Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp1251390pxx; Fri, 30 Oct 2020 05:59:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxhfqlcrA9aRyD6NVESDnECM6cuKdJe+62lEMQGIlf1PTHKq/2LDM8JrzHd7kkqR0jY4A2G X-Received: by 2002:a17:907:10cc:: with SMTP id rv12mr2234563ejb.451.1604062795445; Fri, 30 Oct 2020 05:59:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1604062795; cv=none; d=google.com; s=arc-20160816; b=IWOf36SyzMwj0BF4hayRHlusPmj/0kim5Ua6gyGXmOamWMO4UtE2VYrJ2+cRl2bctO a+ZO+L3sScrz+H2bGaJ3oj3Pt/A+Et1gK/PljAysiyjF7S+YSdQmw3A3beWcYVQG3owI Vew21xV/Zf/Brm8ujFAaGH1mpIwz/wh7RmbcLCUXO6KJxHQ3QlQ7Eu8JbgZJGLdlqKRS PAfDD3kBo3iswONKm3NXdYbqRvpQDFz3XlmRqoExbpVwwth6Or7XHZnv6u1GjmN9l0Kp qawTJY//awCAguAISs+HMUccuN53WY1jjLRCzgN3wNJKgGfAnXlRfs961SmHs62U8up/ X5Hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=EY5jmWEppGIZD3OkVY+PrUIlVBuLQJBSLFzS0cv2zkM=; b=EsxHoSEJY3AUPBh0GuvgvXFlRs5yWQi+X9WLr4K86g4GCvqCTTMomb2+UU3jTVrsvK /Iq0V5Qu2AOHIlQXx83NnSVNUEsIcaksAsd6pDcCvEalPPa5sjgUDLqqebVXyLo+6z1y OWL7CZbl964Ts0Cr3Bsw1visUWQIw1JL4jaoxS51poJc8o6TrPEHuOgflVBSGFAlsC1O DKLYb/z6eyAbBei6l/CUe1OT1XpzC7PHrgN4W+nDouF8Isounf8Hq80QbAojxZK6pUwV KP3Jhwm24z265nGW9f3SEPvi2DaU00ffnx85+8k4d7os4a0/HwaFE0O9Ntv5YpzJYmHM vsuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=WgQp7Qji; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ar8si1232865ejc.496.2020.10.30.05.59.31; Fri, 30 Oct 2020 05:59:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=WgQp7Qji; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726325AbgJ3Mzx (ORCPT + 99 others); Fri, 30 Oct 2020 08:55:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48220 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725939AbgJ3Mzx (ORCPT ); Fri, 30 Oct 2020 08:55:53 -0400 Received: from mail-pf1-x441.google.com (mail-pf1-x441.google.com [IPv6:2607:f8b0:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1EEC9C0613D2 for ; Fri, 30 Oct 2020 05:55:53 -0700 (PDT) Received: by mail-pf1-x441.google.com with SMTP id a200so5191317pfa.10 for ; Fri, 30 Oct 2020 05:55:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=EY5jmWEppGIZD3OkVY+PrUIlVBuLQJBSLFzS0cv2zkM=; b=WgQp7Qjiipq8bte2F1/XmxDPy678VMaI9Ka5i4CJlLM1plIBKrrKgJM3nLT34PINBr WQqbuvEeg3MK45EaLtALAiEFpwYzprg/RILN3PrXmHXJw+muwSjEQb96/fU5VB4f2aIx F5Dc0u6qNHTOwdeyVq4EuGaO311NqjR1yN4CzUH9vwhcJ1i8BWtCyMTDFAAku5fV0+AR ohvpHctMTeVrBOpe6ZOnao1AWQCz9Wxl64XuYx1ivWMi6e/weY8eQ38/voa3ATTB7w5v i4RqN64uuTgCOCNOQYLDNr6/g4Tz8x6axhvES1vtSHJfiabDIELHfktcq8S/dEad9nlV rY5Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=EY5jmWEppGIZD3OkVY+PrUIlVBuLQJBSLFzS0cv2zkM=; b=Hw0IaXnxS7p3gHZBm+uwAqn+ksG8CA/uOCFv5rp4PIF5oLyHESiR3f39UanBfc/cOr vrFdZZvAoYgz7dWToPEqf9lv/ZQ2vI6l4sUvPp1Y8xk6DT4u51ZoH9ocZPr9pr39Q6Rw azASeCHzJLg5VV5qu/g6KlhKx+ifbxLmdd9KmHPkH6bHkAb8PIkLOsO+YqK7Hk47Xg6k 0gHjnJaSgTe4AZlmtcwLJDjEt7lOYN18fySyHqZ7TMhHLGMPP6EIB5GYvYprABwh0R6s R/XdA/LrMdsVcGufppuzHDVktWEXk7JNn04xZ+ILNWykMEHi3D2FPk0x8Ws2vXAFpbr2 8hTw== X-Gm-Message-State: AOAM532uCpjV3pIo4A0UvKXItBSP9mxJrFlV6qpV560qHAUelbflrpNd OGr001pW7WtObGivx2NRUEvfzfKROO0= X-Received: by 2002:a17:90a:fa09:: with SMTP id cm9mr2840218pjb.162.1604062552599; Fri, 30 Oct 2020 05:55:52 -0700 (PDT) Received: from my--box ([103.98.79.70]) by smtp.gmail.com with ESMTPSA id w19sm6220886pff.6.2020.10.30.05.55.