SoC have internal I/O buses that can't be proved for devices. The > devices on the buses can be accessed directly without additinal > configuration required. This type of bus is represented as > "simple-bus". In some platforms, we name "soc" with "simple-bus" > attribute and many devices are hooked under it described in DT > (device tree). > > In commit bf74ad5bc417 ("Hold the device's parent's lock during > probe and remove") to solve USB subsystem lock sequence since > USB device's characteristic. Thus "soc" needs to be locked > whenever a device and driver's probing happen under "soc" bus. > During this period, an async driver tries to probe a device which > is under the "soc" bus would be blocked until previous driver > finish the probing and release "soc" lock. And the next probing > under the "soc" bus need to wait for async finish. Because of > that, driver's async probe for init time improvement will be > shadowed. > > Since many devices don't have USB devices' characteristic, they > actually don't need parent's lock. Thus, we introduce a lock flag > in bus_type struct and driver core would lock the parent lock base > on the flag. For USB, we set this flag in usb_bus_type to keep > original lock behavior in driver core. > > Async probe could have more benefit after this patch. > > Signed-off-by: Martin Liu > --- > Changes in v4: > -fix comment and wording. > -follow the suggestion. > > [v3]: https://lkml.org/lkml/2018/5/29/876 > [v2]: https://lkml.org/lkml/2018/5/29/108 > [v1]: https://lkml.org/lkml/2018/5/22/545 > > drivers/base/bus.c | 16 ++++++++-------- > drivers/base/dd.c | 8 ++++---- > drivers/usb/core/driver.c | 1 + > include/linux/device.h | 3 +++ > 4 files changed, 16 insertions(+), 12 deletions(-) > > diff --git a/drivers/base/bus.c b/drivers/base/bus.c > index ef6183306b40..8bfd27ec73d6 100644 > --- a/drivers/base/bus.c > +++ b/drivers/base/bus.c > @@ -184,10 +184,10 @@ static ssize_t unbind_store(struct device_driver *drv, const char *buf, > > dev = bus_find_device_by_name(bus, NULL, buf); > if (dev && dev->driver == drv) { > - if (dev->parent) /* Needed for USB */ > + if (dev->parent && dev->bus->need_parent_lock) > device_lock(dev->parent); > device_release_driver(dev); > - if (dev->parent) > + if (dev->parent && dev->bus->need_parent_lock) > device_unlock(dev->parent); > err = count; > } > @@ -211,12 +211,12 @@ static ssize_t bind_store(struct device_driver *drv, const char *buf, > > dev = bus_find_device_by_name(bus, NULL, buf); > if (dev && dev->driver == NULL && driver_match_device(drv, dev)) { > - if (dev->parent) /* Needed for USB */ > + if (dev->parent && bus->need_parent_lock) > device_lock(dev->parent); > device_lock(dev); > err = driver_probe_device(drv, dev); > device_unlock(dev); > - if (dev->parent) > + if (dev->parent && bus->need_parent_lock) > device_unlock(dev->parent); > > if (err > 0) { > @@ -735,10 +735,10 @@ static int __must_check bus_rescan_devices_helper(struct device *dev, > int ret = 0; > > if (!dev->driver) { > - if (dev->parent) /* Needed for USB */ > + if (dev->parent && dev->bus->need_parent_lock) > device_lock(dev->parent); > ret = device_attach(dev); > - if (dev->parent) > + if (dev->parent && dev->bus->need_parent_lock) > device_unlock(dev->parent); > } > return ret < 0 ? ret : 0; > @@ -770,10 +770,10 @@ EXPORT_SYMBOL_GPL(bus_rescan_devices); > int device_reprobe(struct device *dev) > { > if (dev->driver) { > - if (dev->parent) /* Needed for USB */ > + if (dev->parent && dev->bus->need_parent_lock) > device_lock(dev->parent); > device_release_driver(dev); > - if (dev->parent) > + if (dev->parent && dev->bus->need_parent_lock) > device_unlock(dev->parent); > } > return bus_rescan_devices_helper(dev, NULL); > diff --git a/drivers/base/dd.c b/drivers/base/dd.c > index c9f54089429b..7c09f73b96f3 100644 > --- a/drivers/base/dd.c > +++ b/drivers/base/dd.c > @@ -817,13 +817,13 @@ static int __driver_attach(struct device *dev, void *data) > return ret; > } /* ret > 0 means positive match */ > > - if (dev->parent) /* Needed for USB */ > + if (dev->parent && dev->bus->need_parent_lock) > device_lock(dev->parent); > device_lock(dev); > if (!dev->driver) > driver_probe_device(drv, dev); > device_unlock(dev); > - if (dev->parent) > + if (dev->parent && dev->bus->need_parent_lock) > device_unlock(dev->parent); > > return 0; > @@ -919,7 +919,7 @@ void device_release_driver_internal(struct device *dev, > struct device_driver *drv, > struct device *parent) > { > - if (parent) > + if (parent && dev->bus->need_parent_lock) > device_lock(parent); > > device_lock(dev); > @@ -927,7 +927,7 @@ void device_release_driver_internal(struct device *dev, > __device_release_driver(dev, parent); > > device_unlock(dev); > - if (parent) > + if (parent && dev->bus->need_parent_lock) > device_unlock(parent); > } > > diff --git a/drivers/usb/core/driver.c b/drivers/usb/core/driver.c > index 9792cedfc351..e76e95f62f76 100644 > --- a/drivers/usb/core/driver.c > +++ b/drivers/usb/core/driver.c > @@ -1922,4 +1922,5 @@ struct bus_type usb_bus_type = { > .name = "usb", > .match = usb_device_match, > .uevent = usb_uevent, > + .need_parent_lock = true, > }; > diff --git a/include/linux/device.h b/include/linux/device.h > index 477956990f5e..beca424395dd 100644 > --- a/include/linux/device.h > +++ b/include/linux/device.h > @@ -98,6 +98,8 @@ extern void bus_remove_file(struct bus_type *, struct bus_attribute *); > * @lock_key: Lock class key for use by the lock validator > * @force_dma: Assume devices on this bus should be set up by dma_configure() > * even if DMA capability is not explicitly described by firmware. > + * @need_parent_lock: When probing or removing a device on this bus, the > + * device core should lock the device's parent. > * > * A bus is a channel between the processor and one or more devices. For the > * purposes of the device model, all devices are connected via a bus, even if > @@ -138,6 +140,7 @@ struct bus_type { > struct lock_class_key lock_key; > > bool force_dma; > + bool need_parent_lock; > }; > > extern int __must_check bus_register(struct bus_type *bus); This looks okay to me. Acked-by: Alan Stern Greg, any more comments? Alan Stern