2019-04-30 18:42:43 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
|
2018-07-03 15:32:35 +00:00
|
|
|
#include "blk-rq-qos.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Increment 'v', if 'v' is below 'below'. Returns true if we succeeded,
|
|
|
|
* false if 'v' + 1 would be bigger than 'below'.
|
|
|
|
*/
|
2018-07-20 01:42:13 +00:00
|
|
|
static bool atomic_inc_below(atomic_t *v, unsigned int below)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
2018-07-20 01:42:13 +00:00
|
|
|
unsigned int cur = atomic_read(v);
|
2018-07-03 15:32:35 +00:00
|
|
|
|
2022-07-12 15:05:47 +00:00
|
|
|
do {
|
2018-07-03 15:32:35 +00:00
|
|
|
if (cur >= below)
|
|
|
|
return false;
|
2022-07-12 15:05:47 +00:00
|
|
|
} while (!atomic_try_cmpxchg(v, &cur, cur + 1));
|
2018-07-03 15:32:35 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-07-20 01:42:13 +00:00
|
|
|
bool rq_wait_inc_below(struct rq_wait *rq_wait, unsigned int limit)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
|
|
|
return atomic_inc_below(&rq_wait->inflight, limit);
|
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_cleanup(struct rq_qos *rqos, struct bio *bio)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:32:35 +00:00
|
|
|
if (rqos->ops->cleanup)
|
2018-07-03 15:14:59 +00:00
|
|
|
rqos->ops->cleanup(rqos, bio);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_done(struct rq_qos *rqos, struct request *rq)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:32:35 +00:00
|
|
|
if (rqos->ops->done)
|
|
|
|
rqos->ops->done(rqos, rq);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_issue(struct rq_qos *rqos, struct request *rq)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:32:35 +00:00
|
|
|
if (rqos->ops->issue)
|
|
|
|
rqos->ops->issue(rqos, rq);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_requeue(struct rq_qos *rqos, struct request *rq)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:32:35 +00:00
|
|
|
if (rqos->ops->requeue)
|
|
|
|
rqos->ops->requeue(rqos, rq);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_throttle(struct rq_qos *rqos, struct bio *bio)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:32:35 +00:00
|
|
|
if (rqos->ops->throttle)
|
2018-11-14 16:02:09 +00:00
|
|
|
rqos->ops->throttle(rqos, bio);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:14:59 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_track(struct rq_qos *rqos, struct request *rq, struct bio *bio)
|
2018-07-03 15:14:59 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:14:59 +00:00
|
|
|
if (rqos->ops->track)
|
|
|
|
rqos->ops->track(rqos, rq, bio);
|
2019-08-28 22:05:54 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
|
|
|
}
|
|
|
|
|
|
|
|
void __rq_qos_merge(struct rq_qos *rqos, struct request *rq, struct bio *bio)
|
|
|
|
{
|
|
|
|
do {
|
|
|
|
if (rqos->ops->merge)
|
|
|
|
rqos->ops->merge(rqos, rq, bio);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 19:25:10 +00:00
|
|
|
void __rq_qos_done_bio(struct rq_qos *rqos, struct bio *bio)
|
2018-07-03 15:15:00 +00:00
|
|
|
{
|
2018-11-15 19:25:10 +00:00
|
|
|
do {
|
2018-07-03 15:15:00 +00:00
|
|
|
if (rqos->ops->done_bio)
|
|
|
|
rqos->ops->done_bio(rqos, bio);
|
2018-11-15 19:25:10 +00:00
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
2018-07-03 15:15:00 +00:00
|
|
|
}
|
|
|
|
|
2019-08-28 22:05:55 +00:00
|
|
|
void __rq_qos_queue_depth_changed(struct rq_qos *rqos)
|
|
|
|
{
|
|
|
|
do {
|
|
|
|
if (rqos->ops->queue_depth_changed)
|
|
|
|
rqos->ops->queue_depth_changed(rqos);
|
|
|
|
rqos = rqos->next;
|
|
|
|
} while (rqos);
|
|
|
|
}
|
|
|
|
|
2018-07-03 15:32:35 +00:00
|
|
|
/*
|
|
|
|
* Return true, if we can't increase the depth further by scaling
|
|
|
|
*/
|
|
|
|
bool rq_depth_calc_max_depth(struct rq_depth *rqd)
|
|
|
|
{
|
|
|
|
unsigned int depth;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For QD=1 devices, this is a special case. It's important for those
|
|
|
|
* to have one request ready when one completes, so force a depth of
|
|
|
|
* 2 for those devices. On the backend, it'll be a depth of 1 anyway,
|
|
|
|
* since the device can't have more than that in flight. If we're
|
|
|
|
* scaling down, then keep a setting of 1/1/1.
