Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp2901356pxf; Sun, 21 Mar 2021 10:48:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxYPhBup5MeCHQBa1k/slrVHojaI9eWkxYGNRhQ+cUi8LKX1kPakDcGU8cpYpITyO/wMVpe X-Received: by 2002:a17:907:36e:: with SMTP id rs14mr15039514ejb.42.1616348902033; Sun, 21 Mar 2021 10:48:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616348902; cv=none; d=google.com; s=arc-20160816; b=b7K7KmDnJMXJJD7Mw3xlBYQ4y5dLKx91iVCcnkubBMGrLw2UndbmffiQ75c3Wp/vsD I3q5k6bFudYAKNI0T7/1ugWqTuqW0ZNtNqZ+Y/iDYbKtUhwtZLr9AT5gI9ISltkIZVtd 6RBlD+uDiMKgaB36VnEccY5Q9MtRC+CQatKpo0JYT88ZN8Ex58QToxveAArh39XE6GKm G3pxZ+EFdtF5pAqR9uPBl6p3sZ3GwncWjw8ATYMG/UbxE2fTaVFAJlkiS+xWcJyxqyDS ezInmHXRLGRfEi8ae6XO5W4HAxhONDrimZT1AR47nBI9Lhjr2rXmSGVbz1+CKzdNxDPO IZZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=gY+T76PD6n4Zq7EzfJEFoF/hF7FVg9UqN4TGv3xMD1w=; b=uTtZLv03NJOQ19Nz8P243gQPsf+G+eM5SZa7uKpc+OviH+3b7miFV+b8UITjNjIoFs YHqm4NBRre1TRuFV1KwkKjz9+o2Ync9ssFmuaE89t7drHhBw3OWvYwsdWVolpsZsKdnf edahMUG9mjyARZAf4ZZeklC9/Cl/OOEemtiOZxtwU22K/wFP8O9MH8AOshuuOmYZPqfd gehQa1Wg0bipuoueJhy68VA2g8/WFGJI2E3pv8mXQCFa/jVud7GHVgPHNP8290R9MK4+ dOToZ1L+m/uFkicLLeFNNnZJGJap9zUzaTHowFkRl+IaWjpU7hznvOsYqDUFhVyLetgi 0mYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c3si9503080edv.329.2021.03.21.10.47.59; Sun, 21 Mar 2021 10:48:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230340AbhCURhl convert rfc822-to-8bit (ORCPT + 99 others); Sun, 21 Mar 2021 13:37:41 -0400 Received: from saturn.retrosnub.co.uk ([46.235.226.198]:34920 "EHLO saturn.retrosnub.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230327AbhCURhX (ORCPT ); Sun, 21 Mar 2021 13:37:23 -0400 Received: from jic23-huawei (cpc108967-cmbg20-2-0-cust86.5-4.cable.virginm.net [81.101.6.87]) by saturn.retrosnub.co.uk (Postfix; Retrosnub mail submission) with ESMTPSA id EC3B09E0079; Sun, 21 Mar 2021 17:37:15 +0000 (GMT) Date: Sun, 21 Mar 2021 17:37:13 +0000 From: Jonathan Cameron To: "Sa, Nuno" Cc: Alexandru Ardelean , Jonathan Cameron , Lars-Peter Clausen , "zzzzArdelean, zzzzAlexandru" , LKML , linux-iio , "Hennerich, Michael" , "Bogdan, Dragos" Subject: Re: [PATCH v6 20/24] iio: buffer: add ioctl() to support opening extra buffers for IIO device Message-ID: <20210321173713.2691e0bb@jic23-huawei> In-Reply-To: <20210320174100.6808ad36@jic23-huawei> References: <20210215104043.91251-1-alexandru.ardelean@analog.com> <20210215104043.91251-21-alexandru.ardelean@analog.com> <877ca331-1a56-1bd3-6637-482bbf060ba9@metafoo.de> <20210228143429.00001f01@Huawei.com> <5f9070a5-2c3d-f185-1981-10ec768dbb4a@metafoo.de> <20210228172753.0000568c@Huawei.com> <20210320174100.6808ad36@jic23-huawei> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 20 Mar 2021 17:41:00 +0000 Jonathan Cameron wrote: > On Mon, 15 Mar 2021 09:58:08 +0000 > "Sa, Nuno" wrote: > > > > -----Original Message----- > > > From: Alexandru Ardelean > > > Sent: Saturday, March 6, 2021 6:01 PM > > > To: Jonathan Cameron > > > Cc: Lars-Peter Clausen ; zzzzArdelean, > > > zzzzAlexandru ; LKML > > kernel@vger.kernel.org>; linux-iio ; > > > Hennerich, Michael ; Jonathan > > > Cameron ; Sa, Nuno ; > > > Bogdan, Dragos > > > Subject: Re: [PATCH v6 20/24] iio: buffer: add ioctl() to support opening > > > extra buffers for IIO device > > > > > > [External] > > > > > > On Sun, Feb 28, 2021 at 9:00 PM Jonathan Cameron > > > wrote: > > > > > > > > On Sun, 28 Feb 2021 16:51:51 +0100 > > > > Lars-Peter Clausen wrote: > > > > > > > > > On 2/28/21 3:34 PM, Jonathan Cameron wrote: > > > > > > On Sun, 28 Feb 2021 09:51:38 +0100 > > > > > > Lars-Peter Clausen wrote: > > > > > > > > > > > >> On 2/15/21 11:40 AM, Alexandru Ardelean wrote: > > > > > >>> With this change, an ioctl() call is added to open a character > > > device for a > > > > > >>> buffer. The ioctl() number is 'i' 0x91, which follows the > > > > > >>> IIO_GET_EVENT_FD_IOCTL ioctl. > > > > > >>> > > > > > >>> The ioctl() will return an FD for the requested buffer index. > > > The indexes > > > > > >>> are the same from the /sys/iio/devices/iio:deviceX/bufferY > > > (i.e. the Y > > > > > >>> variable). > > > > > >>> > > > > > >>> Since there doesn't seem to be a sane way to return the FD for > > > buffer0 to > > > > > >>> be the same FD for