From patchwork Mon Jul 10 09:59:05 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?b?5p2O5oms6Z+s?= X-Patchwork-Id: 117793 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9f45:0:b0:3ea:f831:8777 with SMTP id v5csp4912045vqx; Mon, 10 Jul 2023 03:05:58 -0700 (PDT) X-Google-Smtp-Source: APBJJlEEb/3LsJiuM6g8OOSEA8Cji5z3xvNAOFUag5yVikHlwfx57jwydYCy2sEIpBl17Ak1I1xl X-Received: by 2002:a05:6a20:a20d:b0:12d:ce59:bbc7 with SMTP id u13-20020a056a20a20d00b0012dce59bbc7mr8956012pzk.24.1688983558094; Mon, 10 Jul 2023 03:05:58 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1688983558; cv=pass; d=google.com; s=arc-20160816; b=yUY9At4gdBKshiFsceUi2aMkbGSzKGHhICPD4WidCCQ2uRMtpJIAjg/L3W3TC9NBAL QGEtUbQ00GGAG0Uo8bhfxFT9cuU2WXFE50A0QMeWldHBCJxaNX6pXfH9Tu4AtblphPzL PUZikywfc1a2z5gNIZBek+vaJbWhR3w/jCYaalOmZ6ziiokLq+29D5idVNcf5Rzqtr17 p3zh9KPyisL9UEojUr4XkU3gbtvB+KAH95oP5RT3gYz5CDCh7QQf0CGWpOKe7El/W02i wVm1W2LklVNvse04+7ZtFtGF5T6Zr7qyBMNLo+Nr04aYZ1HJMahAr9IQ3oYVaFOZg4DX baIA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from:dkim-signature; bh=1Yp+KLuutQOtTAOdW01O4bS6fxtp3Qa2Yu19BQW/o80=; fh=k2bObtv+DaN7BQ3nFkAgWs0iMWgzWDIB0Glp69pQ4uE=; b=I6knUjRxlPwbsNoMWTYEGK/QLiXvr6R5yIHPaLa/4Sbn0WTD1wt9hWyYV+y02naunA FbIo0n/jil5QceynMrPBTiNsth8UsxcUogdP2VTo5alCvs8mf+fk/ncIis0WI1W/f/im FrclGhqRNseeFhCMPDn4e2RyzFXtKhNCjSkWfIsUg9da5ZvIlhgzzhxYF0ltvU7p13KP FD15kHHVbiw235Z006QmLUhA+i2uO+AYz0fm1wQfJ4/xQDbGfyMgsk5KCIbtGOTFmlKm mbC6FRNIyXD9gR2BpV5B4+J5edBV1nSEO99JnkxW3UXnls7R7yjRofYtxJEBqK8TKgHK Tf+g== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@vivo.com header.s=selector2 header.b=LsnZYfdf; arc=pass (i=1 spf=pass spfdomain=vivo.com dkim=pass dkdomain=vivo.com dmarc=pass fromdomain=vivo.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=vivo.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j3-20020a170903028300b001b892a54d89si4550597plr.629.2023.07.10.03.05.45; Mon, 10 Jul 2023 03:05:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@vivo.com header.s=selector2 header.b=LsnZYfdf; arc=pass (i=1 spf=pass spfdomain=vivo.com dkim=pass dkdomain=vivo.com dmarc=pass fromdomain=vivo.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=vivo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229637AbjGJKCL (ORCPT + 99 others); Mon, 10 Jul 2023 06:02:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42500 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231481AbjGJKBk (ORCPT ); Mon, 10 Jul 2023 06:01:40 -0400 Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2132.outbound.protection.outlook.com [40.107.255.132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C57CB173C for ; Mon, 10 Jul 2023 02:59:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PSVSitEbegBrfNhAiCZK7txIqe/Ni4lyxVTE1ml0iqu359k567rJoPpzhzBCYBYuJU1srLK34eZKzwmcUr/HG2mdWbz2ymT2aJH7Pc5yml8ypurmcmzRfvlyNzTmu2TPaLH5JE7M1CYN23Oz25PVKyH8KHG3ZTZYp2VQQOu5k97X3I0kRhF9JiDvgJsiOI0t/95nM0IxgwY6hImG52nNOafKGJb0hMYK8VyLc8JtbWHAl7omgLdYCn3caNL0Aki7DCJBs3RXvp0lqN522EOzvMRn3qNGjcv4iA99VS9g6rLzKrEHD1+ifm49foEhIGCX+uGBITK+YJwmBTZaSab/Aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1Yp+KLuutQOtTAOdW01O4bS6fxtp3Qa2Yu19BQW/o80=; b=CtujRGG9dMhiRwz6bWaC8yKymgcap9lKUOvmz7KxdmJWpOziPBAaYJtXb5akeILGW8tDX/rY3GQOX3mtuRP7jx67g8EOogNE1M9dEKkGcIky6y2VHzS1t23eYrpf/AxcB1NC7EkkYDYorEFE0oHByC9LR6Lx1GS+2M9LCD/5zK7dxN8euX0rxbalOS9EAWKwsznWGW99/0CTqgOoIqZuoLBQ3CAx8++iSpcODdeumttvBLqezIEV5pT7HmMwigMeK/ThkYzhG1qvOEqE6tHrk0caTnZo/syc2O4b5qRjn8fhs0hP6iKM4UWD2bDrDTewPe7z7e3au4pW5rRd9d7ZXw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vivo.com; dmarc=pass action=none header.from=vivo.com; dkim=pass header.d=vivo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vivo.