Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3192859pxk; Mon, 5 Oct 2020 03:43:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxUFqUk6nNW21HpI8tqX0oY8hhl8UHwORCxAzc1dvGFvXDxo6QitBXrPub9A3MVEIx117tX X-Received: by 2002:a50:e08a:: with SMTP id f10mr2221531edl.220.1601894598094; Mon, 05 Oct 2020 03:43:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601894598; cv=none; d=google.com; s=arc-20160816; b=Aidlhzq0cl9JfrkODpGf1oGALBzUXzYde4sDOj04BgxGAtDu+kxofI8pmodA/z+IXQ ke6uTcz4VJxlnPLTxsP9xw5ZwHDj0lIdDFoJWXIMn7kGmoUGs6t61HyBXF4FXtov4OwU JwfeLAOsI7/nzAa2gVqtS5eXSYg4FqP+BOzN2vsgP/61z8FQb1unjpyVgI5XyDRjKlb8 XE7Id6tu9MJcpSN+++vUkJ2iofP5ZkAy7yPOUAE1VcGi6cWmps295snhwVwHy+8uYUe/ GFoC7IMGAr+T9U/i+/u7VfVCd4A3ZRvzqkJRaPos0eXo/75WVCeO6ymQXi589DyGDG4t RDEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=I+6/1R0EuhraNNWXBovvaquXl0hT//TLyB7ShJJ9y2E=; b=kY7wYea5RxbTWLQad8yM70N7+MIYxhTVjGNmEVMEBQ8Xn/ZPBTUfJedD5b3Lj/wF+W LhSJ/9mdxjOZYMTEFphoYWVSZHv6CfOTcDIJHFg3p6yAqYBzHXEdqz0vJV1wkvhHoKms gKcb0eY7iiGCXscRywF2kSRc66uBZTBFu5CGp48DxnLNtUr0T1Kdf0kmOuJhSMaDtLEr maw9k/aOMayjgIMVtOyhczlU3RDBTUff3JwBmei6M37t2gcmInlIDYIZWY2WAPGJhJhR JdWq8u/gArDUivB09x4nmMFzJnrwXfDhwfF41SzoIj7cnC7BL5t/PgTIcm/tqLsXbVcn tZQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=h8f3dv1c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qp7si7182367ejb.374.2020.10.05.03.42.54; Mon, 05 Oct 2020 03:43:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=h8f3dv1c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725932AbgJEKjj (ORCPT + 99 others); Mon, 5 Oct 2020 06:39:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:34932 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725843AbgJEKjj (ORCPT ); Mon, 5 Oct 2020 06:39:39 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6EAF62078D; Mon, 5 Oct 2020 10:39:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601894378; bh=KJZFQ3Md+qoKeqSObh5+5y4ipzzhoZlMl/f3afY0fNM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=h8f3dv1cfo8XbGELXuNsbAg1qu6K7owrpKbjyhDMpOAPTJSAH+F7fLm/kZI/lHWC6 yfJrJhCv8PqJHVfW5hqVjau2mPP8f3OJs+GfnC9FNCMwQP+CJCZCOpyDp5gHRXClMl WH13RSqCKS+Onshj0p2Hw3/TXmmLZzarKPiuPohc= Date: Mon, 5 Oct 2020 12:40:23 +0200 From: Greg Kroah-Hartman To: Thierry Reding Cc: Lars Poeschel , Uwe =?iso-8859-1?Q?Kleine-K=F6nig?= , Lee Jones , "open list:PWM SUBSYSTEM" , open list Subject: Re: [PATCH] pwm: sysfs: Set class on pwm devices Message-ID: <20201005104023.GB245520@kroah.com> References: <20200929121953.2817843-1-poeschel@lemonage.de> <20200930065726.fjcsm4pfh65medgl@pengutronix.de> <20200930092056.maz5biy2ugr6yc3p@lem-wkst-02.lemonage> <20200930094146.73s3qzvf5ekjeavc@pengutronix.de> <20201001090531.gubfwmznlto2ng6l@lem-wkst-02.lemonage> <20201001112449.GA2364834@kroah.com> <20201005093016.GD425362@ulmo> <20201005094530.GA154185@kroah.com> <20201005101721.GL425362@ulmo> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20201005101721.GL425362@ulmo> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 05, 2020 at 12:17:21PM +0200, Thierry Reding wrote: > On Mon, Oct 05, 2020 at 11:45:30AM +0200, Greg Kroah-Hartman wrote: > > On Mon, Oct 05, 2020 at 11:30:16AM +0200, Thierry Reding wrote: > > > On Thu, Oct 01, 2020 at 01:24:49PM +0200, Greg Kroah-Hartman wrote: > > > > On Thu, Oct 01, 2020 at 11:05:31AM +0200, Lars Poeschel wrote: > > > > > On Wed, Sep 30, 2020 at 11:41:46AM +0200, Uwe Kleine-K?nig wrote: > > > > > > Hello, > > > > > > > > > > > > I added Greg Kroah-Hartman who I discussed this with via irc a bit to > > > > > > Cc:. > > > > > > > > > > > > On Wed, Sep 30, 2020 at 11:20:56AM +0200, Lars Poeschel wrote: > > > > > > > thank you for your review! > > > > > > > > > > > > > > On Wed, Sep 30, 2020 at 08:57:26AM +0200, Uwe Kleine-K?nig wrote: > > > > > > > > On Tue, Sep 29, 2020 at 02:19:53PM +0200, poeschel@lemonage.de wrote: > > > > > > > > > From: Lars Poeschel > > > > > > > > > > > > > > > > > > This adds a class to exported pwm devices. > > > > > > > > > Exporting a pwm through sysfs did not yield udev events. The > > > > > > > > > > > > > > > > I wonder what is your use-case here. This for sure also has a place to > > > > > > > > be mentioned in the commit log. I suspect there is a better way to > > > > > > > > accomplish you way. > > > > > > > > > > > > > > Use-case is to be able to use a pwm from a non-root userspace