Blame view

fs/eventpoll.c 50.1 KB
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1
  /*
5071f97ec   Davide Libenzi   epoll: fix epoll'...
2
3
   *  fs/eventpoll.c (Efficient event retrieval implementation)
   *  Copyright (C) 2001,...,2009	 Davide Libenzi
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4
5
6
7
8
9
10
11
12
   *
   *  This program is free software; you can redistribute it and/or modify
   *  it under the terms of the GNU General Public License as published by
   *  the Free Software Foundation; either version 2 of the License, or
   *  (at your option) any later version.
   *
   *  Davide Libenzi <davidel@xmailserver.org>
   *
   */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
13
14
15
16
17
18
19
20
21
22
  #include <linux/init.h>
  #include <linux/kernel.h>
  #include <linux/sched.h>
  #include <linux/fs.h>
  #include <linux/file.h>
  #include <linux/signal.h>
  #include <linux/errno.h>
  #include <linux/mm.h>
  #include <linux/slab.h>
  #include <linux/poll.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
23
24
25
26
27
  #include <linux/string.h>
  #include <linux/list.h>
  #include <linux/hash.h>
  #include <linux/spinlock.h>
  #include <linux/syscalls.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
28
29
30
31
32
  #include <linux/rbtree.h>
  #include <linux/wait.h>
  #include <linux/eventpoll.h>
  #include <linux/mount.h>
  #include <linux/bitops.h>
144efe3e3   Arjan van de Ven   [PATCH] sem2mutex...
33
  #include <linux/mutex.h>
da66f7cb0   Davide Libenzi   epoll: use anonym...
34
  #include <linux/anon_inodes.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
35
36
37
38
  #include <asm/uaccess.h>
  #include <asm/system.h>
  #include <asm/io.h>
  #include <asm/mman.h>
60063497a   Arun Sharma   atomic: use <linu...
39
  #include <linux/atomic.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
40

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
41
42
43
44
  /*
   * LOCKING:
   * There are three level of locking required by epoll :
   *
144efe3e3   Arjan van de Ven   [PATCH] sem2mutex...
45
   * 1) epmutex (mutex)
c7ea76302   Davide Libenzi   epoll locks chang...
46
47
   * 2) ep->mtx (mutex)
   * 3) ep->lock (spinlock)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
48
49
50
51
52
53
54
55
56
   *
   * The acquire order is the one listed above, from 1 to 3.
   * We need a spinlock (ep->lock) because we manipulate objects
   * from inside the poll callback, that might be triggered from
   * a wake_up() that in turn might be called from IRQ context.
   * So we can't sleep inside the poll callback and hence we need
   * a spinlock. During the event transfer loop (from kernel to
   * user space) we could end up sleeping due a copy_to_user(), so
   * we need a lock that will allow us to sleep. This lock is a
d47de16c7   Davide Libenzi   fix epoll single ...
57
58
59
60
61
   * mutex (ep->mtx). It is acquired during the event transfer loop,
   * during epoll_ctl(EPOLL_CTL_DEL) and during eventpoll_release_file().
   * Then we also need a global mutex to serialize eventpoll_release_file()
   * and ep_free().
   * This mutex is acquired by ep_free() during the epoll file
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
62
63
   * cleanup path and it is also acquired by eventpoll_release_file()
   * if a file has been pushed inside an epoll set and it is then
bf6a41db7   Daniel Baluta   fs/eventpoll.c: f...
64
   * close()d without a previous call to epoll_ctl(EPOLL_CTL_DEL).
22bacca48   Davide Libenzi   epoll: prevent cr...
65
66
67
68
69
70
71
   * It is also acquired when inserting an epoll fd onto another epoll
   * fd. We do this so that we walk the epoll tree and ensure that this
   * insertion does not create a cycle of epoll file descriptors, which
   * could lead to deadlock. We need a global mutex to prevent two
   * simultaneous inserts (A into B and B into A) from racing and
   * constructing a cycle without either insert observing that it is
   * going to.
d8805e633   Nelson Elhage   epoll: fix spurio...
72
73
74
75
76
77
78
79
80
   * It is necessary to acquire multiple "ep->mtx"es at once in the
   * case when one epoll fd is added to another. In this case, we
   * always acquire the locks in the order of nesting (i.e. after
   * epoll_ctl(e1, EPOLL_CTL_ADD, e2), e1->mtx will always be acquired
   * before e2->mtx). Since we disallow cycles of epoll file
   * descriptors, this ensures that the mutexes are well-ordered. In
   * order to communicate this nesting to lockdep, when walking a tree
   * of epoll file descriptors, we use the current recursion depth as
   * the lockdep subkey.
d47de16c7   Davide Libenzi   fix epoll single ...
81
82
83
   * It is possible to drop the "ep->mtx" and to use the global
   * mutex "epmutex" (together with "ep->lock") to have it working,
   * but having "ep->mtx" will make the interface more scalable.
144efe3e3   Arjan van de Ven   [PATCH] sem2mutex...
84
   * Events that require holding "epmutex" are very rare, while for
d47de16c7   Davide Libenzi   fix epoll single ...
85
86
   * normal operations the epoll private "ep->mtx" will guarantee
   * a better scalability.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
87
   */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
88
89
  /* Epoll private bits inside the event mask */
  #define EP_PRIVATE_BITS (EPOLLONESHOT | EPOLLET)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
90
91
  /* Maximum number of nesting allowed inside epoll sets */
  #define EP_MAX_NESTS 4
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
92

b611967de   Davide Libenzi   [PATCH] epoll_pwa...
93
  #define EP_MAX_EVENTS (INT_MAX / sizeof(struct epoll_event))
d47de16c7   Davide Libenzi   fix epoll single ...
94
  #define EP_UNACTIVE_PTR ((void *) -1L)
7ef9964e6   Davide Libenzi   epoll: introduce ...
95
  #define EP_ITEM_COST (sizeof(struct epitem) + sizeof(struct eppoll_entry))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
96
97
98
99
100
101
  struct epoll_filefd {
  	struct file *file;
  	int fd;
  };
  
  /*
5071f97ec   Davide Libenzi   epoll: fix epoll'...
102
103
   * Structure used to track possible nested calls, for too deep recursions
   * and loop cycles.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
104
   */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
105
  struct nested_call_node {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
106
  	struct list_head llink;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
107
  	void *cookie;
3fe4a975d   Davide Libenzi   epoll: fix nested...
108
  	void *ctx;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
109
110
111
  };
  
  /*
5071f97ec   Davide Libenzi   epoll: fix epoll'...
112
113
   * This structure is used as collector for nested calls, to check for
   * maximum recursion dept and loop cycles.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
114
   */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
115
116
  struct nested_calls {
  	struct list_head tasks_call_list;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
117
118
119
120
  	spinlock_t lock;
  };
  
  /*
d47de16c7   Davide Libenzi   fix epoll single ...
121
122
123
124
   * Each file descriptor added to the eventpoll interface will
   * have an entry of this type linked to the "rbr" RB tree.
   */
  struct epitem {
67647d0fb   Davide Libenzi   epoll: fix some c...
125
  	/* RB tree node used to link this structure to the eventpoll RB tree */
d47de16c7   Davide Libenzi   fix epoll single ...
126
127
128
129
  	struct rb_node rbn;
  
  	/* List header used to link this structure to the eventpoll ready list */
  	struct list_head rdllink;
c7ea76302   Davide Libenzi   epoll locks chang...
130
131
132
133
134
  	/*
  	 * Works together "struct eventpoll"->ovflist in keeping the
  	 * single linked chain of items.
  	 */
  	struct epitem *next;
d47de16c7   Davide Libenzi   fix epoll single ...
135
136
137
138
139
140
141
142
143
144
145
  	/* The file descriptor information this item refers to */
  	struct epoll_filefd ffd;
  
  	/* Number of active wait queue attached to poll operations */
  	int nwait;
  
  	/* List containing poll wait queues */
  	struct list_head pwqlist;
  
  	/* The "container" of this item */
  	struct eventpoll *ep;
d47de16c7   Davide Libenzi   fix epoll single ...
146
147
  	/* List header used to link this item to the "struct file" items list */
  	struct list_head fllink;
c7ea76302   Davide Libenzi   epoll locks chang...
148
149
  	/* The structure that describe the interested events and the source fd */
  	struct epoll_event event;
d47de16c7   Davide Libenzi   fix epoll single ...
150
151
152
  };
  
  /*
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
153
   * This structure is stored inside the "private_data" member of the file
bf6a41db7   Daniel Baluta   fs/eventpoll.c: f...
154
   * structure and represents the main data structure for the eventpoll
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
155
156
157
   * interface.
   */
  struct eventpoll {
bf6a41db7   Daniel Baluta   fs/eventpoll.c: f...
158
  	/* Protect the access to this structure */
c7ea76302   Davide Libenzi   epoll locks chang...
159
  	spinlock_t lock;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
160
161
  
  	/*
d47de16c7   Davide Libenzi   fix epoll single ...
162
163
164
165
  	 * This mutex is used to ensure that files are not removed
  	 * while epoll is using them. This is held during the event
  	 * collection loop, the file cleanup path, the epoll file exit
  	 * code and the ctl operations.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
166
  	 */
d47de16c7   Davide Libenzi   fix epoll single ...
167
  	struct mutex mtx;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
168
169
170
171
172
173
174
175
176
  
  	/* Wait queue used by sys_epoll_wait() */
  	wait_queue_head_t wq;
  
  	/* Wait queue used by file->poll() */
  	wait_queue_head_t poll_wait;
  
  	/* List of ready file descriptors */
  	struct list_head rdllist;
67647d0fb   Davide Libenzi   epoll: fix some c...
177
  	/* RB tree root used to store monitored fd structs */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
178
  	struct rb_root rbr;
d47de16c7   Davide Libenzi   fix epoll single ...
179
180
181
  
  	/*
  	 * This is a single linked list that chains all the "struct epitem" that
25985edce   Lucas De Marchi   Fix common misspe...
182
  	 * happened while transferring ready events to userspace w/out
d47de16c7   Davide Libenzi   fix epoll single ...
183
184
185
  	 * holding ->lock.
  	 */
  	struct epitem *ovflist;
7ef9964e6   Davide Libenzi   epoll: introduce ...
186
187
188
  
  	/* The user that created the eventpoll descriptor */
  	struct user_struct *user;
203aa5260   Jason Baron   epoll: limit paths
189
190
191
192
193
194
  
  	struct file *file;
  
  	/* used to optimize loop detection check */
  	int visited;
  	struct list_head visited_list_link;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
195
196
197
198
199
200
201
202
  };
  
  /* Wait structure used by the poll hooks */
  struct eppoll_entry {
  	/* List header used to link this structure to the "struct epitem" */
  	struct list_head llink;
  
  	/* The "base" pointer is set to the container "struct epitem" */
4f0989dbf   Tony Battersby   epoll: use real t...
203
  	struct epitem *base;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
204
205
206
207
208
209
210
211
212
213
  
  	/*
  	 * Wait queue item that will be linked to the target file wait
  	 * queue head.
  	 */
  	wait_queue_t wait;
  
  	/* The wait queue head that linked the "wait" wait queue item */
  	wait_queue_head_t *whead;
  };
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
214
215
216
217
218
  /* Wrapper struct used by poll queueing */
  struct ep_pqueue {
  	poll_table pt;
  	struct epitem *epi;
  };
5071f97ec   Davide Libenzi   epoll: fix epoll'...
219
220
221
222
223
  /* Used by the ep_send_events() function as callback private data */
  struct ep_send_events_data {
  	int maxevents;
  	struct epoll_event __user *events;
  };
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
224
  /*
7ef9964e6   Davide Libenzi   epoll: introduce ...
225
226
   * Configuration options available inside /proc/sys/fs/epoll/
   */
7ef9964e6   Davide Libenzi   epoll: introduce ...
227
  /* Maximum number of epoll watched descriptors, per user */
52bd19f76   Robin Holt   epoll: convert ma...
228
  static long max_user_watches __read_mostly;
7ef9964e6   Davide Libenzi   epoll: introduce ...
229
230
  
