Message ID | 20231214173614.2820929-1-gnstark@salutedevices.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:3b04:b0:fb:cd0c:d3e with SMTP id c4csp8719283dys; Thu, 14 Dec 2023 09:37:07 -0800 (PST) X-Google-Smtp-Source: AGHT+IG89m4AOEAdctod34ADMoCR0QVRJS6NW1FoKX8jcwtR3wPQe92fi0h/QkgAQD4/YDVnAt5X X-Received: by 2002:a05:6a20:cf49:b0:18b:b170:9a4e with SMTP id hz9-20020a056a20cf4900b0018bb1709a4emr4910754pzb.11.1702575426833; Thu, 14 Dec 2023 09:37:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702575426; cv=none; d=google.com; s=arc-20160816; b=vIdcu6P6RwlHgNQ6lIHykIEiMmp3xvFMs+7W8eX21jxMp+CPzCFDGN9SN6E37bU0X2 17Kwa1/4IhRCtWMcd/lc05F6BSWywO/GsG7LK9wzQgmt2zGCa+8FRuqpDSZp4y0+QGyE vSX3SrbMp1kJUMIja9KeIg/NNfdwPav77JYgYRFbuLpt5A+PqoKleJKIU00OOvxiiXqL PXFTgv+QD7KhnIj31r5sUUwp27UBUF2q8TgNbFat8mx/PiLNPFafASZ14m1RWwkjKC0l gBCI3QpSrBVFvd/AUsm1ad4r3kb0labu4lNTOd5qgVkP5rcZ2aI8WDa+/Fh7ZihCopEC 4k3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-filter; bh=FF/GGxCAQiFT7arMrSkuCqDAuMbQap2zzePwvbnW2V0=; fh=VGV6ajQ72e9w8REvYqgUr7SYaKNgFpS3GtVmljO5VrE=; b=cBusfFY2ByihnUXwXVjj+x+UjT/aApk+qVW/Id17dz8s6/LoE0QWKLpApv1iaOvpvs kt6qmmTWcu6OokTnzVSEUHE2fWtAS3bCh5ppzCI6cZeAgkHv+4BG3LKverSsnChiFDqw /XBm2WydyLELZOV2oXUaTLGJSRCnE6FnrMt+kdops4WsHsO0K/uijGy7hvhy/CaTYEyv y6r0DSk5+QT+ONiCYw1HTp2Msxfc+v4Ei6qo5h1TiVTcUnuUR53xvdMzmON4RybfXNCZ /EPSffWpBMPq3j+R7VXytjkAIqRBlUNbQy/87B0g4QfwaMjUxa+V9L4B5zVjT0Aa2bCN G9UQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@salutedevices.com header.s=mail header.b=GhGjBEAF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=salutedevices.com Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id j4-20020a056a00234400b006cec976aba9si11590240pfj.323.2023.12.14.09.37.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Dec 2023 09:37:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@salutedevices.com header.s=mail header.b=GhGjBEAF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=salutedevices.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 47E7C8024CD0; Thu, 14 Dec 2023 09:37:01 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1444199AbjLNRgj (ORCPT <rfc822;dexuan.linux@gmail.com> + 99 others); Thu, 14 Dec 2023 12:36:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230372AbjLNRgV (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 14 Dec 2023 12:36:21 -0500 Received: from mx1.sberdevices.ru (mx2.sberdevices.ru [45.89.224.132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DA5D0CF; Thu, 14 Dec 2023 09:36:25 -0800 (PST) Received: from p-infra-ksmg-sc-msk02 (localhost [127.0.0.1]) by mx1.sberdevices.ru (Postfix) with ESMTP id 5D93B12000A; Thu, 14 Dec 2023 20:36:24 +0300 (MSK) DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.sberdevices.ru 5D93B12000A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=salutedevices.com; s=mail; t=1702575384; bh=FF/GGxCAQiFT7arMrSkuCqDAuMbQap2zzePwvbnW2V0=; h=From:To:Subject:Date:Message-ID:MIME-Version:Content-Type:From; b=GhGjBEAFfoGiNP+ktkmQVcfzKTI392HOS4Qs7+mmOSFpj8bGuA79iWxZUwTv9nyMh sNpAHk27qFX0dwuTI5BORL94+mIyqTKROgXFJ2CPaHJ4bXTpFAZEjjoASM1JMNTXbh 3THcDPSVy8VFD4mnzC1C8eFC8Ii/3eeiuVWYGgcg1UHOcM2Ve2NJqg7I9ZwVcRbUtn kDc5pede4ba6ZMbbpgC7gRvfM9p1VSENJJXcHLtY/H9Dt+/SXGFeQucOt5ELXPwcXz xBe0Asub0gS+b/VIZxNMG3TXSonYWblQ0TQw7QRc2zf30qHv4zdBKwe61vSULf295N gd4UDmhnLRklg== Received: from smtp.sberdevices.ru (p-i-exch-sc-m01.sberdevices.ru [172.16.192.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.sberdevices.ru (Postfix) with ESMTPS; Thu, 14 Dec 2023 20:36:24 +0300 (MSK) Received: from localhost.localdomain (100.64.160.123) by p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Thu, 14 Dec 2023 20:36:23 +0300 From: George Stark <gnstark@salutedevices.com> To: <andy.shevchenko@gmail.com>, <pavel@ucw.cz>, <lee@kernel.org>, <vadimp@nvidia.com>, <mpe@ellerman.id.au>, <npiggin@gmail.com>, <christophe.leroy@csgroup.eu>, <hdegoede@redhat.com>, <mazziesaccount@gmail.com>, <peterz@infradead.org>, <mingo@redhat.com>, <will@kernel.org>, <longman@redhat.com>, <boqun.feng@gmail.com>, <nikitos.tr@gmail.com> CC: <linux-leds@vger.kernel.org>, <linux-kernel@vger.kernel.org>, <linuxppc-dev@lists.ozlabs.org>, <kernel@salutedevices.com>, George Stark <gnstark@salutedevices.com> Subject: [PATCH v4 00/10] devm_led_classdev_register() usage problem Date: Thu, 14 Dec 2023 20:36:04 +0300 Message-ID: <20231214173614.2820929-1-gnstark@salutedevices.