Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp1952379rdb; Thu, 7 Dec 2023 13:34:47 -0800 (PST) X-Google-Smtp-Source: AGHT+IEdJ2/LcbXFMT0RAkxcoVfVzL2nd8BKCRJigd/QevD/KfzwhLOGFgUjA4xAm/j8F438Adps X-Received: by 2002:a17:90a:e50d:b0:286:a27a:f232 with SMTP id t13-20020a17090ae50d00b00286a27af232mr3316441pjy.5.1701984887344; Thu, 07 Dec 2023 13:34:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701984887; cv=none; d=google.com; s=arc-20160816; b=UBDBqTCGD1R2o4u/qpCfWAbX8g8Uty87jGMHo1MLE0VCzPj1i4hb39mvIFk7sXaY0j bnWaST5kRBuyx/GWtA3gQT/6deD3tlIIAVH3Q24OKxzoOBDts61MZwaDzNxh2sgFtd9T JvnbQgoJcc5UDk5nDU7CkwJdZt2+yUtHtnUc2m/GQAnZZCTaoIFaL55x+CgbUAqtFilp fyEbtSLbncDOGUYk+oC/bg92V2ufQcOli9Jpu/UgPNbG/dj6uxhhh1Zs0CCBvBcT2VKo siWLjL4lHfbgQLcxEGEyGND7eR7qm274NDEWag8qXliHa/jAbqlF3hB0gLinD7S3jPjc aS4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=Qe0P0o7yRkTD2fUSOfyBoEKZezhrInTjx41nrGxtbwk=; fh=P1Kxs4xg5tDH5DiH5xXrJ3Gq46VVOpnOixeN+GIdkUo=; b=cuYxgO8EnQFsFk5ALdU0/+cFqQxCcKENNKI/ubIUhGv6WDCJ5/9Fp2+ZrYcAZAg3mR Jdhl+0CqSbhsKu+2vNJQfIYz5vTH97tzJD/fkLJnanepIX6D8wo/YgC9gvltbVd2vjPx d8KlqVmTiqnNF4pxjcoH9N2n+sCcxO9lp9vJo5yLUEbnq6hQmCCzaCxjcY67I08KJZOz KDtovbA6M2X+vpDUfPVN5MCGv+4x0jkzBep9kZKydxoRK6WAzsjHAAgXfqH5HS06jA4u L6oVy3PIAXq9jiTxuCEjkc1ZB01L3XbqIt7hVDtfQdLyT803b6bLpw9/7iD4V+mwC1/q XQig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BFvJPaLS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id a9-20020a17090a740900b00286acacd596si443770pjg.136.2023.12.07.13.34.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 13:34:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BFvJPaLS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 8C98D806CC08; Thu, 7 Dec 2023 13:34:45 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1444102AbjLGVeb (ORCPT + 99 others); Thu, 7 Dec 2023 16:34:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40944 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233115AbjLGVeD (ORCPT ); Thu, 7 Dec 2023 16:34:03 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5C3A7526F for ; Thu, 7 Dec 2023 13:29:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701984568; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Qe0P0o7yRkTD2fUSOfyBoEKZezhrInTjx41nrGxtbwk=; b=BFvJPaLSm3nB3OtsBruBRhz0vkeeGqEQrQE35AMN7+KBq6pCxx+HneNiMJdmOgKaZJRvRO KsKWujkuhYvKqe8mD7HoOEGvYlgKo3M9ueG7XsWByG4VlXvg9G3JyyOPaEUhS7BUwSWkAW J5qu/hD36JMGsZ9PS4JmZ4MURPKkVog= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-125-Yytt9uJcMF21fHVxfcxU3A-1; Thu, 07 Dec 2023 16:29:25 -0500 X-MC-Unique: Yytt9uJcMF21fHVxfcxU3A-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id AB9E210C04E9; Thu, 7 Dec 2023 21:29:24 +0000 (UTC) Received: from [10.22.32.209] (unknown [10.22.32.209]) by smtp.corp.redhat.com (Postfix) with ESMTP id 1BA518174; Thu, 7 Dec 2023 21:29:23 +0000 (UTC) Message-ID: <3407893a-3ede-4755-9b64-c0c2c9108f77@redhat.com> Date: Thu, 7 Dec 2023 16:29:22 -0500 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 01/10] devm-helpers: introduce devm_mutex_init Content-Language: en-US From: Waiman Long To: Hans de Goede , George Stark , pavel@ucw.cz, lee@kernel.org, vadimp@nvidia.com, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, mazziesaccount@gmail.com, andy.shevchenko@gmail.com, jic23@kernel.org, peterz@infradead.org Cc: linux-leds@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kernel@salutedevices.com References: <20231204180603.470421-1-gnstark@salutedevices.com> <20231204180603.470421-2-gnstark@salutedevices.com> <81798fe5-f89e-482f-b0d0-674ccbfc3666@redhat.com> <29584eb6-fa10-4ce0-9fa3-0c409a582445@salutedevices.com> <580ecff0-b335-4cc0-b928-a99fe73741ca@redhat.com> <469f44fb-2371-4b3b-bc1c-d09ec35a5ec8@redhat.com> In-Reply-To: <469f44fb-2371-4b3b-bc1c-d09ec35a5ec8@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.5 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 07 Dec 2023 13:34:45 -0800 (PST) On 12/6/23 16:02, Waiman Long wrote: > On 12/6/23 14:55, Hans de Goede wrote: >> Hi, >> >> On 12/6/23 19:58, George Stark wrote: >>> Hello Hans >>> >>> Thanks for the review. >>> >>> On 12/6/23 18:01, Hans de Goede wrote: >>>> Hi George, >>>> >>>> On 12/4/23 19:05, George Stark wrote: >>>>> Using of devm API leads to certain order of releasing resources. >>>>> So all