  /*
d47de16c7   Davide Libenzi   fix epoll single ...
231
   * This mutex is used to serialize ep_free() and eventpoll_release_file().
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
232
   */
7ef9964e6   Davide Libenzi   epoll: introduce ...
233
  static DEFINE_MUTEX(epmutex);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
234

22bacca48   Davide Libenzi   epoll: prevent cr...
235
236
  /* Used to check for epoll file descriptor inclusion loops */
  static struct nested_calls poll_loop_ncalls;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
237
238
239
240
241
  /* Used for safe wake up implementation */
  static struct nested_calls poll_safewake_ncalls;
  
  /* Used to call file's f_op->poll() under the nested calls boundaries */
  static struct nested_calls poll_readywalk_ncalls;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
242
243
  
  /* Slab cache used to allocate "struct epitem" */
e18b890bb   Christoph Lameter   [PATCH] slab: rem...
244
  static struct kmem_cache *epi_cache __read_mostly;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
245
246
  
  /* Slab cache used to allocate "struct eppoll_entry" */
e18b890bb   Christoph Lameter   [PATCH] slab: rem...
247
  static struct kmem_cache *pwq_cache __read_mostly;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
248

203aa5260   Jason Baron   epoll: limit paths
249
250
251
252
253
254
255
256
  /* Visited nodes during ep_loop_check(), so we can unset them when we finish */
  static LIST_HEAD(visited_list);
  
  /*
   * List of files with newly added links, where we may need to limit the number
   * of emanating paths. Protected by the epmutex.
   */
  static LIST_HEAD(tfile_check_list);
7ef9964e6   Davide Libenzi   epoll: introduce ...
257
258
259
  #ifdef CONFIG_SYSCTL
  
  #include <linux/sysctl.h>
52bd19f76   Robin Holt   epoll: convert ma...
260
261
  static long zero;
  static long long_max = LONG_MAX;
7ef9964e6   Davide Libenzi   epoll: introduce ...
262
263
264
  
  ctl_table epoll_table[] = {
  	{
7ef9964e6   Davide Libenzi   epoll: introduce ...
265
266
  		.procname	= "max_user_watches",
  		.data		= &max_user_watches,
52bd19f76   Robin Holt   epoll: convert ma...
267
  		.maxlen		= sizeof(max_user_watches),
7ef9964e6   Davide Libenzi   epoll: introduce ...
268
  		.mode		= 0644,
52bd19f76   Robin Holt   epoll: convert ma...
269
  		.proc_handler	= proc_doulongvec_minmax,
7ef9964e6   Davide Libenzi   epoll: introduce ...
270
  		.extra1		= &zero,
52bd19f76   Robin Holt   epoll: convert ma...
271
  		.extra2		= &long_max,
7ef9964e6   Davide Libenzi   epoll: introduce ...
272
  	},
ab09203e3   Eric W. Biederman   sysctl fs: Remove...
273
  	{ }
7ef9964e6   Davide Libenzi   epoll: introduce ...
274
275
  };
  #endif /* CONFIG_SYSCTL */
203aa5260   Jason Baron   epoll: limit paths
276
277
278
279
280
281
  static const struct file_operations eventpoll_fops;
  
  static inline int is_file_epoll(struct file *f)
  {
  	return f->f_op == &eventpoll_fops;
  }
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
282

67647d0fb   Davide Libenzi   epoll: fix some c...
283
  /* Setup the structure that is used as key for the RB tree */
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
284
285
286
287
288
289
  static inline void ep_set_ffd(struct epoll_filefd *ffd,
  			      struct file *file, int fd)
  {
  	ffd->file = file;
  	ffd->fd = fd;
  }
67647d0fb   Davide Libenzi   epoll: fix some c...
290
  /* Compare RB tree keys */
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
291
292
293
294
295
296
  static inline int ep_cmp_ffd(struct epoll_filefd *p1,
  			     struct epoll_filefd *p2)
  {
  	return (p1->file > p2->file ? +1:
  	        (p1->file < p2->file ? -1 : p1->fd - p2->fd));
  }
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
297
298
299
300
301
  /* Tells us if the item is currently linked */
  static inline int ep_is_linked(struct list_head *p)
  {
  	return !list_empty(p);
  }
e6aa5c0ba   Oleg Nesterov   epoll: ep_unregis...
302
303
304
305
  static inline struct eppoll_entry *ep_pwq_from_wait(wait_queue_t *p)
  {
  	return container_of(p, struct eppoll_entry, wait);
  }
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
306
  /* Get the "struct epitem" from a wait queue pointer */
cdac75e6f   Davide Libenzi   epoll: avoid kmem...
307
  static inline struct epitem *ep_item_from_wait(wait_queue_t *p)
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
308
309
310
311
312
  {
  	return container_of(p, struct eppoll_entry, wait)->base;
  }
  
  /* Get the "struct epitem" from an epoll queue wrapper */
cdac75e6f   Davide Libenzi   epoll: avoid kmem...
313
  static inline struct epitem *ep_item_from_epqueue(poll_table *p)
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
314
315
316
317
318
  {
  	return container_of(p, struct ep_pqueue, pt)->epi;
  }
  
  /* Tells if the epoll_ctl(2) operation needs an event copy from userspace */
6192bd536   Davide Libenzi   epoll: optimizati...
319
  static inline int ep_op_has_event(int op)
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
320
321
322
  {
  	return op != EPOLL_CTL_DEL;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
323
  /* Initialize the poll safe wake up structure */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
324
  static void ep_nested_calls_init(struct nested_calls *ncalls)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
325
  {
5071f97ec   Davide Libenzi   epoll: fix epoll'...
326
327
  	INIT_LIST_HEAD(&ncalls->tasks_call_list);
  	spin_lock_init(&ncalls->lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
328
  }
5071f97ec   Davide Libenzi   epoll: fix epoll'...
329
  /**
3fb0e584a   Davide Libenzi   epoll: move ready...
330
331
332
333
334
335
336
337
338
339
340
341
342
   * ep_events_available - Checks if ready events might be available.
   *
   * @ep: Pointer to the eventpoll context.
   *
   * Returns: Returns a value different than zero if ready events are available,
   *          or zero otherwise.
   */
  static inline int ep_events_available(struct eventpoll *ep)
  {
  	return !list_empty(&ep->rdllist) || ep->ovflist != EP_UNACTIVE_PTR;
  }
  
  /**
5071f97ec   Davide Libenzi   epoll: fix epoll'...
343
344
345
346
347
348
349
350
351
352
   * ep_call_nested - Perform a bound (possibly) nested call, by checking
   *                  that the recursion limit is not exceeded, and that
   *                  the same nested call (by the meaning of same cookie) is
   *                  no re-entered.
   *
   * @ncalls: Pointer to the nested_calls structure to be used for this call.
   * @max_nests: Maximum number of allowed nesting calls.
   * @nproc: Nested call core function pointer.
   * @priv: Opaque data to be passed to the @nproc callback.
   * @cookie: Cookie to be used to identify this nested call.
3fe4a975d   Davide Libenzi   epoll: fix nested...
353
   * @ctx: This instance context.
5071f97ec   Davide Libenzi   epoll: fix epoll'...
354
355
356
   *
   * Returns: Returns the code returned by the @nproc callback, or -1 if
   *          the maximum recursion limit has been exceeded.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
357
   */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
358
359
  static int ep_call_nested(struct nested_calls *ncalls, int max_nests,
  			  int (*nproc)(void *, void *, int), void *priv,
3fe4a975d   Davide Libenzi   epoll: fix nested...
360
  			  void *cookie, void *ctx)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
361
  {
5071f97ec   Davide Libenzi   epoll: fix epoll'...
362
  	int error, call_nests = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
363
  	unsigned long flags;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
364
365
366
  	struct list_head *lsthead = &ncalls->tasks_call_list;
  	struct nested_call_node *tncur;
  	struct nested_call_node tnode;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
367

5071f97ec   Davide Libenzi   epoll: fix epoll'...
368
  	spin_lock_irqsave(&ncalls->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
369

5071f97ec   Davide Libenzi   epoll: fix epoll'...
370
371
372
373
374
  	/*
  	 * Try to see if the current task is already inside this wakeup call.
  	 * We use a list here, since the population inside this set is always
  	 * very much limited.
  	 */
b70c39409   Matthias Kaehlcke   fs/eventpoll.c: u...
375
  	list_for_each_entry(tncur, lsthead, llink) {
3fe4a975d   Davide Libenzi   epoll: fix nested...
376
  		if (tncur->ctx == ctx &&
5071f97ec   Davide Libenzi   epoll: fix epoll'...
377
  		    (tncur->cookie == cookie || ++call_nests > max_nests)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
378
379
380
381
  			/*
  			 * Ops ... loop detected or maximum nest level reached.
  			 * We abort this wake by breaking the cycle itself.
  			 */
abff55cee   Tony Battersby   epoll: don't use ...
382
383
  			error = -1;
  			goto out_unlock;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
384
385
  		}
  	}
5071f97ec   Davide Libenzi   epoll: fix epoll'...
386
  	/* Add the current task and cookie to the list */
3fe4a975d   Davide Libenzi   epoll: fix nested...
387
  	tnode.ctx = ctx;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
388
  	tnode.cookie = cookie;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
389
  	list_add(&tnode.llink, lsthead);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
390
  	spin_unlock_irqrestore(&ncalls->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
391

5071f97ec   Davide Libenzi   epoll: fix epoll'...
392
393
  	/* Call the nested function */
  	error = (*nproc)(priv, cookie, call_nests);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
394
395
  
  	/* Remove the current task from the list */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
396
  	spin_lock_irqsave(&ncalls->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
397
  	list_del(&tnode.llink);
3fe4a975d   Davide Libenzi   epoll: fix nested...
398
  out_unlock:
5071f97ec   Davide Libenzi   epoll: fix epoll'...
399
400
401
402
  	spin_unlock_irqrestore(&ncalls->lock, flags);
  
  	return error;
  }
2dfa4eeab   Davide Libenzi   epoll keyed wakeu...
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
  #ifdef CONFIG_DEBUG_LOCK_ALLOC
  static inline void ep_wake_up_nested(wait_queue_head_t *wqueue,
  				     unsigned long events, int subclass)
  {
  	unsigned long flags;
  
  	spin_lock_irqsave_nested(&wqueue->lock, flags, subclass);
  	wake_up_locked_poll(wqueue, events);
  	spin_unlock_irqrestore(&wqueue->lock, flags);
  }
  #else
  static inline void ep_wake_up_nested(wait_queue_head_t *wqueue,
  				     unsigned long events, int subclass)
  {
  	wake_up_poll(wqueue, events);
  }
  #endif
5071f97ec   Davide Libenzi   epoll: fix epoll'...
420
421
  static int ep_poll_wakeup_proc(void *priv, void *cookie, int call_nests)
  {
2dfa4eeab   Davide Libenzi   epoll keyed wakeu...
422
423
  	ep_wake_up_nested((wait_queue_head_t *) cookie, POLLIN,
  			  1 + call_nests);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
  	return 0;
  }
  