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [100.64.160.123] X-ClientProxiedBy: p-i-exch-sc-m02.sberdevices.ru (172.16.192.103) To p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) X-KSMG-Rule-ID: 10 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Lua-Profiles: 182125 [Dec 14 2023] X-KSMG-AntiSpam-Version: 6.1.0.3 X-KSMG-AntiSpam-Envelope-From: gnstark@salutedevices.com X-KSMG-AntiSpam-Rate: 0 X-KSMG-AntiSpam-Status: not_detected X-KSMG-AntiSpam-Method: none X-KSMG-AntiSpam-Auth: dkim=none X-KSMG-AntiSpam-Info: LuaCore: 7 0.3.7 6d6bf5bd8eea7373134f756a2fd73e9456bb7d1a, {Tracking_uf_ne_domains}, {Tracking_urls_end_caps}, {Tracking_from_domain_doesnt_match_to}, salutedevices.com:7.1.1;smtp.sberdevices.ru:5.0.1,7.1.1;d41d8cd98f00b204e9800998ecf8427e.com:7.1.1;lore.kernel.org:7.1.1;100.64.160.123:7.1.2;127.0.0.199:7.1.2, FromAlignment: s, ApMailHostAddress: 100.64.160.123 X-MS-Exchange-Organization-SCL: -1 X-KSMG-AntiSpam-Interceptor-Info: scan successful X-KSMG-AntiPhishing: Clean, bases: 2023/12/14 14:24:00 X-KSMG-LinksScanning: Clean, bases: 2023/12/14 14:25:00 X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 2.0.1.6960, bases: 2023/12/14 10:50:00 #22693095 X-KSMG-AntiVirus-Status: Clean, skipped X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Thu, 14 Dec 2023 09:37:01 -0800 (PST) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1785279730491326115 X-GMAIL-MSGID: 1785279730491326115 |
Series |
devm_led_classdev_register() usage problem
|
|
Message
George Stark
Dec. 14, 2023, 5:36 p.m. UTC
This patch series fixes the problem of devm_led_classdev_register misusing. The basic problem is described in [1]. Shortly when devm_led_classdev_register() is used then led_classdev_unregister() called after driver's remove() callback. led_classdev_unregister() calls driver's brightness_set callback and that callback may use resources which were destroyed already in driver's remove(). After discussion with maintainers [2] [3] we decided: 1) don't touch led subsytem core code and don't remove led_set_brightness() from it but fix drivers 2) don't use devm_led_classdev_unregister So the solution is to use devm wrappers for all resources driver's brightness_set() depends on. And introduce dedicated devm wrapper for mutex as it's often used resource. [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 Changelog: v1->v2: revise patch series completely v2->v3: locking: add define if mutex_destroy() is not an empty function new patch, discussed here [8] devm-helpers: introduce devm_mutex_init previous version [4] - revise code based on mutex_destroy define - update commit message - update devm_mutex_init()'s description leds: aw2013: unlock mutex before destroying it previous version [5] - make this patch first in the series - add tags Fixes and RvB by Andy leds: aw2013: use devm API to cleanup module's resources previous version [6] - make aw2013_chip_disable_action()'s body oneline - don't shadow devm_mutex_init() return code leds: aw200xx: use devm API to cleanup module's resources previous version [7] - make aw200xx_*_action()'s bodies oneline - don't shadow devm_mutex_init() return code leds: lm3532: use devm API to cleanup module's resources leds: nic78bx: use devm API to cleanup module's resources leds: mlxreg: use devm_mutex_init for mutex initializtion leds: an30259a: use devm_mutext_init for mutext initialization leds: powernv: add LED_RETAIN_AT_SHUTDOWN flag for leds - those pathes