dependent resources which are not devm-wrapped should be >>>>> deleted >>>>> with respect to devm-release order. Mutex is one of such objects that >>>>> often is bound to other resources and has no own devm wrapping. >>>>> Since mutex_destroy() actually does nothing in non-debug builds >>>>> frequently calling mutex_destroy() is just ignored which is safe >>>>> for now >>>>> but wrong formally and can lead to a problem if mutex_destroy() is >>>>> extended so introduce devm_mutex_init(). >>>>> >>>>> Signed-off-by: George Stark >>>>> --- >>>>>    include/linux/devm-helpers.h | 18 ++++++++++++++++++ >>>>>    1 file changed, 18 insertions(+) >>>>> >>>>> diff --git a/include/linux/devm-helpers.h >>>>> b/include/linux/devm-helpers.h >>>>> index 74891802200d..2f56e476776f 100644 >>>>> --- a/include/linux/devm-helpers.h >>>>> +++ b/include/linux/devm-helpers.h >>>>> @@ -76,4 +76,22 @@ static inline int devm_work_autocancel(struct >>>>> device *dev, >>>>>        return devm_add_action(dev, devm_work_drop, w); >>>>>    } >>>>>    +static inline void devm_mutex_release(void *res) >>>>> +{ >>>>> +    mutex_destroy(res); >>>>> +} >>>>> + >>>>> +/** >>>>> + * devm_mutex_init - Resource-managed mutex initialization >>>>> + * @dev:    Device which lifetime work is bound to >>>>> + * @lock:    Pointer to a mutex >>>>> + * >>>>> + * Initialize mutex which is automatically destroyed when driver >>>>> is detached. >>>>> + */ >>>>> +static inline int devm_mutex_init(struct device *dev, struct >>>>> mutex *lock) >>>>> +{ >>>>> +    mutex_init(lock); >>>>> +    return devm_add_action_or_reset(dev, devm_mutex_release, lock); >>>>> +} >>>>> + >>>>>    #endif >>>> mutex_destroy() only actually does anything if CONFIG_DEBUG_MUTEXES >>>> is set, otherwise it is an empty inline-stub. >>>> >>>> Adding a devres resource to the device just to call an empty inline >>>> stub which is a no-op seems like a waste of resources. IMHO it >>>> would be better to change this to: >>>> >>>> static inline int devm_mutex_init(struct device *dev, struct mutex >>>> *lock) >>>> { >>>>      mutex_init(lock); >>>> #ifdef CONFIG_DEBUG_MUTEXES >>>>      return devm_add_action_or_reset(dev, devm_mutex_release, lock); >>>> #else >>>>      return 0; >>>> #endif >>>> } >>>> >>>> To avoid the unnecessary devres allocation when >>>> CONFIG_DEBUG_MUTEXES is not set. >>> Honestly saying I don't like unnecessary devres allocation either >>> but the proposed approach has its own price: >>> >>> 1) we'll have more than one place with branching if mutex_destroy is >>> empty or not using  indirect condition. If suddenly mutex_destroy is >>> extended for non-debug code (in upstream branch or e.g. by someone >>> for local debug) than there'll be a problem. >>> >>> 2) If mutex_destroy is empty or not depends on CONFIG_PREEMPT_RT >>> option too. When CONFIG_PREEMPT_RT is on mutex_destroy is always empty. >>> >>> As I see it only the mutex interface (mutex.h) has to say definitely >>> if mutex_destroy must be called. Probably we could add some define >>> to include/linux/mutex.h,like IS_MUTEX_DESTROY_REQUIRED and declare >>> it near mutex_destroy definition itself. >> That (a  IS_MUTEX_DESTROY_REQUIRED define) is an interesting idea. >> Lets see for v3 if the mutex maintainers will accept that and if not >> then I guess we will just need to live with the unnecessary devres >> allocation. > > The purpose of calling mutex_destroy() is to mark a mutex as being > destroyed so that any subsequent call to mutex_lock/unlock will cause > a warning to be printed when CONFIG_DEBUG_MUTEXES is defined. I would > not say that mutex_destroy() is required. Rather it is a nice to have > for catching programming error. OTOH, one thing that we can probably do in mutex.h is something like diff --git a/include/linux/mutex.h b/include/linux/mutex.h index a33aa9eb9fc3..7db7862de3f1 100644 --- a/include/linux/mutex.h +++ b/include/linux/mutex.h @@ -83,6 +83,9 @@ struct mutex {  extern void mutex_destroy(struct mutex *lock); +/* mutex_destroy() is a real function, not a NOP */ +#define mutex_destroy  mutex_destroy +  #else ---------------------------------------- Now in some devm files, you can use the absense/presence of mutex_destroy macro to decide on what to do. Cheers, Longman