Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp458827ybj; Tue, 5 May 2020 01:44:39 -0700 (PDT) X-Google-Smtp-Source: APiQypKvx1kCZtre/5IH0fJxCllmYiYvo2fiGtKQYzDhYvzQ3Gw5C37MW8zc487iU3P+cphjtCHr X-Received: by 2002:a17:906:b2c4:: with SMTP id cf4mr1720991ejb.340.1588668279034; Tue, 05 May 2020 01:44:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588668279; cv=none; d=google.com; s=arc-20160816; b=RYl086XkOx/tYp5OqEJQE6aaN6l5WvroQyHfkRqWZHUqWNsJMf+JAAOcUSinR8mOuX DJu0FrlbR30f0zRwAzCkATqE+0bximyxi0+5OC3+7zcPaCbVtBj9QP9EfO66udc+GZG/ 2Mn9jeGqgijFWZUKsBqPdOzATuXpOVAEf17EBgYr48WBUg3+dATgE8PWkNWIHwmPgtSs LklQcK0EWB+4viwZS2GODAsO6+FqxFrZrrM7vFhp54h27PkKjp6H3MjqgTh9301Y9rYa YlUcopFKYrLR/f1KMOb/Pkyp3mgpOdcByzPsZUNKTPngXMdEcIVa7Cb5FBAOImHVmlOW mTSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :message-id:date:subject:cc:from; bh=rHcB5pQQqYdb0Aok0qks9+/8mRWCQ1hQN5eEZKAb0Wg=; b=pvu20zCD+OsKQQGsJ4yvx/YiQueAWQweAmv4C06xBGojszlUV0N5PjNg9ZC/BVNoeG SxPgcLvBbs1FpD6vEFtQep7/hNwrlnA6thQkMlgSG8+CfXSb+EKI0A11iDLXVGBWKVE7 pZ4EoZOiJlGl4sd7BlzXZzhEXw6NNcoBuJ12OV/tdsvcQRlm8tF0usiFC3B2p0tqC8bp FAT6BN/Yr7y2JuT1BcVKI1rfF1aV+3sowM3FONOca6wcn11OVt8891/IrtqedFEL6r9x PrlqmVEKl7kvwhy72Fl52P6v83USbT2nk3s8uxZPPDBH24YboLkmINEHI2I3l5tATQDu 5d/Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kt5si734742ejb.455.2020.05.05.01.44.16; Tue, 05 May 2020 01:44:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728544AbgEEIlA (ORCPT + 99 others); Tue, 5 May 2020 04:41:00 -0400 Received: from mx2.suse.de ([195.135.220.15]:39200 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725915AbgEEIlA (ORCPT ); Tue, 5 May 2020 04:41:00 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id C6BE0AFF3; Tue, 5 May 2020 08:41:00 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Jason Baron , Andrew Morton , Khazhismel Kumykov , Alexander Viro , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH 1/1] epoll: call final ep_events_available() check under the lock Date: Tue, 5 May 2020 10:40:49 +0200 Message-Id: <20200505084049.1779243-1-rpenyaev@suse.de> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The original problem was described here: https://lkml.org/lkml/2020/4/27/1121 There is a possible race when ep_scan_ready_list() leaves ->rdllist and ->obflist empty for a short period of time although some events are pending. It is quite likely that ep_events_available() observes empty lists and goes to sleep. Since 339ddb53d373 ("fs/epoll: remove unnecessary wakeups of nested epoll") we are conservative in wakeups (there is only one place for wakeup and this is ep_poll_callback()), thus ep_events_available() must always observe correct state of two lists. The easiest and correct way is to do the final check under the lock. This does not impact the performance, since lock is taken anyway for adding a wait entry to the wait queue. In this patch barrierless __set_current_state() is used. This is safe since waitqueue_active() is called under the same lock on wakeup side. Short-circuit for fatal signals (i.e. fatal_signal_pending() check) is moved to the line just before actual events harvesting routine. This is fully compliant to what is said in the comment of the patch where the actual fatal_signal_pending() check was added: c257a340ede0 ("fs, epoll: short circuit fetching events if thread has been killed"). Signed-off-by: Roman Penyaev Reported-by: Jason Baron Cc: Andrew Morton Cc: Khazhismel Kumykov Cc: Alexander Viro Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: stable@vger.kernel.org --- fs/eventpoll.c | 48 ++++++++++++++++++++++++++++-------------------- 1 file changed, 28 insertions(+), 20 deletions(-) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index aba03ee749f8..8453e5403283 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -1879,34 +1879,33 @@ static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, * event delivery. */ init_wait(&wait); - write_lock_irq(&ep->lock); - __add_wait_queue_exclusive(&ep->wq, &wait); - write_unlock_irq(&ep->lock); + write_lock_irq(&ep->lock); /* - * We don't want to sleep if the ep_poll_callback() sends us - * a wakeup in between. That's why we set the task state - * to TASK_INTERRUPTIBLE before doing the checks. + * Barrierless variant, waitqueue_active() is called under + * the same lock on wakeup ep_poll_callback() side, so it + * is safe to avoid an explicit barrier. */ - set_current_state(TASK_INTERRUPTIBLE); + __set_current_state(TASK_INTERRUPTIBLE); + /* - * Always short-circuit for fatal signals to allow - * threads to make a timely exit without the chance of - * finding more events available and fetching - * repeatedly. + * Do the final check under the lock. ep_scan_ready_list() + * plays with two lists (->rdllist and ->ovflist) and there + * is always a race when both lists are empty for short + * period of time although events are pending, so lock is + * important. */ - if (fatal_signal_pending(current)) { - res = -EINTR; - break; + eavail = ep_events_available(ep); + if (!eavail) { + if (signal_pending(current)) + res = -EINTR; + else + __add_wait_queue_exclusive(&ep->wq, &wait); } + write_unlock_irq(&ep->lock); - eavail = ep_events_available(ep); - if (eavail) - break; - if (signal_pending(current)) { - res = -EINTR; + if (eavail || res) break; - } if (!schedule_hrtimeout_range(to, slack, HRTIMER_MODE_ABS)) { timed_out = 1; @@ -1927,6 +1926,15 @@ static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, } send_events: + if (fatal_signal_pending(current)) + /* + * Always short-circuit for fatal signals to allow + * threads to make a timely exit without the chance of + * finding more events available and fetching + * repeatedly. + */ + res = -EINTR; + /* * Try to transfer events to user space. In case we get 0 events and * there's still timeout left over, we go trying again in search of -- 2.24.1