|
|
|
|
*/
|
|
|
|
if (rqd->queue_depth == 1) {
|
|
|
|
if (rqd->scale_step > 0)
|
|
|
|
rqd->max_depth = 1;
|
|
|
|
else {
|
|
|
|
rqd->max_depth = 2;
|
|
|
|
ret = true;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* scale_step == 0 is our default state. If we have suffered
|
|
|
|
* latency spikes, step will be > 0, and we shrink the
|
|
|
|
* allowed write depths. If step is < 0, we're only doing
|
|
|
|
* writes, and we allow a temporarily higher depth to
|
|
|
|
* increase performance.
|
|
|
|
*/
|
|
|
|
depth = min_t(unsigned int, rqd->default_depth,
|
|
|
|
rqd->queue_depth);
|
|
|
|
if (rqd->scale_step > 0)
|
|
|
|
depth = 1 + ((depth - 1) >> min(31, rqd->scale_step));
|
|
|
|
else if (rqd->scale_step < 0) {
|
|
|
|
unsigned int maxd = 3 * rqd->queue_depth / 4;
|
|
|
|
|
|
|
|
depth = 1 + ((depth - 1) << -rqd->scale_step);
|
|
|
|
if (depth > maxd) {
|
|
|
|
depth = maxd;
|
|
|
|
ret = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rqd->max_depth = depth;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-10-05 18:59:27 +00:00
|
|
|
/* Returns true on success and false if scaling up wasn't possible */
|
|
|
|
bool rq_depth_scale_up(struct rq_depth *rqd)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Hit max in previous round, stop here
|
|
|
|
*/
|
|
|
|
if (rqd->scaled_max)
|
2019-10-05 18:59:27 +00:00
|
|
|
return false;
|
2018-07-03 15:32:35 +00:00
|
|
|
|
|
|
|
rqd->scale_step--;
|
|
|
|
|
|
|
|
rqd->scaled_max = rq_depth_calc_max_depth(rqd);
|
2019-10-05 18:59:27 +00:00
|
|
|
return true;
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Scale rwb down. If 'hard_throttle' is set, do it quicker, since we
|
2019-10-05 18:59:27 +00:00
|
|
|
* had a latency violation. Returns true on success and returns false if
|
|
|
|
* scaling down wasn't possible.
|
2018-07-03 15:32:35 +00:00
|
|
|
*/
|
2019-10-05 18:59:27 +00:00
|
|
|
bool rq_depth_scale_down(struct rq_depth *rqd, bool hard_throttle)
|
2018-07-03 15:32:35 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Stop scaling down when we've hit the limit. This also prevents
|
|
|
|
* ->scale_step from going to crazy values, if the device can't
|
|
|
|
* keep up.
|
|
|
|
*/
|
|
|
|
if (rqd->max_depth == 1)
|
2019-10-05 18:59:27 +00:00
|
|
|
return false;
|
2018-07-03 15:32:35 +00:00
|
|
|
|
|
|
|
if (rqd->scale_step < 0 && hard_throttle)
|
|
|
|
rqd->scale_step = 0;
|
|
|
|
else
|
|
|
|
rqd->scale_step++;
|
|
|
|
|
|
|
|
rqd->scaled_max = false;
|
|
|
|
rq_depth_calc_max_depth(rqd);
|
2019-10-05 18:59:27 +00:00
|
|
|
return true;
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
|
|
|
|
2018-12-04 17:59:02 +00:00
|
|
|
struct rq_qos_wait_data {
|
|
|
|
struct wait_queue_entry wq;
|
|
|
|
struct task_struct *task;
|
|
|
|
struct rq_wait *rqw;
|
|
|
|
acquire_inflight_cb_t *cb;
|
|
|
|
void *private_data;
|
|
|
|
bool got_token;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int rq_qos_wake_function(struct wait_queue_entry *curr,
|
|
|
|
unsigned int mode, int wake_flags, void *key)
|
|
|
|
{
|
|
|
|
struct rq_qos_wait_data *data = container_of(curr,
|
|
|
|
struct rq_qos_wait_data,
|
|
|
|
wq);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we fail to get a budget, return -1 to interrupt the wake up loop
|
|
|
|
* in __wake_up_common.