were planned but not sent in the series #2 due to mail server problem on my side. I revised them according to the comments. v3->v4: locking: introduce devm_mutex_init new patch - move devm_mutex_init implementation completely from devm-helpers.h to mutex.h locking: add define if mutex_destroy() is not an empty function drop the patch [9] devm-helpers: introduce devm_mutex_init drop the patch [10] leds: aw2013: use devm API to cleanup module's resources - add tag Tested-by: Nikita Travkin <nikita@trvn.ru> [4] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#mf500af0eda2a9ffc95594607dbe4cb64f2e3c9a8 [5] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#mc92df4fb4f7d4187fb01cc1144acfa5fb5230dd2 [6] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#m300df89710c43cc2ab598baa16c68dd0a0d7d681 [7] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#m8e5c65e0c6b137c91fa00bb9320ad581164d1d0b [8] https://lore.kernel.org/lkml/377e4437-7051-4d88-ae68-1460bcd692e1@redhat.com/T/#m5f84a4a2f387d49678783e652b9e658e02c27450 [9] https://lore.kernel.org/lkml/20231213223020.2713164-1-gnstark@salutedevices.com/T/#m19ad1fc04c560012c1e27418e3156d0c9306dd84 [10] https://lore.kernel.org/lkml/20231213223020.2713164-1-gnstark@salutedevices.com/T/#m63126025f5d1bdcef69bcad50f2e58274d42e2d7 George Stark (10): leds: aw2013: unlock mutex before destroying it locking: introduce devm_mutex_init leds: aw2013: use devm API to cleanup module's resources leds: aw200xx: use devm API to cleanup module's resources leds: lp3952: use devm API to cleanup module's resources leds: lm3532: use devm API to cleanup module's resources leds: nic78bx: use devm API to cleanup module's resources leds: mlxreg: use devm_mutex_init for mutex initializtion leds: an30259a: use devm_mutext_init for mutext initialization leds: powernv: use LED_RETAIN_AT_SHUTDOWN flag for leds drivers/leds/leds-an30259a.c | 15 +++++---------- drivers/leds/leds-aw200xx.c | 33 ++++++++++++++++++++++----------- drivers/leds/leds-aw2013.c | 27 +++++++++++++++------------ drivers/leds/leds-lm3532.c | 30 ++++++++++++++++++------------ drivers/leds/leds-lp3952.c | 21 +++++++++++---------- drivers/leds/leds-mlxreg.c | 17 ++++++----------- drivers/leds/leds-nic78bx.c | 25 +++++++++++++------------ drivers/leds/leds-powernv.c | 23 ++++++++--------------- include/linux/mutex.h | 23 +++++++++++++++++++++++ kernel/locking/mutex-debug.c | 22 ++++++++++++++++++++++ 10 files changed, 143 insertions(+), 93 deletions(-)
Comments
On Thu, 14 Dec 2023, George Stark wrote: > This patch series fixes the problem of devm_led_classdev_register misusing. > > The basic problem is described in [1]. Shortly when devm_led_classdev_register() > is used then led_classdev_unregister() called after driver's remove() callback. > led_classdev_unregister() calls driver's brightness_set callback and that callback > may use resources which were destroyed already in driver's remove(). > > After discussion with maintainers [2] [3] we decided: > 1) don't touch led subsytem core code and don't remove led_set_brightness() from it > but fix drivers > 2) don't use devm_led_classdev_unregister > > So the solution is to use devm wrappers for all resources > driver's brightness_set() depends on. And introduce dedicated devm wrapper > for mutex as it's often used resource. > > [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ > [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f > [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 > > Changelog: > v1->v2: > revise patch series completely > > v2->v3: > locking: add define if mutex_destroy() is not an empty function > new patch, discussed here [8] > > devm-helpers: introduce devm_mutex_init > previous version [4] > - revise code based on mutex_destroy define > - update commit message > - update devm_mutex_init()'s description > > leds: aw2013: unlock mutex before destroying it > previous version [5] > - make this patch