the /dev/iio:deviceX, this ioctl() will return > > > another > > > > > >>> FD for buffer0 (or the first buffer). This duplicate FD will be > > > able to > > > > > >>> access the same buffer object (for buffer0) as accessing > > > directly the > > > > > >>> /dev/iio:deviceX chardev. > > > > > >>> > > > > > >>> Also, there is no IIO_BUFFER_GET_BUFFER_COUNT ioctl() > > > implemented, as the > > > > > >>> index for each buffer (and the count) can be deduced from > > > the > > > > > >>> '/sys/bus/iio/devices/iio:deviceX/bufferY' folders (i.e the > > > number of > > > > > >>> bufferY folders). > > > > > >>> > > > > > >>> Used following C code to test this: > > > > > >>> ------------------------------------------------------------------- > > > > > >>> > > > > > >>> #include > > > > > >>> #include > > > > > >>> #include > > > > > >>> #include > > > > > >>> #include > > > > >>> #include > > > > > >>> > > > > > >>> #define IIO_BUFFER_GET_FD_IOCTL _IOWR('i', 0x91, int) > > > > > >>> > > > > > >>> int main(int argc, char *argv[]) > > > > > >>> { > > > > > >>> int fd; > > > > > >>> int fd1; > > > > > >>> int ret; > > > > > >>> > > > > > >>> if ((fd = open("/dev/iio:device0", O_RDWR))<0) { > > > > > >>> fprintf(stderr, "Error open() %d errno %d\n",fd, > > > errno); > > > > > >>> return -1; > > > > > >>> } > > > > > >>> > > > > > >>> fprintf(stderr, "Using FD %d\n", fd); > > > > > >>> > > > > > >>> fd1 = atoi(argv[1]); > > > > > >>> > > > > > >>> ret = ioctl(fd, IIO_BUFFER_GET_FD_IOCTL, &fd1); > > > > > >>> if (ret < 0) { > > > > > >>> fprintf(stderr, "Error for buffer %d ioctl() %d errno > > > %d\n", fd1, ret, errno); > > > > > >>> close(fd); > > > > > >>> return -1; > > > > > >>> } > > > > > >>> > > > > > >>> fprintf(stderr, "Got FD %d\n", fd1); > > > > > >>> > > > > > >>> close(fd1); > > > > > >>> close(fd); > > > > > >>> > > > > > >>> return 0; > > > > > >>> } > > > > > >>> ------------------------------------------------------------------- > > > > > >>> > > > > > >>> Results are: > > > > > >>> ------------------------------------------------------------------- > > > > > >>> # ./test 0 > > > > > >>> Using FD 3 > > > > > >>> Got FD 4 > > > > > >>> > > > > > >>> # ./test 1 > > > > > >>> Using FD 3 > > > > > >>> Got FD 4 > > > > > >>> > > > > > >>> # ./test 2 > > > > > >>> Using FD 3 > > > > > >>> Got FD 4 > > > > > >>> > > > > > >>> # ./test 3 > > > > > >>> Using FD 3 > > > > > >>> Got FD 4 > > > > > >>> > > > > > >>> # ls /sys/bus/iio/devices/iio\:device0 > > > > > >>> buffer buffer0 buffer1 buffer2 buffer3 dev > > > > > >>> in_voltage_sampling_frequency in_voltage_scale > > > > > >>> in_voltage_scale_available > > > > > >>> name of_node power scan_elements subsystem uevent > > > > > >>> ------------------------------------------------------------------- > > > > > >>> > > > > > >>> iio:device0 has some fake kfifo buffers attached to an IIO > > > device. > > > > > >> For me there is one major problem with this approach. We only > > > allow one > > > > > >> application to open /dev/iio:deviceX at a time. This means we > > > can't have > > > > > >> different applications access different buffers of the same > > > device. I > > > > > >> believe this is a circuital feature. > > > > > > Thats not quite true (I think - though I've not tested it). What we > > > don't > > > > > > allow is for multiple processes to access them in an unaware > > > fashion. > > > > > > My assumption is we can rely on fork + fd passing via appropriate > > > sockets. > > > > > > > > > > > >> It is possible to open the chardev, get the annonfd, close the > > > chardev > > > > > >> and keep the annonfd open. Then the next application can do > > > the same and > > > > > >> get access to a different buffer. But this has room for race > > > conditions > > > > > >> when two applications try this at the very same time. > > > > > >> > > > > > >> We need to somehow address this. > > > > > > I'd count this as a bug :). It could be safely done in a particular > > > custom > > > > > > system but in general it opens a can of worm. > > > > > > > > > > > >> I'm also not much of a fan of using ioctls to create annon fds. In > > > part > > > > > >> because all the standard mechanisms for access control no > > > longer work. > > > > > > The