Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161783AbWKITmy (ORCPT ); Thu, 9 Nov 2006 14:42:54 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1161209AbWKITmy (ORCPT ); Thu, 9 Nov 2006 14:42:54 -0500 Received: from x35.xmailserver.org ([69.30.125.51]:19692 "EHLO x35.xmailserver.org") by vger.kernel.org with ESMTP id S1161802AbWKITmw (ORCPT ); Thu, 9 Nov 2006 14:42:52 -0500 X-AuthUser: davidel@xmailserver.org Date: Thu, 9 Nov 2006 11:42:49 -0800 (PST) From: Davide Libenzi X-X-Sender: davide@alien.or.mcafeemobile.com To: Evgeniy Polyakov cc: David Miller , Ulrich Drepper , Andrew Morton , netdev , Zach Brown , Christoph Hellwig , Chase Venters , Johann Borck , Linux Kernel Mailing List , Jeff Garzik Subject: Re: [take24 3/6] kevent: poll/select() notifications. In-Reply-To: <20061109191036.GA30138@2ka.mipt.ru> Message-ID: References: <11630606373650@2ka.mipt.ru> <20061109191036.GA30138@2ka.mipt.ru> X-GPG-FINGRPRINT: CFAE 5BEE FD36 F65E E640 56FE 0974 BF23 270F 474E X-GPG-PUBLIC_KEY: http://www.xmailserver.org/davidel.asc MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2577 Lines: 71 On Thu, 9 Nov 2006, Evgeniy Polyakov wrote: > On Thu, Nov 09, 2006 at 10:51:56AM -0800, Davide Libenzi (davidel@xmailserver.org) wrote: > > On Thu, 9 Nov 2006, Evgeniy Polyakov wrote: > > > > > +static int kevent_poll_callback(struct kevent *k) > > > +{ > > > + if (k->event.req_flags & KEVENT_REQ_LAST_CHECK) { > > > + return 1; > > > + } else { > > > + struct file *file = k->st->origin; > > > + unsigned int revents = file->f_op->poll(file, NULL); > > > + > > > + k->event.ret_data[0] = revents & k->event.event; > > > + > > > + return (revents & k->event.event); > > > + } > > > +} > > > > You need to be careful that file->f_op->poll is not called inside the > > spin_lock_irqsave/spin_lock_irqrestore pair, since (even this came up > > during epoll developemtn days) file->f_op->poll might do a simple > > spin_lock_irq/spin_unlock_irq. This unfortunate constrain forced epoll to > > have a suboptimal double O(R) loop to handle LT events. > > It is tricky - users call wake_up() from any context, which in turn ends > up calling kevent_storage_ready(), which calls kevent_poll_callback() with > KEVENT_REQ_LAST_CHECK bit set, which becomes almost empty call in fast > path. Since callback returns 1, kevent will be queued into ready queue, > which is processed on behalf of syscalls - in that case kevent will > check the flag and since KEVENT_REQ_LAST_CHECK is set, will call > callback again to check if kevent is correctly marked, but already > without that flag (it happens in syscall context, i.e. process context > without any locks held), so callback calls ->poll(), which can sleep, > but it is safe. If ->poll() returns 'ready' value, kevent is transfers > data into userspace, otherwise it is 'requeued' (just removed from > ready queue). Oh, mine was only a general warn. I hadn't looked at the generic code before. But now that I poke on it, I see: void kevent_requeue(struct kevent *k) { unsigned long flags; spin_lock_irqsave(&k->st->lock, flags); __kevent_requeue(k, 0); spin_unlock_irqrestore(&k->st->lock, flags); } and then: static int __kevent_requeue(struct kevent *k, u32 event) { int ret, rem; unsigned long flags; ret = k->callbacks.callback(k); Isn't the k->callbacks.callback() possibly end up calling f_op->poll? - Davide - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/