first in the series > - add tags Fixes and RvB by Andy > > leds: aw2013: use devm API to cleanup module's resources > previous version [6] > - make aw2013_chip_disable_action()'s body oneline > - don't shadow devm_mutex_init() return code > > leds: aw200xx: use devm API to cleanup module's resources > previous version [7] > - make aw200xx_*_action()'s bodies oneline > - don't shadow devm_mutex_init() return code > > leds: lm3532: use devm API to cleanup module's resources > leds: nic78bx: use devm API to cleanup module's resources > leds: mlxreg: use devm_mutex_init for mutex initializtion > leds: an30259a: use devm_mutext_init for mutext initialization > leds: powernv: add LED_RETAIN_AT_SHUTDOWN flag for leds > - those pathes were planned but not sent in the series #2 due to mail server > problem on my side. I revised them according to the comments. > > v3->v4: > locking: introduce devm_mutex_init > new patch > - move devm_mutex_init implementation completely from devm-helpers.h to mutex.h > > locking: add define if mutex_destroy() is not an empty function > drop the patch [9] > > devm-helpers: introduce devm_mutex_init > drop the patch [10] > > leds: aw2013: use devm API to cleanup module's resources > - add tag Tested-by: Nikita Travkin <nikita@trvn.ru> > > [4] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#mf500af0eda2a9ffc95594607dbe4cb64f2e3c9a8 > [5] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#mc92df4fb4f7d4187fb01cc1144acfa5fb5230dd2 > [6] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#m300df89710c43cc2ab598baa16c68dd0a0d7d681 > [7] https://lore.kernel.org/lkml/20231204180603.470421-1-gnstark@salutedevices.com/T/#m8e5c65e0c6b137c91fa00bb9320ad581164d1d0b > [8] https://lore.kernel.org/lkml/377e4437-7051-4d88-ae68-1460bcd692e1@redhat.com/T/#m5f84a4a2f387d49678783e652b9e658e02c27450 > [9] https://lore.kernel.org/lkml/20231213223020.2713164-1-gnstark@salutedevices.com/T/#m19ad1fc04c560012c1e27418e3156d0c9306dd84 > [10] https://lore.kernel.org/lkml/20231213223020.2713164-1-gnstark@salutedevices.com/T/#m63126025f5d1bdcef69bcad50f2e58274d42e2d7 > > George Stark (10): > leds: aw2013: unlock mutex before destroying it > locking: introduce devm_mutex_init > leds: aw2013: use devm API to cleanup module's resources > leds: aw200xx: use devm API to cleanup module's resources > leds: lp3952: use devm API to cleanup module's resources > leds: lm3532: use devm API to cleanup module's resources > leds: nic78bx: use devm API to cleanup module's resources > leds: mlxreg: use devm_mutex_init for mutex initializtion > leds: an30259a: use devm_mutext_init for mutext initialization > leds: powernv: use LED_RETAIN_AT_SHUTDOWN flag for leds > > drivers/leds/leds-an30259a.c | 15 +++++---------- > drivers/leds/leds-aw200xx.c | 33 ++++++++++++++++++++++----------- > drivers/leds/leds-aw2013.c | 27 +++++++++++++++------------ > drivers/leds/leds-lm3532.c | 30 ++++++++++++++++++------------ > drivers/leds/leds-lp3952.c | 21 +++++++++++---------- > drivers/leds/leds-mlxreg.c | 17 ++++++----------- > drivers/leds/leds-nic78bx.c | 25 +++++++++++++------------ > drivers/leds/leds-powernv.c | 23 ++++++++--------------- FYI: I'll conduct my review once the locking side is settled. > include/linux/mutex.h | 23 +++++++++++++++++++++++ > kernel/locking/mutex-debug.c | 22 ++++++++++++++++++++++ > 10 files changed, 143 insertions(+), 93 deletions(-) > > -- > 2.25.1 > >
