Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2512642ybd; Mon, 24 Jun 2019 07:42:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqxvyHxFZC/be9ZDvLhT+f7yOHyn5ECWTEnFp+0/tEBObL4CCslhopAfKoh+7nDrEzPz6LJ6 X-Received: by 2002:a17:90a:9bc5:: with SMTP id b5mr25476057pjw.109.1561387372492; Mon, 24 Jun 2019 07:42:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561387372; cv=none; d=google.com; s=arc-20160816; b=CeLuqnadJFhgt3y4CSptREuGNn6k+VvBYHog5Pp6oYp82oDCYEwhMu8YB3UFxTkOA2 MpxP4jq94WPOaRX8vc2zjLlR0/HImbxrWi6Wlu0AX9m5Qgs5nUiXHpEu3Qae4JAoio68 wZKxEUs8C4hRXcGNdDMzu5yqTdtIebKn5c3Rg9fo21MTMMQFIBCdxNLQ/275L//6X78Y CPlHmn6Vr0SYOQTtP9UHGCwhdRJFs/9bRixvLbcbuUGoi8SWqO2RlYcCd5Kf/tB+cdC6 N96wg2e3jCkNkGSQiiRGokVqcoEaBe+UD/qHkC1yzDUoenEAe03PZ9X3wjFZrqr3e7hj YxCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=Tmps4DnX6Aj/TfYyj/Vlepdev/g3Z5aRAm6uRxcBeqw=; b=TPZitRmVxgnDDN7LRR65nu3KIR+rnpLvcBXXflAaH3nLmJGVUbpQgtbQ6eCgmKXos8 8vDtzX0PY609zGy2vUtHs91oUlP5mG6c1XyBSXoqmwjapddVCZuboOdK2RuhYksyXOlk vNxYJi/oD1Uo2kWmYTOoXCLIwRrudnQvcBQEZPVbCMWvD3OUwG667izwaBNwghA2Jkg2 qQtJ/HfI50NQLjtFnF0yb6i9paEav+zcoadzsuVLMSQ1c9u39RIiTSb0UyeP4+heEXYj nXmtqfdWrMmMitGxOjGQfbNnUsPlidSP4VTYGlgxw5TNpaZgWD1Ulf7ZGqELLcRm/VkJ KcQA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g16si9760113plo.211.2019.06.24.07.42.36; Mon, 24 Jun 2019 07:42:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729453AbfFXOmT (ORCPT + 99 others); Mon, 24 Jun 2019 10:42:19 -0400 Received: from mx2.suse.de ([195.135.220.15]:50430 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729026AbfFXOmF (ORCPT ); Mon, 24 Jun 2019 10:42:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id A32E8AF70; Mon, 24 Jun 2019 14:42:03 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Al Viro , Linus Torvalds , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v5 11/14] epoll: support polling from userspace for ep_poll() Date: Mon, 24 Jun 2019 16:41:48 +0200 Message-Id: <20190624144151.22688-12-rpenyaev@suse.de> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190624144151.22688-1-rpenyaev@suse.de> References: <20190624144151.22688-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rule of thumb for epfd polled from userspace is simple: epfd has events if ->head != ->tail, no traversing of each item is performed. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Al Viro Cc: Linus Torvalds Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- fs/eventpoll.c | 69 ++++++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 59 insertions(+), 10 deletions(-) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index f94608ca9f7a..1d4a76ff5dff 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -481,6 +481,13 @@ static inline bool ep_polled_by_user(struct eventpoll *ep) return ep_userpoll_supported() && !!ep->user_header; } +static inline bool ep_uring_events_available(struct eventpoll *ep) +{ + return ep_polled_by_user(ep) && + READ_ONCE(ep->user_header->head) != + READ_ONCE(ep->user_header->tail); +} + /** * ep_events_available - Checks if ready events might be available. * @@ -492,7 +499,8 @@ static inline bool ep_polled_by_user(struct eventpoll *ep) static inline int ep_events_available(struct eventpoll *ep) { return !list_empty_careful(&ep->rdllist) || - READ_ONCE(ep->ovflist) != EP_UNACTIVE_PTR; + READ_ONCE(ep->ovflist) != EP_UNACTIVE_PTR || + ep_uring_events_available(ep); } #ifdef CONFIG_NET_RX_BUSY_POLL @@ -1330,7 +1338,7 @@ static void ep_ptable_queue_proc(struct file *file, wait_queue_head_t *whead, static __poll_t ep_item_poll(const struct epitem *epi, poll_table *pt, int depth) { - struct eventpoll *ep; + struct eventpoll *ep, *tep; bool locked; pt->_key = epi->event.events; @@ -1339,6 +1347,26 @@ static __poll_t ep_item_poll(const struct epitem *epi, poll_table *pt, ep = epi->ffd.file->private_data; poll_wait(epi->ffd.file, &ep->poll_wait, pt); + + tep = epi->ffd.file->private_data; + if (ep_polled_by_user(tep)) { + /* + * The behaviour differs comparing to full scan of ready + * list for original epoll. If descriptor is pollable + * from userspace we don't do scan of all ready user items: + * firstly because we can't do reverse search of epi by + * uitem bit, secondly this is simply waste of time for + * edge triggered descriptors (user code should be prepared + * to deal with EAGAIN returned from read() or write() on + * inserted file descriptor) and thirdly once event is put + * into user index ring do not touch it from kernel, what + * we do is mark it as EPOLLREMOVED on ep_remove() and + * that's it. + */ + return ep_uring_events_available(tep) ? + EPOLLIN | EPOLLRDNORM : 0; + } + locked = pt && (pt->_qproc == ep_ptable_queue_proc); return ep_scan_ready_list(epi->ffd.file->private_data, @@ -1381,6 +1409,12 @@ static __poll_t ep_eventpoll_poll(struct file *file, poll_table *wait) /* Insert inside our poll wait queue */ poll_wait(file, &ep->poll_wait, wait); + if (ep_polled_by_user(ep)) { + /* Please read detailed comments inside ep_item_poll() */ + return ep_uring_events_available(ep) ? + EPOLLIN | EPOLLRDNORM : 0; + } + /* * Proceed to find out if wanted events are really available inside * the ready list. @@ -2445,6 +2479,8 @@ static int ep_send_events(struct eventpoll *ep, { struct ep_send_events_data esed; + WARN_ON(ep_polled_by_user(ep)); + esed.maxevents = maxevents; esed.events = events; @@ -2491,6 +2527,12 @@ static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, lockdep_assert_irqs_enabled(); + if (ep_polled_by_user(ep)) { + if (ep_uring_events_available(ep)) + /* Firstly all events from ring have to be consumed */ + return -ESTALE; + } + if (timeout > 0) { struct timespec64 end_time = ep_set_mstimeout(timeout); @@ -2579,14 +2621,21 @@ static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, __set_current_state(TASK_RUNNING); send_events: - /* - * Try to transfer events to user space. In case we get 0 events and - * there's still timeout left over, we go trying again in search of - * more luck. - */ - if (!res && eavail && - !(res = ep_send_events(ep, events, maxevents)) && !timed_out) - goto fetch_events; + if (!res && eavail) { + if (!ep_polled_by_user(ep)) { + /* + * Try to transfer events to user space. In case we get + * 0 events and there's still timeout left over, we go + * trying again in search of more luck. + */ + res = ep_send_events(ep, events, maxevents); + if (!res && !timed_out) + goto fetch_events; + } else { + /* User has to deal with the ring himself */ + res = -ESTALE; + } + } if (waiter) { spin_lock_irq(&ep->wq.lock); -- 2.21.0