  /*
   * Perform a safe wake up of the poll wait list. The problem is that
   * with the new callback'd wake up system, it is possible that the
   * poll callback is reentered from inside the call to wake_up() done
   * on the poll wait queue head. The rule is that we cannot reenter the
   * wake up code from the same task more than EP_MAX_NESTS times,
   * and we cannot reenter the same wait queue head at all. This will
   * enable to have a hierarchy of epoll file descriptor of no more than
   * EP_MAX_NESTS deep.
   */
  static void ep_poll_safewake(wait_queue_head_t *wq)
  {
3fe4a975d   Davide Libenzi   epoll: fix nested...
439
  	int this_cpu = get_cpu();
5071f97ec   Davide Libenzi   epoll: fix epoll'...
440
  	ep_call_nested(&poll_safewake_ncalls, EP_MAX_NESTS,
3fe4a975d   Davide Libenzi   epoll: fix nested...
441
442
443
  		       ep_poll_wakeup_proc, NULL, wq, (void *) (long) this_cpu);
  
  	put_cpu();
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
444
  }
e6aa5c0ba   Oleg Nesterov   epoll: ep_unregis...
445
446
447
448
449
450
451
452
453
454
455
  static void ep_remove_wait_queue(struct eppoll_entry *pwq)
  {
  	wait_queue_head_t *whead;
  
  	rcu_read_lock();
  	/* If it is cleared by POLLFREE, it should be rcu-safe */
  	whead = rcu_dereference(pwq->whead);
  	if (whead)
  		remove_wait_queue(whead, &pwq->wait);
  	rcu_read_unlock();
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
456
  /*
d1bc90dd5   Tony Battersby   epoll: remove unn...
457
458
459
   * This function unregisters poll callbacks from the associated file
   * descriptor.  Must be called with "mtx" held (or "epmutex" if called from
   * ep_free).
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
460
   */
7699acd13   Davide Libenzi   epoll cleanups: e...
461
  static void ep_unregister_pollwait(struct eventpoll *ep, struct epitem *epi)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
462
  {
7699acd13   Davide Libenzi   epoll cleanups: e...
463
464
  	struct list_head *lsthead = &epi->pwqlist;
  	struct eppoll_entry *pwq;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
465

d1bc90dd5   Tony Battersby   epoll: remove unn...
466
467
  	while (!list_empty(lsthead)) {
  		pwq = list_first_entry(lsthead, struct eppoll_entry, llink);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
468

d1bc90dd5   Tony Battersby   epoll: remove unn...
469
  		list_del(&pwq->llink);
e6aa5c0ba   Oleg Nesterov   epoll: ep_unregis...
470
  		ep_remove_wait_queue(pwq);
d1bc90dd5   Tony Battersby   epoll: remove unn...
471
  		kmem_cache_free(pwq_cache, pwq);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
472
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
473
  }
5071f97ec   Davide Libenzi   epoll: fix epoll'...
474
475
476
477
478
479
480
481
  /**
   * ep_scan_ready_list - Scans the ready list in a way that makes possible for
   *                      the scan code, to call f_op->poll(). Also allows for
   *                      O(NumReady) performance.
   *
   * @ep: Pointer to the epoll private data structure.
   * @sproc: Pointer to the scan callback.
   * @priv: Private opaque data passed to the @sproc callback.
d8805e633   Nelson Elhage   epoll: fix spurio...
482
   * @depth: The current depth of recursive f_op->poll calls.
5071f97ec   Davide Libenzi   epoll: fix epoll'...
483
484
485
486
487
488
   *
   * Returns: The same integer error code returned by the @sproc callback.
   */
  static int ep_scan_ready_list(struct eventpoll *ep,
  			      int (*sproc)(struct eventpoll *,
  					   struct list_head *, void *),
d8805e633   Nelson Elhage   epoll: fix spurio...
489
490
  			      void *priv,
  			      int depth)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
491
492
493
494
  {
  	int error, pwake = 0;
  	unsigned long flags;
  	struct epitem *epi, *nepi;
296e236e9   Davide Libenzi   epoll: fix epoll'...
495
  	LIST_HEAD(txlist);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
496
497
498
  
  	/*
  	 * We need to lock this because we could be hit by
e057e15ff   Tony Battersby   epoll: clean up e...
499
  	 * eventpoll_release_file() and epoll_ctl().
5071f97ec   Davide Libenzi   epoll: fix epoll'...
500
  	 */
d8805e633   Nelson Elhage   epoll: fix spurio...
501
  	mutex_lock_nested(&ep->mtx, depth);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
502
503
504
505
506
507
508
509
510
511
  
  	/*
  	 * Steal the ready list, and re-init the original one to the
  	 * empty list. Also, set ep->ovflist to NULL so that events
  	 * happening while looping w/out locks, are not lost. We cannot
  	 * have the poll callback to queue directly on ep->rdllist,
  	 * because we want the "sproc" callback to be able to do it
  	 * in a lockless way.
  	 */
  	spin_lock_irqsave(&ep->lock, flags);
296e236e9   Davide Libenzi   epoll: fix epoll'...
512
  	list_splice_init(&ep->rdllist, &txlist);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
  	ep->ovflist = NULL;
  	spin_unlock_irqrestore(&ep->lock, flags);
  
  	/*
  	 * Now call the callback function.
  	 */
  	error = (*sproc)(ep, &txlist, priv);
  
  	spin_lock_irqsave(&ep->lock, flags);
  	/*
  	 * During the time we spent inside the "sproc" callback, some
  	 * other events might have been queued by the poll callback.
  	 * We re-insert them inside the main ready-list here.
  	 */
  	for (nepi = ep->ovflist; (epi = nepi) != NULL;
  	     nepi = epi->next, epi->next = EP_UNACTIVE_PTR) {
  		/*
  		 * We need to check if the item is already in the list.
  		 * During the "sproc" callback execution time, items are
  		 * queued into ->ovflist but the "txlist" might already
  		 * contain them, and the list_splice() below takes care of them.
  		 */
  		if (!ep_is_linked(&epi->rdllink))
  			list_add_tail(&epi->rdllink, &ep->rdllist);
  	}
  	/*
  	 * We need to set back ep->ovflist to EP_UNACTIVE_PTR, so that after
  	 * releasing the lock, events will be queued in the normal way inside
  	 * ep->rdllist.
  	 */
  	ep->ovflist = EP_UNACTIVE_PTR;
  
  	/*
  	 * Quickly re-inject items left on "txlist".
  	 */
  	list_splice(&txlist, &ep->rdllist);
  
  	if (!list_empty(&ep->rdllist)) {
  		/*
296e236e9   Davide Libenzi   epoll: fix epoll'...
552
553
  		 * Wake up (if active) both the eventpoll wait list and
  		 * the ->poll() wait list (delayed after we release the lock).
5071f97ec   Davide Libenzi   epoll: fix epoll'...
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
  		 */
  		if (waitqueue_active(&ep->wq))
  			wake_up_locked(&ep->wq);
  		if (waitqueue_active(&ep->poll_wait))
  			pwake++;
  	}
  	spin_unlock_irqrestore(&ep->lock, flags);
  
  	mutex_unlock(&ep->mtx);
  
  	/* We have to call this outside the lock */
  	if (pwake)
  		ep_poll_safewake(&ep->poll_wait);
  
  	return error;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
570
  /*
7699acd13   Davide Libenzi   epoll cleanups: e...
571
   * Removes a "struct epitem" from the eventpoll RB tree and deallocates
c7ea76302   Davide Libenzi   epoll locks chang...
572
   * all the associated resources. Must be called with "mtx" held.
7699acd13   Davide Libenzi   epoll cleanups: e...
573
574
575
   */
  static int ep_remove(struct eventpoll *ep, struct epitem *epi)
  {
7699acd13   Davide Libenzi   epoll cleanups: e...
576
577
  	unsigned long flags;
  	struct file *file = epi->ffd.file;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
578
579
  
  	/*
7699acd13   Davide Libenzi   epoll cleanups: e...
580
581
582
583
584
585
  	 * Removes poll wait queue hooks. We _have_ to do this without holding
  	 * the "ep->lock" otherwise a deadlock might occur. This because of the
  	 * sequence of the lock acquisition. Here we do "ep->lock" then the wait
  	 * queue head lock when unregistering the wait queue. The wakeup callback
  	 * will run by holding the wait queue head lock and will call our callback
  	 * that will try to get "ep->lock".
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
586
  	 */
7699acd13   Davide Libenzi   epoll cleanups: e...
587
  	ep_unregister_pollwait(ep, epi);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
588

7699acd13   Davide Libenzi   epoll cleanups: e...
589
  	/* Remove the current item from the list of epoll hooks */
684999149   Jonathan Corbet   Rename struct fil...
590
  	spin_lock(&file->f_lock);
7699acd13   Davide Libenzi   epoll cleanups: e...
591
592
  	if (ep_is_linked(&epi->fllink))
  		list_del_init(&epi->fllink);
684999149   Jonathan Corbet   Rename struct fil...
593
  	spin_unlock(&file->f_lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
594

cdac75e6f   Davide Libenzi   epoll: avoid kmem...
595
  	rb_erase(&epi->rbn, &ep->rbr);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
596

c7ea76302   Davide Libenzi   epoll locks chang...
597
598
599
600
  	spin_lock_irqsave(&ep->lock, flags);
  	if (ep_is_linked(&epi->rdllink))
  		list_del_init(&epi->rdllink);
  	spin_unlock_irqrestore(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
601

7699acd13   Davide Libenzi   epoll cleanups: e...
602
  	/* At this point it is safe to free the eventpoll item */
c7ea76302   Davide Libenzi   epoll locks chang...
603
  	kmem_cache_free(epi_cache, epi);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
604

52bd19f76   Robin Holt   epoll: convert ma...
605
  	atomic_long_dec(&ep->user->epoll_watches);
7ef9964e6   Davide Libenzi   epoll: introduce ...
606

c7ea76302   Davide Libenzi   epoll locks chang...
607
  	return 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
608
  }
7699acd13   Davide Libenzi   epoll cleanups: e...
609
  static void ep_free(struct eventpoll *ep)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
610
  {
7699acd13   Davide Libenzi   epoll cleanups: e...
611
612
  	struct rb_node *rbp;
  	struct epitem *epi;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
613

7699acd13   Davide Libenzi   epoll cleanups: e...
614
615
  	/* We need to release all tasks waiting for these file */
  	if (waitqueue_active(&ep->poll_wait))
5071f97ec   Davide Libenzi   epoll: fix epoll'...
616
  		ep_poll_safewake(&ep->poll_wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
617

7699acd13   Davide Libenzi   epoll cleanups: e...
618
619
620
  	/*
  	 * We need to lock this because we could be hit by
  	 * eventpoll_release_file() while we're freeing the "struct eventpoll".
d47de16c7   Davide Libenzi   fix epoll single ...
621
  	 * We do not need to hold "ep->mtx" here because the epoll file
7699acd13   Davide Libenzi   epoll cleanups: e...
622
623
  	 * is on the way to be removed and no one has references to it
  	 * anymore. The only hit might come from eventpoll_release_file() but
25985edce   Lucas De Marchi   Fix common misspe...
624
  	 * holding "epmutex" is sufficient here.
7699acd13   Davide Libenzi   epoll cleanups: e...
625
626
  	 */
  	mutex_lock(&epmutex);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
627
628
  
  	/*
7699acd13   Davide Libenzi   epoll cleanups: e...
629
  	 * Walks through the whole tree by unregistering poll callbacks.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
630
  	 */
7699acd13   Davide Libenzi   epoll cleanups: e...
631
632
633
634
635
  	for (rbp = rb_first(&ep->rbr); rbp; rbp = rb_next(rbp)) {
  		epi = rb_entry(rbp, struct epitem, rbn);
  
  		ep_unregister_pollwait(ep, epi);
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
636
637
  
  	/*
7699acd13   Davide Libenzi   epoll cleanups: e...
638
639
  	 * Walks through the whole tree by freeing each "struct epitem". At this
  	 * point we are sure no poll callbacks will be lingering around, and also by
d47de16c7   Davide Libenzi   fix epoll single ...
640
  	 * holding "epmutex" we can be sure that no file cleanup code will hit
7699acd13   Davide Libenzi   epoll cleanups: e...
641
  	 * us during this operation. So we can avoid the lock on "ep->lock".
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
642
  	 */
c80544dc0   Stephen Hemminger   sparse pointer us...
643
  	while ((rbp = rb_first(&ep->rbr)) != NULL) {
7699acd13   Davide Libenzi   epoll cleanups: e...
644
645
646
  		epi = rb_entry(rbp, struct epitem, rbn);
  		ep_remove(ep, epi);
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
647

