2019-10-22 16:25:58 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
|
|
* Basic worker thread pool for io_uring
|
|
|
|
*
|
|
|
|
* Copyright (C) 2019 Jens Axboe
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/sched/signal.h>
|
|
|
|
#include <linux/percpu.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/rculist_nulls.h>
|
2020-10-22 15:02:50 +00:00
|
|
|
#include <linux/cpu.h>
|
2021-02-16 21:15:30 +00:00
|
|
|
#include <linux/tracehook.h>
|
2019-10-22 16:25:58 +00:00
|
|
|
|
|
|
|
#include "io-wq.h"
|
|
|
|
|
|
|
|
#define WORKER_IDLE_TIMEOUT (5 * HZ)
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WORKER_F_UP = 1, /* up and active */
|
|
|
|
IO_WORKER_F_RUNNING = 2, /* account as running */
|
|
|
|
IO_WORKER_F_FREE = 4, /* worker on free list */
|
2020-09-26 18:37:46 +00:00
|
|
|
IO_WORKER_F_FIXED = 8, /* static idle worker */
|
|
|
|
IO_WORKER_F_BOUND = 16, /* is doing bounded work */
|
2019-10-22 16:25:58 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WQ_BIT_EXIT = 0, /* wq exiting */
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WQE_FLAG_STALLED = 1, /* stalled on hash */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* One for each thread in a wqe pool
|
|
|
|
*/
|
|
|
|
struct io_worker {
|
|
|
|
refcount_t ref;
|
|
|
|
unsigned flags;
|
|
|
|
struct hlist_nulls_node nulls_node;
|
2019-11-13 20:54:49 +00:00
|
|
|
struct list_head all_list;
|
2019-10-22 16:25:58 +00:00
|
|
|
struct task_struct *task;
|
|
|
|
struct io_wqe *wqe;
|
2019-11-13 16:43:34 +00:00
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
struct io_wq_work *cur_work;
|
2019-11-13 16:43:34 +00:00
|
|
|
spinlock_t lock;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-02-24 02:59:06 +00:00
|
|
|
struct completion ref_done;
|
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
unsigned long create_state;
|
|
|
|
struct callback_head create_work;
|
|
|
|
int create_index;
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
struct rcu_head rcu;
|
|
|
|
};
|
|
|
|
|
|
|
|
#if BITS_PER_LONG == 64
|
|
|
|
#define IO_WQ_HASH_ORDER 6
|
|
|
|
#else
|
|
|
|
#define IO_WQ_HASH_ORDER 5
|
|
|
|
#endif
|
|
|
|
|
2020-03-23 19:57:22 +00:00
|
|
|
#define IO_WQ_NR_HASH_BUCKETS (1u << IO_WQ_HASH_ORDER)
|
|
|
|
|
2019-11-07 18:41:16 +00:00
|
|
|
struct io_wqe_acct {
|
|
|
|
unsigned nr_workers;
|
|
|
|
unsigned max_workers;
|
2021-03-08 16:37:51 +00:00
|
|
|
int index;
|
2019-11-07 18:41:16 +00:00
|
|
|
atomic_t nr_running;
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WQ_ACCT_BOUND,
|
|
|
|
IO_WQ_ACCT_UNBOUND,
|
|
|
|
};
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
/*
|
|
|
|
* Per-node worker thread pool
|
|
|
|
*/
|
|
|
|
struct io_wqe {
|
|
|
|
struct {
|
2020-09-01 08:41:46 +00:00
|
|
|
raw_spinlock_t lock;
|
2019-11-26 18:59:32 +00:00
|
|
|
struct io_wq_work_list work_list;
|
2019-10-22 16:25:58 +00:00
|
|
|
unsigned flags;
|
|
|
|
} ____cacheline_aligned_in_smp;
|
|
|
|
|
|
|
|
int node;
|
2019-11-07 18:41:16 +00:00
|
|
|
struct io_wqe_acct acct[2];
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2019-11-14 15:00:41 +00:00
|
|
|
struct hlist_nulls_head free_list;
|
2019-11-13 20:54:49 +00:00
|
|
|
struct list_head all_list;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-02-19 19:33:30 +00:00
|
|
|
struct wait_queue_entry wait;
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
struct io_wq *wq;
|
2020-03-23 19:57:22 +00:00
|
|
|
struct io_wq_work *hash_tail[IO_WQ_NR_HASH_BUCKETS];
|
2021-06-17 16:08:11 +00:00
|
|
|
|
|
|
|
cpumask_var_t cpu_mask;
|
2019-10-22 16:25:58 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Per io_wq state
|
|
|
|
*/
|
|
|
|
struct io_wq {
|
|
|
|
unsigned long state;
|
|
|
|
|
2020-03-04 13:14:12 +00:00
|
|
|
free_work_fn *free_work;
|
2020-06-08 18:08:20 +00:00
|
|
|
io_wq_work_fn *do_work;
|
2019-11-13 05:31:31 +00:00
|
|
|
|
2021-02-19 19:33:30 +00:00
|
|
|
struct io_wq_hash *hash;
|
|
|
|
|
2021-02-26 16:47:20 +00:00
|
|
|
atomic_t worker_refs;
|
|
|
|
struct completion worker_done;
|
|
|
|
|
2020-10-22 15:02:50 +00:00
|
|
|
struct hlist_node cpuhp_node;
|
2021-02-16 21:15:30 +00:00
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
struct task_struct *task;
|
2021-06-14 01:36:12 +00:00
|
|
|
|
|
|
|
struct io_wqe *wqes[];
|
2019-10-22 16:25:58 +00:00
|
|
|
};
|
|
|
|
|
2020-10-22 15:02:50 +00:00
|
|
|
static enum cpuhp_state io_wq_online;
|
|
|
|
|
2021-03-03 22:47:04 +00:00
|
|
|
struct io_cb_cancel_data {
|
|
|
|
work_cancel_fn *fn;
|
|
|
|
void *data;
|
|
|
|
int nr_running;
|
|
|
|
int nr_pending;
|
|
|
|
bool cancel_all;
|
|
|
|
};
|
|
|
|
|
2021-08-08 13:54:34 +00:00
|
|
|
static void create_io_worker(struct io_wq *wq, struct io_wqe *wqe, int index, bool first);
|
2021-08-03 15:14:35 +00:00
|
|
|
static void io_wqe_dec_running(struct io_worker *worker);
|
2021-03-03 22:47:04 +00:00
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
static bool io_worker_get(struct io_worker *worker)
|
|
|
|
{
|
|
|
|
return refcount_inc_not_zero(&worker->ref);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void io_worker_release(struct io_worker *worker)
|
|
|
|
{
|
|
|
|
if (refcount_dec_and_test(&worker->ref))
|
2021-02-24 02:59:06 +00:00
|
|
|
complete(&worker->ref_done);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2021-03-22 01:58:28 +00:00
|
|
|
static inline struct io_wqe_acct *io_get_acct(struct io_wqe *wqe, bool bound)
|
|
|
|
{
|
|
|
|
return &wqe->acct[bound ? IO_WQ_ACCT_BOUND : IO_WQ_ACCT_UNBOUND];
|
|
|
|
}
|
|
|
|
|
2019-11-07 18:41:16 +00:00
|
|
|
static inline struct io_wqe_acct *io_work_get_acct(struct io_wqe *wqe,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
{
|
2021-03-22 01:58:28 +00:00
|
|
|
return io_get_acct(wqe, !(work->flags & IO_WQ_WORK_UNBOUND));
|
2019-11-07 18:41:16 +00:00
|
|
|
}
|
|
|
|
|
2021-02-17 16:00:57 +00:00
|
|
|
static inline struct io_wqe_acct *io_wqe_get_acct(struct io_worker *worker)
|
2019-11-07 18:41:16 +00:00
|
|
|
{
|
2021-03-22 01:58:28 +00:00
|
|
|
return io_get_acct(worker->wqe, worker->flags & IO_WORKER_F_BOUND);
|
2019-11-07 18:41:16 +00:00
|
|
|
}
|
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
static void io_worker_ref_put(struct io_wq *wq)
|
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&wq->worker_refs))
|
|
|
|
complete(&wq->worker_done);
|
|
|
|
}
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
static void io_worker_exit(struct io_worker *worker)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = worker->wqe;
|
2021-02-17 16:00:57 +00:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-02-24 02:59:06 +00:00
|
|
|
if (refcount_dec_and_test(&worker->ref))
|
|
|
|
complete(&worker->ref_done);
|
|
|
|
wait_for_completion(&worker->ref_done);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-08-03 15:14:35 +00:00
|
|
|
if (worker->flags & IO_WORKER_F_FREE)
|
2021-02-17 01:00:55 +00:00
|
|
|
hlist_nulls_del_rcu(&worker->nulls_node);
|
2019-11-13 20:54:49 +00:00
|
|
|
list_del_rcu(&worker->all_list);
|
2019-11-07 18:41:16 +00:00
|
|
|
acct->nr_workers--;
|
2021-08-03 15:14:35 +00:00
|
|
|
preempt_disable();
|
|
|
|
io_wqe_dec_running(worker);
|
|
|
|
worker->flags = 0;
|
|
|
|
current->flags &= ~PF_IO_WORKER;
|
|
|
|
preempt_enable();
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2019-11-02 07:55:01 +00:00
|
|
|
kfree_rcu(worker, rcu);
|
2021-03-08 16:37:51 +00:00
|
|
|
io_worker_ref_put(wqe->wq);
|
2021-03-04 19:39:36 +00:00
|
|
|
do_exit(0);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2019-11-07 18:41:16 +00:00
|
|
|
static inline bool io_wqe_run_queue(struct io_wqe *wqe)
|
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
2019-11-26 18:59:32 +00:00
|
|
|
if (!wq_list_empty(&wqe->work_list) &&
|
|
|
|
!(wqe->flags & IO_WQE_FLAG_STALLED))
|
2019-11-07 18:41:16 +00:00
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check head of free list for an available worker. If one isn't available,
|
2021-03-08 16:37:51 +00:00
|
|
|
* caller must create one.