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Oct 2020 05:55:52 -0700 (PDT) Date: Fri, 30 Oct 2020 18:25:45 +0530 From: Deepak R Varma To: Greg KH , Christian =?iso-8859-1?Q?K=F6nig?= , outreachy-kernel@googlegroups.com, Alex Deucher , David Airlie , amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, melissa.srw@gmail.com Cc: mh12gx2825@gmail.com Subject: Re: [Outreachy kernel] [PATCH] drm/amdgpu: use DEFINE_DEBUGFS_ATTRIBUTE with debugfs_create_file_unsafe() Message-ID: <20201030125545.GA12671@my--box> References: <20201030032245.GA274478@my--box> <20201030071120.GA1493629@kroah.com> <20201030075716.GA6976@my--box> <5a7d8e8d-8db5-ff56-6448-3f1cefc11ef8@amd.com> <20201030082518.GB1619669@kroah.com> <20201030091521.GH401619@phenom.ffwll.local> <20201030092457.GI401619@phenom.ffwll.local> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20201030092457.GI401619@phenom.ffwll.local> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 30, 2020 at 10:24:57AM +0100, Daniel Vetter wrote: > On Fri, Oct 30, 2020 at 10:15:21AM +0100, Daniel Vetter wrote: > > On Fri, Oct 30, 2020 at 09:25:18AM +0100, Greg KH wrote: > > > On Fri, Oct 30, 2020 at 09:00:04AM +0100, Christian K?nig wrote: > > > > Am 30.10.20 um 08:57 schrieb Deepak R Varma: > > > > > On Fri, Oct 30, 2020 at 08:11:20AM +0100, Greg KH wrote: > > > > > > On Fri, Oct 30, 2020 at 08:52:45AM +0530, Deepak R Varma wrote: > > > > > > > Using DEFINE_DEBUGFS_ATTRIBUTE macro with debugfs_create_file_unsafe() > > > > > > > function in place of the debugfs_create_file() function will make the > > > > > > > file operation struct "reset" aware of the file's lifetime. Additional > > > > > > > details here: https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.archive.carbon60.com%2Flinux%2Fkernel%2F2369498&data=04%7C01%7Cchristian.koenig%40amd.com%7Cddd7a6ac8164415a639708d87ca97004%7C3dd8961fe4884e608e11a82d994e183d%7C0%7C0%7C637396414464384011%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=o6GOHvMxNMuOPlC4nhDyURCHBLqfQZhYQq%2BiIMt3D3s%3D&reserved=0 > > > > > > > > > > > > > > Issue reported by Coccinelle script: > > > > > > > scripts/coccinelle/api/debugfs/debugfs_simple_attr.cocci > > > > > > > > > > > > > > Signed-off-by: Deepak R Varma > > > > > > > --- > > > > > > > Please Note: This is a Outreachy project task patch. > > > > > > > > > > > > > > drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c | 20 ++++++++++---------- > > > > > > > 1 file changed, 10 insertions(+), 10 deletions(-) > > > > > > > > > > > > > > diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c b/drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c > > > > > > > index 2d125b8b15ee..f076b1ba7319 100644 > > > > > > > --- a/drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c > > > > > > > +++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c > > > > > > > @@ -1551,29 +1551,29 @@ static int amdgpu_debugfs_sclk_set(void *data, u64 val) > > > > > > > return 0; > > > > > > > } > > > > > > > -DEFINE_SIMPLE_ATTRIBUTE(fops_ib_preempt, NULL, > > > > > > > - amdgpu_debugfs_ib_preempt, "%llu\n"); > > > > > > > +DEFINE_DEBUGFS_ATTRIBUTE(fops_ib_preempt, NULL, > > > > > > > + amdgpu_debugfs_ib_preempt, "%llu\n"); > > > > > > Are