On Thu, Dec 21, 2023 at 03:11:11PM +0000, Lee Jones wrote: > On Thu, 14 Dec 2023, George Stark wrote: > > > This patch series fixes the problem of devm_led_classdev_register misusing. > > > > The basic problem is described in [1]. Shortly when devm_led_classdev_register() > > is used then led_classdev_unregister() called after driver's remove() callback. > > led_classdev_unregister() calls driver's brightness_set callback and that callback > > may use resources which were destroyed already in driver's remove(). > > > > After discussion with maintainers [2] [3] we decided: > > 1) don't touch led subsytem core code and don't remove led_set_brightness() from it > > but fix drivers > > 2) don't use devm_led_classdev_unregister > > > > So the solution is to use devm wrappers for all resources > > driver's brightness_set() depends on. And introduce dedicated devm wrapper > > for mutex as it's often used resource. > > > > [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ > > [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f > > [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 .. > FYI: I'll conduct my review once the locking side is settled. To reduce burden can you apply the first one? It's a fix.
On Thu, Dec 14, 2023 at 08:36:04PM +0300, George Stark wrote: > This patch series fixes the problem of devm_led_classdev_register misusing. > > The basic problem is described in [1]. Shortly when devm_led_classdev_register() > is used then led_classdev_unregister() called after driver's remove() callback. > led_classdev_unregister() calls driver's brightness_set callback and that callback > may use resources which were destroyed already in driver's remove(). > > After discussion with maintainers [2] [3] we decided: > 1) don't touch led subsytem core code and don't remove led_set_brightness() from it > but fix drivers > 2) don't use devm_led_classdev_unregister > > So the solution is to use devm wrappers for all resources > driver's brightness_set() depends on. And introduce dedicated devm wrapper > for mutex as it's often used resource. > > [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ > [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f > [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 Are you going to send an updated version with the amended second patch?
Hello Andy. I haven't lose hope for the devm_mutex thing and keep pinging those guys from time to time. Sure I can single out the fix-only patch I'll do it tomorrow. On 2/9/24 20:11, Andy Shevchenko wrote: > On Thu, Dec 21, 2023 at 03:11:11PM +0000, Lee Jones wrote: >> On Thu, 14 Dec 2023, George Stark wrote: >> >>> This patch series fixes the problem of devm_led_classdev_register misusing. >>> >>> The basic problem is described in [1]. Shortly when devm_led_classdev_register() >>> is used then led_classdev_unregister() called after driver's remove() callback. >>> led_classdev_unregister() calls driver's brightness_set callback and that callback >>> may use resources which were destroyed already in driver's remove(). >>> >>> After discussion with maintainers [2] [3] we decided: >>> 1) don't touch led subsytem core code and don't remove led_set_brightness() from it >>> but fix drivers >>> 2) don't use devm_led_classdev_unregister >>> >>> So the solution is to use devm wrappers for all resources >>> driver's brightness_set() depends on. And introduce dedicated devm wrapper >>> for mutex as it's often used resource. >>> >>> [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ >>> [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f >>> [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 > > ... > >> FYI: I'll conduct my review once the locking side is settled. > > To reduce burden can you apply the first one? It's a fix. >
On Mon, Feb 12, 2024 at 1:52 AM George Stark <gnstark@salutedevicescom> wrote: > I haven't lose hope for the devm_mutex thing and keep pinging those guys > from time to time. I don't understand. According to v4 thread Christophe proposed on how the patch should look like. What you need is to incorporate an updated version into your series. Am I wrong? > Sure I can single out the fix-only patch I'll do it tomorrow. I believe it can be handled without issuing it separately. `b4` tool is capable of selective choices. It was rather Q to Lee if he can/want to apply it right away. > On 2/9/24 20:11, Andy Shevchenko wrote: > > On Thu, Dec 21, 2023 at 03:11:11PM +0000, Lee Jones wrote: > >> On Thu, 14 Dec 2023, George Stark wrote: > >> > >>> This patch series fixes the problem of devm_led_classdev_register misusing. > >>> > >>> The basic problem is described in [1]. Shortly when devm_led_classdev_register() > >>> is used then led_classdev_unregister() called after driver's remove() callback. > >>> led_classdev_unregister() calls driver's brightness_set callback and that callback > >>> may use resources which were destroyed already in driver's remove(). > >>> > >>> After discussion with maintainers [2] [3] we decided: > >>> 1) don't touch led subsytem core code and don't remove led_set_brightness() from it > >>> but fix drivers > >>> 2) don't use devm_led_classdev_unregister > >>> > >>> So the solution is to use devm wrappers for all resources > >>> driver's brightness_set() depends on. And introduce dedicated devm wrapper > >>> for mutex as it's often used resource. > >>> > >>> [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ > >>> [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f > >>> [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 > > > > ... > > > >> FYI: I'll conduct my review once the locking side is settled. > > > > To reduce burden can you apply the first one? It's a fix.
Hello Andy On 2/12/24 12:53, Andy Shevchenko wrote: > On Mon, Feb 12, 2024 at 1:52 AM George Stark <gnstark@salutedevices.com> wrote: >> I haven't lose hope for the devm_mutex thing and keep pinging those guys >> from time to time. > > I don't understand. According to v4 thread Christophe proposed on how > the patch should look like. What you need is to incorporate an updated > version into your series. Am I wrong? We agreed that the effective way of implementing devm_mutex_init() is in mutex.h using forward declaration of struct device. The only inconvenient thing is that in the mutex.h mutex_init() declared after mutex_destroy() so we'll have to use condition #ifdef CONFIG_DEBUG_MUTEXES twice. Waiman Long proposed great cleanup patch [1] that eliminates the need of doubling #ifdef. That patch was reviewed a bit but it's still unapplied (near 2 months). I'm still trying to contact mutex.h guys but there're no any feedback yet. [1] https://lore.kernel.org/lkml/20231216013656.1382213-2-longman@redhat.com/T/#m795b230d662c1debb28463ad721ddba5b384340a > >> Sure I can single out the fix-only patch I'll do it tomorrow. > > I believe it can be handled without issuing it separately. `b4` tool > is capable of selective choices. It was rather Q to Lee if he can/want > to apply it right away. Oh ok, that would be great. > >> On 2/9/24 20:11, Andy Shevchenko wrote: >>> On Thu, Dec 21, 2023 at 03:11:11PM +0000, Lee Jones wrote: >>>> On Thu, 14 Dec 2023, George Stark wrote: >>>> >>>>> This patch series fixes the problem of devm_led_classdev_register misusing. >>>>> >>>>> The basic problem is described in [1]. Shortly when devm_led_classdev_register() >>>>> is used then led_classdev_unregister() called after driver's remove() callback. >>>>> led_classdev_unregister() calls driver's brightness_set callback and that callback >>>>> may use resources which were destroyed already in driver's remove(). >>>>> >>>>> After discussion with maintainers [2] [3] we decided: >>>>> 1) don't touch led subsytem core code and don't remove led_set_brightness() from it >>>>> but fix drivers >>>>> 2) don't use devm_led_classdev_unregister >>>>> >>>>> So the solution is to use devm wrappers for all resources >>>>> driver's brightness_set() depends on. And introduce dedicated devm wrapper >>>>> for mutex as it's often used resource. >>>>> >>>>> [1] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/ >>>>> [2] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mc132b9b350fa51931b4fcfe14705d9f06e91421f >>>>> [3] https://lore.kernel.org/lkml/8704539b-ed3b-44e6-aa82-586e2f895e2b@salutedevices.com/T/#mdbf572a85c33f869a553caf986b6228bb65c8383 >>> >>> ... >>> >>>> FYI: I'll conduct my review once the locking side is settled. >>> >>> To reduce burden can you apply the first one? It's a fix. >