|
2019-11-07 18:41:16 +00:00
|
|
|
*/
|
|
|
|
static bool io_wqe_activate_free_worker(struct io_wqe *wqe)
|
|
|
|
__must_hold(RCU)
|
|
|
|
{
|
|
|
|
struct hlist_nulls_node *n;
|
|
|
|
struct io_worker *worker;
|
|
|
|
|
2021-08-03 15:14:35 +00:00
|
|
|
/*
|
|
|
|
* Iterate free_list and see if we can find an idle worker to
|
|
|
|
* activate. If a given worker is on the free_list but in the process
|
|
|
|
* of exiting, keep trying.
|
|
|
|
*/
|
|
|
|
hlist_nulls_for_each_entry_rcu(worker, n, &wqe->free_list, nulls_node) {
|
|
|
|
if (!io_worker_get(worker))
|
|
|
|
continue;
|
|
|
|
if (wake_up_process(worker->task)) {
|
|
|
|
io_worker_release(worker);
|
|
|
|
return true;
|
|
|
|
}
|
2019-11-07 18:41:16 +00:00
|
|
|
io_worker_release(worker);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We need a worker. If we find a free one, we're good. If not, and we're
|
2021-03-08 16:37:51 +00:00
|
|
|
* below the max number of workers, create one.
|
2019-11-07 18:41:16 +00:00
|
|
|
*/
|
2021-08-30 17:55:22 +00:00
|
|
|
static void io_wqe_create_worker(struct io_wqe *wqe, struct io_wqe_acct *acct)
|
2019-11-07 18:41:16 +00:00
|
|
|
{
|
2021-08-30 17:55:22 +00:00
|
|
|
bool do_create = false, first = false;
|
2019-11-07 18:41:16 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Most likely an attempt to queue unbounded work on an io_wq that
|
|
|
|
* wasn't setup with any unbounded workers.
|
|
|
|
*/
|
2021-06-17 17:13:59 +00:00
|
|
|
if (unlikely(!acct->max_workers))
|
|
|
|
pr_warn_once("io-wq is not configured for unbound workers");
|
2019-11-07 18:41:16 +00:00
|
|
|
|
2021-08-30 17:55:22 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
|
|
|
if (acct->nr_workers < acct->max_workers) {
|
|
|
|
if (!acct->nr_workers)
|
|
|
|
first = true;
|
|
|
|
acct->nr_workers++;
|
|
|
|
do_create = true;
|
|
|
|
}
|
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
if (do_create) {
|
|
|
|
atomic_inc(&acct->nr_running);
|
|
|
|
atomic_inc(&wqe->wq->worker_refs);
|
|
|
|
create_io_worker(wqe->wq, wqe, acct->index, first);
|
2021-03-08 16:37:51 +00:00
|
|
|
}
|
2019-11-07 18:41:16 +00:00
|
|
|
}
|
|
|
|
|
2021-02-17 16:00:57 +00:00
|
|
|
static void io_wqe_inc_running(struct io_worker *worker)
|
2019-11-07 18:41:16 +00:00
|
|
|
{
|
2021-02-17 16:00:57 +00:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
2019-11-07 18:41:16 +00:00
|
|
|
|
|
|
|
atomic_inc(&acct->nr_running);
|
|
|
|
}
|
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
static void create_worker_cb(struct callback_head *cb)
|
|
|
|
{
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
struct io_worker *worker;
|
2021-03-08 16:37:51 +00:00
|
|
|
struct io_wq *wq;
|
2021-08-05 10:05:38 +00:00
|
|
|
struct io_wqe *wqe;
|
|
|
|
struct io_wqe_acct *acct;
|
2021-08-08 13:54:34 +00:00
|
|
|
bool do_create = false, first = false;
|
2021-03-08 16:37:51 +00:00
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
|
|
|
wqe = worker->wqe;
|
2021-08-05 10:05:38 +00:00
|
|
|
wq = wqe->wq;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
acct = &wqe->acct[worker->create_index];
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-08-08 13:54:33 +00:00
|
|
|
if (acct->nr_workers < acct->max_workers) {
|
2021-08-08 13:54:34 +00:00
|
|
|
if (!acct->nr_workers)
|
|
|
|
first = true;
|
2021-08-05 10:05:38 +00:00
|
|
|
acct->nr_workers++;
|
2021-08-08 13:54:33 +00:00
|
|
|
do_create = true;
|
|
|
|
}
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-08-08 13:54:33 +00:00
|
|
|
if (do_create) {
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
create_io_worker(wq, wqe, worker->create_index, first);
|
2021-08-08 13:54:33 +00:00
|
|
|
} else {
|
|
|
|
atomic_dec(&acct->nr_running);
|
|
|
|
io_worker_ref_put(wq);
|
|
|
|
}
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
io_worker_release(worker);
|
2021-03-08 16:37:51 +00:00
|
|
|
}
|
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
static void io_queue_worker_create(struct io_wqe *wqe, struct io_worker *worker,
|
|
|
|
struct io_wqe_acct *acct)
|
2021-03-08 16:37:51 +00:00
|
|
|
{
|
|
|
|
struct io_wq *wq = wqe->wq;
|
|
|
|
|
|
|
|
/* raced with exit, just ignore create call */
|
|
|
|
if (test_bit(IO_WQ_BIT_EXIT, &wq->state))
|
|
|
|
goto fail;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
if (!io_worker_get(worker))
|
|
|
|
goto fail;
|
|
|
|
/*
|
|
|
|
* create_state manages ownership of create_work/index. We should
|
|
|
|
* only need one entry per worker, as the worker going to sleep
|
|
|
|
* will trigger the condition, and waking will clear it once it
|
|
|
|
* runs the task_work.
