Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3539154ybv; Mon, 10 Feb 2020 01:43:19 -0800 (PST) X-Google-Smtp-Source: APXvYqwggsKH/LV3yoCQ3pKYzkTlHuheoeVOONMdHevnd94AO9HrbPxHVrSPPWTky+bTFrjgg60b X-Received: by 2002:aca:3805:: with SMTP id f5mr310430oia.6.1581327799564; Mon, 10 Feb 2020 01:43:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581327799; cv=none; d=google.com; s=arc-20160816; b=rf1BpstS1sKT4eFEY9xefUtl9bRGKgjcWhhSPSew+Kc6Wg4G7rFonvR08UXPQoz8X1 RySPdYqsS59WWnG71XLjtrlYxMUp9iB8h0zPfkLkJep0MSlkMEUAzuXjVgAZQSq4V8iU zzUP6n3+/S64SsIwynP63U3a/XroK7kUAgZXzXkcIIpsWR4E7uC/Ou73PEy3tF8V/gG8 sqkeKF6dpEK10UU9AVsaPDgoxj7AQV9oRW70LNHiAEAi8+iI3+3B7KLOnjP4OS2OoHGt a2CuaPpI/n/5nYmaCRaz3svvetZUDyom9yfNVsDUA1pcexQQBOr8jvMhHPzgyeui8w9G uMmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=HWlQlJI6JE6+lKpBoKmZQ3LG9KCzoXMIonU+rg7AoZg=; b=JKj/pbMTOkvVI3IaPMH0Bx3MeWKialqx2e3hxUON3qfNjh2L3xpNEE/YPfhEN9sXob rYTA+BImQiNhHcyYMdliDxHvs+kkKUXNcYRXvKPKP/4405BcZjMBpp8rIbr5+oE3q+wI 664rCQdqkIhCeaijf08Li1IbK5W55L+AJwscBZdOBiJdpQkgJ2nbHBWgvYIEOMjV/oZW 5aew2q0Ow4sKkfgPSTZpq+mZYDIsiv+u1WBKhuc2l8aryx9AOdJ/Ih1DN3LbfJ+2q8oN ay777yrPlMb2QcvZUSbg6s7rX/b4sVOd9Qkf+6dxbk20iWmZZHL8GCv1AcC7mDa71rr9 QCaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u12si7814504oiv.13.2020.02.10.01.43.08; Mon, 10 Feb 2020 01:43:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727529AbgBJJmT (ORCPT + 99 others); Mon, 10 Feb 2020 04:42:19 -0500 Received: from mx2.suse.de ([195.135.220.15]:51726 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726950AbgBJJmS (ORCPT ); Mon, 10 Feb 2020 04:42:18 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 8F822ADEE; Mon, 10 Feb 2020 09:42:16 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Max Neunhoeffer , Jakub Kicinski , Christopher Kohlhoff , Davidlohr Bueso , Jason Baron , Andrew Morton , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 2/3] epoll: ep->wq can be woken up unlocked in certain cases Date: Mon, 10 Feb 2020 10:41:22 +0100 Message-Id: <20200210094123.389854-2-rpenyaev@suse.de> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200210094123.389854-1-rpenyaev@suse.de> References: <20200210094123.389854-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now ep->lock is responsible for wqueue serialization, thus if ep->lock is taken on write path, wake_up_locked() can be invoked. Though, read path is different. Since concurrent cpus can enter the wake up function it needs to be internally serialized, thus wake_up() variant is used which implies internal spin lock. Signed-off-by: Roman Penyaev Cc: Max Neunhoeffer Cc: Jakub Kicinski Cc: Christopher Kohlhoff Cc: Davidlohr Bueso Cc: Jason Baron Cc: Andrew Morton Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- Nothing interesting in v2: changed the comment a bit fs/eventpoll.c | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index eee3c92a9ebf..6e218234bd4a 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -1173,7 +1173,7 @@ static inline bool chain_epi_lockless(struct epitem *epi) * Another thing worth to mention is that ep_poll_callback() can be called * concurrently for the same @epi from different CPUs if poll table was inited * with several wait queues entries. Plural wakeup from different CPUs of a - * single wait queue is serialized by wq.lock, but the case when multiple wait + * single wait queue is serialized by ep->lock, but the case when multiple wait * queues are used should be detected accordingly. This is detected using * cmpxchg() operation. */ @@ -1248,6 +1248,12 @@ static int ep_poll_callback(wait_queue_entry_t *wait, unsigned mode, int sync, v break; } } + /* + * Since here we have the read lock (ep->lock) taken, plural + * wakeup from different CPUs can occur, thus we call wake_up() + * variant which implies its own lock on wqueue. All other paths + * take write lock. + */ wake_up(&ep->wq); } if (waitqueue_active(&ep->poll_wait)) @@ -1551,7 +1557,7 @@ static int ep_insert(struct eventpoll *ep, const struct epoll_event *event, /* Notify waiting tasks that events are available */ if (waitqueue_active(&ep->wq)) - wake_up(&ep->wq); + wake_up_locked(&ep->wq); if (waitqueue_active(&ep->poll_wait)) pwake++; } @@ -1657,7 +1663,7 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, /* Notify waiting tasks that events are available */ if (waitqueue_active(&ep->wq)) - wake_up(&ep->wq); + wake_up_locked(&ep->wq); if (waitqueue_active(&ep->poll_wait)) pwake++; } -- 2.24.1