|
|
|
|
*/
|
|
|
|
if (!data->cb(data->rqw, data->private_data))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
data->got_token = true;
|
2019-07-16 20:19:29 +00:00
|
|
|
smp_wmb();
|
2018-12-04 17:59:02 +00:00
|
|
|
list_del_init(&curr->entry);
|
|
|
|
wake_up_process(data->task);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rq_qos_wait - throttle on a rqw if we need to
|
2019-05-31 00:00:50 +00:00
|
|
|
* @rqw: rqw to throttle on
|
|
|
|
* @private_data: caller provided specific data
|
|
|
|
* @acquire_inflight_cb: inc the rqw->inflight counter if we can
|
|
|
|
* @cleanup_cb: the callback to cleanup in case we race with a waker
|
2018-12-04 17:59:02 +00:00
|
|
|
*
|
|
|
|
* This provides a uniform place for the rq_qos users to do their throttling.
|
|
|
|
* Since you can end up with a lot of things sleeping at once, this manages the
|
|
|
|
* waking up based on the resources available. The acquire_inflight_cb should
|
|
|
|
* inc the rqw->inflight if we have the ability to do so, or return false if not
|
|
|
|
* and then we will sleep until the room becomes available.
|
|
|
|
*
|
|
|
|
* cleanup_cb is in case that we race with a waker and need to cleanup the
|
|
|
|
* inflight count accordingly.
|
|
|
|
*/
|
|
|
|
void rq_qos_wait(struct rq_wait *rqw, void *private_data,
|
|
|
|
acquire_inflight_cb_t *acquire_inflight_cb,
|
|
|
|
cleanup_cb_t *cleanup_cb)
|
|
|
|
{
|
|
|
|
struct rq_qos_wait_data data = {
|
|
|
|
.wq = {
|
|
|
|
.func = rq_qos_wake_function,
|
|
|
|
.entry = LIST_HEAD_INIT(data.wq.entry),
|
|
|
|
},
|
|
|
|
.task = current,
|
|
|
|
.rqw = rqw,
|
|
|
|
.cb = acquire_inflight_cb,
|
|
|
|
.private_data = private_data,
|
|
|
|
};
|
|
|
|
bool has_sleeper;
|
|
|
|
|
|
|
|
has_sleeper = wq_has_sleeper(&rqw->wait);
|
|
|
|
if (!has_sleeper && acquire_inflight_cb(rqw, private_data))
|
|
|
|
return;
|
|
|
|
|
2021-06-07 11:26:13 +00:00
|
|
|
has_sleeper = !prepare_to_wait_exclusive(&rqw->wait, &data.wq,
|
|
|
|
TASK_UNINTERRUPTIBLE);
|
2018-12-04 17:59:02 +00:00
|
|
|
do {
|
2019-07-16 20:19:29 +00:00
|
|
|
/* The memory barrier in set_task_state saves us here. */
|
2018-12-04 17:59:02 +00:00
|
|
|
if (data.got_token)
|
|
|
|
break;
|
|
|
|
if (!has_sleeper && acquire_inflight_cb(rqw, private_data)) {
|
|
|
|
finish_wait(&rqw->wait, &data.wq);
|
|
|
|
|
|
|
|
/*
|
2023-09-14 09:15:08 +00:00
|
|
|
* We raced with rq_qos_wake_function() getting a token,
|
2018-12-04 17:59:02 +00:00
|
|
|
* which means we now have two. Put our local token
|
|
|
|
* and wake anyone else potentially waiting for one.
|
|
|
|
*/
|
2019-07-16 20:19:29 +00:00
|
|
|
smp_rmb();
|
2018-12-04 17:59:02 +00:00
|
|
|
if (data.got_token)
|
|
|
|
cleanup_cb(rqw, private_data);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
io_schedule();
|
2019-07-16 20:19:27 +00:00
|
|
|
has_sleeper = true;
|
2019-07-16 20:19:28 +00:00
|
|
|
set_current_state(TASK_UNINTERRUPTIBLE);
|
2018-12-04 17:59:02 +00:00
|
|
|
} while (1);
|
|
|
|
finish_wait(&rqw->wait, &data.wq);
|
|
|
|
}
|
|
|
|
|
2018-07-03 15:32:35 +00:00
|
|
|
void rq_qos_exit(struct request_queue *q)
|
|
|
|
{
|
block/rq_qos: protect rq_qos apis with a new lock
commit 50e34d78815e ("block: disable the elevator int del_gendisk")
move rq_qos_exit() from disk_release() to del_gendisk(), this will
introduce some problems:
1) If rq_qos_add() is triggered by enabling iocost/iolatency through
cgroupfs, then it can concurrent with del_gendisk(), it's not safe to
write 'q->rq_qos' concurrently.