|
|
|
|
*/
|
|
|
|
if (test_bit(0, &worker->create_state) ||
|
|
|
|
test_and_set_bit_lock(0, &worker->create_state))
|
|
|
|
goto fail_release;
|
2021-03-08 16:37:51 +00:00
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
init_task_work(&worker->create_work, create_worker_cb);
|
|
|
|
worker->create_index = acct->index;
|
|
|
|
if (!task_work_add(wq->task, &worker->create_work, TWA_SIGNAL))
|
|
|
|
return;
|
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
fail_release:
|
|
|
|
io_worker_release(worker);
|
2021-03-08 16:37:51 +00:00
|
|
|
fail:
|
|
|
|
atomic_dec(&acct->nr_running);
|
|
|
|
io_worker_ref_put(wq);
|
|
|
|
}
|
|
|
|
|
2021-02-17 16:00:57 +00:00
|
|
|
static void io_wqe_dec_running(struct io_worker *worker)
|
2019-11-07 18:41:16 +00:00
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
2021-02-17 16:00:57 +00:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
|
|
|
struct io_wqe *wqe = worker->wqe;
|
2019-11-07 18:41:16 +00:00
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
if (!(worker->flags & IO_WORKER_F_UP))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (atomic_dec_and_test(&acct->nr_running) && io_wqe_run_queue(wqe)) {
|
|
|
|
atomic_inc(&acct->nr_running);
|
|
|
|
atomic_inc(&wqe->wq->worker_refs);
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
io_queue_worker_create(wqe, worker, acct);
|
2021-03-08 16:37:51 +00:00
|
|
|
}
|
2019-11-07 18:41:16 +00:00
|
|
|
}
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
/*
|
|
|
|
* Worker will start processing some work. Move it to the busy list, if
|
|
|
|
* it's currently on the freelist
|
|
|
|
*/
|
|
|
|
static void __io_worker_busy(struct io_wqe *wqe, struct io_worker *worker,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
2019-11-07 18:41:16 +00:00
|
|
|
bool worker_bound, work_bound;
|
|
|
|
|
2021-04-06 03:08:45 +00:00
|
|
|
BUILD_BUG_ON((IO_WQ_ACCT_UNBOUND ^ IO_WQ_ACCT_BOUND) != 1);
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
if (worker->flags & IO_WORKER_F_FREE) {
|
|
|
|
worker->flags &= ~IO_WORKER_F_FREE;
|
|
|
|
hlist_nulls_del_init_rcu(&worker->nulls_node);
|
|
|
|
}
|
2019-11-07 18:41:16 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If worker is moving from bound to unbound (or vice versa), then
|
|
|
|
* ensure we update the running accounting.
|
|
|
|
*/
|
2019-11-19 06:22:16 +00:00
|
|
|
worker_bound = (worker->flags & IO_WORKER_F_BOUND) != 0;
|
|
|
|
work_bound = (work->flags & IO_WQ_WORK_UNBOUND) == 0;
|
|
|
|
if (worker_bound != work_bound) {
|
2021-04-06 03:08:45 +00:00
|
|
|
int index = work_bound ? IO_WQ_ACCT_UNBOUND : IO_WQ_ACCT_BOUND;
|
2021-02-17 16:00:57 +00:00
|
|
|
io_wqe_dec_running(worker);
|
2021-04-06 03:08:45 +00:00
|
|
|
worker->flags ^= IO_WORKER_F_BOUND;
|
|
|
|
wqe->acct[index].nr_workers--;
|
|
|
|
wqe->acct[index ^ 1].nr_workers++;
|
2021-02-17 16:00:57 +00:00
|
|
|
io_wqe_inc_running(worker);
|
2019-11-07 18:41:16 +00:00
|
|
|
}
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No work, worker going to sleep. Move to freelist, and unuse mm if we
|
|
|
|
* have one attached. Dropping the mm may potentially sleep, so we drop
|
|
|
|
* the lock in that case and return success. Since the caller has to
|
|
|
|
* retry the loop in that case (we changed task state), we don't regrab
|
|
|
|
* the lock if we return success.
|
|
|
|
*/
|
2021-02-15 20:26:34 +00:00
|
|
|
static void __io_worker_idle(struct io_wqe *wqe, struct io_worker *worker)
|
2019-10-22 16:25:58 +00:00
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
|
|
|
if (!(worker->flags & IO_WORKER_F_FREE)) {
|
|
|
|
worker->flags |= IO_WORKER_F_FREE;
|
2019-11-14 15:00:41 +00:00
|
|
|
hlist_nulls_add_head_rcu(&worker->nulls_node, &wqe->free_list);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-13 21:31:05 +00:00
|
|
|
static inline unsigned int io_get_work_hash(struct io_wq_work *work)
|
|
|
|
{
|
|
|
|
return work->flags >> IO_WQ_HASH_SHIFT;
|
|
|
|
}
|
|
|
|
|
2021-02-19 19:33:30 +00:00
|
|
|
static void io_wait_on_hash(struct io_wqe *wqe, unsigned int hash)
|
|
|
|
{
|
|
|
|
struct io_wq *wq = wqe->wq;
|
|
|
|
|
2021-08-31 12:57:25 +00:00
|
|
|
spin_lock_irq(&wq->hash->wait.lock);
|
2021-02-19 19:33:30 +00:00
|
|
|
if (list_empty(&wqe->wait.entry)) {
|
|
|
|
__add_wait_queue(&wq->hash->wait, &wqe->wait);
|
|
|
|
if (!test_bit(hash, &wq->hash->map)) {
|
|
|
|
__set_current_state(TASK_RUNNING);
|
|
|
|
list_del_init(&wqe->wait.entry);
|
|
|
|
}
|
|
|
|
}
|
2021-08-31 12:57:25 +00:00
|
|
|
spin_unlock_irq(&wq->hash->wait.lock);
|
2021-02-19 19:33:30 +00:00
|
|
|
}
|
|
|
|
|
2021-08-29 22:13:03 +00:00
|
|
|
/*
|
|
|
|
* We can always run the work if the worker is currently the same type as
|
|
|
|
* the work (eg both are bound, or both are unbound). If they are not the
|
|
|
|
* same, only allow it if incrementing the worker count would be allowed.
|
|
|
|
*/
|
|
|
|
static bool io_worker_can_run_work(struct io_worker *worker,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
{
|
|
|
|
struct io_wqe_acct *acct;
|
|
|
|
|
|
|
|
if (!(worker->flags & IO_WORKER_F_BOUND) !=
|
|
|
|
!(work->flags & IO_WQ_WORK_UNBOUND))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
/* not the same type, check if we'd go over the limit */
|
|
|
|
acct = io_work_get_acct(worker->wqe, work);
|
|
|
|
return acct->nr_workers < acct->max_workers;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct io_wq_work *io_get_next_work(struct io_wqe *wqe,
|
2021-08-31 19:53:00 +00:00
|
|
|
struct io_worker *worker)
|
2019-10-22 16:25:58 +00:00
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
2019-11-26 18:59:32 +00:00
|
|
|
struct io_wq_work_node *node, *prev;
|
2020-03-23 19:57:22 +00:00
|
|
|
struct io_wq_work *work, *tail;
|
2021-02-19 19:33:30 +00:00
|
|
|
unsigned int stall_hash = -1U;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2019-11-26 18:59:32 +00:00
|
|
|
wq_list_for_each(node, prev, &wqe->work_list) {
|
2021-02-19 19:33:30 +00:00
|
|
|
unsigned int hash;
|
|
|
|
|
2019-11-26 18:59:32 +00:00
|
|
|
work = container_of(node, struct io_wq_work, list);
|
|
|
|
|
2021-08-29 22:13:03 +00:00
|
|
|
if (!io_worker_can_run_work(worker, work))
|
|
|
|
break;
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
/* not hashed, can run anytime */
|
2020-03-13 21:31:04 +00:00
|
|
|
if (!io_wq_is_hashed(work)) {
|
2020-03-23 19:57:22 +00:00
|
|
|
wq_list_del(&wqe->work_list, node, prev);
|
2019-10-22 16:25:58 +00:00
|
|
|
return work;
|
|
|
|
}
|
|
|
|
|
2020-03-13 21:31:05 +00:00
|
|
|
hash = io_get_work_hash(work);
|
2021-02-19 19:33:30 +00:00
|
|
|
/* all items with this hash lie in [work, tail] */
|
|
|
|
tail = wqe->hash_tail[hash];
|
|
|
|
|
|
|
|
/* hashed, can run if not already running */
|
|
|
|
if (!test_and_set_bit(hash, &wqe->wq->hash->map)) {
|
2020-03-23 19:57:22 +00:00
|
|
|
wqe->hash_tail[hash] = NULL;
|
|
|
|
wq_list_cut(&wqe->work_list, &tail->list, prev);
|
2019-10-22 16:25:58 +00:00
|
|
|
return work;
|
|
|
|
}
|
2021-02-19 19:33:30 +00:00
|
|
|
if (stall_hash == -1U)
|
|
|
|
stall_hash = hash;
|
|
|
|
/* fast forward to a next hash, for-each will fix up @prev */
|
|
|
|
node = &tail->list;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stall_hash != -1U) {
|
2021-08-31 19:53:00 +00:00
|
|
|
/*
|
|
|
|
* Set this before dropping the lock to avoid racing with new
|
|
|
|
* work being added and clearing the stalled bit.