7699acd13   Davide Libenzi   epoll cleanups: e...
648
  	mutex_unlock(&epmutex);
d47de16c7   Davide Libenzi   fix epoll single ...
649
  	mutex_destroy(&ep->mtx);
7ef9964e6   Davide Libenzi   epoll: introduce ...
650
  	free_uid(ep->user);
f0ee9aabb   Davide Libenzi   epoll: move kfree...
651
  	kfree(ep);
7699acd13   Davide Libenzi   epoll cleanups: e...
652
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
653

7699acd13   Davide Libenzi   epoll cleanups: e...
654
655
656
  static int ep_eventpoll_release(struct inode *inode, struct file *file)
  {
  	struct eventpoll *ep = file->private_data;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
657

f0ee9aabb   Davide Libenzi   epoll: move kfree...
658
  	if (ep)
7699acd13   Davide Libenzi   epoll cleanups: e...
659
  		ep_free(ep);
7699acd13   Davide Libenzi   epoll cleanups: e...
660

7699acd13   Davide Libenzi   epoll cleanups: e...
661
  	return 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
662
  }
296e236e9   Davide Libenzi   epoll: fix epoll'...
663
664
  static int ep_read_events_proc(struct eventpoll *ep, struct list_head *head,
  			       void *priv)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
665
666
667
668
669
670
671
  {
  	struct epitem *epi, *tmp;
  
  	list_for_each_entry_safe(epi, tmp, head, rdllink) {
  		if (epi->ffd.file->f_op->poll(epi->ffd.file, NULL) &
  		    epi->event.events)
  			return POLLIN | POLLRDNORM;
296e236e9   Davide Libenzi   epoll: fix epoll'...
672
  		else {
5071f97ec   Davide Libenzi   epoll: fix epoll'...
673
674
675
676
677
678
  			/*
  			 * Item has been dropped into the ready list by the poll
  			 * callback, but it's not actually ready, as far as
  			 * caller requested events goes. We can remove it here.
  			 */
  			list_del_init(&epi->rdllink);
296e236e9   Davide Libenzi   epoll: fix epoll'...
679
  		}
5071f97ec   Davide Libenzi   epoll: fix epoll'...
680
681
682
683
684
685
686
  	}
  
  	return 0;
  }
  
  static int ep_poll_readyevents_proc(void *priv, void *cookie, int call_nests)
  {
d8805e633   Nelson Elhage   epoll: fix spurio...
687
  	return ep_scan_ready_list(priv, ep_read_events_proc, NULL, call_nests + 1);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
688
  }
7699acd13   Davide Libenzi   epoll cleanups: e...
689
690
  static unsigned int ep_eventpoll_poll(struct file *file, poll_table *wait)
  {
5071f97ec   Davide Libenzi   epoll: fix epoll'...
691
  	int pollflags;
7699acd13   Davide Libenzi   epoll cleanups: e...
692
  	struct eventpoll *ep = file->private_data;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
693

7699acd13   Davide Libenzi   epoll cleanups: e...
694
695
  	/* Insert inside our poll wait queue */
  	poll_wait(file, &ep->poll_wait, wait);
5071f97ec   Davide Libenzi   epoll: fix epoll'...
696
697
698
699
700
701
702
  	/*
  	 * Proceed to find out if wanted events are really available inside
  	 * the ready list. This need to be done under ep_call_nested()
  	 * supervision, since the call to f_op->poll() done on listed files
  	 * could re-enter here.
  	 */
  	pollflags = ep_call_nested(&poll_readywalk_ncalls, EP_MAX_NESTS,
3fe4a975d   Davide Libenzi   epoll: fix nested...
703
  				   ep_poll_readyevents_proc, ep, ep, current);
7699acd13   Davide Libenzi   epoll cleanups: e...
704

296e236e9   Davide Libenzi   epoll: fix epoll'...
705
  	return pollflags != -1 ? pollflags : 0;
7699acd13   Davide Libenzi   epoll cleanups: e...
706
707
708
709
710
  }
  
  /* File callbacks that implement the eventpoll file behaviour */
  static const struct file_operations eventpoll_fops = {
  	.release	= ep_eventpoll_release,
6038f373a   Arnd Bergmann   llseek: automatic...
711
712
  	.poll		= ep_eventpoll_poll,
  	.llseek		= noop_llseek,
7699acd13   Davide Libenzi   epoll cleanups: e...
713
  };
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
714
  /*
7699acd13   Davide Libenzi   epoll cleanups: e...
715
716
717
   * This is called from eventpoll_release() to unlink files from the eventpoll
   * interface. We need to have this facility to cleanup correctly files that are
   * closed without being removed from the eventpoll interface.
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
718
   */
7699acd13   Davide Libenzi   epoll cleanups: e...
719
  void eventpoll_release_file(struct file *file)
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
720
  {
7699acd13   Davide Libenzi   epoll cleanups: e...
721
722
723
  	struct list_head *lsthead = &file->f_ep_links;
  	struct eventpoll *ep;
  	struct epitem *epi;
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
724
725
  
  	/*
684999149   Jonathan Corbet   Rename struct fil...
726
  	 * We don't want to get "file->f_lock" because it is not
7699acd13   Davide Libenzi   epoll cleanups: e...
727
  	 * necessary. It is not necessary because we're in the "struct file"
25985edce   Lucas De Marchi   Fix common misspe...
728
  	 * cleanup path, and this means that no one is using this file anymore.
5071f97ec   Davide Libenzi   epoll: fix epoll'...
729
  	 * So, for example, epoll_ctl() cannot hit here since if we reach this
67647d0fb   Davide Libenzi   epoll: fix some c...
730
  	 * point, the file counter already went to zero and fget() would fail.
d47de16c7   Davide Libenzi   fix epoll single ...
731
  	 * The only hit might come from ep_free() but by holding the mutex
7699acd13   Davide Libenzi   epoll cleanups: e...
732
  	 * will correctly serialize the operation. We do need to acquire
d47de16c7   Davide Libenzi   fix epoll single ...
733
  	 * "ep->mtx" after "epmutex" because ep_remove() requires it when called
7699acd13   Davide Libenzi   epoll cleanups: e...
734
  	 * from anywhere but ep_free().
684999149   Jonathan Corbet   Rename struct fil...
735
736
  	 *
  	 * Besides, ep_remove() acquires the lock, so we can't hold it here.
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
737
  	 */
7699acd13   Davide Libenzi   epoll cleanups: e...
738
  	mutex_lock(&epmutex);
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
739

7699acd13   Davide Libenzi   epoll cleanups: e...
740
741
  	while (!list_empty(lsthead)) {
  		epi = list_first_entry(lsthead, struct epitem, fllink);
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
742

7699acd13   Davide Libenzi   epoll cleanups: e...
743
744
  		ep = epi->ep;
  		list_del_init(&epi->fllink);
d8805e633   Nelson Elhage   epoll: fix spurio...
745
  		mutex_lock_nested(&ep->mtx, 0);
7699acd13   Davide Libenzi   epoll cleanups: e...
746
  		ep_remove(ep, epi);
d47de16c7   Davide Libenzi   fix epoll single ...
747
  		mutex_unlock(&ep->mtx);
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
748
  	}
7699acd13   Davide Libenzi   epoll cleanups: e...
749
  	mutex_unlock(&epmutex);
b611967de   Davide Libenzi   [PATCH] epoll_pwa...
750
  }
53d2be79d   Davide Libenzi   [PATCH] epoll: fi...
751
  static int ep_alloc(struct eventpoll **pep)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
752
  {
7ef9964e6   Davide Libenzi   epoll: introduce ...
753
754
755
  	int error;
  	struct user_struct *user;
  	struct eventpoll *ep;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
756

7ef9964e6   Davide Libenzi   epoll: introduce ...
757
  	user = get_current_user();
7ef9964e6   Davide Libenzi   epoll: introduce ...
758
759
760
761
  	error = -ENOMEM;
  	ep = kzalloc(sizeof(*ep), GFP_KERNEL);
  	if (unlikely(!ep))
  		goto free_uid;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
762

c7ea76302   Davide Libenzi   epoll locks chang...
763
  	spin_lock_init(&ep->lock);
d47de16c7   Davide Libenzi   fix epoll single ...
764
  	mutex_init(&ep->mtx);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
765
766
767
768
  	init_waitqueue_head(&ep->wq);
  	init_waitqueue_head(&ep->poll_wait);
  	INIT_LIST_HEAD(&ep->rdllist);
  	ep->rbr = RB_ROOT;
d47de16c7   Davide Libenzi   fix epoll single ...
769
  	ep->ovflist = EP_UNACTIVE_PTR;
7ef9964e6   Davide Libenzi   epoll: introduce ...
770
  	ep->user = user;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
771

53d2be79d   Davide Libenzi   [PATCH] epoll: fi...
772
  	*pep = ep;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
773

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
774
  	return 0;
7ef9964e6   Davide Libenzi   epoll: introduce ...
775
776
777
778
  
  free_uid:
  	free_uid(user);
  	return error;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
779
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
780
  /*
c7ea76302   Davide Libenzi   epoll locks chang...
781
782
783
   * Search the file inside the eventpoll tree. The RB tree operations
   * are protected by the "mtx" mutex, and ep_find() must be called with
   * "mtx" held.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
784
785
786
787
   */
  static struct epitem *ep_find(struct eventpoll *ep, struct file *file, int fd)
  {
  	int kcmp;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
788
789
790
  	struct rb_node *rbp;
  	struct epitem *epi, *epir = NULL;
  	struct epoll_filefd ffd;
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
791
  	ep_set_ffd(&ffd, file, fd);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
792
793
  	for (rbp = ep->rbr.rb_node; rbp; ) {
  		epi = rb_entry(rbp, struct epitem, rbn);
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
794
  		kcmp = ep_cmp_ffd(&ffd, &epi->ffd);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
795
796
797
798
799
  		if (kcmp > 0)
  			rbp = rbp->rb_right;
  		else if (kcmp < 0)
  			rbp = rbp->rb_left;
  		else {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
800
801
802
803
  			epir = epi;
  			break;
  		}
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
804

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
805
806
  	return epir;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
807
  /*
7699acd13   Davide Libenzi   epoll cleanups: e...
808
   * This is the callback that is passed to the wait queue wakeup
bf6a41db7   Daniel Baluta   fs/eventpoll.c: f...
809
   * mechanism. It is called by the stored file descriptors when they
7699acd13   Davide Libenzi   epoll cleanups: e...
810
   * have events to report.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
811
   */
7699acd13   Davide Libenzi   epoll cleanups: e...
812
  static int ep_poll_callback(wait_queue_t *wait, unsigned mode, int sync, void *key)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
813
  {
7699acd13   Davide Libenzi   epoll cleanups: e...
814
815
816
817
  	int pwake = 0;
  	unsigned long flags;
  	struct epitem *epi = ep_item_from_wait(wait);
  	struct eventpoll *ep = epi->ep;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
818

e6aa5c0ba   Oleg Nesterov   epoll: ep_unregis...
819
820
821
822
823
824
825
826
  	if ((unsigned long)key & POLLFREE) {
  		ep_pwq_from_wait(wait)->whead = NULL;
  		/*
  		 * whead = NULL above can race with ep_remove_wait_queue()
  		 * which can do another remove_wait_queue() after us, so we
  		 * can't use __remove_wait_queue(). whead->lock is held by
  		 * the caller.
  		 */
7741374fa   Oleg Nesterov   epoll: introduce ...
827
  		list_del_init(&wait->task_list);
e6aa5c0ba   Oleg Nesterov   epoll: ep_unregis...
828
  	}
7741374fa   Oleg Nesterov   epoll: introduce ...
829

c7ea76302   Davide Libenzi   epoll locks chang...
830
  	spin_lock_irqsave(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
831

7699acd13   Davide Libenzi   epoll cleanups: e...
832
833
834
835
836
837
838
  	/*
  	 * If the event mask does not contain any poll(2) event, we consider the
  	 * descriptor to be disabled. This condition is likely the effect of the
  	 * EPOLLONESHOT bit that disables the descriptor when an event is received,
  	 * until the next EPOLL_CTL_MOD will be issued.
  	 */
  	if (!(epi->event.events & ~EP_PRIVATE_BITS))
d47de16c7   Davide Libenzi   fix epoll single ...
839
840
841
  		goto out_unlock;
  