2) Activate cgroup policy that is relied on rq_qos will call
rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is
called in the middle, null-ptr-dereference will be triggered in
blkcg_activate_policy().
3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the
disk, then if rq_qos_exit() from del_gendisk() is done before
rq_qos_add(), then memory will be leaked.
This patch add a new disk level mutex 'rq_qos_mutex':
1) The lock will protect rq_qos_exit() directly.
2) For wbt that doesn't relied on blk-cgroup, rq_qos_add() can only be
called from disk initialization for now because wbt can't be
destructed until rq_qos_exit(), so it's safe not to protect wbt for
now. Hoever, in case that rq_qos dynamically destruction is supported
in the furture, this patch also protect rq_qos_add() from wbt_init()
directly, this is enough because blk-sysfs already synchronize
writers with disk removal.
3) For iocost and iolatency, in order to synchronize disk removal and
cgroup configuration, the lock is held after blkdev_get_no_open()
from blkg_conf_open_bdev(), and is released in blkg_conf_exit().
In order to fix the above memory leak, disk_live() is checked after
holding the new lock.
Fixes: 50e34d78815e ("block: disable the elevator int del_gendisk")
Signed-off-by: Yu Kuai <yukuai3@huawei.com>
Acked-by: Tejun Heo <tj@kernel.org>
Link: https://lore.kernel.org/r/20230414084008.2085155-1-yukuai1@huaweicloud.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2023-04-14 08:40:08 +00:00
|
|
|
mutex_lock(&q->rq_qos_mutex);
|
2018-07-03 15:32:35 +00:00
|
|
|
while (q->rq_qos) {
|
|
|
|
struct rq_qos *rqos = q->rq_qos;
|
|
|
|
q->rq_qos = rqos->next;
|
|
|
|
rqos->ops->exit(rqos);
|
|
|
|
}
|
block/rq_qos: protect rq_qos apis with a new lock
commit 50e34d78815e ("block: disable the elevator int del_gendisk")
move rq_qos_exit() from disk_release() to del_gendisk(), this will
introduce some problems:
1) If rq_qos_add() is triggered by enabling iocost/iolatency through
cgroupfs, then it can concurrent with del_gendisk(), it's not safe to
write 'q->rq_qos' concurrently.
2) Activate cgroup policy that is relied on rq_qos will call
rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is
called in the middle, null-ptr-dereference will be triggered in
blkcg_activate_policy().
3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the
disk, then if rq_qos_exit() from del_gendisk() is done before
rq_qos_add(), then memory will be leaked.
This patch add a new disk level mutex 'rq_qos_mutex':
1) The lock will protect rq_qos_exit() directly.
2) For wbt that doesn't relied on blk-cgroup, rq_qos_add() can only be
called from disk initialization for now because wbt can't be
destructed until rq_qos_exit(), so it's safe not to protect wbt for
now. Hoever, in case that rq_qos dynamically destruction is supported
in the furture, this patch also protect rq_qos_add() from wbt_init()
directly, this is enough because blk-sysfs already synchronize
writers with disk removal.
3) For iocost and iolatency, in order to synchronize disk removal and
cgroup configuration, the lock is held after blkdev_get_no_open()
from blkg_conf_open_bdev(), and is released in blkg_conf_exit().
In order to fix the above memory leak, disk_live() is checked after
holding the new lock.