|
|
|
|
*/
|
|
|
|
wqe->flags |= IO_WQE_FLAG_STALLED;
|
2021-02-19 19:33:30 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
io_wait_on_hash(wqe, stall_hash);
|
|
|
|
raw_spin_lock(&wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-03-21 13:06:56 +00:00
|
|
|
static bool io_flush_signals(void)
|
2020-01-27 23:34:48 +00:00
|
|
|
{
|
2021-03-21 20:16:08 +00:00
|
|
|
if (unlikely(test_thread_flag(TIF_NOTIFY_SIGNAL))) {
|
2021-03-21 13:06:56 +00:00
|
|
|
__set_current_state(TASK_RUNNING);
|
2021-03-21 20:16:08 +00:00
|
|
|
tracehook_notify_signal();
|
2021-03-21 13:06:56 +00:00
|
|
|
return true;
|
2020-01-27 23:34:48 +00:00
|
|
|
}
|
2021-03-21 13:06:56 +00:00
|
|
|
return false;
|
2020-03-04 13:14:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void io_assign_current_work(struct io_worker *worker,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
{
|
2020-03-13 21:31:03 +00:00
|
|
|
if (work) {
|
2021-02-16 21:15:30 +00:00
|
|
|
io_flush_signals();
|
2020-03-13 21:31:03 +00:00
|
|
|
cond_resched();
|
|
|
|
}
|
2020-03-04 13:14:09 +00:00
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
spin_lock(&worker->lock);
|
2020-03-04 13:14:09 +00:00
|
|
|
worker->cur_work = work;
|
2021-08-30 12:33:08 +00:00
|
|
|
spin_unlock(&worker->lock);
|
2020-03-04 13:14:09 +00:00
|
|
|
}
|
|
|
|
|
2020-03-13 21:31:05 +00:00
|
|
|
static void io_wqe_enqueue(struct io_wqe *wqe, struct io_wq_work *work);
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
static void io_worker_handle_work(struct io_worker *worker)
|
|
|
|
__releases(wqe->lock)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = worker->wqe;
|
|
|
|
struct io_wq *wq = wqe->wq;
|
2021-04-08 00:54:42 +00:00
|
|
|
bool do_kill = test_bit(IO_WQ_BIT_EXIT, &wq->state);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
|
|
|
do {
|
2020-03-23 19:57:22 +00:00
|
|
|
struct io_wq_work *work;
|
2020-03-04 13:14:11 +00:00
|
|
|
get_next:
|
2019-10-22 16:25:58 +00:00
|
|
|
/*
|
|
|
|
* If we got some work, mark us as busy. If we didn't, but
|
|
|
|
* the list isn't empty, it means we stalled on hashed work.
|
|
|
|
* Mark us stalled so we don't keep looking for work when we
|
|
|
|
* can't make progress, any work completion or insertion will
|
|
|
|
* clear the stalled flag.
|
|
|
|
*/
|
2021-08-31 19:53:00 +00:00
|
|
|
work = io_get_next_work(wqe, worker);
|
2019-10-22 16:25:58 +00:00
|
|
|
if (work)
|
|
|
|
__io_worker_busy(wqe, worker, work);
|
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
if (!work)
|
|
|
|
break;
|
2020-03-04 13:14:10 +00:00
|
|
|
io_assign_current_work(worker, work);
|
2021-02-19 19:33:30 +00:00
|
|
|
__set_current_state(TASK_RUNNING);
|
2019-11-13 16:43:34 +00:00
|
|
|
|
2020-03-04 13:14:09 +00:00
|
|
|
/* handle a whole dependent link */
|
|
|
|
do {
|
2021-02-04 13:52:08 +00:00
|
|
|
struct io_wq_work *next_hashed, *linked;
|
2020-07-25 11:42:00 +00:00
|
|
|
unsigned int hash = io_get_work_hash(work);
|
2020-03-04 13:14:09 +00:00
|
|
|
|
2020-03-23 19:57:22 +00:00
|
|
|
next_hashed = wq_next_work(work);
|
2021-04-08 00:54:42 +00:00
|
|
|
|
|
|
|
if (unlikely(do_kill) && (work->flags & IO_WQ_WORK_UNBOUND))
|
|
|
|
work->flags |= IO_WQ_WORK_CANCEL;
|
2021-02-04 13:52:08 +00:00
|
|
|
wq->do_work(work);
|
|
|
|
io_assign_current_work(worker, NULL);
|
2020-03-04 13:14:09 +00:00
|
|
|
|
2021-02-04 13:52:08 +00:00
|
|
|
linked = wq->free_work(work);
|
2020-03-23 19:57:22 +00:00
|
|
|
work = next_hashed;
|
|
|
|
if (!work && linked && !io_wq_is_hashed(linked)) {
|
|
|
|
work = linked;
|
|
|
|
linked = NULL;
|
|
|
|
}
|
|
|
|
io_assign_current_work(worker, work);
|
|
|
|
if (linked)
|
|
|
|
io_wqe_enqueue(wqe, linked);
|
|
|
|
|
|
|
|
if (hash != -1U && !next_hashed) {
|
2021-02-19 19:33:30 +00:00
|
|
|
clear_bit(hash, &wq->hash->map);
|
|
|
|
if (wq_has_sleeper(&wq->hash->wait))
|
|
|
|
wake_up(&wq->hash->wait);
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2020-03-04 13:14:09 +00:00
|
|
|
wqe->flags &= ~IO_WQE_FLAG_STALLED;
|
2020-03-04 13:14:11 +00:00
|
|
|
/* skip unnecessary unlock-lock wqe->lock */
|
|
|
|
if (!work)
|
|
|
|
goto get_next;
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-11-13 05:31:31 +00:00
|
|
|
}
|
2020-03-04 13:14:10 +00:00
|
|
|
} while (work);
|
2019-11-13 05:31:31 +00:00
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
} while (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int io_wqe_worker(void *data)
|
|
|
|
{
|
|
|
|
struct io_worker *worker = data;
|
|
|
|
struct io_wqe *wqe = worker->wqe;
|
|
|
|
struct io_wq *wq = wqe->wq;
|
2021-03-04 19:39:36 +00:00
|
|
|
char buf[TASK_COMM_LEN];
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-03-04 19:39:36 +00:00
|
|
|
worker->flags |= (IO_WORKER_F_UP | IO_WORKER_F_RUNNING);
|
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
snprintf(buf, sizeof(buf), "iou-wrk-%d", wq->task->pid);
|
2021-03-04 19:39:36 +00:00
|
|
|
set_task_comm(current, buf);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
|
|
|
while (!test_bit(IO_WQ_BIT_EXIT, &wq->state)) {
|
2021-03-13 03:26:13 +00:00
|
|
|
long ret;
|
|
|
|
|
2019-12-08 04:03:59 +00:00
|
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
2019-12-08 04:06:46 +00:00
|
|
|
loop:
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
if (io_wqe_run_queue(wqe)) {
|
|
|
|
io_worker_handle_work(worker);
|
2019-12-08 04:06:46 +00:00
|
|
|
goto loop;
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
2021-02-15 20:26:34 +00:00
|
|
|
__io_worker_idle(wqe, worker);
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-03-21 13:06:56 +00:00
|
|
|
if (io_flush_signals())
|
|
|
|
continue;
|
2021-03-13 03:26:13 +00:00
|
|
|
ret = schedule_timeout(WORKER_IDLE_TIMEOUT);
|
2021-03-26 00:16:06 +00:00
|
|
|
if (signal_pending(current)) {
|
|
|
|
struct ksignal ksig;
|
|
|
|
|
|
|
|
if (!get_signal(&ksig))
|
|
|
|
continue;
|
2021-02-16 21:15:30 +00:00
|
|
|
break;
|
2021-03-26 00:16:06 +00:00
|
|
|
}
|
|
|
|
if (ret)
|
|
|
|
continue;
|
2019-10-22 16:25:58 +00:00
|
|
|
/* timed out, exit unless we're the fixed worker */
|
2021-06-14 01:36:16 +00:00
|
|
|
if (!(worker->flags & IO_WORKER_F_FIXED))
|
2019-10-22 16:25:58 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(IO_WQ_BIT_EXIT, &wq->state)) {
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-06-14 01:36:17 +00:00
|
|
|
io_worker_handle_work(worker);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
io_worker_exit(worker);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called when a worker is scheduled in. Mark us as currently running.
