Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp1620897iob; Fri, 29 Apr 2022 09:07:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyocZlXvPhZBCXpa9LyF/PYmXVjaJgaFD6MIB4VdtWggVAoTt4G9PfsYa5zY8En/VS72R6q X-Received: by 2002:a05:6512:1320:b0:44a:ee57:23c6 with SMTP id x32-20020a056512132000b0044aee5723c6mr28470624lfu.9.1651248450326; Fri, 29 Apr 2022 09:07:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651248450; cv=none; d=google.com; s=arc-20160816; b=M0R+EDBfRjl3xhGnpUn5rZlExBZg5sb84lhFCWGkiNBRZVrxvFtiCoq5M6PDHxC6KO MJlrBeL7cKEbYGaf3DGLYuaFQDa5hm7Vj72ilyQLpvmHxFhcsR1x+yX+s0xPYqXbYg7H bd2++Ee8S5VL+pbmJy+I/MBIcWEmV6d0y3XP5WIhfVA3DLrT96dBhZuthhlCoK3MTTM0 7wQVAoLXfvJdS/z8KmzudXnTx5USBhro3wjsqwvDzeQh6mfZ9uyc1WTduiGkn8fP8ZCT YCR2whK+hBf7RcZFj5z1YJ/F7GJsanGwL9yhNH8332/plX2TEyzW5h8xP5hNERGHIgNC s+Ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=wmvnuAXDDTpEHZ4wb3aAkiV4QzxMQFgH8HKcgLemBrU=; b=E0374GuFLGjCHIB8x6IGzDaqS1mI8HrOOyDAmASZENrID48VGYOZ1Lpb7kQ6HWKpVW bXs3UVNmDT9R+KzDpG8rOIaE6vi9ftL9Bi9usciKZ/BSRDpnemrLViPrbCP9y0uw65/Y fEt1PEok/Q1y9hoL/2AjL5GEXy2apu8RgABTLdj11tbPkk033hVFn+AeuqttbvDKBy6X 93+nT5hSX8G8MVB5IvbpM0xXNak+9sICLwpWKlAYz9CjcDA/gKvLO5XU0sdCDDSGD9hB qt5cZceaGBTJ/bpxG0BJtoaiGv7vmgQcc852KS3i9VYPsA2CwwsGGpdS0hoaJMu7PGWR fGnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m6-20020a2ea886000000b0024f0b503ed3si2098414ljq.469.2022.04.29.09.07.01; Fri, 29 Apr 2022 09:07:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234821AbiD1K32 (ORCPT + 99 others); Thu, 28 Apr 2022 06:29:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35686 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239808AbiD1K2r (ORCPT ); Thu, 28 Apr 2022 06:28:47 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 29DFC27B2C for ; Thu, 28 Apr 2022 03:25:32 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C334B1474; Thu, 28 Apr 2022 03:25:31 -0700 (PDT) Received: from bogus (unknown [10.57.11.83]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9729B3F774; Thu, 28 Apr 2022 03:25:29 -0700 (PDT) Date: Thu, 28 Apr 2022 11:25:24 +0100 From: Sudeep Holla To: Cristian Marussi Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, james.quinlan@broadcom.com, Jonathan.Cameron@huawei.com, f.fainelli@gmail.com, etienne.carriere@linaro.org, vincent.guittot@linaro.org, souvik.chakravarty@arm.com Subject: Re: [PATCH 02/22] firmware: arm_scmi: Make protocols init fail on basic errors Message-ID: <20220428102524.s37xg2ytjkcgkq3e@bogus> References: <20220330150551.2573938-1-cristian.marussi@arm.com> <20220330150551.2573938-3-cristian.marussi@arm.com> <20220426153528.bhskpchq2huhjtjk@bogus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 26, 2022 at 05:25:28PM +0100, Cristian Marussi wrote: > On Tue, Apr 26, 2022 at 04:35:28PM +0100, Sudeep Holla wrote: > > On Wed, Mar 30, 2022 at 04:05:31PM +0100, Cristian Marussi wrote: > > > Bail out of protocol initialization routine early when basic information > > > about protocol version and attributes could not be retrieved: failing to > > > act this way can lead to a successfully initialized SCMI protocol which > > > is in fact not fully functional. > > > > > > Signed-off-by: Cristian Marussi > > > --- > > > drivers/firmware/arm_scmi/base.c | 5 ++++- > > > drivers/firmware/arm_scmi/clock.c | 8 ++++++-- > > > drivers/firmware/arm_scmi/perf.c | 10 +++++++--- > > > drivers/firmware/arm_scmi/power.c | 10 +++++++--- > > > drivers/firmware/arm_scmi/reset.c | 10 +++++++--- > > > drivers/firmware/arm_scmi/sensors.c | 4 +++- > > > drivers/firmware/arm_scmi/system.c | 5 ++++- > > > 7 files changed, 38 insertions(+), 14 deletions(-) > > > > > Hi Sudeep, > > thanks for the review first of all... > > > > @@ -370,7 +372,9 @@ static int scmi_clock_protocol_init(const struct scmi_protocol_handle *ph) > > > if (!cinfo) > > > return -ENOMEM; > > > > > > - scmi_clock_protocol_attributes_get(ph, cinfo); > > > + ret = scmi_clock_protocol_attributes_get(ph, cinfo); > > > + if (ret) > > > + return ret; > > > > Does this result in removal of scmi_dev associated with devm_* calls ? > > Otherwise we may need to free the allocated buffers ? I am not sure > > if the dev here is individual scmi_dev or the platform scmi device. > > I assume latter and it is unlikely to be removed/freed with the error in > > the above path. > > > > Similarly in couple of other instances/protocols. > > So, ph->dev used in the above devm_ is indeed the arm_scmi platform device > and I was *almost* gonna tell you 'Good catch', BUT then, rereading my own > code (O_o), I saw/remembered that when a protocol instance is initialized on > it first usage, there is indeed a devres_group internally managed by > the SCMI core, so that: > > scmi_get_protocol_instance() > > @first_protocol_usage (refcount pi->users): > > --> scmi_get_protocol() // just in case was LKM proto > --> scmi_alloc_init_protocol_instance() > gid = devres_open_group(handle->dev, NULL, GFP_KERNEL); > > ret = pi->proto->instance_init(&pi->ph); > ====>>> i.e. scmi_clock_protocol_init(ph) > if (ret) > goto clean; > ..... > > clean: > devres_release_group(handle->dev, gid); > > > So basically all that happens at initialization time in scmi_clock_protocol_init, > BUT also everything that happens implicitly inside scmi_alloc_init_protocol_instance > during that protocol initialization (like the events registration) is undone on > failure transparently by the SCMI core init/free management functions > (via devres_ groups...) > > All of the above is because each protocol is initialized only once on > its first usage, no matter how many SCMI driver users (and scmi_devs) are > using it...only in case (unsupported) we have multiple SCMI instances > (platforms) there will be one instance of protocol initialized per SCMI > server. > > ... having said that, now I'll go and double check (test) this behaviour since I > even had forgot about having implemented this kind of design :P > Makes sense, thanks for the detailed explanation. I had totally forgotten how devres_group works ????, my bad. -- Regards, Sudeep