Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1874920ybv; Fri, 21 Feb 2020 05:00:57 -0800 (PST) X-Google-Smtp-Source: APXvYqyh4xnLcyqQXxw3r1BSyumTBOl3O9fnfDX1wKZTU/iqWqYica66WW9Og6c8rnkQMnK2pbKf X-Received: by 2002:aca:4d06:: with SMTP id a6mr1893684oib.27.1582290057630; Fri, 21 Feb 2020 05:00:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582290057; cv=none; d=google.com; s=arc-20160816; b=qbtNXcdmZhNQkBOq5hgLbiY2tlPEvezQhtlrO+GEPdpj9BcF9FmaSLVNGxIJS+dXVu 2adfPdXMWVor6D6UFIoUcszObhXhYvPBo4iHVZMCP/6kXjD0mSxoqjLCdd30jjbR3wQA kLGf5RKfxQgpeHb2fdBZdwUm6aho2WM8HZc34mQE2szUv0BOE//kdU8WRtNCyeRFBgV/ S/WHABNGyKL4cw6YlZM2x4lF7T3F6lmYBrMpL8tlJP1wXTMxR5N6sqWgX1tm7nlVoiDi bMEqP3BiwiS/ry7A8tOGqb6Cyfqa/cSqISJjRJs1jA4ffFLe6e3gUKLFZB8T49wg0dkk TQnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=dTGIxNzKWjg+vXTJZB1ERDDEq61BmS+JiVpmqXvAT/s=; b=tSodc7/eaEwZdAbhcTMQRl6hR/c6rhux6ZK9v+FO4DAHeUCGOKu8bIcZemuz6VIn0X bqREJZvTbogdLKBUsDghePVGYGA8l3ghIMhiLhqzrn9qN1J+GhBozlQ8+hQ9TJWSk389 J3j05eSQe05OxKVpjYzOpuZ4iQma9Nz3a7yekz8ol4t7FZDNvLicuBoAVntpwVsIgsYL 1twt026CXC21WnhatMKsjza4rQZKL0yuKacljJePgU2kaNwy6LJ5RMwTk6+AV6h8ykbd US22EsCLFGVIrV/FnHlu2GJ3SHXT16zKFFVQrTdBeAVcmlmKOEXU7oCoGDP6B/ZDzW4F X0Fg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i13si1374008oth.175.2020.02.21.05.00.43; Fri, 21 Feb 2020 05:00:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727470AbgBUM7R (ORCPT + 99 others); Fri, 21 Feb 2020 07:59:17 -0500 Received: from bhuna.collabora.co.uk ([46.235.227.227]:57956 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727039AbgBUM7R (ORCPT ); Fri, 21 Feb 2020 07:59:17 -0500 Received: from localhost (unknown [IPv6:2a01:e0a:2c:6930:5cf4:84a1:2763:fe0d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: bbrezillon) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 726AC29617A; Fri, 21 Feb 2020 12:59:14 +0000 (GMT) Date: Fri, 21 Feb 2020 13:59:11 +0100 From: Boris Brezillon To: Greg KH Cc: Vitor Soares , Jose Abreu , "corbet@lwn.net" , Joao Pinto , "arnd@arndb.de" , "wsa@the-dreams.de" , "bbrezillon@kernel.org" , "linux-kernel@vger.kernel.org" , "broonie@kernel.org" , "linux-i3c@lists.infradead.org" Subject: Re: [PATCH v3 3/5] i3c: master: add i3c_for_each_dev helper Message-ID: <20200221135911.1300170b@collabora.com> In-Reply-To: <20200221115229.GA116368@kroah.com> References: <868e5b37fd817b65e6953ed7279f5063e5fc06c5.1582069402.git.vitor.soares@synopsys.com> <20200219073548.GA2728338@kroah.com> <20200221115229.GA116368@kroah.com> Organization: Collabora X-Mailer: Claws Mail 3.17.4 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 21 Feb 2020 12:52:29 +0100 Greg KH wrote: > On Fri, Feb 21, 2020 at 11:47:22AM +0000, Vitor Soares wrote: > > Hi Greg, > > > > From: Greg KH > > Date: Wed, Feb 19, 2020 at 07:35:48 > > > > > On Wed, Feb 19, 2020 at 01:20:41AM +0100, Vitor Soares wrote: > > > > Introduce i3c_for_each_dev(), an i3c device iterator for use by i3cdev. > > > > > > > > Signed-off-by: Vitor Soares > > > > --- > > > > drivers/i3c/internals.h | 1 + > > > > drivers/i3c/master.c | 12 ++++++++++++ > > > > 2 files changed, 13 insertions(+) > > > > > > > > diff --git a/drivers/i3c/internals.h b/drivers/i3c/internals.h > > > > index bc062e8..a6deedf 100644 > > > > --- a/drivers/i3c/internals.h > > > > +++ b/drivers/i3c/internals.h > > > > @@ -24,4 +24,5 @@ int i3c_dev_enable_ibi_locked(struct i3c_dev_desc *dev); > > > > int i3c_dev_request_ibi_locked(struct i3c_dev_desc *dev, > > > > const struct i3c_ibi_setup *req); > > > > void i3c_dev_free_ibi_locked(struct i3c_dev_desc *dev); > > > > +int i3c_for_each_dev(void *data, int (*fn)(struct device *, void *)); > > > > #endif /* I3C_INTERNAL_H */ > > > > diff --git a/drivers/i3c/master.c b/drivers/i3c/master.c > > > > index 21c4372..8e22da2 100644 > > > > --- a/drivers/i3c/master.c > > > > +++ b/drivers/i3c/master.c > > > > @@ -2640,6 +2640,18 @@ void i3c_dev_free_ibi_locked(struct i3c_dev_desc *dev) > > > > dev->ibi = NULL; > > > > } > > > > > > > > +int i3c_for_each_dev(void *data, int (*fn)(struct device *, void *)) > > > > +{ > > > > + int res; > > > > + > > > > + mutex_lock(&i3c_core_lock); > > > > + res = bus_for_each_dev(&i3c_bus_type, NULL, data, fn); > > > > + mutex_unlock(&i3c_core_lock); > > > > > > Ick, why the lock? Are you _sure_ you need that? The core should > > > handle any list locking issues here, right? > > > > I want to make sure that no new devices (eg: Hot-Join capable device) are > > added during this iteration and after this call, each new device will > > release a bus notification. > > > > > > > > I don't see bus-specific-locks around other subsystem functions that do > > > this (like usb_for_each_dev). > > > > I based in I2C use case. > > Check to see if this is really needed, for some reason I doubt it... Can we please try the spidev approach before fixing those problems. None of that would be needed if we declare the i3cdev driver as a regular i3c_device_driver and let user space bind devices it wants to expose through the sysfs interface. As I said earlier, we even have all the pieces we need to automate that using a udev rule, and the resulting patchset would be 'less invasive'/simpler for pretty much the same result.