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1Yp+KLuutQOtTAOdW01O4bS6fxtp3Qa2Yu19BQW/o80=; b=LsnZYfdfiGAljnGPSKGwuYgvVYcLotyqmHSDL2403kOBuhyGhWFiYwiNsjrSnf2nRcVolSOyRH2nyAdpGj7sJbnHHPz2lztsgTS0J/Sth2+BSE6pctqueXXrOkriHUYuWWExoJGpHyIkrdadW6eMdy/d9FCF+ks9iCWjgsXOwasxuM2nt0eViJG3KJgS30vmazrIQRlukBNRFsG3dqLGUG9wjqdLOOENVQSqHkFPWj+crfksVFv1ClH2dLncxLTZ5Cj33FsHK3DM9pbksnYIpxdzU2/p7dsfDaZjuULO/etBMARbsWTrOtR5YoLz02o7plBCacPGCwGJOfnegE3rkg== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=vivo.com; Received: from SEZPR06MB5269.apcprd06.prod.outlook.com (2603:1096:101:78::6) by SI2PR06MB3963.apcprd06.prod.outlook.com (2603:1096:4:f2::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.30; Mon, 10 Jul 2023 09:59:38 +0000 Received: from SEZPR06MB5269.apcprd06.prod.outlook.com ([fe80::fa0e:6c06:7474:285c]) by SEZPR06MB5269.apcprd06.prod.outlook.com ([fe80::fa0e:6c06:7474:285c%5]) with mapi id 15.20.6565.028; Mon, 10 Jul 2023 09:59:38 +0000 From: Yangtao Li To: Thomas Gleixner Cc: Yangtao Li , Krzysztof Kozlowski , =?utf-8?q?Uwe_Kleine-K=C3=B6nig?= , Jonathan Cameron , AngeloGioacchino Del Regno , linux-kernel@vger.kernel.org Subject: [PATCH v4 01/21] genirq/devres: Add devm_request_threaded_irq_probe() and devm_request_irq_probe() Date: Mon, 10 Jul 2023 17:59:05 +0800 Message-Id: <20230710095926.15614-1-frank.li@vivo.com> X-Mailer: git-send-email 2.39.0 X-ClientProxiedBy: SG2PR01CA0167.apcprd01.prod.exchangelabs.com (2603:1096:4:28::23) To SEZPR06MB5269.apcprd06.prod.outlook.com (2603:1096:101:78::6) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SEZPR06MB5269:EE_|SI2PR06MB3963:EE_ X-MS-Office365-Filtering-Correlation-Id: 8451b738-553d-4182-3268-08db812c5f30 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SEZPR06MB5269.apcprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(4636009)(346002)(396003)(39860400002)(366004)(376002)(136003)(451199021)(86362001)(38100700002)(38350700002)(36756003)(6666004)(6486002)(52116002)(54906003)(6506007)(26005)(186003)(1076003)(6512007)(2616005)(5660300002)(2906002)(66556008)(316002)(478600001)(66946007)(8936002)(66476007)(8676002)(66574015)(83380400001)(4326008)(6916009)(41300700001);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?BNPlP8DWzEao43xA3QS0/70ISLSt?= =?utf-8?q?XxdXOzJj6ipXcDUdL4wYCI24KHgWQV+8vD0O0nrW1ukjgpg1u9lpyAXVET+3G0xy7?= =?utf-8?q?Ck0toOJLPnZlvxt9iU3sk8zX4Lq8Y7MUFsAIHwetezjGA9ZSS5m+utptV/vaYk2Y+?= =?utf-8?q?ZxK2xCtFd5UwXtHDH+NWP2/pjGkn942QSofIkJzOt2T6vWbnmHvmNlnhTIX3zNtiS?= =?utf-8?q?aVViUroGZxYajHSW1FAtpUqO9pdXV8MID7PVA+ad+y18E/jmF3K8Hji8fyKyEP2x8?= =?utf-8?q?RIStDEwJCRprvoTGuTB8bFt2jKKl6epajZM46+dAhr4vsa1ExQbpYkY9ehX+XohTN?= =?utf-8?q?HGmjTV1cWZrpaTQojpJzoUNEX+CG7ufXDq9AzqYMcUlrVKaf1qYEGElYjbzEo2tdw?= =?utf-8?q?AZIodzr9HLjp4gMdD4M51t9aTYnNlqiWDUWIioZeKR+zuzC97v/h0IflzI/Fd9VXi?= =?utf-8?q?WiUwKHKni+3Tt7Pw+yU1E8/XxqZ9PmuaigfGKY6YJxqTY3nlT5tMum473lXktIvXE?= =?utf-8?q?n+wCB7VFc//ukBuZqK+A2FbDkGyNnXUENXcsu4CFFoLiaF3Wv3KZKY4xCLoOUWJ7l?= =?utf-8?q?eGwNf6u/HuiCBQLjmCru489pyuytGSriisFg5DX7GSNwTa3vQBLIAIQWIYVm37NoL?= =?utf-8?q?ikqkGpCNx0pxuitzip35wKWSrv+IdxUp5nwi92Aq+OsApiaEfdCMs/Z66ZXRWz3df?