Fixes: 50e34d78815e ("block: disable the elevator int del_gendisk")
Signed-off-by: Yu Kuai <yukuai3@huawei.com>
Acked-by: Tejun Heo <tj@kernel.org>
Link: https://lore.kernel.org/r/20230414084008.2085155-1-yukuai1@huaweicloud.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2023-04-14 08:40:08 +00:00
|
|
|
mutex_unlock(&q->rq_qos_mutex);
|
2018-07-03 15:32:35 +00:00
|
|
|
}
|
2023-02-03 15:03:53 +00:00
|
|
|
|
2023-02-03 15:03:54 +00:00
|
|
|
int rq_qos_add(struct rq_qos *rqos, struct gendisk *disk, enum rq_qos_id id,
|
2023-02-03 15:03:55 +00:00
|
|
|
const struct rq_qos_ops *ops)
|
2023-02-03 15:03:53 +00:00
|
|
|
{
|
2023-02-03 15:03:54 +00:00
|
|
|
struct request_queue *q = disk->queue;
|
|
|
|
|
block/rq_qos: protect rq_qos apis with a new lock
commit 50e34d78815e ("block: disable the elevator int del_gendisk")
move rq_qos_exit() from disk_release() to del_gendisk(), this will
introduce some problems:
1) If rq_qos_add() is triggered by enabling iocost/iolatency through
cgroupfs, then it can concurrent with del_gendisk(), it's not safe to
write 'q->rq_qos' concurrently.
2) Activate cgroup policy that is relied on rq_qos will call
rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is
called in the middle, null-ptr-dereference will be triggered in
blkcg_activate_policy().
3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the
disk, then if rq_qos_exit() from del_gendisk() is done before
rq_qos_add(), then memory will be leaked.
This patch add a new disk level mutex 'rq_qos_mutex':
1) The lock will protect rq_qos_exit() directly.
2) For wbt that doesn't relied on blk-cgroup, rq_qos_add() can only be
called from disk initialization for now because wbt can't be
destructed until rq_qos_exit(), so it's safe not to protect wbt for
now. Hoever, in case that rq_qos dynamically destruction is supported
in the furture, this patch also protect rq_qos_add() from wbt_init()
directly, this is enough because blk-sysfs already synchronize
writers with disk removal.
3) For iocost and iolatency, in order to synchronize disk removal and
cgroup configuration, the lock is held after blkdev_get_no_open()
from blkg_conf_open_bdev(), and is released in blkg_conf_exit().
In order to fix the above memory leak, disk_live() is checked after
holding the new lock.
Fixes: 50e34d78815e ("block: disable the elevator int del_gendisk")
Signed-off-by: Yu Kuai <yukuai3@huawei.com>
Acked-by: Tejun Heo <tj@kernel.org>
Link: https://lore.kernel.org/r/20230414084008.2085155-1-yukuai1@huaweicloud.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2023-04-14 08:40:08 +00:00
|
|
|
lockdep_assert_held(&q->rq_qos_mutex);
|
|
|
|
|
2023-02-03 15:03:56 +00:00
|
|
|
rqos->disk = disk;
|
2023-02-03 15:03:54 +00:00
|
|
|
rqos->id = id;
|
|
|
|
rqos->ops = ops;
|
|
|
|
|
2023-02-03 15:03:53 +00:00
|
|
|
/*
|
|
|
|
* No IO can be in-flight when adding rqos, so freeze queue, which
|
|
|
|
* is fine since we only support rq_qos for blk-mq queue.
|
|
|
|
*/
|
|
|
|
blk_mq_freeze_queue(q);
|
|
|
|
|
|
|
|
if (rq_qos_id(q, rqos->id))
|
|
|
|
goto ebusy;
|
|
|
|
rqos->next = q->rq_qos;
|
|
|
|
q->rq_qos = rqos;
|
|
|
|
|
|
|
|
blk_mq_unfreeze_queue(q);
|
|
|
|
|
|
|
|
if (rqos->ops->debugfs_attrs) {
|
|
|
|
mutex_lock(&q->debugfs_mutex);
|
|
|
|
blk_mq_debugfs_register_rqos(rqos);
|
|
|
|
mutex_unlock(&q->debugfs_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
ebusy:
|
|
|
|
blk_mq_unfreeze_queue(q);
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
|
2023-02-03 15:03:54 +00:00
|
|
|
void rq_qos_del(struct rq_qos *rqos)
|
2023-02-03 15:03:53 +00:00
|
|
|
{
|
2023-02-03 15:03:56 +00:00
|
|
|
struct request_queue *q = rqos->disk->queue;
|
2023-02-03 15:03:53 +00:00
|
|
|
struct rq_qos **cur;
|
|
|
|
|
block/rq_qos: protect rq_qos apis with a new lock
commit 50e34d78815e ("block: disable the elevator int del_gendisk")
move rq_qos_exit() from disk_release() to del_gendisk(), this will
introduce some problems:
1) If rq_qos_add() is triggered by enabling iocost/iolatency through
cgroupfs, then it can concurrent with del_gendisk(), it's not safe to
write 'q->rq_qos' concurrently.
