Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2536878rwb; Wed, 30 Nov 2022 07:48:27 -0800 (PST) X-Google-Smtp-Source: AA0mqf7R1mUBMW4nhxFCf+xcSGdIGr74MLOAYIgobDmMr1LBnklfoVLjNnEgo1yd5xIIn3mq8uzC X-Received: by 2002:a05:6402:1943:b0:46a:e4cd:5204 with SMTP id f3-20020a056402194300b0046ae4cd5204mr6866495edz.402.1669823307525; Wed, 30 Nov 2022 07:48:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669823307; cv=none; d=google.com; s=arc-20160816; b=knWSnA4J3rAB65qrxYqHJ0FsvRktk69DftohyE/OWTP61Pg4Q+ZcwDs0GqoNCjN6BJ gNa2D2QtN14w5WSCBlxjzAnLRBGFRiODavnp3drQTA71DHWj0mj/kScO5H+ruWyYAN/1 o19b354zWfyaqz2h+2JRFz1a6WstKeOWLh88l4oLsD+VEDNsNsKNP06/ydlj6M2HFP19 hXNAavu0nq5maGJ4NG0OdlGKVPwAcocxrLhX7PDrzI8JwqOsZkxjxeNLmQ2uLEVJoFhN 1EHZchYocB+RA5xDWnBXJNletkP6+B4rsW0K2Xy0niboibmOnyXVI7tlSFPOgosJZK53 lgog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=oQ9dPsuO3NH7LD/dPayMRzr2bJuPWc28ti+5YXyo6Lo=; b=mCFgkKyk9pOm++A2nb+OeuxtkjXYCKOta+BfUNYnbZnnIn03NGSHtaNPaCdX/O/+Mn 00dqRHSmHQ3p0vfddXpdgDdNsvh654WTSXnE8w1+QiquCSn5obBeVicmgX4l0Ie5WwV5 w3u999QvcMgl4+twlgPc8P6fWATvBiuy0uHGCqq/Xtj2GCuba5JyjRWe2AtWjT1JbdAq CKuDXvqg3qJwjVGVnA2XUT6OF5YRQEq9iElnGgwZ9t0WbU36EzhLwhyD8uMTiygrpTAi GGRqwklrwzqvRD5LDDxW0PX9aGlRJJiQCmBSRPNCl54GaRVNfLMeT7bAAu6vzS49pCrx S0Og== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@igalia.com header.s=20170329 header.b=h6hMWKg1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u12-20020aa7d88c000000b0046a94bba042si1554822edq.410.2022.11.30.07.48.03; Wed, 30 Nov 2022 07:48:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@igalia.com header.s=20170329 header.b=h6hMWKg1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229521AbiK3PYK (ORCPT + 83 others); Wed, 30 Nov 2022 10:24:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229693AbiK3PYI (ORCPT ); Wed, 30 Nov 2022 10:24:08 -0500 Received: from fanzine2.igalia.com (fanzine2.igalia.com [213.97.179.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6394C7E40A for ; Wed, 30 Nov 2022 07:24:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=igalia.com; s=20170329; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From: References:Cc:To:Subject:MIME-Version:Date:Message-ID:Sender:Reply-To: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=oQ9dPsuO3NH7LD/dPayMRzr2bJuPWc28ti+5YXyo6Lo=; b=h6hMWKg1nF8fxST1CkhnfvYovh ufRy684CUnMt5QyuAmcYo14AF5YDB2vyNT3O42Y2fKH3Q5GISG6rqCI2F2uaQQyTjkgg4F5hfT0rN AqEX9MH+8uyV/K6AYPa177HqQBd1+gAcIlkcHi9V5/LP69UppHI4YcS1ldcG6v8XEYuA0jQmyQrvV KOV5ZtWRl/nprilkrGXDr0LbaXCkIiTY0YAsg+3qFD99cefkB5WTRQ6j8shE87MNfmdYij4h5J2F2 Wes50rDCDJBtwWKV8XVn9aJN8jPs8Qa0B+3fgkvOqfUdA43xW5JDhmp5CSbcziKlhyRqVfX+RZDxw t9Ci+U7w==; Received: from 200-207-99-62.dsl.telesp.net.br ([200.207.99.62] helo=[192.168.1.111]) by fanzine2.igalia.com with esmtpsa (Cipher TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_128_GCM:128) (Exim) id 1p0OwH-00BgmO-9q; Wed, 30 Nov 2022 16:23:57 +0100 Message-ID: <2dbf222e-7694-ea5e-c35d-663011c16e84@igalia.com> Date: Wed, 30 Nov 2022 12:23:35 -0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Subject: Re: [PATCH v3 0/2] drm: Add GPU reset sysfs Content-Language: en-US To: Simon Ser , Pekka Paalanen Cc: dri-devel@lists.freedesktop.org, amd-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org, kernel-dev@igalia.com, alexander.deucher@amd.com, contactshashanksharma@gmail.com, amaranath.somalapuram@amd.com, christian.koenig@amd.com, pierre-eric.pelloux-prayer@amd.com, Rob Clark , Andrey Grodzovsky , Daniel Vetter , Daniel Stone , =?UTF-8?B?J01hcmVrIE9sxaHDoWsn?= , Dave Airlie , "Pierre-Loup A . Griffais" References: <20221125175203.52481-1-andrealmeid@igalia.com> <20221128112528.1206b1f5@eldfell> <584UdQAqoPr4vSxCTJg70LFQm--HpHH-EhnAo78lRAZ89OnrDkUeKlTnDGT_DMzDT3PeEtmXNsrqB6GuiV4TsZv3pBU8kFWjyPLWGrevIMw=@emersion.fr> From: =?UTF-8?Q?Andr=c3=a9_Almeida?= In-Reply-To: <584UdQAqoPr4vSxCTJg70LFQm--HpHH-EhnAo78lRAZ89OnrDkUeKlTnDGT_DMzDT3PeEtmXNsrqB6GuiV4TsZv3pBU8kFWjyPLWGrevIMw=@emersion.fr> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/28/22 06:30, Simon Ser wrote: > The PID is racy, the user-space daemon could end up killing an > unrelated process… Is there any way we could use a pidfd instead? Is the PID race condition something that really happens or rather something theoretical? Anyway, I can't see how pidfd and uevent would work together. Since uevent it's kind of a broadcast and pidfd is an anon file, it wouldn't be possible to say to userspace which is the fd to be used giving that file descriptors are per process resources. On the other hand, this interface could be converted to be an ioctl that userspace would block waiting for a reset notification, then the kernel could create a pidfd and give to the blocked process the right fd. We would probably need a queue to make sure no event is lost. Thanks André