= =?utf-8?q?gGRIcgNXjB1vquqgbliH8+R0iJwcVFpCIihYqs0wI7cibFmgjeZsuo5+6RmgY1YDI?= =?utf-8?q?mD6M1UzMGMXSbaOFL9dbYzF3HDyk8RmFcUX94dFPI++K/X8eL87gZ9UZnL+CeM6Hb?= =?utf-8?q?BJiqTnWJ2n9K4kEa/WFxhVVeb5j9J7kcKnQPnbInnJZxF07pMph7AmTF8YhtpQlsa?= =?utf-8?q?GFoT/f6uyxF332LGscjuiarAONXK4QJgaZwrobUiWBJTZasYV5rIb7QstreIaq/iA?= =?utf-8?q?KpRomiNA0j9HW/9UEv+40ja+p/kyTS6cXf055sJZpxlQZQucHa2RXghgS3w2AFfno?= =?utf-8?q?M/+f2zIx8gSc2jZdx8tesuON6tPW4A/XhnglMa3SdX0fpLePW/LJSlcVs8qvq3ssc?= =?utf-8?q?fCgeY/Fr4rpnsJncqlXI6GVt/3thyQm6sZUYrK1WZWt+wd+kCuR7d3To0Vtzf+q/+?= =?utf-8?q?4TjsOZbvP5PznrxpEiy6lNEj8SkAms3CWJV1GvRC8IjLBgCSQsBeG0PyyljZEuH9H?= =?utf-8?q?M+UenK6IrglWzvAbImADwhD94xMSuCUowM6IwZZem57ud3QQYvT+iSEa8mx9JfiyP?= =?utf-8?q?tunAyhLgXznRwS/yO50xYCCJItgH2DeC6Gl4jyV++HPU2aDghQZaGu0DMwymQ4XpW?= =?utf-8?q?K3D6UVwbEcWMRn2q+yigOqKKswIN/D71KSKYHOM5LdfCArHEsVRpHN02nQyJVWLB4?= =?utf-8?q?Gm7AE0qgCT9BfQCScBpewOebdSiBTjVTXkFaXzpL3Z8cP2wzMQcOd8qeQ5a3lZWtf?= =?utf-8?q?1g873Dn6iwPVXljbnoORfmFgEgPsZ/7IVmAgAU1KDqD4kOlZBfj+fcRVTBH4tSy9R?= =?utf-8?q?BvZsHfNfEfo9?= X-OriginatorOrg: vivo.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8451b738-553d-4182-3268-08db812c5f30 X-MS-Exchange-CrossTenant-AuthSource: SEZPR06MB5269.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Jul 2023 09:59:37.9866 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 923e42dc-48d5-4cbe-b582-1a797a6412ed X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: cqFgVeT0RRFjLphr7AoNFR6DKi8chTWkcsqUnwghm5T41CSkQbKoZTpm8Dv7DRPJ2p2UbzL1a9BW44cvIpnWbg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SI2PR06MB3963 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1771027623365203083 X-GMAIL-MSGID: 1771027623365203083 There are more than 700 calls to devm_request_threaded_irq method and more than 1000 calls to devm_request_irq method. Most drivers only request one interrupt resource, and these error messages are basically the same. If error messages are printed everywhere, more than 2000 lines of code can be saved by removing the msg in the driver. And tglx point out that: If we actually look at the call sites of devm_request_threaded_irq() then the vast majority of them print more or less lousy error messages. A quick grep/sed/awk/sort/uniq revealed 519 messages total (there are probably more) 352 unique messages 323 unique messages after lower casing Those 323 are mostly just variants of the same patterns with slight modifications in formatting and information provided. 186 of these messages do not deliver any useful information, e.g. "no irq", " The most useful one of all is: "could request wakeup irq: %d" So there is certainly an argument to be made that this particular function should print a well formatted and informative error message. It's not a general allocator like kmalloc(). It's specialized and in the vast majority of cases failing to request the interrupt causes the device probe to fail. So having proper and consistent information why the device cannot be used _is_ useful. So add devm_request_threaded_irq_probe() and devm_request_irq_probe(), which ensure that all error handling branches print error information. In this way, when this function fails, the upper-layer functions can directly return an error code without missing debugging information. Otherwise, the error message will be printed redundantly or missing. Cc: Thomas