On 5/5/06, Greg KH <[email protected]> wrote:
On Fri, May 05, 2006 at 05:15:02PM -0400, Jon Smirl wrote:
> On 5/5/06, Greg KH <[email protected]> wrote:
> >On Fri, May 05, 2006 at 04:35:17PM -0400, Jon Smirl wrote:
> >> On 5/5/06, Greg KH <[email protected]> wrote:
> >> >On Fri, May 05, 2006 at 04:14:00PM -0400, Jon Smirl wrote:
> >> >> I would like to see other design alternatives considered on this
> >> >> issue. The 'enable' attribute has a clear problem in that you can't
> >> >> tell which user space program is trying to control the device.
> >> >> Multiple programs accessing the video hardware with poor coordination
> >> >> is already the source of many problems.
> >> >
> >> >Who cares who "enabled" the device. Remember, the majority of PCI
> >> >devices in the system are not video ones. Lots of other types of
> >> >devices want this ability to enable PCI devices from userspace. I've
> >> >been talking with some people about how to properly write PCI drivers in
> >> >userspace, and this attribute is a needed part of it.
> >>
> >> User space program enables the device.
> >> Next I load a device driver
> >> next I rmmod the device driver and it disables the device
> >> user space program trys to use the device
> >> No coordination and user space program faults
> >
> >Gun. Foot. Shoot.
>
> Why do we want to create problem like this when there is a simple
> solution to preventing them. All it takes is a couple of rules:
>
> 1) To use a device it must have a device driver. It may be as simple
> as a couple of lines of code. This driver will cause a device node to
> be created.
>
> 2) If a user app want to use the device it opens the device node.
>
> This builds a system where everybody knows what is going on. The
> driver knows that user space is using the device. Multiple user space
> users are blocked from conflicting because of the open. There is no
> way to shoot yourself in the foot.
That sounds like a nice way to mediate userspace usages of PCI devices,
yes. Much like a dot lockfile is done for tty devices today, all in
userspace (which hints that this too can be done in userspace with no
kernel involvement...)
But it still has nothing to do with this enable sysfs file :)
It has everything to do with the 'enable' file. The 'enable' file lets
you change the state of the hardware without an ownership mechanism.
Other device users will not be notified of the state change. Since the
other users can't be sure of the state of the hardware when they are
activated, they will have to reload their state into the hardware on
every activation.
So as a result of this every interrupt service routine should now
include pci_enable(). If you don't include this and someone from user
space disables the hardware you're going to GPF. fbdev is already
forced to take defensive measures like this since X will randomly
disable it's hardware while it has an ISR active.
On the other hand, if you say you're only going to enable hardware and
not disable it, then we should simply get rid of the PCI
enable/disable functions and permanently enable everything at boot.
--
Jon Smirl
[email protected]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]