Received: by 2002:a05:6602:2086:0:0:0:0 with SMTP id a6csp3909196ioa; Tue, 26 Apr 2022 12:08:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwi/Zp7HMisiCX9L7uCfj6K9Y2lJ+vVbVXWGIMFBGDEbBtwFD95SNIKs2K7J5046iRRwmJB X-Received: by 2002:a17:90a:638e:b0:1d2:b6e3:6e9d with SMTP id f14-20020a17090a638e00b001d2b6e36e9dmr39573171pjj.74.1651000123820; Tue, 26 Apr 2022 12:08:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651000123; cv=none; d=google.com; s=arc-20160816; b=UxmIm7Kmn9oyIJ/6iEzB1Om+5Fjltaav9NsFjRXjUwZAb8Eqf6wuGmbhW2lzAfXemB 1VEhes3P4BhFafVMUCMaC/d8QGiCIq2IyCwMSsHw5ZrR+79UtIbD8AIkz7JTZvYKzOsm 3tgNSNQXVnfgOPYFB7IVJQU/UH9hsoRsJNWL6+H+CVJrkMv8RFvdk0/jF8BmFO+LUoG7 s2zITIQ6ZQeZ4RG9jGvAhyYFvKuo+KBulqhhCVoK0+DhFEfOqUkXkKF0PfP9r6VG0UE8 fB5ygpNcPAyS8qtX4nqS2+BpaSIZjuhzyExwCHwHHsIFN9F1Zguz4nd8O3HAF5Wmf99B Wm+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=6o+SI4yj6/1QuIDP6FADkDckBUMPioD3y38MqpuhkSo=; b=uwFV8vssrm/wRWhYPAlXRcybwQeUab2mJHMJ+WdLoZHrgkdXBMZFaJsHy1duBuXSZc 0cxEb7OzC1E5zAwojXrnuT7iWQPohhuke+EF9ncc74EzCeO/mdw132UoBzndXxq3pNOM WDWMw2rX5pjZ4GglIcJ+tbAHA9sj7QCbT8loq1FygsGY+IRmN33QBtKHte0PyzRZQaiG JbBI50uVj2r0EczB0XGJvENUkqIFDljY8mz6bU2uydv0KvXZ+UoCyC+K2O5qup8R7nX0 5VK907SvEFRduHxKJbLk26wHUdeJZpljgZvwnwgezdZ6kEGzO4fDuz25sSZmXK9IHKx1 2pXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel-com.20210112.gappssmtp.com header.s=20210112 header.b=P1K4PYS2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x26-20020a656aba000000b0039d6ac4b3fcsi22671293pgu.739.2022.04.26.12.08.27; Tue, 26 Apr 2022 12:08:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel-com.20210112.gappssmtp.com header.s=20210112 header.b=P1K4PYS2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244739AbiDYTAk (ORCPT + 99 others); Mon, 25 Apr 2022 15:00:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35904 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234574AbiDYTAh (ORCPT ); Mon, 25 Apr 2022 15:00:37 -0400 Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4E6DE124D83 for ; Mon, 25 Apr 2022 11:57:33 -0700 (PDT) Received: by mail-pf1-x42c.google.com with SMTP id j6so13338963pfe.13 for ; Mon, 25 Apr 2022 11:57:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6o+SI4yj6/1QuIDP6FADkDckBUMPioD3y38MqpuhkSo=; b=P1K4PYS25TS0Jd/Wx1fojI8IZ5I9h3+RLAY7MrwpwNS/97M2bik+Fzj4uCxSceTFqC By1zfFuX/dRkCdeEJYZr+gPWBQpJmKS+xMan4GPia2P7HYavXB/ti79lxVJxwM7d4LM4 aPK1RRSJ/R9VAaoblJjSjAtxHnDWIJPEq87p8VBqlTtFdSmnFgJdFtRWqMM0h49u6xc9 rhrP0KJj3lMgZHRcTs+tyLa2KjZgBcbNipfstGdWxKKlnvCyT2TaW1Syc4TU9KG3ibtj 4zHlVZKN7G/200mOGcecQer5k4ANX/oi0/zChwRmOOQUjYp8HN+wmH5LUUnSU34FuuRS Hgeg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6o+SI4yj6/1QuIDP6FADkDckBUMPioD3y38MqpuhkSo=; b=n67zavTJEjzhIpn13pxrEI+pVvn6Cs0Q8Hr0uAY1UXKUXQcSeBDfa7tvC84SWw/mUA xBFyQRYdEajmKebjJDwdYRwOekbeqBHuE/UduSwS/jOqCRCOKsl92oRY4x5xPyLzgR2E 7OlS5L3pMNx4N4Zy9L9CcBzjvnfLElNyic2zWL20mkk7m3ZlVX43RRpJGuJcF1GAzYML h4LG7w4IGo6EZoEyVgian609zu3BdtatSq34U1CEXN0Hxmh74N67dP8oEeODD86ouLcW f4OIV5XXiZc8+Y3FUpOBLxw5L6bPuXGzByilI6DLyAHkOdf4mPvSqssvkhZzBMPFpCTg +yeg== X-Gm-Message-State: AOAM531ELiVk+lYx6QQ3rWQr8NOD4nR0jvR0+Vq+Sp/w8FyNOwBprmbn 4emVuNgDuAEqcv0Ra2C7Zkk0Whq1Kv3KdIa+7smk0Q== X-Received: by 2002:a05:6a00:e14:b0:4fe:3cdb:23f with SMTP id bq20-20020a056a000e1400b004fe3cdb023fmr20248514pfb.86.1650913052859; Mon, 25 Apr 2022 11:57:32 -0700 (PDT) MIME-Version: 1.0 References: <165055518776.3745911.9346998911322224736.stgit@dwillia2-desk3.amr.corp.intel.com> <165055519869.3745911.10162603933337340370.stgit@dwillia2-desk3.amr.corp.intel.com> <20220425103307.GI2731@worktop.programming.kicks-ass.net> In-Reply-To: From: Dan Williams Date: Mon, 25 Apr 2022 11:57:21 -0700 Message-ID: Subject: Re: [PATCH v3 2/8] cxl/acpi: Add root device lockdep validation To: Peter Zijlstra Cc: Ira Weiny , linux-cxl@vger.kernel.org, Greg Kroah-Hartman , "Rafael J. Wysocki" , Ingo Molnar , Will Deacon , Waiman Long , Boqun Feng , Alison Schofield , Vishal Verma , Ben Widawsky , Jonathan Cameron , Linux NVDIMM , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 25, 2022 at 9:05 AM Dan Williams wrote: > > On Mon, Apr 25, 2022 at 3:33 AM Peter Zijlstra wrote: > > > > On Sat, Apr 23, 2022 at 10:27:52AM -0700, Dan Williams wrote: > > > > > ...so I'm going to drop it and just add a comment about the > > > expectations. As Peter said there's already a multitude of ways to > > > cause false positive / negative results with lockdep so this is just > > > one more area where one needs to be careful and understand the lock > > > context they might be overriding. > > > > One safe-guard might be to check the class you're overriding is indeed > > __no_validate__, and WARN if not. Then the unconditional reset is > > conistent. > > > > Then, if/when, that WARN ever triggers you can revisit all this. > > Ok, that does seem to need a dummy definition of lockdep_match_class() > in the CONFIG_LOCKDEP=n case, but that seems worth it to me for the > sanity check. Thankfully the comment in lockdep.h to not define a lockdep_match_class() for the CONFIG_LOCKDEP=n stopped me from going that direction.