  	/*
2dfa4eeab   Davide Libenzi   epoll keyed wakeu...
842
843
844
845
846
847
848
849
850
  	 * Check the events coming with the callback. At this stage, not
  	 * every device reports the events in the "key" parameter of the
  	 * callback. We need to be able to handle both cases here, hence the
  	 * test for "key" != NULL before the event match test.
  	 */
  	if (key && !((unsigned long) key & epi->event.events))
  		goto out_unlock;
  
  	/*
bf6a41db7   Daniel Baluta   fs/eventpoll.c: f...
851
  	 * If we are transferring events to userspace, we can hold no locks
d47de16c7   Davide Libenzi   fix epoll single ...
852
  	 * (because we're accessing user memory, and because of linux f_op->poll()
bf6a41db7   Daniel Baluta   fs/eventpoll.c: f...
853
  	 * semantics). All the events that happen during that period of time are
d47de16c7   Davide Libenzi   fix epoll single ...
854
855
856
857
858
859
860
861
862
  	 * chained in ep->ovflist and requeued later on.
  	 */
  	if (unlikely(ep->ovflist != EP_UNACTIVE_PTR)) {
  		if (epi->next == EP_UNACTIVE_PTR) {
  			epi->next = ep->ovflist;
  			ep->ovflist = epi;
  		}
  		goto out_unlock;
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
863

7699acd13   Davide Libenzi   epoll cleanups: e...
864
  	/* If this file is already in the ready list we exit soon */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
865
866
  	if (!ep_is_linked(&epi->rdllink))
  		list_add_tail(&epi->rdllink, &ep->rdllist);
7699acd13   Davide Libenzi   epoll cleanups: e...
867

7699acd13   Davide Libenzi   epoll cleanups: e...
868
869
870
871
872
  	/*
  	 * Wake up ( if active ) both the eventpoll wait list and the ->poll()
  	 * wait list.
  	 */
  	if (waitqueue_active(&ep->wq))
4a6e9e2ce   Matthew Wilcox   Use wake_up_locke...
873
  		wake_up_locked(&ep->wq);
7699acd13   Davide Libenzi   epoll cleanups: e...
874
875
  	if (waitqueue_active(&ep->poll_wait))
  		pwake++;
d47de16c7   Davide Libenzi   fix epoll single ...
876
  out_unlock:
c7ea76302   Davide Libenzi   epoll locks chang...
877
  	spin_unlock_irqrestore(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
878

7699acd13   Davide Libenzi   epoll cleanups: e...
879
880
  	/* We have to call this outside the lock */
  	if (pwake)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
881
  		ep_poll_safewake(&ep->poll_wait);
7699acd13   Davide Libenzi   epoll cleanups: e...
882
883
884
  
  	return 1;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
885
886
887
888
889
890
891
892
  
  /*
   * This is the callback that is used to add our wait queue to the
   * target file wakeup lists.
   */
  static void ep_ptable_queue_proc(struct file *file, wait_queue_head_t *whead,
  				 poll_table *pt)
  {
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
893
  	struct epitem *epi = ep_item_from_epqueue(pt);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
894
  	struct eppoll_entry *pwq;
e94b17660   Christoph Lameter   [PATCH] slab: rem...
895
  	if (epi->nwait >= 0 && (pwq = kmem_cache_alloc(pwq_cache, GFP_KERNEL))) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
896
897
898
899
900
901
  		init_waitqueue_func_entry(&pwq->wait, ep_poll_callback);
  		pwq->whead = whead;
  		pwq->base = epi;
  		add_wait_queue(whead, &pwq->wait);
  		list_add_tail(&pwq->llink, &epi->pwqlist);
  		epi->nwait++;
296e236e9   Davide Libenzi   epoll: fix epoll'...
902
  	} else {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
903
904
  		/* We have to signal that an error occurred */
  		epi->nwait = -1;
296e236e9   Davide Libenzi   epoll: fix epoll'...
905
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
906
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
907
908
909
910
911
912
913
914
915
  static void ep_rbtree_insert(struct eventpoll *ep, struct epitem *epi)
  {
  	int kcmp;
  	struct rb_node **p = &ep->rbr.rb_node, *parent = NULL;
  	struct epitem *epic;
  
  	while (*p) {
  		parent = *p;
  		epic = rb_entry(parent, struct epitem, rbn);
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
916
  		kcmp = ep_cmp_ffd(&epi->ffd, &epic->ffd);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
917
918
919
920
921
922
923
924
  		if (kcmp > 0)
  			p = &parent->rb_right;
  		else
  			p = &parent->rb_left;
  	}
  	rb_link_node(&epi->rbn, parent, p);
  	rb_insert_color(&epi->rbn, &ep->rbr);
  }
203aa5260   Jason Baron   epoll: limit paths
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
  
  
  #define PATH_ARR_SIZE 5
  /*
   * These are the number paths of length 1 to 5, that we are allowing to emanate
   * from a single file of interest. For example, we allow 1000 paths of length
   * 1, to emanate from each file of interest. This essentially represents the
   * potential wakeup paths, which need to be limited in order to avoid massive
   * uncontrolled wakeup storms. The common use case should be a single ep which
   * is connected to n file sources. In this case each file source has 1 path
   * of length 1. Thus, the numbers below should be more than sufficient. These
   * path limits are enforced during an EPOLL_CTL_ADD operation, since a modify
   * and delete can't add additional paths. Protected by the epmutex.
   */
  static const int path_limits[PATH_ARR_SIZE] = { 1000, 500, 100, 50, 10 };
  static int path_count[PATH_ARR_SIZE];
  
  static int path_count_inc(int nests)
  {
  	if (++path_count[nests] > path_limits[nests])
  		return -1;
  	return 0;
  }
  
  static void path_count_init(void)
  {
  	int i;
  
  	for (i = 0; i < PATH_ARR_SIZE; i++)
  		path_count[i] = 0;
  }
  
  static int reverse_path_check_proc(void *priv, void *cookie, int call_nests)
  {
  	int error = 0;
  	struct file *file = priv;
  	struct file *child_file;
  	struct epitem *epi;
  
  	list_for_each_entry(epi, &file->f_ep_links, fllink) {
  		child_file = epi->ep->file;
  		if (is_file_epoll(child_file)) {
  			if (list_empty(&child_file->f_ep_links)) {
  				if (path_count_inc(call_nests)) {
  					error = -1;
  					break;
  				}
  			} else {
  				error = ep_call_nested(&poll_loop_ncalls,
  							EP_MAX_NESTS,
  							reverse_path_check_proc,
  							child_file, child_file,
  							current);
  			}
  			if (error != 0)
  				break;
  		} else {
  			printk(KERN_ERR "reverse_path_check_proc: "
  				"file is not an ep!
  ");
  		}
  	}
  	return error;
  }
  
  /**
   * reverse_path_check - The tfile_check_list is list of file *, which have
   *                      links that are proposed to be newly added. We need to
   *                      make sure that those added links don't add too many
   *                      paths such that we will spend all our time waking up
   *                      eventpoll objects.
   *
   * Returns: Returns zero if the proposed links don't create too many paths,
   *	    -1 otherwise.
   */
  static int reverse_path_check(void)
  {
  	int length = 0;
  	int error = 0;
  	struct file *current_file;
  
  	/* let's call this for all tfiles */
  	list_for_each_entry(current_file, &tfile_check_list, f_tfile_llink) {
  		length++;
  		path_count_init();
  		error = ep_call_nested(&poll_loop_ncalls, EP_MAX_NESTS,
  					reverse_path_check_proc, current_file,
  					current_file, current);
  		if (error)
  			break;
  	}
  	return error;
  }
c7ea76302   Davide Libenzi   epoll locks chang...
1018
1019
1020
  /*
   * Must be called with "mtx" held.
   */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1021
1022
1023
1024
1025
  static int ep_insert(struct eventpoll *ep, struct epoll_event *event,
  		     struct file *tfile, int fd)
  {
  	int error, revents, pwake = 0;
  	unsigned long flags;
52bd19f76   Robin Holt   epoll: convert ma...
1026
  	long user_watches;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1027
1028
  	struct epitem *epi;
  	struct ep_pqueue epq;
52bd19f76   Robin Holt   epoll: convert ma...
1029
1030
  	user_watches = atomic_long_read(&ep->user->epoll_watches);
  	if (unlikely(user_watches >= max_user_watches))
7ef9964e6   Davide Libenzi   epoll: introduce ...
1031
  		return -ENOSPC;
e94b17660   Christoph Lameter   [PATCH] slab: rem...
1032
  	if (!(epi = kmem_cache_alloc(epi_cache, GFP_KERNEL)))
7ef9964e6   Davide Libenzi   epoll: introduce ...
1033
  		return -ENOMEM;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1034
1035
  
  	/* Item initialization follow here ... */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1036
1037
  	INIT_LIST_HEAD(&epi->rdllink);
  	INIT_LIST_HEAD(&epi->fllink);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1038
1039
  	INIT_LIST_HEAD(&epi->pwqlist);
  	epi->ep = ep;
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
1040
  	ep_set_ffd(&epi->ffd, tfile, fd);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1041
  	epi->event = *event;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1042
  	epi->nwait = 0;
d47de16c7   Davide Libenzi   fix epoll single ...
1043
  	epi->next = EP_UNACTIVE_PTR;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1044
1045
1046
1047
1048
1049
1050
1051
  
  	/* Initialize the poll table using the queue callback */
  	epq.epi = epi;
  	init_poll_funcptr(&epq.pt, ep_ptable_queue_proc);
  
  	/*
  	 * Attach the item to the poll hooks and get current event bits.
  	 * We can safely use the file* here because its usage count has
c7ea76302   Davide Libenzi   epoll locks chang...
1052
1053
1054
  	 * been increased by the caller of this function. Note that after
  	 * this operation completes, the poll callback can start hitting
  	 * the new item.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1055
1056
1057
1058
1059
1060
1061
1062
  	 */
  	revents = tfile->f_op->poll(tfile, &epq.pt);
  
  	/*
  	 * We have to check if something went wrong during the poll wait queue
  	 * install process. Namely an allocation for a wait queue failed due
  	 * high memory pressure.
  	 */
7ef9964e6   Davide Libenzi   epoll: introduce ...
1063
  	error = -ENOMEM;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1064
  	if (epi->nwait < 0)
7699acd13   Davide Libenzi   epoll cleanups: e...
1065
  		goto error_unregister;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1066
1067
  
  	/* Add the current item to the list of active epoll hook for this file */
684999149   Jonathan Corbet   Rename struct fil...
1068
  	spin_lock(&tfile->f_lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1069
  	list_add_tail(&epi->fllink, &tfile->f_ep_links);
684999149   Jonathan Corbet   Rename struct fil...
1070
  	spin_unlock(&tfile->f_lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1071

c7ea76302   Davide Libenzi   epoll locks chang...
1072
1073
1074
1075
  	/*
  	 * Add the current item to the RB tree. All RB tree operations are
  	 * protected by "mtx", and ep_insert() is called with "mtx" held.
  	 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1076
  	ep_rbtree_insert(ep, epi);
203aa5260   Jason Baron   epoll: limit paths
1077
1078
1079
1080
  	/* now check if we've created too many backpaths */
  	error = -EINVAL;
  	if (reverse_path_check())
  		goto error_remove_epi;
c7ea76302   Davide Libenzi   epoll locks chang...
1081
1082
  	/* We have to drop the new item inside our item list to keep track of it */
  	spin_lock_irqsave(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1083
  	/* If the file is already "ready" we drop it inside the ready list */
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
1084
  	if ((revents & event->events) && !ep_is_linked(&epi->rdllink)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1085
1086
1087
1088
  		list_add_tail(&epi->rdllink, &ep->rdllist);
  