|
|
|
|
*/
|
|
|
|
void io_wq_worker_running(struct task_struct *tsk)
|
|
|
|
{
|
2021-02-16 21:15:30 +00:00
|
|
|
struct io_worker *worker = tsk->pf_io_worker;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-02-16 21:15:30 +00:00
|
|
|
if (!worker)
|
|
|
|
return;
|
2019-10-22 16:25:58 +00:00
|
|
|
if (!(worker->flags & IO_WORKER_F_UP))
|
|
|
|
return;
|
|
|
|
if (worker->flags & IO_WORKER_F_RUNNING)
|
|
|
|
return;
|
|
|
|
worker->flags |= IO_WORKER_F_RUNNING;
|
2021-02-17 16:00:57 +00:00
|
|
|
io_wqe_inc_running(worker);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called when worker is going to sleep. If there are no workers currently
|
2021-03-08 16:37:51 +00:00
|
|
|
* running and we have work pending, wake up a free one or create a new one.
|
2019-10-22 16:25:58 +00:00
|
|
|
*/
|
|
|
|
void io_wq_worker_sleeping(struct task_struct *tsk)
|
|
|
|
{
|
2021-02-16 21:15:30 +00:00
|
|
|
struct io_worker *worker = tsk->pf_io_worker;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-02-16 21:15:30 +00:00
|
|
|
if (!worker)
|
|
|
|
return;
|
2019-10-22 16:25:58 +00:00
|
|
|
if (!(worker->flags & IO_WORKER_F_UP))
|
|
|
|
return;
|
|
|
|
if (!(worker->flags & IO_WORKER_F_RUNNING))
|
|
|
|
return;
|
|
|
|
|
|
|
|
worker->flags &= ~IO_WORKER_F_RUNNING;
|
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&worker->wqe->lock);
|
2021-02-17 16:00:57 +00:00
|
|
|
io_wqe_dec_running(worker);
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&worker->wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2021-08-08 13:54:34 +00:00
|
|
|
static void create_io_worker(struct io_wq *wq, struct io_wqe *wqe, int index, bool first)
|
2021-02-16 21:15:30 +00:00
|
|
|
{
|
2021-03-04 19:39:36 +00:00
|
|
|
struct io_wqe_acct *acct = &wqe->acct[index];
|
2021-02-16 21:15:30 +00:00
|
|
|
struct io_worker *worker;
|
2021-03-04 19:39:36 +00:00
|
|
|
struct task_struct *tsk;
|
2021-02-16 21:15:30 +00:00
|
|
|
|
2021-02-23 22:34:06 +00:00
|
|
|
__set_current_state(TASK_RUNNING);
|
|
|
|
|
2021-02-16 21:15:30 +00:00
|
|
|
worker = kzalloc_node(sizeof(*worker), GFP_KERNEL, wqe->node);
|
|
|
|
if (!worker)
|
2021-03-08 16:37:51 +00:00
|
|
|
goto fail;
|
2021-02-16 21:15:30 +00:00
|
|
|
|
|
|
|
refcount_set(&worker->ref, 1);
|
|
|
|
worker->nulls_node.pprev = NULL;
|
|
|
|
worker->wqe = wqe;
|
|
|
|
spin_lock_init(&worker->lock);
|
2021-02-24 02:59:06 +00:00
|
|
|
init_completion(&worker->ref_done);
|
2021-02-16 21:15:30 +00:00
|
|
|
|
2021-03-04 19:39:36 +00:00
|
|
|
tsk = create_io_thread(io_wqe_worker, worker, wqe->node);
|
|
|
|
if (IS_ERR(tsk)) {
|
2021-02-16 21:15:30 +00:00
|
|
|
kfree(worker);
|
2021-03-08 16:37:51 +00:00
|
|
|
fail:
|
|
|
|
atomic_dec(&acct->nr_running);
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-08-05 10:05:37 +00:00
|
|
|
acct->nr_workers--;
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-03-08 16:37:51 +00:00
|
|
|
io_worker_ref_put(wq);
|
|
|
|
return;
|
2021-02-16 21:15:30 +00:00
|
|
|
}
|
2021-03-04 19:39:36 +00:00
|
|
|
|
|
|
|
tsk->pf_io_worker = worker;
|
|
|
|
worker->task = tsk;
|
2021-06-17 16:08:11 +00:00
|
|
|
set_cpus_allowed_ptr(tsk, wqe->cpu_mask);
|
2021-03-10 02:49:02 +00:00
|
|
|
tsk->flags |= PF_NO_SETAFFINITY;
|
2021-03-04 19:39:36 +00:00
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-03-04 19:39:36 +00:00
|
|
|
hlist_nulls_add_head_rcu(&worker->nulls_node, &wqe->free_list);
|
|
|
|
list_add_tail_rcu(&worker->all_list, &wqe->all_list);
|
|
|
|
worker->flags |= IO_WORKER_F_FREE;
|
|
|
|
if (index == IO_WQ_ACCT_BOUND)
|
|
|
|
worker->flags |= IO_WORKER_F_BOUND;
|
2021-08-08 13:54:34 +00:00
|
|
|
if (first && (worker->flags & IO_WORKER_F_BOUND))
|
2021-03-04 19:39:36 +00:00
|
|
|
worker->flags |= IO_WORKER_F_FIXED;
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-03-04 19:39:36 +00:00
|
|
|
wake_up_new_task(tsk);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2020-09-26 13:26:55 +00:00
|
|
|
/*
|
|
|
|
* Iterate the passed in list and call the specific function for each
|
|
|
|
* worker that isn't exiting
|
|
|
|
*/
|
|
|
|
static bool io_wq_for_each_worker(struct io_wqe *wqe,
|
|
|
|
bool (*func)(struct io_worker *, void *),
|
|
|
|
void *data)
|
|
|
|
{
|
|
|
|
struct io_worker *worker;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
list_for_each_entry_rcu(worker, &wqe->all_list, all_list) {
|
|
|
|
if (io_worker_get(worker)) {
|
|
|
|
/* no task if node is/was offline */
|
|
|
|
if (worker->task)
|
|
|
|
ret = func(worker, data);
|
|
|
|
io_worker_release(worker);
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool io_wq_worker_wake(struct io_worker *worker, void *data)
|
|
|
|
{
|
2021-03-04 19:39:36 +00:00
|
|
|
set_notify_signal(worker->task);
|
2020-09-26 13:26:55 +00:00
|
|
|
wake_up_process(worker->task);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-03-03 22:47:04 +00:00
|
|
|
static bool io_wq_work_match_all(struct io_wq_work *work, void *data)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-03-04 13:14:12 +00:00
|
|
|
static void io_run_cancel(struct io_wq_work *work, struct io_wqe *wqe)
|
2020-03-01 16:18:19 +00:00
|
|
|
{
|
2020-03-04 13:14:12 +00:00
|
|
|
struct io_wq *wq = wqe->wq;
|
|
|
|
|
2020-03-01 16:18:19 +00:00
|
|
|
do {
|
|
|
|
work->flags |= IO_WQ_WORK_CANCEL;
|
2021-02-04 13:52:08 +00:00
|
|
|
wq->do_work(work);
|
|
|
|
work = wq->free_work(work);
|
2020-03-01 16:18:19 +00:00
|
|
|
} while (work);
|
|
|
|
}
|
|
|
|
|
2020-03-23 19:57:22 +00:00
|
|
|
static void io_wqe_insert_work(struct io_wqe *wqe, struct io_wq_work *work)
|
|
|
|
{
|
|
|
|
unsigned int hash;
|
|
|
|
struct io_wq_work *tail;
|
|
|
|
|
|
|
|
if (!io_wq_is_hashed(work)) {
|
|
|
|
append:
|
|
|
|
wq_list_add_tail(&work->list, &wqe->work_list);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
hash = io_get_work_hash(work);
|
|
|
|
tail = wqe->hash_tail[hash];
|
|
|
|
wqe->hash_tail[hash] = work;
|
|
|
|
if (!tail)
|
|
|
|
goto append;
|
|
|
|
|
|
|
|
wq_list_add_after(&work->list, &tail->list, &wqe->work_list);
|
|
|
|
}
|
|
|
|
|
2019-10-22 16:25:58 +00:00
|
|
|
static void io_wqe_enqueue(struct io_wqe *wqe, struct io_wq_work *work)
|
|
|
|
{
|
2019-11-07 18:41:16 +00:00
|
|
|
struct io_wqe_acct *acct = io_work_get_acct(wqe, work);
|
2021-08-30 17:55:22 +00:00
|
|
|
unsigned work_flags = work->flags;
|
|
|
|
bool do_create;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-07-23 17:53:54 +00:00
|
|
|
/*
|
|
|
|
* If io-wq is exiting for this task, or if the request has explicitly
|
|
|
|
* been marked as one that should not get executed, cancel it here.
