Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2513193ybd; Mon, 24 Jun 2019 07:43:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqxxS9Q8VApzELVzg14L57gPjHeDYCBYUUQLsz7X4w3E4PtZ4RQYrFWpK+ubceNVk1cMBklV X-Received: by 2002:a17:902:d717:: with SMTP id w23mr99008909ply.275.1561387404312; Mon, 24 Jun 2019 07:43:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561387404; cv=none; d=google.com; s=arc-20160816; b=I0FOP4m56AP7rnzxc6JQvB9e/J/MDvMNFiJMsf1OFYfOHyEULXIY0A6NNIMnTt131F gPSWUAXWJIzWmXtAp69U0VH7HJ8lupifI5NlIhwceGes0JAXIbxk6DJ3+7D8gRn/kt4/ n9xV5xCkeh5dIaigxSMXySuSIPWxDwmaGvvlaPUvoBG5xsogEV9wbRMmJGAHKo9o/zBs mdjI6fsryDrLcw3WaLWQDbITIU7u0eN867fIIzDHTsxjrYobJQCGrHbbXPHTL4X4nPbz QsaP1Xy5jxnAkHiscY9FYU4vhUZsiqlQWVkUjIH70Eq7BhnZJ5uj3CeEvWKmyc2zLOTG 4OQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=KN5bkMHx6kebB2vKR/qLT56DmaebzkmF7b1E7KxBHVQ=; b=zVwq71LwRw1OyYr2qcARUHcZnxJyxHKHbBX2nUDBcxKikgh3Og10nzd9lhEbrIpZ9p 7qcKv2AjaWEzglLVmeANGecWzBFfTjFASOmB3e7siiX4Sq0ycPHzcl3Crg2hBY3rpq2I BtxGZJAuOLqXMITvErtnFC1YPzt60myTM0fRu4tmextJJttn3lJxLFdgF8MSNB2xgjgv gBrKfLiHzgt1dL07zrGDC4zsl+rqAPtSt58SgupY/Q+bh1lqlNzO7vSJC5wehudBibMH vM6bSnH6zJ45ky2CDhDZl1vSAxuwEkpeP4+o9kRA/f4hfcpcM8d5bq0KtQnZH8HhiNBd PZmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j62si11297519pfb.272.2019.06.24.07.43.08; Mon, 24 Jun 2019 07:43:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729881AbfFXOml (ORCPT + 99 others); Mon, 24 Jun 2019 10:42:41 -0400 Received: from mx2.suse.de ([195.135.220.15]:50422 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727742AbfFXOmE (ORCPT ); Mon, 24 Jun 2019 10:42:04 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5A878AF3F; Mon, 24 Jun 2019 14:42:03 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Al Viro , Linus Torvalds , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v5 10/14] epoll: support polling from userspace for ep_modify() Date: Mon, 24 Jun 2019 16:41:47 +0200 Message-Id: <20190624144151.22688-11-rpenyaev@suse.de> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190624144151.22688-1-rpenyaev@suse.de> References: <20190624144151.22688-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When epfd is polled from userspace and item is being modified: 1. Update user item with new pointer or poll flags. 2. Add event to user ring if needed. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Al Viro Cc: Linus Torvalds Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- fs/eventpoll.c | 32 +++++++++++++++++++++++++++----- 1 file changed, 27 insertions(+), 5 deletions(-) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index df96569d3b5a..f94608ca9f7a 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -2265,6 +2265,7 @@ static int ep_insert(struct eventpoll *ep, const struct epoll_event *event, static int ep_modify(struct eventpoll *ep, struct epitem *epi, const struct epoll_event *event) { + __poll_t revents; int pwake = 0; poll_table pt; @@ -2276,10 +2277,24 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, * Set the new event interest mask before calling f_op->poll(); * otherwise we might miss an event that happens between the * f_op->poll() call and the new event set registering. + * + * Use xchg() here because we can race with ep_clear_public_event_bits() + * for the case when events are polled from userspace. Internally + * ep_clear_public_event_bits() uses cmpxchg(), thus on some archs + * we can't mix normal writes and cmpxchg(). */ - epi->event.events = event->events; /* need barrier below */ + (void) xchg(&epi->event.events, event->events); epi->event.data = event->data; /* protected by mtx */ - if (epi->event.events & EPOLLWAKEUP) { + + /* Update user item, barrier is below */ + if (ep_polled_by_user(ep)) { + struct uepitem *uepi = uep_item_from_epi(epi); + struct epoll_uitem *uitem; + + uitem = &ep->user_header->items[uepi->bit]; + WRITE_ONCE(uitem->events, event->events); + WRITE_ONCE(uitem->data, event->data); + } else if (epi->event.events & EPOLLWAKEUP) { if (!ep_has_wakeup_source(epi)) ep_create_wakeup_source(epi); } else if (ep_has_wakeup_source(epi)) { @@ -2312,12 +2327,19 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, * If the item is "hot" and it is not registered inside the ready * list, push it inside. */ - if (ep_item_poll(epi, &pt, 1)) { + revents = ep_item_poll(epi, &pt, 1); + if (revents) { + bool added = false; + write_lock_irq(&ep->lock); - if (!ep_is_linked(epi)) { + if (ep_polled_by_user(ep)) + added = ep_add_event_to_uring(epi, revents); + else if (!ep_is_linked(epi)) { list_add_tail(&epi->rdllink, &ep->rdllist); ep_pm_stay_awake(epi); - + added = true; + } + if (added) { /* Notify waiting tasks that events are available */ if (waitqueue_active(&ep->wq)) wake_up(&ep->wq); -- 2.21.0