  		/* Notify waiting tasks that events are available */
  		if (waitqueue_active(&ep->wq))
4a6e9e2ce   Matthew Wilcox   Use wake_up_locke...
1089
  			wake_up_locked(&ep->wq);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1090
1091
1092
  		if (waitqueue_active(&ep->poll_wait))
  			pwake++;
  	}
c7ea76302   Davide Libenzi   epoll locks chang...
1093
  	spin_unlock_irqrestore(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1094

52bd19f76   Robin Holt   epoll: convert ma...
1095
  	atomic_long_inc(&ep->user->epoll_watches);
7ef9964e6   Davide Libenzi   epoll: introduce ...
1096

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1097
1098
  	/* We have to call this outside the lock */
  	if (pwake)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1099
  		ep_poll_safewake(&ep->poll_wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1100

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1101
  	return 0;
203aa5260   Jason Baron   epoll: limit paths
1102
1103
1104
1105
1106
1107
1108
  error_remove_epi:
  	spin_lock(&tfile->f_lock);
  	if (ep_is_linked(&epi->fllink))
  		list_del_init(&epi->fllink);
  	spin_unlock(&tfile->f_lock);
  
  	rb_erase(&epi->rbn, &ep->rbr);
7699acd13   Davide Libenzi   epoll cleanups: e...
1109
  error_unregister:
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1110
1111
1112
1113
  	ep_unregister_pollwait(ep, epi);
  
  	/*
  	 * We need to do this because an event could have been arrived on some
67647d0fb   Davide Libenzi   epoll: fix some c...
1114
1115
1116
  	 * allocated wait queue. Note that we don't care about the ep->ovflist
  	 * list, since that is used/cleaned only inside a section bound by "mtx".
  	 * And ep_insert() is called with "mtx" held.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1117
  	 */
c7ea76302   Davide Libenzi   epoll locks chang...
1118
  	spin_lock_irqsave(&ep->lock, flags);
b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
1119
  	if (ep_is_linked(&epi->rdllink))
6192bd536   Davide Libenzi   epoll: optimizati...
1120
  		list_del_init(&epi->rdllink);
c7ea76302   Davide Libenzi   epoll locks chang...
1121
  	spin_unlock_irqrestore(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1122

b030a4dd6   Pekka Enberg   [PATCH] Remove ev...
1123
  	kmem_cache_free(epi_cache, epi);
7ef9964e6   Davide Libenzi   epoll: introduce ...
1124

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1125
1126
  	return error;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1127
1128
  /*
   * Modify the interest event mask by dropping an event if the new mask
c7ea76302   Davide Libenzi   epoll locks chang...
1129
   * has a match in the current file status. Must be called with "mtx" held.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1130
1131
1132
1133
1134
   */
  static int ep_modify(struct eventpoll *ep, struct epitem *epi, struct epoll_event *event)
  {
  	int pwake = 0;
  	unsigned int revents;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1135
1136
  
  	/*
e057e15ff   Tony Battersby   epoll: clean up e...
1137
1138
1139
  	 * Set the new event interest mask before calling f_op->poll();
  	 * otherwise we might miss an event that happens between the
  	 * f_op->poll() call and the new event set registering.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1140
1141
  	 */
  	epi->event.events = event->events;
e057e15ff   Tony Battersby   epoll: clean up e...
1142
  	epi->event.data = event->data; /* protected by mtx */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1143
1144
1145
1146
1147
1148
  
  	/*
  	 * Get current event bits. We can safely use the file* here because
  	 * its usage count has been increased by the caller of this function.
  	 */
  	revents = epi->ffd.file->f_op->poll(epi->ffd.file, NULL);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1149
  	/*
c7ea76302   Davide Libenzi   epoll locks chang...
1150
  	 * If the item is "hot" and it is not registered inside the ready
67647d0fb   Davide Libenzi   epoll: fix some c...
1151
  	 * list, push it inside.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1152
  	 */
c7ea76302   Davide Libenzi   epoll locks chang...
1153
  	if (revents & event->events) {
e057e15ff   Tony Battersby   epoll: clean up e...
1154
  		spin_lock_irq(&ep->lock);
c7ea76302   Davide Libenzi   epoll locks chang...
1155
1156
1157
1158
1159
  		if (!ep_is_linked(&epi->rdllink)) {
  			list_add_tail(&epi->rdllink, &ep->rdllist);
  
  			/* Notify waiting tasks that events are available */
  			if (waitqueue_active(&ep->wq))
4a6e9e2ce   Matthew Wilcox   Use wake_up_locke...
1160
  				wake_up_locked(&ep->wq);
c7ea76302   Davide Libenzi   epoll locks chang...
1161
1162
  			if (waitqueue_active(&ep->poll_wait))
  				pwake++;
7699acd13   Davide Libenzi   epoll cleanups: e...
1163
  		}
e057e15ff   Tony Battersby   epoll: clean up e...
1164
  		spin_unlock_irq(&ep->lock);
7699acd13   Davide Libenzi   epoll cleanups: e...
1165
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1166

7699acd13   Davide Libenzi   epoll cleanups: e...
1167
1168
  	/* We have to call this outside the lock */
  	if (pwake)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1169
  		ep_poll_safewake(&ep->poll_wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1170

7699acd13   Davide Libenzi   epoll cleanups: e...
1171
  	return 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1172
  }
296e236e9   Davide Libenzi   epoll: fix epoll'...
1173
1174
  static int ep_send_events_proc(struct eventpoll *ep, struct list_head *head,
  			       void *priv)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1175
  {
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1176
1177
  	struct ep_send_events_data *esed = priv;
  	int eventcnt;
296e236e9   Davide Libenzi   epoll: fix epoll'...
1178
  	unsigned int revents;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1179
1180
  	struct epitem *epi;
  	struct epoll_event __user *uevent;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1181

296e236e9   Davide Libenzi   epoll: fix epoll'...
1182
  	/*
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1183
1184
1185
  	 * We can loop without lock because we are passed a task private list.
  	 * Items cannot vanish during the loop because ep_scan_ready_list() is
  	 * holding "mtx" during this call.
296e236e9   Davide Libenzi   epoll: fix epoll'...
1186
  	 */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1187
1188
1189
  	for (eventcnt = 0, uevent = esed->events;
  	     !list_empty(head) && eventcnt < esed->maxevents;) {
  		epi = list_first_entry(head, struct epitem, rdllink);
d47de16c7   Davide Libenzi   fix epoll single ...
1190
1191
  
  		list_del_init(&epi->rdllink);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1192

296e236e9   Davide Libenzi   epoll: fix epoll'...
1193
1194
  		revents = epi->ffd.file->f_op->poll(epi->ffd.file, NULL) &
  			epi->event.events;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1195

296e236e9   Davide Libenzi   epoll: fix epoll'...
1196
  		/*
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1197
1198
1199
1200
  		 * If the event mask intersect the caller-requested one,
  		 * deliver the event to userspace. Again, ep_scan_ready_list()
  		 * is holding "mtx", so no operations coming from userspace
  		 * can change the item.
296e236e9   Davide Libenzi   epoll: fix epoll'...
1201
1202
  		 */
  		if (revents) {
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1203
  			if (__put_user(revents, &uevent->events) ||
d03058828   Tony Battersby   epoll: remember t...
1204
1205
  			    __put_user(epi->event.data, &uevent->data)) {
  				list_add(&epi->rdllink, head);
296e236e9   Davide Libenzi   epoll: fix epoll'...
1206
  				return eventcnt ? eventcnt : -EFAULT;
d03058828   Tony Battersby   epoll: remember t...
1207
  			}
296e236e9   Davide Libenzi   epoll: fix epoll'...
1208
  			eventcnt++;
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1209
  			uevent++;
296e236e9   Davide Libenzi   epoll: fix epoll'...
1210
1211
1212
1213
1214
1215
1216
1217
  			if (epi->event.events & EPOLLONESHOT)
  				epi->event.events &= EP_PRIVATE_BITS;
  			else if (!(epi->event.events & EPOLLET)) {
  				/*
  				 * If this file has been added with Level
  				 * Trigger mode, we need to insert back inside
  				 * the ready list, so that the next call to
  				 * epoll_wait() will check again the events
25985edce   Lucas De Marchi   Fix common misspe...
1218
  				 * availability. At this point, no one can insert
296e236e9   Davide Libenzi   epoll: fix epoll'...
1219
1220
1221
1222
1223
1224
1225
1226
1227
  				 * into ep->rdllist besides us. The epoll_ctl()
  				 * callers are locked out by
  				 * ep_scan_ready_list() holding "mtx" and the
  				 * poll callback will queue them in ep->ovflist.
  				 */
  				list_add_tail(&epi->rdllink, &ep->rdllist);
  			}
  		}
  	}
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1228
1229
1230
  
  	return eventcnt;
  }
d47de16c7   Davide Libenzi   fix epoll single ...
1231

296e236e9   Davide Libenzi   epoll: fix epoll'...
1232
1233
  static int ep_send_events(struct eventpoll *ep,
  			  struct epoll_event __user *events, int maxevents)
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1234
1235
  {
  	struct ep_send_events_data esed;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1236

5071f97ec   Davide Libenzi   epoll: fix epoll'...
1237
1238
  	esed.maxevents = maxevents;
  	esed.events = events;
6192bd536   Davide Libenzi   epoll: optimizati...
1239

d8805e633   Nelson Elhage   epoll: fix spurio...
1240
  	return ep_scan_ready_list(ep, ep_send_events_proc, &esed, 0);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1241
  }
0781b909b   Eric Dumazet   epoll: epoll_wait...
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
  static inline struct timespec ep_set_mstimeout(long ms)
  {
  	struct timespec now, ts = {
  		.tv_sec = ms / MSEC_PER_SEC,
  		.tv_nsec = NSEC_PER_MSEC * (ms % MSEC_PER_SEC),
  	};
  
  	ktime_get_ts(&now);
  	return timespec_add_safe(now, ts);
  }
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
  /**
   * ep_poll - Retrieves ready events, and delivers them to the caller supplied
   *           event buffer.
   *
   * @ep: Pointer to the eventpoll context.
   * @events: Pointer to the userspace buffer where the ready events should be
   *          stored.
   * @maxevents: Size (in terms of number of events) of the caller event buffer.
   * @timeout: Maximum timeout for the ready events fetch operation, in
   *           milliseconds. If the @timeout is zero, the function will not block,
   *           while if the @timeout is less than zero, the function will block
   *           until at least one event has been retrieved (or an error
   *           occurred).
   *
   * Returns: Returns the number of ready events which have been fetched, or an
   *          error code, in case of error.
   */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1269
1270
1271
  static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events,
  		   int maxevents, long timeout)
  {
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1272
  	int res = 0, eavail, timed_out = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1273
  	unsigned long flags;
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1274
  	long slack = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1275
  	wait_queue_t wait;
95aac7b1c   Shawn Bohrer   epoll: make epoll...
1276
1277
1278
  	ktime_t expires, *to = NULL;
  
  	if (timeout > 0) {
0781b909b   Eric Dumazet   epoll: epoll_wait...
1279
  		struct timespec end_time = ep_set_mstimeout(timeout);
95aac7b1c   Shawn Bohrer   epoll: make epoll...
1280
1281
1282
1283
  		slack = select_estimate_accuracy(&end_time);
  		to = &expires;
  		*to = timespec_to_ktime(end_time);
  	} else if (timeout == 0) {
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1284
1285
1286
1287
  		/*
  		 * Avoid the unnecessary trip to the wait queue loop, if the
  		 * caller specified a non blocking operation.
  		 */
95aac7b1c   Shawn Bohrer   epoll: make epoll...
1288
  		timed_out = 1;
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1289
1290
  		spin_lock_irqsave(&ep->lock, flags);
  		goto check_events;
95aac7b1c   Shawn Bohrer   epoll: make epoll...
1291
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1292

f4d93ad74   Shawn Bohrer   epoll: fix compil...
1293
  fetch_events:
c7ea76302   Davide Libenzi   epoll locks chang...
1294
  	spin_lock_irqsave(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1295