|
|
|
|
*/
|
|
|
|
if (test_bit(IO_WQ_BIT_EXIT, &wqe->wq->state) ||
|
|
|
|
(work->flags & IO_WQ_WORK_CANCEL)) {
|
2021-03-09 03:04:10 +00:00
|
|
|
io_run_cancel(work, wqe);
|
2021-02-25 17:17:09 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2020-03-23 19:57:22 +00:00
|
|
|
io_wqe_insert_work(wqe, work);
|
2019-10-22 16:25:58 +00:00
|
|
|
wqe->flags &= ~IO_WQE_FLAG_STALLED;
|
2021-08-30 17:55:22 +00:00
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
do_create = !io_wqe_activate_free_worker(wqe);
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-08-30 17:55:22 +00:00
|
|
|
if (do_create && ((work_flags & IO_WQ_WORK_CONCURRENT) ||
|
|
|
|
!atomic_read(&acct->nr_running)))
|
|
|
|
io_wqe_create_worker(wqe, acct);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void io_wq_enqueue(struct io_wq *wq, struct io_wq_work *work)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = wq->wqes[numa_node_id()];
|
|
|
|
|
|
|
|
io_wqe_enqueue(wqe, work);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-03-13 21:31:04 +00:00
|
|
|
* Work items that hash to the same value will not be done in parallel.
|
|
|
|
* Used to limit concurrent writes, generally hashed by inode.
|
2019-10-22 16:25:58 +00:00
|
|
|
*/
|
2020-03-13 21:31:04 +00:00
|
|
|
void io_wq_hash_work(struct io_wq_work *work, void *val)
|
2019-10-22 16:25:58 +00:00
|
|
|
{
|
2020-03-13 21:31:04 +00:00
|
|
|
unsigned int bit;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
|
|
|
bit = hash_ptr(val, IO_WQ_HASH_ORDER);
|
|
|
|
work->flags |= (IO_WQ_WORK_HASHED | (bit << IO_WQ_HASH_SHIFT));
|
|
|
|
}
|
|
|
|
|
2020-03-06 22:15:39 +00:00
|
|
|
static bool io_wq_worker_cancel(struct io_worker *worker, void *data)
|
2019-10-29 03:49:21 +00:00
|
|
|
{
|
2020-03-06 22:15:39 +00:00
|
|
|
struct io_cb_cancel_data *match = data;
|
2019-10-29 03:49:21 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Hold the lock to avoid ->cur_work going out of scope, caller
|
2019-11-13 16:43:34 +00:00
|
|
|
* may dereference the passed in work.
|
2019-10-29 03:49:21 +00:00
|
|
|
*/
|
2021-08-30 12:33:08 +00:00
|
|
|
spin_lock(&worker->lock);
|
2019-10-29 03:49:21 +00:00
|
|
|
if (worker->cur_work &&
|
2020-03-06 22:15:39 +00:00
|
|
|
match->fn(worker->cur_work, match->data)) {
|
2021-02-16 21:15:30 +00:00
|
|
|
set_notify_signal(worker->task);
|
2020-06-15 07:24:03 +00:00
|
|
|
match->nr_running++;
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
2021-08-30 12:33:08 +00:00
|
|
|
spin_unlock(&worker->lock);
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
return match->nr_running && !match->cancel_all;
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2020-08-23 17:33:10 +00:00
|
|
|
static inline void io_wqe_remove_pending(struct io_wqe *wqe,
|
|
|
|
struct io_wq_work *work,
|
|
|
|
struct io_wq_work_node *prev)
|
|
|
|
{
|
|
|
|
unsigned int hash = io_get_work_hash(work);
|
|
|
|
struct io_wq_work *prev_work = NULL;
|
|
|
|
|
|
|
|
if (io_wq_is_hashed(work) && work == wqe->hash_tail[hash]) {
|
|
|
|
if (prev)
|
|
|
|
prev_work = container_of(prev, struct io_wq_work, list);
|
|
|
|
if (prev_work && io_get_work_hash(prev_work) == hash)
|
|
|
|
wqe->hash_tail[hash] = prev_work;
|
|
|
|
else
|
|
|
|
wqe->hash_tail[hash] = NULL;
|
|
|
|
}
|
|
|
|
wq_list_del(&wqe->work_list, &work->list, prev);
|
|
|
|
}
|
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
static void io_wqe_cancel_pending_work(struct io_wqe *wqe,
|
2020-06-15 07:24:02 +00:00
|
|
|
struct io_cb_cancel_data *match)
|
2019-10-22 16:25:58 +00:00
|
|
|
{
|
2019-11-26 18:59:32 +00:00
|
|
|
struct io_wq_work_node *node, *prev;
|
2019-10-22 16:25:58 +00:00
|
|
|
struct io_wq_work *work;
|
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
retry:
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2019-11-26 18:59:32 +00:00
|
|
|
wq_list_for_each(node, prev, &wqe->work_list) {
|
|
|
|
work = container_of(node, struct io_wq_work, list);
|
2020-06-15 07:24:03 +00:00
|
|
|
if (!match->fn(work, match->data))
|
|
|
|
continue;
|
2020-08-23 17:33:10 +00:00
|
|
|
io_wqe_remove_pending(wqe, work, prev);
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2020-06-15 07:24:03 +00:00
|
|
|
io_run_cancel(work, wqe);
|
|
|
|
match->nr_pending++;
|
|
|
|
if (!match->cancel_all)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* not safe to continue after unlock */
|
|
|
|
goto retry;
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
2021-08-30 12:33:08 +00:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2020-06-15 07:24:02 +00:00
|
|
|
}
|
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
static void io_wqe_cancel_running_work(struct io_wqe *wqe,
|
2020-06-15 07:24:02 +00:00
|
|
|
struct io_cb_cancel_data *match)
|
|
|
|
{
|
2019-10-22 16:25:58 +00:00
|
|
|
rcu_read_lock();
|
2020-06-15 07:24:03 +00:00
|
|
|
io_wq_for_each_worker(wqe, io_wq_worker_cancel, match);
|
2019-10-22 16:25:58 +00:00
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
2020-03-06 22:15:39 +00:00
|
|
|
enum io_wq_cancel io_wq_cancel_cb(struct io_wq *wq, work_cancel_fn *cancel,
|
2020-06-15 07:24:03 +00:00
|
|
|
void *data, bool cancel_all)
|
2019-10-22 16:25:58 +00:00
|
|
|
{
|
2020-03-06 22:15:39 +00:00
|
|
|
struct io_cb_cancel_data match = {
|
2020-06-15 07:24:03 +00:00
|
|
|
.fn = cancel,
|
|
|
|
.data = data,
|
|
|
|
.cancel_all = cancel_all,
|
2020-02-09 02:13:32 +00:00
|
|
|
};
|
2019-11-26 18:10:20 +00:00
|
|
|
int node;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2020-06-15 07:24:02 +00:00
|
|
|
/*
|
|
|
|
* First check pending list, if we're lucky we can just remove it
|
|
|
|
* from there. CANCEL_OK means that the work is returned as-new,
|
|
|
|
* no completion will be posted for it.
