From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.2 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D54ECC433E1 for ; Tue, 2 Jun 2020 16:56:51 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BBDD7206C3 for ; Tue, 2 Jun 2020 16:56:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726598AbgFBQ4t (ORCPT ); Tue, 2 Jun 2020 12:56:49 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:54708 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725969AbgFBQ4s (ORCPT ); Tue, 2 Jun 2020 12:56:48 -0400 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: andrzej.p) with ESMTPSA id C8CF72A36C9 Subject: Re: [PATCHv2 0/7] Support inhibiting input devices To: Dmitry Torokhov , Hans de Goede Cc: linux-input@vger.kernel.org, linux-acpi@vger.kernel.org, linux-iio@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-tegra@vger.kernel.org, patches@opensource.cirrus.com, ibm-acpi-devel@lists.sourceforge.net, platform-driver-x86@vger.kernel.org, "Rafael J . Wysocki" , Len Brown , Jonathan Cameron , Hartmut Knaack , Lars-Peter Clausen , Peter Meerwald-Stadler , Kukjin Kim , Krzysztof Kozlowski , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , NXP Linux Team , Vladimir Zapolskiy , Sylvain Lemieux , Laxman Dewangan , Thierry Reding , Jonathan Hunter , Barry Song , Michael Hennerich , Nick Dyer , Ferruh Yigit , Sangwon Jee , Henrique de Moraes Holschuh , kernel@collabora.com, Peter Hutterer , Benjamin Tissoires References: <20200506002746.GB89269@dtor-ws> <20200515164943.28480-1-andrzej.p@collabora.com> <842b95bb-8391-5806-fe65-be64b02de122@redhat.com> <6d9921fc-5c2f-beda-4dcd-66d6970a22fe@redhat.com> <09679de4-75d3-1f29-ec5f-8d42c84273dd@collabora.com> <2d224833-3a7e-bc7c-af15-1f803f466697@collabora.com> <20200527063430.GJ89269@dtor-ws> From: Andrzej Pietrasiewicz Message-ID: <88f939cd-1518-d516-59f2-8f627a6a70d2@collabora.com> Date: Tue, 2 Jun 2020 18:56:40 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: <20200527063430.GJ89269@dtor-ws> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-input-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-input@vger.kernel.org Hi Dmitry, W dniu 27.05.2020 o 08:34, Dmitry Torokhov pisze: > On Tue, May 19, 2020 at 11:36:34AM +0200, Hans de Goede wrote: >> Hi, >> >> On 5/19/20 11:02 AM, Andrzej Pietrasiewicz wrote: >>> Hi Hans, Hi Dmitry, >>> >>> W dniu 18.05.2020 o 16:23, Hans de Goede pisze: >>>> Hi, >>> >>> >>> >>>>>>>> >>>>>>>> So I wonder what this series actually adds for functionality for >>>>>>>> userspace which can not already be achieved this way? >>>>>>>> >>>>>>>> I also noticed that you keep the device open (do not call the >>>>>>>> input_device's close callback) when inhibited and just throw away >>>>>>> >>>>>>> I'm not sure if I understand you correctly, it is called: >>>>>>> >>>>>>> +static inline void input_stop(struct input_dev *dev) >>>>>>> +{ >>>>>>> +    if (dev->poller) >>>>>>> +        input_dev_poller_stop(dev->poller); >>>>>>> +    if (dev->close) >>>>>>> +        dev->close(dev); >>>>>>>                  ^^^^^^^^^^^^^^^^ >>>>>>> +static int input_inhibit(struct input_dev *dev) >>>>>>> +{ >>>>>>> +    int ret = 0; >>>>>>> + >>>>>>> +    mutex_lock(&dev->mutex); >>>>>>> + >>>>>>> +    if (dev->inhibited) >>>>>>> +        goto out; >>>>>>> + >>>>>>> +    if (dev->users) { >>>>>>> +        if (dev->inhibit) { >>>>>>> +            ret = dev->inhibit(dev); >>>>>>> +            if (ret) >>>>>>> +                goto out; >>>>>>> +        } >>>>>>> +        input_stop(dev); >>>>>>>                  ^^^^^^^^^^^^^^^^ >>>>>>> >>>>>>> It will not be called when dev->users is zero, but if it is zero, >>>>>>> then nobody has opened the device yet so there is nothing to close. >>>>>> >>>>>> Ah, I missed that. >>>>>> >>>>>> So if the device implements the inhibit call back then on >>>>>> inhibit it will get both the inhibit and close callback called? >>>>>> >>>>> >>>>> That's right. And conversely, upon uninhibit open() and uninhibit() >>>>> callbacks will be invoked. Please note that just as with open()/close(), >>>>> providing inhibit()/uninhibit() is optional. >>>> >>>> Ack. >>>> >>>>>> And what happens if the last user goes away and the device >>>>>> is not inhibited? >>>>> >>>>> close() is called as usually. >>>> >>>> But not inhibit, hmm, see below. >>>> >>>>>> I'm trying to understand here what the difference between the 2 >>>>>> is / what the goal of having a separate inhibit callback ? >>>>>> >>>>> >>>>> Drivers have very different ideas about what it means to suspend/resume >>>>> and