process. > > > > > > > I use udev rules to adjust permissions. > > > > > > > > > > > > Hmm, how do you trigger the export? Without being aware of all the > > > > > > details in the sysfs code I would expect that the exported stuff is > > > > > > available instantly once the write used to export the PWM is completed. > > > > > > So changing the permissions can be done directly after triggering the > > > > > > export in the same process. > > > > > > > > > > The export is triggered through the userspace process itself. Why can it > > > > > do this ? Because there is another udev rule, that changes permissions > > > > > when a pwmchip appears. > > > > > Then I'd like to have the second udev rule, that changes permissions on > > > > > the freshly exported pwm. The userspace process can't do this. > > > > > You are right I could propably do everything from within udev: If a > > > > > pwmchip appears, export certain pwms and right away change their > > > > > permissions. It does not also not feel right. It'd require knowledge > > > > > from the userspace application to be mapped to udev. > > > > > > > > The way the kernel code is now, yes, you will not have any way to > > > > trigger it by userspace as the kernel is creating a "raw" struct device > > > > that isn't assigned to anything. That is what needs to be fixed here. > > > > > > > > > > Out of interest: What do you use the pwm for? Isn't there a suitable > > > > > > kernel driver that can do the required stuff? Compared to the kernel-API > > > > > > the sysfs interface isn't atomic. Is this an annoyance? > > > > > > > > > > Use-case is generating a voltage from the pwm. This voltage is used to > > > > > signal different states and does not change very often. This is > > > > > absolutely not annoying that this is not atomic. We just change the duty > > > > > cycle on the fly. Everything else is configured one time at startup. > > > > > I'd call what I need pwm-dac. I could not find a ready to use driver. > > > > > Maybe I could misuse some kernel driver for this. Maybe I could use > > > > > pwm-led or pwm-brightness or pwm-fan. Propably pwm-regulator could work, > > > > > there is even a userspace facing part for this, but this is not > > > > > devicetree ready. > > > > > ...and the worst, please don't blame me: The application is java, so > > > > > ioctl is a problem. > > > > > > > > I thought java could do ioctls, otherwise how would it ever be able to > > > > talk to serial ports? > > > > > > > > Anyway, this needs to be fixed in the kernel... > > > > > > If atomicity was a problem, we could potentially add a mechanism to the > > > sysfs interface to enable that. I don't see a good way of doing that in > > > a single file, since that works against how sysfs is designed. But one > > > thing I could imagine is adding a file ("lock", or whatever you want to > > > call it) that you can use for atomic fencing: > > > > > > $ echo 1 > lock # locks the hardware state > > > $ echo 100 > period > > > $ echo 50 > duty_cycle > > > $ echo 0 > lock # flushes state to hardware > > > > > > But it sounds like that's not even a big issue. > > > > That is exactly what configfs was designed for :) > > Interesting... for some reason I had never thought about configfs in > this context. But it does indeed sound like it could solve this problem > in a better way. > > My memory is a bit sketchy, but I think for USB device controllers this > works by exposing each controller in configfs and then configuring > things like endpoints within the controller's directory. So I wonder if > instead of requesting PWMs via sysfs, we should rather expose them via > configfs items. > > Something like: > > # mkdir /configfs/7000a000.pwm/0 > > could then be the equivalent of exporting PWM channel 0 of the given PWM > chip in sysfs, except that now you get a configfs directory with > attributes that you can use to inspect and reconfigure the PWM channel > and ultimately apply the changes atomically. > > How does that work from a permissions point of view? How do we ensure > that people don't need root privileges to access these? To change things in configfs, yes, I'm pretty sure you need root access. But to read things, sysfs is fine. I don't really know what you are wanting to do here, both create a device and change the options over time? thanks, greg k-h