3fb0e584a   Davide Libenzi   epoll: move ready...
1296
  	if (!ep_events_available(ep)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1297
1298
1299
1300
1301
1302
  		/*
  		 * We don't have any available event to return to the caller.
  		 * We need to sleep here, and we will be wake up by
  		 * ep_poll_callback() when events will become available.
  		 */
  		init_waitqueue_entry(&wait, current);
a93d2f174   Changli Gao   sched, wait: Use ...
1303
  		__add_wait_queue_exclusive(&ep->wq, &wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1304
1305
1306
1307
1308
1309
1310
1311
  
  		for (;;) {
  			/*
  			 * We don't want to sleep if the ep_poll_callback() sends us
  			 * a wakeup in between. That's why we set the task state
  			 * to TASK_INTERRUPTIBLE before doing the checks.
  			 */
  			set_current_state(TASK_INTERRUPTIBLE);
3fb0e584a   Davide Libenzi   epoll: move ready...
1312
  			if (ep_events_available(ep) || timed_out)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1313
1314
1315
1316
1317
  				break;
  			if (signal_pending(current)) {
  				res = -EINTR;
  				break;
  			}
c7ea76302   Davide Libenzi   epoll locks chang...
1318
  			spin_unlock_irqrestore(&ep->lock, flags);
95aac7b1c   Shawn Bohrer   epoll: make epoll...
1319
1320
  			if (!schedule_hrtimeout_range(to, slack, HRTIMER_MODE_ABS))
  				timed_out = 1;
c7ea76302   Davide Libenzi   epoll locks chang...
1321
  			spin_lock_irqsave(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1322
  		}
3419b23a9   Davide Libenzi   [PATCH] epoll: us...
1323
  		__remove_wait_queue(&ep->wq, &wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1324
1325
1326
  
  		set_current_state(TASK_RUNNING);
  	}
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1327
  check_events:
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1328
  	/* Is it worth to try to dig for events ? */
3fb0e584a   Davide Libenzi   epoll: move ready...
1329
  	eavail = ep_events_available(ep);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1330

c7ea76302   Davide Libenzi   epoll locks chang...
1331
  	spin_unlock_irqrestore(&ep->lock, flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1332
1333
1334
1335
1336
1337
1338
  
  	/*
  	 * Try to transfer events to user space. In case we get 0 events and
  	 * there's still timeout left over, we go trying again in search of
  	 * more luck.
  	 */
  	if (!res && eavail &&
95aac7b1c   Shawn Bohrer   epoll: make epoll...
1339
  	    !(res = ep_send_events(ep, events, maxevents)) && !timed_out)
f4d93ad74   Shawn Bohrer   epoll: fix compil...
1340
  		goto fetch_events;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1341
1342
1343
  
  	return res;
  }
22bacca48   Davide Libenzi   epoll: prevent cr...
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
  /**
   * ep_loop_check_proc - Callback function to be passed to the @ep_call_nested()
   *                      API, to verify that adding an epoll file inside another
   *                      epoll structure, does not violate the constraints, in
   *                      terms of closed loops, or too deep chains (which can
   *                      result in excessive stack usage).
   *
   * @priv: Pointer to the epoll file to be currently checked.
   * @cookie: Original cookie for this call. This is the top-of-the-chain epoll
   *          data structure pointer.
   * @call_nests: Current dept of the @ep_call_nested() call stack.
   *
   * Returns: Returns zero if adding the epoll @file inside current epoll
   *          structure @ep does not violate the constraints, or -1 otherwise.
   */
  static int ep_loop_check_proc(void *priv, void *cookie, int call_nests)
  {
  	int error = 0;
  	struct file *file = priv;
  	struct eventpoll *ep = file->private_data;
203aa5260   Jason Baron   epoll: limit paths
1364
  	struct eventpoll *ep_tovisit;
22bacca48   Davide Libenzi   epoll: prevent cr...
1365
1366
  	struct rb_node *rbp;
  	struct epitem *epi;
d8805e633   Nelson Elhage   epoll: fix spurio...
1367
  	mutex_lock_nested(&ep->mtx, call_nests + 1);
203aa5260   Jason Baron   epoll: limit paths
1368
1369
  	ep->visited = 1;
  	list_add(&ep->visited_list_link, &visited_list);
22bacca48   Davide Libenzi   epoll: prevent cr...
1370
1371
1372
  	for (rbp = rb_first(&ep->rbr); rbp; rbp = rb_next(rbp)) {
  		epi = rb_entry(rbp, struct epitem, rbn);
  		if (unlikely(is_file_epoll(epi->ffd.file))) {
203aa5260   Jason Baron   epoll: limit paths
1373
1374
1375
  			ep_tovisit = epi->ffd.file->private_data;
  			if (ep_tovisit->visited)
  				continue;
22bacca48   Davide Libenzi   epoll: prevent cr...
1376
  			error = ep_call_nested(&poll_loop_ncalls, EP_MAX_NESTS,
203aa5260   Jason Baron   epoll: limit paths
1377
1378
  					ep_loop_check_proc, epi->ffd.file,
  					ep_tovisit, current);
22bacca48   Davide Libenzi   epoll: prevent cr...
1379
1380
  			if (error != 0)
  				break;
203aa5260   Jason Baron   epoll: limit paths
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
  		} else {
  			/*
  			 * If we've reached a file that is not associated with
  			 * an ep, then we need to check if the newly added
  			 * links are going to add too many wakeup paths. We do
  			 * this by adding it to the tfile_check_list, if it's
  			 * not already there, and calling reverse_path_check()
  			 * during ep_insert().
  			 */
  			if (list_empty(&epi->ffd.file->f_tfile_llink))
  				list_add(&epi->ffd.file->f_tfile_llink,
  					 &tfile_check_list);
22bacca48   Davide Libenzi   epoll: prevent cr...
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
  		}
  	}
  	mutex_unlock(&ep->mtx);
  
  	return error;
  }
  
  /**
   * ep_loop_check - Performs a check to verify that adding an epoll file (@file)
   *                 another epoll file (represented by @ep) does not create
   *                 closed loops or too deep chains.
   *
   * @ep: Pointer to the epoll private data structure.
   * @file: Pointer to the epoll file to be checked.
   *
   * Returns: Returns zero if adding the epoll @file inside current epoll
   *          structure @ep does not violate the constraints, or -1 otherwise.
   */
  static int ep_loop_check(struct eventpoll *ep, struct file *file)
  {
203aa5260   Jason Baron   epoll: limit paths
1413
1414
1415
1416
  	int ret;
  	struct eventpoll *ep_cur, *ep_next;
  
  	ret = ep_call_nested(&poll_loop_ncalls, EP_MAX_NESTS,
22bacca48   Davide Libenzi   epoll: prevent cr...
1417
  			      ep_loop_check_proc, file, ep, current);
203aa5260   Jason Baron   epoll: limit paths
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
  	/* clear visited list */
  	list_for_each_entry_safe(ep_cur, ep_next, &visited_list,
  							visited_list_link) {
  		ep_cur->visited = 0;
  		list_del(&ep_cur->visited_list_link);
  	}
  	return ret;
  }
  
  static void clear_tfile_check_list(void)
  {
  	struct file *file;
  
  	/* first clear the tfile_check_list */
  	while (!list_empty(&tfile_check_list)) {
  		file = list_first_entry(&tfile_check_list, struct file,
  					f_tfile_llink);
  		list_del_init(&file->f_tfile_llink);
  	}
  	INIT_LIST_HEAD(&tfile_check_list);
22bacca48   Davide Libenzi   epoll: prevent cr...
1438
  }
7699acd13   Davide Libenzi   epoll cleanups: e...
1439
  /*
523723bb5   Andrew Morton   fs/eventpoll.c: f...
1440
   * Open an eventpoll file descriptor.
7699acd13   Davide Libenzi   epoll cleanups: e...
1441
   */
5a8a82b1d   Heiko Carstens   [CVE-2009-0029] S...
1442
  SYSCALL_DEFINE1(epoll_create1, int, flags)
7699acd13   Davide Libenzi   epoll cleanups: e...
1443
  {
203aa5260   Jason Baron   epoll: limit paths
1444
  	int error, fd;
bb57c3edc   Davide Libenzi   epoll: remove deb...
1445
  	struct eventpoll *ep = NULL;
203aa5260   Jason Baron   epoll: limit paths
1446
  	struct file *file;
7699acd13   Davide Libenzi   epoll cleanups: e...
1447

e38b36f32   Ulrich Drepper   flag parameters: ...
1448
1449
  	/* Check the EPOLL_* constant for consistency.  */
  	BUILD_BUG_ON(EPOLL_CLOEXEC != O_CLOEXEC);
296e236e9   Davide Libenzi   epoll: fix epoll'...
1450
1451
  	if (flags & ~EPOLL_CLOEXEC)
  		return -EINVAL;
7699acd13   Davide Libenzi   epoll cleanups: e...
1452
  	/*
bb57c3edc   Davide Libenzi   epoll: remove deb...
1453
  	 * Create the internal data structure ("struct eventpoll").
7699acd13   Davide Libenzi   epoll cleanups: e...
1454
  	 */
9fe5ad9c8   Ulrich Drepper   flag parameters a...
1455
  	error = ep_alloc(&ep);
bb57c3edc   Davide Libenzi   epoll: remove deb...
1456
1457
  	if (error < 0)
  		return error;
7699acd13   Davide Libenzi   epoll cleanups: e...
1458
1459
  	/*
  	 * Creates all the items needed to setup an eventpoll file. That is,
2030a42ce   Al Viro   [PATCH] sanitize ...
1460
  	 * a file structure and a free file descriptor.
7699acd13   Davide Libenzi   epoll cleanups: e...
1461
  	 */
203aa5260   Jason Baron   epoll: limit paths
1462
1463
1464
1465
1466
1467
  	fd = get_unused_fd_flags(O_RDWR | (flags & O_CLOEXEC));
  	if (fd < 0) {
  		error = fd;
  		goto out_free_ep;
  	}
  	file = anon_inode_getfile("[eventpoll]", &eventpoll_fops, ep,
628ff7c1d   Roland Dreier   anonfd: Allow mak...
1468
  				 O_RDWR | (flags & O_CLOEXEC));
203aa5260   Jason Baron   epoll: limit paths
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
  	if (IS_ERR(file)) {
  		error = PTR_ERR(file);
  		goto out_free_fd;
  	}
  	fd_install(fd, file);
  	ep->file = file;
  	return fd;
  
  out_free_fd:
  	put_unused_fd(fd);
  out_free_ep:
  	ep_free(ep);
bb57c3edc   Davide Libenzi   epoll: remove deb...
1481
  	return error;
7699acd13   Davide Libenzi   epoll cleanups: e...
1482
  }
5a8a82b1d   Heiko Carstens   [CVE-2009-0029] S...
1483
  SYSCALL_DEFINE1(epoll_create, int, size)
a0998b50c   Ulrich Drepper   flag parameters: ...
1484
  {
bfe3891a5   Davide Libenzi   epoll: fix size c...
1485
  	if (size <= 0)
9fe5ad9c8   Ulrich Drepper   flag parameters a...
1486
1487
1488
  		return -EINVAL;
  
  	return sys_epoll_create1(0);
a0998b50c   Ulrich Drepper   flag parameters: ...
1489
  }
7699acd13   Davide Libenzi   epoll cleanups: e...
1490
1491
1492
  /*
   * The following function implements the controller interface for
   * the eventpoll file that enables the insertion/removal/change of
67647d0fb   Davide Libenzi   epoll: fix some c...
1493
   * file descriptors inside the interest set.
7699acd13   Davide Libenzi   epoll cleanups: e...
1494
   */
5a8a82b1d   Heiko Carstens   [CVE-2009-0029] S...
1495
1496
  SYSCALL_DEFINE4(epoll_ctl, int, epfd, int, op, int, fd,
  		struct epoll_event __user *, event)
7699acd13   Davide Libenzi   epoll cleanups: e...
1497
1498
  {
  	int error;
22bacca48   Davide Libenzi   epoll: prevent cr...
1499
  	int did_lock_epmutex = 0;
7699acd13   Davide Libenzi   epoll cleanups: e...
1500
1501
1502
1503
  	struct file *file, *tfile;
  	struct eventpoll *ep;
  	struct epitem *epi;
  	struct epoll_event epds;
7699acd13   Davide Libenzi   epoll cleanups: e...
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
  	error = -EFAULT;
  	if (ep_op_has_event(op) &&
  	    copy_from_user(&epds, event, sizeof(struct epoll_event)))
  		goto error_return;
  