2) Activate cgroup policy that is relied on rq_qos will call
rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is
called in the middle, null-ptr-dereference will be triggered in
blkcg_activate_policy().
3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the
disk, then if rq_qos_exit() from del_gendisk() is done before
rq_qos_add(), then memory will be leaked.
This patch add a new disk level mutex 'rq_qos_mutex':
1) The lock will protect rq_qos_exit() directly.
2) For wbt that doesn't relied on blk-cgroup, rq_qos_add() can only be
called from disk initialization for now because wbt can't be
destructed until rq_qos_exit(), so it's safe not to protect wbt for
now. Hoever, in case that rq_qos dynamically destruction is supported
in the furture, this patch also protect rq_qos_add() from wbt_init()
directly, this is enough because blk-sysfs already synchronize
writers with disk removal.
3) For iocost and iolatency, in order to synchronize disk removal and
cgroup configuration, the lock is held after blkdev_get_no_open()
from blkg_conf_open_bdev(), and is released in blkg_conf_exit().
In order to fix the above memory leak, disk_live() is checked after
holding the new lock.
Fixes: 50e34d78815e ("block: disable the elevator int del_gendisk")
Signed-off-by: Yu Kuai <yukuai3@huawei.com>
Acked-by: Tejun Heo <tj@kernel.org>
Link: https://lore.kernel.org/r/20230414084008.2085155-1-yukuai1@huaweicloud.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2023-04-14 08:40:08 +00:00
|
|
|
lockdep_assert_held(&q->rq_qos_mutex);
|
2023-02-03 15:03:53 +00:00
|
|
|
|
block/rq_qos: protect rq_qos apis with a new lock
commit 50e34d78815e ("block: disable the elevator int del_gendisk")
move rq_qos_exit() from disk_release() to del_gendisk(), this will
introduce some problems:
1) If rq_qos_add() is triggered by enabling iocost/iolatency through
cgroupfs, then it can concurrent with del_gendisk(), it's not safe to
write 'q->rq_qos' concurrently.
2) Activate cgroup policy that is relied on rq_qos will call
rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is
called in the middle, null-ptr-dereference will be triggered in
blkcg_activate_policy().
3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the
disk, then if rq_qos_exit() from del_gendisk() is done before
rq_qos_add(), then memory will be leaked.
This patch add a new disk level mutex 'rq_qos_mutex':
1) The lock will protect rq_qos_exit() directly.
2) For wbt that doesn't relied on blk-cgroup, rq_qos_add() can only be
called from disk initialization for now because wbt can't be
destructed until rq_qos_exit(), so it's safe not to protect wbt for
now. Hoever, in case that rq_qos dynamically destruction is supported
in the furture, this patch also protect rq_qos_add() from wbt_init()
directly, this is enough because blk-sysfs already synchronize
writers with disk removal.
3) For iocost and iolatency, in order to synchronize disk removal and
cgroup configuration, the lock is held after blkdev_get_no_open()
from blkg_conf_open_bdev(), and is released in blkg_conf_exit().
In order to fix the above memory leak, disk_live() is checked after
holding the new lock.
Fixes: 50e34d78815e ("block: disable the elevator int del_gendisk")
Signed-off-by: Yu Kuai <yukuai3@huawei.com>
Acked-by: Tejun Heo <tj@kernel.org>
Link: https://lore.kernel.org/r/20230414084008.2085155-1-yukuai1@huaweicloud.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2023-04-14 08:40:08 +00:00
|
|
|
blk_mq_freeze_queue(q);
|
2023-02-03 15:03:53 +00:00
|
|
|
for (cur = &q->rq_qos; *cur; cur = &(*cur)->next) {
|
|
|
|
if (*cur == rqos) {
|
|
|
|
*cur = rqos->next;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
blk_mq_unfreeze_queue(q);
|
|
|
|
|
|
|
|
mutex_lock(&q->debugfs_mutex);
|
|
|
|
blk_mq_debugfs_unregister_rqos(rqos);
|
|
|
|
mutex_unlock(&q->debugfs_mutex);
|
|
|
|
}
|