|
|
|
|
*/
|
2019-11-26 18:10:20 +00:00
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
io_wqe_cancel_pending_work(wqe, &match);
|
|
|
|
if (match.nr_pending && !match.cancel_all)
|
2020-06-15 07:24:02 +00:00
|
|
|
return IO_WQ_CANCEL_OK;
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2020-06-15 07:24:02 +00:00
|
|
|
/*
|
|
|
|
* Now check if a free (going busy) or busy worker has the work
|
|
|
|
* currently running. If we find it there, we'll return CANCEL_RUNNING
|
|
|
|
* as an indication that we attempt to signal cancellation. The
|
|
|
|
* completion will run normally in this case.
|
|
|
|
*/
|
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
io_wqe_cancel_running_work(wqe, &match);
|
|
|
|
if (match.nr_running && !match.cancel_all)
|
2020-06-15 07:24:02 +00:00
|
|
|
return IO_WQ_CANCEL_RUNNING;
|
|
|
|
}
|
|
|
|
|
2020-06-15 07:24:03 +00:00
|
|
|
if (match.nr_running)
|
|
|
|
return IO_WQ_CANCEL_RUNNING;
|
|
|
|
if (match.nr_pending)
|
|
|
|
return IO_WQ_CANCEL_OK;
|
2020-06-15 07:24:02 +00:00
|
|
|
return IO_WQ_CANCEL_NOTFOUND;
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2021-02-19 19:33:30 +00:00
|
|
|
static int io_wqe_hash_wake(struct wait_queue_entry *wait, unsigned mode,
|
|
|
|
int sync, void *key)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = container_of(wait, struct io_wqe, wait);
|
|
|
|
|
|
|
|
list_del_init(&wait->entry);
|
|
|
|
|
|
|
|
rcu_read_lock();
|
2021-03-08 16:37:51 +00:00
|
|
|
io_wqe_activate_free_worker(wqe);
|
2021-02-19 19:33:30 +00:00
|
|
|
rcu_read_unlock();
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-11-25 15:49:20 +00:00
|
|
|
struct io_wq *io_wq_create(unsigned bounded, struct io_wq_data *data)
|
2019-10-22 16:25:58 +00:00
|
|
|
{
|
2021-06-15 14:34:24 +00:00
|
|
|
int ret, node;
|
2019-10-22 16:25:58 +00:00
|
|
|
struct io_wq *wq;
|
|
|
|
|
2020-06-08 18:08:20 +00:00
|
|
|
if (WARN_ON_ONCE(!data->free_work || !data->do_work))
|
2020-03-04 13:14:12 +00:00
|
|
|
return ERR_PTR(-EINVAL);
|
2021-06-17 17:13:59 +00:00
|
|
|
if (WARN_ON_ONCE(!bounded))
|
|
|
|
return ERR_PTR(-EINVAL);
|
2020-03-04 13:14:12 +00:00
|
|
|
|
2021-06-14 01:36:12 +00:00
|
|
|
wq = kzalloc(struct_size(wq, wqes, nr_node_ids), GFP_KERNEL);
|
2019-10-22 16:25:58 +00:00
|
|
|
if (!wq)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2020-10-22 15:02:50 +00:00
|
|
|
ret = cpuhp_state_add_instance_nocalls(io_wq_online, &wq->cpuhp_node);
|
|
|
|
if (ret)
|
2021-06-14 01:36:12 +00:00
|
|
|
goto err_wq;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2021-02-19 19:33:30 +00:00
|
|
|
refcount_inc(&data->hash->refs);
|
|
|
|
wq->hash = data->hash;
|
2020-03-04 13:14:12 +00:00
|
|
|
wq->free_work = data->free_work;
|
2020-06-08 18:08:20 +00:00
|
|
|
wq->do_work = data->do_work;
|
2019-11-13 05:31:31 +00:00
|
|
|
|
2020-10-22 15:02:50 +00:00
|
|
|
ret = -ENOMEM;
|
2019-11-26 18:10:20 +00:00
|
|
|
for_each_node(node) {
|
2019-10-22 16:25:58 +00:00
|
|
|
struct io_wqe *wqe;
|
2020-02-11 13:30:06 +00:00
|
|
|
int alloc_node = node;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2020-02-11 13:30:06 +00:00
|
|
|
if (!node_online(alloc_node))
|
|
|
|
alloc_node = NUMA_NO_NODE;
|
|
|
|
wqe = kzalloc_node(sizeof(struct io_wqe), GFP_KERNEL, alloc_node);
|
2019-10-22 16:25:58 +00:00
|
|
|
if (!wqe)
|
2019-11-26 18:10:20 +00:00
|
|
|
goto err;
|
2021-06-17 16:08:11 +00:00
|
|
|
if (!alloc_cpumask_var(&wqe->cpu_mask, GFP_KERNEL))
|
|
|
|
goto err;
|
|
|
|
cpumask_copy(wqe->cpu_mask, cpumask_of_node(node));
|
2019-11-26 18:10:20 +00:00
|
|
|
wq->wqes[node] = wqe;
|
2020-02-11 13:30:06 +00:00
|
|
|
wqe->node = alloc_node;
|
2021-03-08 16:37:51 +00:00
|
|
|
wqe->acct[IO_WQ_ACCT_BOUND].index = IO_WQ_ACCT_BOUND;
|
|
|
|
wqe->acct[IO_WQ_ACCT_UNBOUND].index = IO_WQ_ACCT_UNBOUND;
|
2019-11-07 18:41:16 +00:00
|
|
|
wqe->acct[IO_WQ_ACCT_BOUND].max_workers = bounded;
|
|
|
|
atomic_set(&wqe->acct[IO_WQ_ACCT_BOUND].nr_running, 0);
|
2021-02-21 23:02:53 +00:00
|
|
|
wqe->acct[IO_WQ_ACCT_UNBOUND].max_workers =
|
2019-11-07 18:41:16 +00:00
|
|
|
task_rlimit(current, RLIMIT_NPROC);
|
|
|
|
atomic_set(&wqe->acct[IO_WQ_ACCT_UNBOUND].nr_running, 0);
|
2021-02-19 19:33:30 +00:00
|
|
|
wqe->wait.func = io_wqe_hash_wake;
|
|
|
|
INIT_LIST_HEAD(&wqe->wait.entry);
|
2019-10-22 16:25:58 +00:00
|
|
|
wqe->wq = wq;
|
2020-09-01 08:41:46 +00:00
|
|
|
raw_spin_lock_init(&wqe->lock);
|
2019-11-26 18:59:32 +00:00
|
|
|
INIT_WQ_LIST(&wqe->work_list);
|
2019-11-14 15:00:41 +00:00
|
|
|
INIT_HLIST_NULLS_HEAD(&wqe->free_list, 0);
|
2019-11-13 20:54:49 +00:00
|
|
|
INIT_LIST_HEAD(&wqe->all_list);
|
2019-10-22 16:25:58 +00:00
|
|
|
}
|
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
wq->task = get_task_struct(data->task);
|
|
|
|
atomic_set(&wq->worker_refs, 1);
|
|
|
|
init_completion(&wq->worker_done);
|
|
|
|
return wq;
|
2019-11-19 15:37:07 +00:00
|
|
|
err:
|
2021-03-01 16:09:56 +00:00
|
|
|
io_wq_put_hash(data->hash);
|
2020-10-22 15:02:50 +00:00
|
|
|
cpuhp_state_remove_instance_nocalls(io_wq_online, &wq->cpuhp_node);
|
2021-06-17 16:08:11 +00:00
|
|
|
for_each_node(node) {
|
|
|
|
if (!wq->wqes[node])
|
|
|
|
continue;
|
|
|
|
free_cpumask_var(wq->wqes[node]->cpu_mask);
|
2019-11-26 18:10:20 +00:00
|
|
|
kfree(wq->wqes[node]);
|
2021-06-17 16:08:11 +00:00
|
|
|
}
|
2020-10-22 15:02:50 +00:00
|
|
|
err_wq:
|
2019-11-19 15:37:07 +00:00
|
|
|
kfree(wq);
|
2019-10-22 16:25:58 +00:00
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
|
2021-04-02 01:57:07 +00:00
|
|
|
static bool io_task_work_match(struct callback_head *cb, void *data)
|
|
|
|
{
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
struct io_worker *worker;
|
2021-04-02 01:57:07 +00:00
|
|
|
|
|
|
|
if (cb->func != create_worker_cb)
|
|
|
|
return false;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
|
|
|
return worker->wqe->wq == data;
|
2021-04-02 01:57:07 +00:00
|
|
|
}
|
|
|
|
|
2021-05-23 14:48:39 +00:00
|
|
|
void io_wq_exit_start(struct io_wq *wq)
|
|
|
|
{
|
|
|
|