On Tue, Feb 13, 2024 at 2:14 AM George Stark <gnstark@salutedevicescom> wrote: > > Hello Andy > > On 2/12/24 12:53, Andy Shevchenko wrote: > > On Mon, Feb 12, 2024 at 1:52 AM George Stark <gnstark@salutedevices.com> wrote: > >> I haven't lose hope for the devm_mutex thing and keep pinging those guys > >> from time to time. > > > > I don't understand. According to v4 thread Christophe proposed on how > > the patch should look like. What you need is to incorporate an updated > > version into your series. Am I wrong? > > We agreed that the effective way of implementing devm_mutex_init() is in > mutex.h using forward declaration of struct device. > The only inconvenient thing is that in the mutex.h mutex_init() declared > after mutex_destroy() so we'll have to use condition #ifdef > CONFIG_DEBUG_MUTEXES twice. Waiman Long proposed great cleanup patch [1] > that eliminates the need of doubling #ifdef. That patch was reviewed a > bit but it's still unapplied (near 2 months). I'm still trying to > contact mutex.h guys but there're no any feedback yet. So the roadmap (as I see it) is: - convince Lee to take the first patch while waiting for the others - incorporate the above mentioned patch into your series - make an ultimatum in case there is no reaction to get it applied on deadline, let's say within next cycle (if Lee is okay with a such, but this is normal practice when some maintainers are non-responsive) P.S. In case Lee doesn't want to take the first patch separately (let's say this week), send a new version with amended patches included. > [1] > https://lore.kernel.org/lkml/20231216013656.1382213-2-longman@redhat.com/T/#m795b230d662c1debb28463ad721ddba5b384340a
Hello Andy On 2/13/24 13:55, Andy Shevchenko wrote: > On Tue, Feb 13, 2024 at 2:14 AM George Stark <gnstark@salutedevices.com> wrote: >> >> Hello Andy >> >> On 2/12/24 12:53, Andy Shevchenko wrote: >>> On Mon, Feb 12, 2024 at 1:52 AM George Stark <gnstark@salutedevices.com> wrote: >>>> I haven't lose hope for the devm_mutex thing and keep pinging those guys >>>> from time to time. >>> >>> I don't understand. According to v4 thread Christophe proposed on how >>> the patch should look like. What you need is to incorporate an updated >>> version into your series. Am I wrong? >> >> We agreed that the effective way of implementing devm_mutex_init() is in >> mutex.h using forward declaration of struct device. >> The only inconvenient thing is that in the mutex.h mutex_init() declared >> after mutex_destroy() so we'll have to use condition #ifdef >> CONFIG_DEBUG_MUTEXES twice. Waiman Long proposed great cleanup patch [1] >> that eliminates the need of doubling #ifdef. That patch was reviewed a >> bit but it's still unapplied (near 2 months). I'm still trying to >> contact mutex.h guys but there're no any feedback yet. > > So the roadmap (as I see it) is: > - convince Lee to take the first patch while waiting for the others > - incorporate the above mentioned patch into your series > - make an ultimatum in case there is no reaction to get it applied on > deadline, let's say within next cycle (if Lee is okay with a such, but > this is normal practice when some maintainers are non-responsive) Well, it was interesting to know that there is such a practice. Waiman Long has just updated his patches with mutex.h cleanup [1] so I think we can wait for that series to be merged than I'll prepare may patchseries with or w\o the first patch. [1] https://lore.kernel.org/all/20240213031656.1375951-4-longman@redhat.com/T/ > > P.S. In case Lee doesn't want to take the first patch separately > (let's say this week), send a new version with amended patches > included. Ok > >> [1] >> https://lore.kernel.org/lkml/20231216013656.1382213-2-longman@redhat.com/T/#m795b230d662c1debb28463ad721ddba5b384340a > >