inability to trivially have multiple processes open the anon > > > fds > > > > > > without care is one of the things I like most about them. > > > > > > > > > > > > IIO drivers and interfaces really aren't designed for multiple > > > unaware > > > > > > processes to access them. We don't have per process controls > > > for device > > > > > > wide sysfs attributes etc. In general, it would be hard to > > > > > > do due to the complexity of modeling all the interactions > > > between the > > > > > > different interfaces (events / buffers / sysfs access) in a generic > > > fashion. > > > > > > > > > > > > As such, the model, in my head at least, is that we only want a > > > single > > > > > > process to ever be responsible for access control. That process > > > can then > > > > > > assign access to children or via a deliberate action (I think passing > > > the > > > > > > anon fd over a unix socket should work for example). The intent > > > being > > > > > > that it is also responsible for mediating access to infrastructure > > > that > > > > > > multiple child processes all want to access. > > > > > > > > > > > > As such, having one chrdev isn't a disadvantage because only one > > > process > > > > > > should ever open it at a time. This same process also handles the > > > > > > resource / control mediation. Therefore we should only have > > > one file > > > > > > exposed for all the standard access control mechanisms. > > > > > > > > > > > Hm, I see your point, but I'm not convinced. > > > > > > > > > > Having to have explicit synchronization makes it difficult to mix and > > > > > match. E.g. at ADI a popular use case for testing was to run some > > > signal > > > > > generator application on the TX buffer and some signal analyzer > > > > > application on the RX buffer. > > > > > > > > > > Both can be launched independently and there can be different > > > types of > > > > > generator and analyzer applications. Having to have a 3rd > > > application to > > > > > arbitrate access makes this quite cumbersome. And I'm afraid that > > > in > > > > > reality people might just stick with the two devices model just to > > > avoid > > > > > this restriction. > > > > > > > > I'd argue that's a problem best tackled in a library - though it's a bit > > > > fiddly. It ought to be possible to make it invisible that this level > > > > of sharing is going on. The management process you describe would > > > probably > > > > be a thread running inside the first process to try and access a given > > > device. > > > > A second process failing to open the file with -EBUSY then connects > > > to > > > > appropriate socket (via path in /tmp or similar) and asks for the FD. > > > > There are race conditions that might make it fail, but a retry loop > > > should > > > > deal with those. > > > > > > > > I agree people might just stick to a two device model and if the > > > devices > > > > are independent enough I'm not sure that is the wrong way to > > > approach the > > > > problem. It represents the independence and that the driver is > > > being careful > > > > that it both can and is safely handle independent simultaneous > > > accessors. > > > > We are always going to have some drivers doing that anyway > > > because they've > > > > already been doing that for years. > > > > > > > > > > This is the last of the 3 patches that I need to re-spin after Lars' review. > > > I have a good handle on the small stuff. > > > > > > I'm not sure about the race-condition about which Lars was talking > > > about. > > > I mean, I get the problem, but is it a problem that we should fix in the > > > kernel? > > > > Hi all, > > > > FWIW, I think that this really depends on the chosen ABI. If we do use > > the ioctl to return the buffer fd and just allow one app to hold the chardev > > at a time, I agree with Alex that this is not really a race and is just something > > that userspace needs to deal with.... > > > > That said and giving my superficial (I did not really read the full series) piece on this, > > I get both Lars and Jonathan points and, personally, it feels that the most natural thing > > would be to have a chardev per buffer... > > > > On the other hand, AFAIC, events are also being handled in the same