set_bit(IO_WQ_BIT_EXIT, &wq->state);
|
|
|
|
}
|
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
static void io_wq_exit_workers(struct io_wq *wq)
|
2021-02-26 20:48:19 +00:00
|
|
|
{
|
2021-03-08 16:37:51 +00:00
|
|
|
struct callback_head *cb;
|
|
|
|
int node;
|
|
|
|
|
|
|
|
if (!wq->task)
|
|
|
|
return;
|
|
|
|
|
2021-04-02 01:57:07 +00:00
|
|
|
while ((cb = task_work_cancel_match(wq->task, io_task_work_match, wq)) != NULL) {
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
struct io_worker *worker;
|
2021-03-08 16:37:51 +00:00
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
|
|
|
atomic_dec(&worker->wqe->acct[worker->create_index].nr_running);
|
2021-03-08 16:37:51 +00:00
|
|
|
io_worker_ref_put(wq);
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 14:37:25 +00:00
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
io_worker_release(worker);
|
2021-03-08 16:37:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
|
|
|
|
|
|
|
io_wq_for_each_worker(wqe, io_wq_worker_wake, NULL);
|
2021-02-26 20:48:19 +00:00
|
|
|
}
|
2021-03-08 16:37:51 +00:00
|
|
|
rcu_read_unlock();
|
|
|
|
io_worker_ref_put(wq);
|
|
|
|
wait_for_completion(&wq->worker_done);
|
2021-05-26 05:08:26 +00:00
|
|
|
|
|
|
|
for_each_node(node) {
|
|
|
|
spin_lock_irq(&wq->hash->wait.lock);
|
|
|
|
list_del_init(&wq->wqes[node]->wait.entry);
|
|
|
|
spin_unlock_irq(&wq->hash->wait.lock);
|
|
|
|
}
|
2021-03-08 16:37:51 +00:00
|
|
|
put_task_struct(wq->task);
|
|
|
|
wq->task = NULL;
|
2021-02-26 20:48:19 +00:00
|
|
|
}
|
|
|
|
|
2021-02-25 17:17:09 +00:00
|
|
|
static void io_wq_destroy(struct io_wq *wq)
|
2019-10-22 16:25:58 +00:00
|
|
|
{
|
2019-11-26 18:10:20 +00:00
|
|
|
int node;
|
2019-10-22 16:25:58 +00:00
|
|
|
|
2020-10-22 15:02:50 +00:00
|
|
|
cpuhp_state_remove_instance_nocalls(io_wq_online, &wq->cpuhp_node);
|
|
|
|
|
2021-02-19 19:33:30 +00:00
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
2021-03-25 16:16:12 +00:00
|
|
|
struct io_cb_cancel_data match = {
|
|
|
|
.fn = io_wq_work_match_all,
|
|
|
|
.cancel_all = true,
|
|
|
|
};
|
|
|
|
io_wqe_cancel_pending_work(wqe, &match);
|
2021-06-17 16:08:11 +00:00
|
|
|
free_cpumask_var(wqe->cpu_mask);
|
2021-02-19 19:33:30 +00:00
|
|
|
kfree(wqe);
|
|
|
|
}
|
|
|
|
io_wq_put_hash(wq->hash);
|
2019-10-22 16:25:58 +00:00
|
|
|
kfree(wq);
|
2021-02-25 17:17:09 +00:00
|
|
|
}
|
|
|
|
|
2021-02-26 20:48:19 +00:00
|
|
|
void io_wq_put_and_exit(struct io_wq *wq)
|
|
|
|
{
|
2021-05-23 14:48:39 +00:00
|
|
|
WARN_ON_ONCE(!test_bit(IO_WQ_BIT_EXIT, &wq->state));
|
|
|
|
|
2021-03-08 16:37:51 +00:00
|
|
|
io_wq_exit_workers(wq);
|
2021-06-14 01:36:13 +00:00
|
|
|
io_wq_destroy(wq);
|
2021-02-26 20:48:19 +00:00
|
|
|
}
|
|
|
|
|
2021-06-17 16:08:11 +00:00
|
|
|
struct online_data {
|
|
|
|
unsigned int cpu;
|
|
|
|
bool online;
|
|
|
|
};
|
|
|
|
|
2020-10-22 15:02:50 +00:00
|
|
|
static bool io_wq_worker_affinity(struct io_worker *worker, void *data)
|
|
|
|
{
|
2021-06-17 16:08:11 +00:00
|
|
|
struct online_data *od = data;
|
2021-04-08 09:44:50 +00:00
|
|
|
|
2021-06-17 16:08:11 +00:00
|
|
|
if (od->online)
|
|
|
|
cpumask_set_cpu(od->cpu, worker->wqe->cpu_mask);
|
|
|
|
else
|
|
|
|
cpumask_clear_cpu(od->cpu, worker->wqe->cpu_mask);
|
2020-10-22 15:02:50 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-06-17 16:08:11 +00:00
|
|
|
static int __io_wq_cpu_online(struct io_wq *wq, unsigned int cpu, bool online)
|
2020-10-22 15:02:50 +00:00
|
|
|
{
|
2021-06-17 16:08:11 +00:00
|
|
|
struct online_data od = {
|
|
|
|
.cpu = cpu,
|
|
|
|
.online = online
|
|
|
|
};
|
2020-10-22 15:02:50 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(i)
|
2021-06-17 16:08:11 +00:00
|
|
|
io_wq_for_each_worker(wq->wqes[i], io_wq_worker_affinity, &od);
|
2020-10-22 15:02:50 +00:00
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-06-17 16:08:11 +00:00
|
|
|
static int io_wq_cpu_online(unsigned int cpu, struct hlist_node *node)
|
|
|
|
{
|
|
|
|
struct io_wq *wq = hlist_entry_safe(node, struct io_wq, cpuhp_node);
|
|
|
|
|
|
|
|
return __io_wq_cpu_online(wq, cpu, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int io_wq_cpu_offline(unsigned int cpu, struct hlist_node *node)
|
|
|
|
{
|
|
|
|
struct io_wq *wq = hlist_entry_safe(node, struct io_wq, cpuhp_node);
|
|
|
|
|
|
|
|
return __io_wq_cpu_online(wq, cpu, false);
|
|
|
|
}
|
|
|
|
|
2021-06-17 16:19:54 +00:00
|
|
|
int io_wq_cpu_affinity(struct io_wq *wq, cpumask_var_t mask)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(i) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[i];
|
|
|
|
|
|
|
|
if (mask)
|
|
|
|
cpumask_copy(wqe->cpu_mask, mask);
|
|
|
|
else
|
|
|
|
cpumask_copy(wqe->cpu_mask, cpumask_of_node(i));
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-08-27 17:33:19 +00:00
|
|
|
/*
|
|
|
|
* Set max number of unbounded workers, returns old value. If new_count is 0,
|
|
|
|
* then just return the old value.
|
|
|
|
*/
|
|
|
|
int io_wq_max_workers(struct io_wq *wq, int *new_count)
|
|
|
|
{
|
|
|
|
int i, node, prev = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < 2; i++) {
|
|
|
|
if (new_count[i] > task_rlimit(current, RLIMIT_NPROC))
|
|
|
|
new_count[i] = task_rlimit(current, RLIMIT_NPROC);
|
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe_acct *acct;
|
|
|
|
|
|
|
|
for (i = 0; i < 2; i++) {
|
|
|
|
acct = &wq->wqes[node]->acct[i];
|
|
|
|
prev = max_t(int, acct->max_workers, prev);
|
|
|
|
if (new_count[i])
|
|
|
|
acct->max_workers = new_count[i];
|
|
|
|
new_count[i] = prev;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-22 15:02:50 +00:00
|
|
|
static __init int io_wq_init(void)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = cpuhp_setup_state_multi(CPUHP_AP_ONLINE_DYN, "io-wq/online",
|
2021-06-17 16:08:11 +00:00
|
|
|
io_wq_cpu_online, io_wq_cpu_offline);
|
2020-10-22 15:02:50 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
io_wq_online = ret;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
subsys_initcall(io_wq_init);
|