  	/* Get the "struct file *" for the eventpoll file */
  	error = -EBADF;
  	file = fget(epfd);
  	if (!file)
  		goto error_return;
  
  	/* Get the "struct file *" for the target file */
  	tfile = fget(fd);
  	if (!tfile)
  		goto error_fput;
  
  	/* The target file descriptor must support poll */
  	error = -EPERM;
  	if (!tfile->f_op || !tfile->f_op->poll)
  		goto error_tgt_fput;
  
  	/*
  	 * We have to check that the file structure underneath the file descriptor
  	 * the user passed to us _is_ an eventpoll file. And also we do not permit
  	 * adding an epoll file descriptor inside itself.
  	 */
  	error = -EINVAL;
  	if (file == tfile || !is_file_epoll(file))
  		goto error_tgt_fput;
  
  	/*
  	 * At this point it is safe to assume that the "private_data" contains
  	 * our own data structure.
  	 */
  	ep = file->private_data;
22bacca48   Davide Libenzi   epoll: prevent cr...
1539
1540
1541
  	/*
  	 * When we insert an epoll file descriptor, inside another epoll file
  	 * descriptor, there is the change of creating closed loops, which are
203aa5260   Jason Baron   epoll: limit paths
1542
1543
1544
1545
  	 * better be handled here, than in more critical paths. While we are
  	 * checking for loops we also determine the list of files reachable
  	 * and hang them on the tfile_check_list, so we can check that we
  	 * haven't created too many possible wakeup paths.
22bacca48   Davide Libenzi   epoll: prevent cr...
1546
  	 *
203aa5260   Jason Baron   epoll: limit paths
1547
1548
1549
  	 * We need to hold the epmutex across both ep_insert and ep_remove
  	 * b/c we want to make sure we are looking at a coherent view of
  	 * epoll network.
22bacca48   Davide Libenzi   epoll: prevent cr...
1550
  	 */
203aa5260   Jason Baron   epoll: limit paths
1551
  	if (op == EPOLL_CTL_ADD || op == EPOLL_CTL_DEL) {
22bacca48   Davide Libenzi   epoll: prevent cr...
1552
1553
  		mutex_lock(&epmutex);
  		did_lock_epmutex = 1;
22bacca48   Davide Libenzi   epoll: prevent cr...
1554
  	}
203aa5260   Jason Baron   epoll: limit paths
1555
1556
1557
1558
1559
1560
1561
1562
  	if (op == EPOLL_CTL_ADD) {
  		if (is_file_epoll(tfile)) {
  			error = -ELOOP;
  			if (ep_loop_check(ep, tfile) != 0)
  				goto error_tgt_fput;
  		} else
  			list_add(&tfile->f_tfile_llink, &tfile_check_list);
  	}
22bacca48   Davide Libenzi   epoll: prevent cr...
1563

d8805e633   Nelson Elhage   epoll: fix spurio...
1564
  	mutex_lock_nested(&ep->mtx, 0);
7699acd13   Davide Libenzi   epoll cleanups: e...
1565

67647d0fb   Davide Libenzi   epoll: fix some c...
1566
1567
1568
1569
1570
  	/*
  	 * Try to lookup the file inside our RB tree, Since we grabbed "mtx"
  	 * above, we can be sure to be able to use the item looked up by
  	 * ep_find() till we release the mutex.
  	 */
7699acd13   Davide Libenzi   epoll cleanups: e...
1571
1572
1573
1574
1575
1576
1577
  	epi = ep_find(ep, tfile, fd);
  
  	error = -EINVAL;
  	switch (op) {
  	case EPOLL_CTL_ADD:
  		if (!epi) {
  			epds.events |= POLLERR | POLLHUP;
7699acd13   Davide Libenzi   epoll cleanups: e...
1578
1579
1580
  			error = ep_insert(ep, &epds, tfile, fd);
  		} else
  			error = -EEXIST;
203aa5260   Jason Baron   epoll: limit paths
1581
  		clear_tfile_check_list();
7699acd13   Davide Libenzi   epoll cleanups: e...
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
  		break;
  	case EPOLL_CTL_DEL:
  		if (epi)
  			error = ep_remove(ep, epi);
  		else
  			error = -ENOENT;
  		break;
  	case EPOLL_CTL_MOD:
  		if (epi) {
  			epds.events |= POLLERR | POLLHUP;
  			error = ep_modify(ep, epi, &epds);
  		} else
  			error = -ENOENT;
  		break;
  	}
d47de16c7   Davide Libenzi   fix epoll single ...
1597
  	mutex_unlock(&ep->mtx);
7699acd13   Davide Libenzi   epoll cleanups: e...
1598
1599
  
  error_tgt_fput:
203aa5260   Jason Baron   epoll: limit paths
1600
  	if (did_lock_epmutex)
22bacca48   Davide Libenzi   epoll: prevent cr...
1601
  		mutex_unlock(&epmutex);
7699acd13   Davide Libenzi   epoll cleanups: e...
1602
1603
1604
1605
  	fput(tfile);
  error_fput:
  	fput(file);
  error_return:
7699acd13   Davide Libenzi   epoll cleanups: e...
1606
1607
1608
1609
1610
1611
1612
1613
  
  	return error;
  }
  
  /*
   * Implement the event wait interface for the eventpoll file. It is the kernel
   * part of the user space epoll_wait(2).
   */
5a8a82b1d   Heiko Carstens   [CVE-2009-0029] S...
1614
1615
  SYSCALL_DEFINE4(epoll_wait, int, epfd, struct epoll_event __user *, events,
  		int, maxevents, int, timeout)
7699acd13   Davide Libenzi   epoll cleanups: e...
1616
1617
1618
1619
  {
  	int error;
  	struct file *file;
  	struct eventpoll *ep;
7699acd13   Davide Libenzi   epoll cleanups: e...
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
  	/* The maximum number of event must be greater than zero */
  	if (maxevents <= 0 || maxevents > EP_MAX_EVENTS)
  		return -EINVAL;
  
  	/* Verify that the area passed by the user is writeable */
  	if (!access_ok(VERIFY_WRITE, events, maxevents * sizeof(struct epoll_event))) {
  		error = -EFAULT;
  		goto error_return;
  	}
  
  	/* Get the "struct file *" for the eventpoll file */
  	error = -EBADF;
  	file = fget(epfd);
  	if (!file)
  		goto error_return;
  
  	/*
  	 * We have to check that the file structure underneath the fd
  	 * the user passed to us _is_ an eventpoll file.
  	 */
  	error = -EINVAL;
  	if (!is_file_epoll(file))
  		goto error_fput;
  
  	/*
  	 * At this point it is safe to assume that the "private_data" contains
  	 * our own data structure.
  	 */
  	ep = file->private_data;
  
  	/* Time to fish for events ... */
  	error = ep_poll(ep, events, maxevents, timeout);
  
  error_fput:
  	fput(file);
  error_return:
7699acd13   Davide Libenzi   epoll cleanups: e...
1656
1657
1658
  
  	return error;
  }
f3de272b8   Roland McGrath   signals: use HAVE...
1659
  #ifdef HAVE_SET_RESTORE_SIGMASK
7699acd13   Davide Libenzi   epoll cleanups: e...
1660
1661
1662
1663
1664
  
  /*
   * Implement the event wait interface for the eventpoll file. It is the kernel
   * part of the user space epoll_pwait(2).
   */
5a8a82b1d   Heiko Carstens   [CVE-2009-0029] S...
1665
1666
1667
  SYSCALL_DEFINE6(epoll_pwait, int, epfd, struct epoll_event __user *, events,
  		int, maxevents, int, timeout, const sigset_t __user *, sigmask,
  		size_t, sigsetsize)
7699acd13   Davide Libenzi   epoll cleanups: e...
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
  {
  	int error;
  	sigset_t ksigmask, sigsaved;
  
  	/*
  	 * If the caller wants a certain signal mask to be set during the wait,
  	 * we apply it here.
  	 */
  	if (sigmask) {
  		if (sigsetsize != sizeof(sigset_t))
  			return -EINVAL;
  		if (copy_from_user(&ksigmask, sigmask, sizeof(ksigmask)))
  			return -EFAULT;
  		sigdelsetmask(&ksigmask, sigmask(SIGKILL) | sigmask(SIGSTOP));
  		sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
  	}
  
  	error = sys_epoll_wait(epfd, events, maxevents, timeout);
  
  	/*
  	 * If we changed the signal mask, we need to restore the original one.
  	 * In case we've got a signal while waiting, we do not restore the
  	 * signal mask yet, and we allow do_signal() to deliver the signal on
  	 * the way back to userspace, before the signal mask is restored.
  	 */
  	if (sigmask) {
  		if (error == -EINTR) {
  			memcpy(&current->saved_sigmask, &sigsaved,
c7ea76302   Davide Libenzi   epoll locks chang...
1696
  			       sizeof(sigsaved));
4e4c22c71   Roland McGrath   signals: add set_...
1697
  			set_restore_sigmask();
7699acd13   Davide Libenzi   epoll cleanups: e...
1698
1699
1700
1701
1702
1703
  		} else
  			sigprocmask(SIG_SETMASK, &sigsaved, NULL);
  	}
  
  	return error;
  }
f3de272b8   Roland McGrath   signals: use HAVE...
1704
  #endif /* HAVE_SET_RESTORE_SIGMASK */
7699acd13   Davide Libenzi   epoll cleanups: e...
1705

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1706
1707
  static int __init eventpoll_init(void)
  {
7ef9964e6   Davide Libenzi   epoll: introduce ...
1708
1709
1710
  	struct sysinfo si;
  
  	si_meminfo(&si);
9df04e1f2   Davide Libenzi   epoll: drop max_u...
1711
1712
1713
1714
  	/*
  	 * Allows top 4% of lomem to be allocated for epoll watches (per user).
  	 */
  	max_user_watches = (((si.totalram - si.totalhigh) / 25) << PAGE_SHIFT) /
7ef9964e6   Davide Libenzi   epoll: introduce ...
1715
  		EP_ITEM_COST;
52bd19f76   Robin Holt   epoll: convert ma...
1716
  	BUG_ON(max_user_watches < 0);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1717

22bacca48   Davide Libenzi   epoll: prevent cr...
1718
1719
1720
1721
1722
  	/*
  	 * Initialize the structure used to perform epoll file descriptor
  	 * inclusion loops checks.
  	 */
  	ep_nested_calls_init(&poll_loop_ncalls);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1723
  	/* Initialize the structure used to perform safe poll wait head wake ups */
5071f97ec   Davide Libenzi   epoll: fix epoll'...
1724
1725
1726
1727
  	ep_nested_calls_init(&poll_safewake_ncalls);
  
  	/* Initialize the structure used to perform file's f_op->poll() calls */
  	ep_nested_calls_init(&poll_readywalk_ncalls);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1728
1729
1730
  
  	/* Allocates slab cache used to allocate "struct epitem" items */
  	epi_cache = kmem_cache_create("eventpoll_epi", sizeof(struct epitem),
bb57c3edc   Davide Libenzi   epoll: remove deb...
1731
  			0, SLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1732
1733
1734
  
  	/* Allocates slab cache used to allocate "struct eppoll_entry" */
  	pwq_cache = kmem_cache_create("eventpoll_pwq",
bb57c3edc   Davide Libenzi   epoll: remove deb...
1735
  			sizeof(struct eppoll_entry), 0, SLAB_PANIC, NULL);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1736

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1737
  	return 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1738
  }
cea692418   Davide Libenzi   epoll cleanups: e...
1739
  fs_initcall(eventpoll_init);