open/close. The optional inhibit/uninhibit callbacks are meant for >>>>> the drivers to know that it is this particular action going on. >>>> >>>> So the inhibit() callback triggers the "suspend" behavior ? >>>> But shouldn't drivers which are capable of suspending the device >>>> always do so on close() ? >>>> >>>> Since your current proposal also calls close() on inhibit() I >>>> really see little difference between an inhibit() and the last >>>> user of the device closing it and IMHO unless there is a good >>>> reason to actually differentiate the 2 it would be better >>>> to only stick with the existing close() and in cases where >>>> that does not put the device in a low-power mode yet, fix >>>> the existing close() callback to do the low-power mode >>>> setting instead of adding a new callback. >>>> >>>>> For inhibit() there's one more argument: close() does not return a value, >>>>> so its meaning is "do some last cleanup" and as such it is not allowed >>>>> to fail - whatever its effect is, we must deem it successful. inhibit() >>>>> does return a value and so it is allowed to fail. >>>> >>>> Well, we could make close() return an error and at least in the inhibit() >>>> case propagate that to userspace. I wonder if userspace is going to >>>> do anything useful with that error though... > > It really can't do anything. Have you ever seen userspace handling > errors from close()? And what can be done? A program is terminating, but > the kernel says "no, you closing input device failed, you have to > continue running indefinitely..." > >>>> >>>> In my experience errors during cleanup/shutdown are best logged >>>> (using dev_err) and otherwise ignored, so that we try to clean up >>>> as much possible. Unless the very first step of the shutdown process >>>> fails the device is going to be in some twilight zone state anyways >>>> at this point we might as well try to cleanup as much as possible. >>> >>> What you say makes sense to me. >>> @Dmitry? > > I will note here, that inhibit is closer to suspend() than to close(), > and we do report errors for suspend(). Therefore we could conceivably > try to handle errors if driver really wants to be fancy. But I think > majority of cases will be quite happy with using close() and simply > logging errors, as Hans said. > > That said, I think the way we should handle inhibit/uninhibit, is that > if we have the callback defined, then we call it, and only call open and > close if uninhibit or inhibit are _not_ defined. > If I understand you correctly you suggest to call either inhibit, if provided or close, if inhibit is not provided, but not both, that is, if both are provided then on the inhibit path only inhibit is called. And, consequently, you suggest to call either uninhibit or open, but not both. The rest of my mail makes this assumption, so kindly confirm if I understand you correctly. In my opinion this idea will not work. The first question is should we be able to inhibit a device which is not opened? In my opinion we should, in order to be able to inhibit a device in anticipation without needing to open it first. Then what does opening (with input_open_device()) an inhibited device mean? Should it succeed or should it fail? If it is not the first opening then effectively it boils down to increasing device's and handle's counters, so we can allow it to succeed. If, however, the device is being opened for the first time, the ->open() method wants to be called, but that somehow contradicts the device's inhibited state. So a logical thing to do is to either fail input_open_device() or postpone ->open() invocation to the moment of uninhibiting - and the latter is what the patches in this series currently do. Failing input_open_device() because of the inhibited state is not the right thing to do. Let me explain. Suppose that a device is already inhibited and then a new matching handler appears in the system. Most handlers (apm-power.c, evbug.c, input-leds.c, mac_hid.c, sysrq.c, vt/keyboard.c and rfkill/input.c) don't create any character devices (only evdev.c, joydev.c and mousedev.c do), so for them it makes no sense to delay calling input_open_device() and it is called in handler's ->connect(). If input_open_device() now fails, we have lost the only chance for this ->connect() to succeed. Summarizing, IMO the uninhibit path should be calling both ->open() and ->uninhibit() (if provided), and conversely, the inhibit path should be calling both ->inhibit() and ->close() (if provided). What's your opinion? Regards, Andrzej