Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4568257ybi; Tue, 11 Jun 2019 08:44:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqyNJOh5pDqhiiNEUnfuuvkzOVkkIkCQgZiQjHUirza732GaXYxVRObAzxka6gayV8FI39MU X-Received: by 2002:a17:90a:1a0d:: with SMTP id 13mr21802839pjk.99.1560267864575; Tue, 11 Jun 2019 08:44:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560267864; cv=none; d=google.com; s=arc-20160816; b=Fb0739bgh1r8EQnmnNotaKkbVeKsHzAFkI0vWq/8oiKcb0glSTBZxJsIcErBvUvEnY ujCRq6i7i1xm2Bw+bwyp49FbNpHUU2PEx8xq+g9wRhH0HjbpR/0QKngL5A2MlbMFxrK2 Fo5C9zXgsVXFm5U3GRzRRatbd4lIycVPy2qbCySF5aoCUpeFvvudDM1P7miW5DmUZKHG aJLjR8XwggjR8U4x6fNdWVzTjQwccenzlzDkS2JGUNTy2sOqvim00Lxa0O9B9+wYA1f6 0yvgTZmfcYXPNr3xQCGEkGnlyHNNxad8OB7igv0kl3FZd7BX6bnL+B3FPtP0TPAj6TXi Vixw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=1vefkrY7km0uKsg9WVI7bxC2x/qa+Jba2wetIekV5nA=; b=cPIuoIntNjZZLTPBJBTIzO+S438fACOhvqXUH0qwfHkg1acd/fvwabboZeTjmxzf5K kGl78nZicpl0vOlcLH1s5KpL/n+ljBQMxQVl9Fwv3UuPUE5P50P8qzjebw6uL2zUWGj+ A85YJXtsSCuhcHWLYidWx6l0wBCnbamYyQmHQ8ImqJw/6zaUSZ56agGtggXhM6kg9YdU MJ9okLC/d/7cSLvt2CvFRnYzi6hNI1UFPYj2QVjCzgtN/jipi8KH4lDbtqAiZjB0VQTu dsvEnB8OqDYoQFxqoz5FCVJveTOqT18wvFS4qeDsUIAkvTgWg2/Z3RO6f/h9GaTDW5QY f7Kg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m127si12502219pgm.231.2019.06.11.08.44.08; Tue, 11 Jun 2019 08:44:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391666AbfFKOz2 (ORCPT + 99 others); Tue, 11 Jun 2019 10:55:28 -0400 Received: from mx2.suse.de ([195.135.220.15]:52630 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2404076AbfFKOzU (ORCPT ); Tue, 11 Jun 2019 10:55:20 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 7226AAF1F; Tue, 11 Jun 2019 14:55:19 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Al Viro , Linus Torvalds , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v4 10/14] epoll: support polling from userspace for ep_modify() Date: Tue, 11 Jun 2019 16:54:54 +0200 Message-Id: <20190611145458.9540-11-rpenyaev@suse.de> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190611145458.9540-1-rpenyaev@suse.de> References: <20190611145458.9540-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When epfd is polled from userspace and item is being modified: 1. Update user item with new pointer or poll flags. 2. Add event to user ring if needed. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Al Viro Cc: Linus Torvalds Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- fs/eventpoll.c | 32 +++++++++++++++++++++++++++----- 1 file changed, 27 insertions(+), 5 deletions(-) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index edf7ba28bce0..9f0d48eb360e 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -2239,6 +2239,7 @@ static int ep_insert(struct eventpoll *ep, const struct epoll_event *event, static int ep_modify(struct eventpoll *ep, struct epitem *epi, const struct epoll_event *event) { + __poll_t revents; int pwake = 0; poll_table pt; @@ -2250,10 +2251,24 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, * Set the new event interest mask before calling f_op->poll(); * otherwise we might miss an event that happens between the * f_op->poll() call and the new event set registering. + * + * Use xchg() here because we can race with ep_clear_public_event_bits() + * for the case when events are polled from userspace. Internally + * ep_clear_public_event_bits() uses cmpxchg(), thus on some archs + * we can't mix normal writes and cmpxchg(). */ - epi->event.events = event->events; /* need barrier below */ + xchg(&epi->event.events, event->events); epi->event.data = event->data; /* protected by mtx */ - if (epi->event.events & EPOLLWAKEUP) { + + /* Update user item, barrier is below */ + if (ep_polled_by_user(ep)) { + struct uepitem *uepi = uep_item_from_epi(epi); + struct epoll_uitem *uitem; + + uitem = &ep->user_header->items[uepi->bit]; + WRITE_ONCE(uitem->events, event->events); + WRITE_ONCE(uitem->data, event->data); + } else if (epi->event.events & EPOLLWAKEUP) { if (!ep_has_wakeup_source(epi)) ep_create_wakeup_source(epi); } else if (ep_has_wakeup_source(epi)) { @@ -2286,12 +2301,19 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, * If the item is "hot" and it is not registered inside the ready * list, push it inside. */ - if (ep_item_poll(epi, &pt, 1)) { + revents = ep_item_poll(epi, &pt, 1); + if (revents) { + bool added = false; + write_lock_irq(&ep->lock); - if (!ep_is_linked(epi)) { + if (ep_polled_by_user(ep)) + added = ep_add_event_to_uring(epi, revents); + else if (!ep_is_linked(epi)) { list_add_tail(&epi->rdllink, &ep->rdllist); ep_pm_stay_awake(epi); - + added = true; + } + if (added) { /* Notify waiting tasks that events are available */ if (waitqueue_active(&ep->wq)) wake_up(&ep->wq); -- 2.21.0