chardev as > > buffers, which makes things harder in terms of consistency... Events are per device > > and not per buffers right? My point is that, to have a chardev per buffer, it would make > > sense to detach events from the buffer stuff and that seems to be not doable without > > breaking ABI (we would probably need to assume that events and buffer0 are on the > > same chardev). > > Events are interesting as there is no particular reason to assume the driver > handling buffer0 is the right one to deal with them. It might just as easily > be the case that they are of interest to a process that is concerned with buffer1. > > To add a bit more flavour to my earlier comments. > > I'm still concerned that if we did do multiple /dev/* files it would allow code > to think it has complete control over the device when it really doesn't. > Events are just one aspect of that. > > We have had discussions in the past about allowing multiple userspace consumers > for a single buffer, but the conclusion there was that was a job for userspace > (daemon or similar) software which can deal with control inter dependencies etc. > > There are already potential messy corners we don't handle for userspace > iio buffers vs in kernel users (what happens if they both try to control the > sampling frequency?) I'm not keen to broaden this problem set. > If a device genuinely has separate control and pipelines for different > buffers then we are probably better representing that cleanly as > an mfd type layer and two separate IIO devices. Its effectively the > same a multi chip package. > > A more classic multibuffer usecase is the one where you have related > datastreams that run at different rates (often happens in devices with > tagged FIFO elements). These are tightly coupled but we need to split > the data stream (or add tagging to our FIFOs.). Another case would be > DMA based device that puts channels into buffers that are entirely > separate in memory address rather than interleaved. > > So I still need to put together a PoC, but it feels like there are various > software models that will give the illusion of there being separate > /dev/* files, but with an aspect of control being possible. > > 1. Daemon, if present that can hand off chardevs to who needs them > 2. Library to make the first user of the buffer responsible for providing > service to other users. Yes there are races, but I don't think they > are hard to deal in normal usecases. (retry loops) Hi Nuno / Others, Nuno's mention of things being similar for the event anon FD to the situation for the buffer anon FDs made me realise there was a horrible short cut to a proof of concept that didn't require me to wire up a multiple buffer device. Upshot, is that I've just sent out a (definitely not for merging) hacked up version of the iio_event_monitor that can act as server or client. The idea is that the socket handling looks a bit like what I'd expect to see hidden away in a library so as to allow 1) Client 1 is after buffer 3. It tries to open the /dev/iio\:deviceX chrdev and succeeds. It spins up a thread with a listening socket for /tmp/iio\:deviceX-magic Continues in main thread to request buffer 3. 2) Client 2 is after buffer 2 I tries to open the /dev/iio\:deviceX chrdev and fails. It sleeps a moment (reduces chance of race with client 1) It opens a connection to the socket via /tmp/iio\:deviceX-magic Sends a request for the buffer 2 FD. Thread in Client 1 calls the ioctl to get the buffer 2 FD which it then sends on to Client 2 which can use it as if it had requested it directly. We might want to have a generic server version as well that doesn't itself make use of any of the buffers as keeps the model more symmetric and reduce common corner cases. Anyhow the code I put together is terrible, but I wasn't 100% sure there weren't any issues passing anon fd file handles and this shows that at least in theory the approach I proposed above works. Test is something like ./iio_events_network /dev/iio\:device1 ./iio_events_network -c Then make some events happen (I was using the dummy driver and the event generator associated with that). The server in this PoC just quits after handling off the FD. Jonathan > > Jonathan > > > > > > - Nuno Sá >