Gleixner Cc: Krzysztof Kozlowski Cc: "Uwe Kleine-König" Cc: Jonathan Cameron Cc: AngeloGioacchino Del Regno Signed-off-by: Yangtao Li Reviewed-by: Krzysztof Kozlowski Reviewed-by: Geert Uytterhoeven Reviewed-by: Jonathan Cameron --- include/linux/interrupt.h | 15 +++++++++++++++ kernel/irq/devres.c | 40 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 55 insertions(+) diff --git a/include/linux/interrupt.h b/include/linux/interrupt.h index a92bce40b04b..91ab9e501b3d 100644 --- a/include/linux/interrupt.h +++ b/include/linux/interrupt.h @@ -201,6 +201,21 @@ extern void free_percpu_nmi(unsigned int irq, void __percpu *percpu_dev_id); struct device; +extern int __must_check +devm_request_threaded_irq_probe(struct device *dev, unsigned int irq, + irq_handler_t handler, irq_handler_t thread_fn, + unsigned long irqflags, const char *devname, + void *dev_id, const char *info); + +static inline int __must_check +devm_request_irq_probe(struct device *dev, unsigned int irq, + irq_handler_t handler, unsigned long irqflags, + const char *devname, void *dev_id, const char *info) +{ + return devm_request_threaded_irq_probe(dev, irq, handler, NULL, irqflags, + devname, dev_id, info); +} + extern int __must_check devm_request_threaded_irq(struct device *dev, unsigned int irq, irq_handler_t handler, irq_handler_t thread_fn, diff --git a/kernel/irq/devres.c b/kernel/irq/devres.c index f6e5515ee077..43a40d6e2e0b 100644 --- a/kernel/irq/devres.c +++ b/kernel/irq/devres.c @@ -79,6 +79,46 @@ int devm_request_threaded_irq(struct device *dev, unsigned int irq, } EXPORT_SYMBOL(devm_request_threaded_irq); +/** + * devm_request_threaded_irq_probe - allocate an interrupt line for a managed device + * @dev: device to request interrupt for + * @irq: Interrupt line to allocate + * @handler: Function to be called when the IRQ occurs + * @thread_fn: function to be called in a threaded interrupt context. NULL + * for devices which handle everything in @handler + * @irqflags: Interrupt type flags + * @devname: An ascii name for the claiming device, dev_name(dev) if NULL + * @dev_id: A cookie passed back to the handler function + * @info: Optional additional error log + * + * This is a variant of the devm_request_threaded_irq function. + * It will print an error message by default when the request fails, + * and the consumer can add a special error msg. + * + * Except for the extra @dev argument, this function takes the + * same arguments and performs the same function as + * request_threaded_irq(). IRQs requested with this function will be + * automatically freed on driver detach. + * + * If an IRQ allocated with this function needs to be freed + * separately, devm_free_irq() must be used. + */ +int devm_request_threaded_irq_probe(struct device *dev, unsigned int irq, + irq_handler_t handler, irq_handler_t thread_fn, + unsigned long irqflags, const char *devname, + void *dev_id, const char *info) +{ + int rc; + + rc = devm_request_threaded_irq(dev, irq, handler, NULL, irqflags, devname, dev_id); + if (rc) + return dev_err_probe(dev, rc, "Failed to request %sinterrupt %u %s %s\n", + thread_fn ? "threaded " : "", irq, devname ? : dev_name(dev), + info ? : ""); + return 0; +} +EXPORT_SYMBOL(devm_request_threaded_irq_probe); + /** * devm_request_any_context_irq - allocate an interrupt line for a managed device * @dev: device to request interrupt for