you sure this is ok? Do these devices need this additional > > > > > > "protection"? Do they have the problem that these macros were written > > > > > > for? > > > > > > > > > > > > Same for the other patches you just submitted here, I think you need to > > > > > > somehow "prove" that these changes are necessary, checkpatch isn't able > > > > > > to determine this all the time. > > > > > Hi Greg, > > > > > Based on my understanding, the current function debugfs_create_file() > > > > > adds an overhead of lifetime managing proxy for such fop structs. This > > > > > should be applicable to these set of drivers as well. Hence I think this > > > > > change will be useful. > > > > > > > > Well since this is only created once per device instance I don't really care > > > > about this little overhead. > > > > > > > > But what exactly is debugfs doing or not doing here? > > > > > > It is trying to save drivers from having debugfs files open that point > > > to memory that can go away at any time. For graphics devices, I doubt > > > that is the case. > > > > So for anything we add/remove we have two-stage cleanup > > > > 1. drm_dev_unregister (or drm_connector_unregisters, those are the only > > two hotunpluggable things we have) unregister all the uapi interfaces. > > This deletes all the sysfs and debugfs files. > > > > 2. Once all the references to the underlying object disappear from the > > kernel, we free up the data structure. > > > > Now for chardev and similar uapi, we hold full references for open files. > > But for sysfs and debugfs we assume that those uapi layers will make sure > > that after we deleted the files in step 1 all access through these > > functions are guaranteed to have finished. If that's not the case, then we > > need to rework our refcounting and also refcount the underlying drm > > structure (drm_device or drm_connector) from sysfs/debugfs files. > > > > Now I tried to look at the patch Deepak references, and I'm not really > > clear what changes. Or whether we made a wrong assumption previously about > > what debugfs/sysfs guarantee when we delete the files. > > I read some more code and kerneldoc, and I still have no idea what this > new _unsafe variant is used for. Only ones I've found seem to use > debugfs_file_get/put like the normal variant, to protect against > concurrently removed files due to hotunplug. Which is kinda what we've > been expecting debugfs to do for us. > > What's a use-case for _unsafe _without_ debugfs_file_get/put? > > Decently confused me over here doesn't get this. > -Daniel Hi All, Thank you for your comments. I was not anticipating this to be such a offbeat patch. Pardon my growing understanding. Please suggest if I can evaluate the change proposed to confirm if this is a meaningful change. Thank you again! ./drv > > > -Daniel > > > > > > > > thanks, > > > > > > greg k-h > > > > -- > > Daniel Vetter > > Software Engineer, Intel Corporation > > http://blog.ffwll.ch > > -- > Daniel Vetter > Software Engineer, Intel Corporation > http://blog.ffwll.ch