2019-10-23 00:25:58 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
|
|
* Basic worker thread pool for io_uring
|
|
|
|
*
|
|
|
|
* Copyright (C) 2019 Jens Axboe
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/sched/signal.h>
|
|
|
|
#include <linux/percpu.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/rculist_nulls.h>
|
2020-10-22 23:02:50 +08:00
|
|
|
#include <linux/cpu.h>
|
2021-02-17 05:15:30 +08:00
|
|
|
#include <linux/tracehook.h>
|
2021-09-13 23:44:15 +08:00
|
|
|
#include <uapi/linux/io_uring.h>
|
2019-10-23 00:25:58 +08:00
|
|
|
|
|
|
|
#include "io-wq.h"
|
|
|
|
|
|
|
|
#define WORKER_IDLE_TIMEOUT (5 * HZ)
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WORKER_F_UP = 1, /* up and active */
|
|
|
|
IO_WORKER_F_RUNNING = 2, /* account as running */
|
|
|
|
IO_WORKER_F_FREE = 4, /* worker on free list */
|
2021-09-02 03:01:17 +08:00
|
|
|
IO_WORKER_F_BOUND = 8, /* is doing bounded work */
|
2019-10-23 00:25:58 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WQ_BIT_EXIT = 0, /* wq exiting */
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
2021-09-01 03:57:32 +08:00
|
|
|
IO_ACCT_STALLED_BIT = 0, /* stalled on hash */
|
2019-10-23 00:25:58 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* One for each thread in a wqe pool
|
|
|
|
*/
|
|
|
|
struct io_worker {
|
|
|
|
refcount_t ref;
|
|
|
|
unsigned flags;
|
|
|
|
struct hlist_nulls_node nulls_node;
|
2019-11-14 04:54:49 +08:00
|
|
|
struct list_head all_list;
|
2019-10-23 00:25:58 +08:00
|
|
|
struct task_struct *task;
|
|
|
|
struct io_wqe *wqe;
|
2019-11-14 00:43:34 +08:00
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wq_work *cur_work;
|
2019-11-14 00:43:34 +08:00
|
|
|
spinlock_t lock;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-02-24 10:59:06 +08:00
|
|
|
struct completion ref_done;
|
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
unsigned long create_state;
|
|
|
|
struct callback_head create_work;
|
|
|
|
int create_index;
|
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
union {
|
|
|
|
struct rcu_head rcu;
|
|
|
|
struct work_struct work;
|
|
|
|
};
|
2019-10-23 00:25:58 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#if BITS_PER_LONG == 64
|
|
|
|
#define IO_WQ_HASH_ORDER 6
|
|
|
|
#else
|
|
|
|
#define IO_WQ_HASH_ORDER 5
|
|
|
|
#endif
|
|
|
|
|
2020-03-24 03:57:22 +08:00
|
|
|
#define IO_WQ_NR_HASH_BUCKETS (1u << IO_WQ_HASH_ORDER)
|
|
|
|
|
2019-11-08 02:41:16 +08:00
|
|
|
struct io_wqe_acct {
|
|
|
|
unsigned nr_workers;
|
|
|
|
unsigned max_workers;
|
2021-03-09 00:37:51 +08:00
|
|
|
int index;
|
2019-11-08 02:41:16 +08:00
|
|
|
atomic_t nr_running;
|
2021-09-01 03:57:32 +08:00
|
|
|
struct io_wq_work_list work_list;
|
|
|
|
unsigned long flags;
|
2019-11-08 02:41:16 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
IO_WQ_ACCT_BOUND,
|
|
|
|
IO_WQ_ACCT_UNBOUND,
|
2021-09-01 03:57:32 +08:00
|
|
|
IO_WQ_ACCT_NR,
|
2019-11-08 02:41:16 +08:00
|
|
|
};
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
/*
|
|
|
|
* Per-node worker thread pool
|
|
|
|
*/
|
|
|
|
struct io_wqe {
|
2021-09-01 03:57:32 +08:00
|
|
|
raw_spinlock_t lock;
|
|
|
|
struct io_wqe_acct acct[2];
|
2019-10-23 00:25:58 +08:00
|
|
|
|
|
|
|
int node;
|
|
|
|
|
2019-11-14 23:00:41 +08:00
|
|
|
struct hlist_nulls_head free_list;
|
2019-11-14 04:54:49 +08:00
|
|
|
struct list_head all_list;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-02-20 03:33:30 +08:00
|
|
|
struct wait_queue_entry wait;
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wq *wq;
|
2020-03-24 03:57:22 +08:00
|
|
|
struct io_wq_work *hash_tail[IO_WQ_NR_HASH_BUCKETS];
|
2021-06-18 00:08:11 +08:00
|
|
|
|
|
|
|
cpumask_var_t cpu_mask;
|
2019-10-23 00:25:58 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Per io_wq state
|
|
|
|
*/
|
|
|
|
struct io_wq {
|
|
|
|
unsigned long state;
|
|
|
|
|
2020-03-04 21:14:12 +08:00
|
|
|
free_work_fn *free_work;
|
2020-06-09 02:08:20 +08:00
|
|
|
io_wq_work_fn *do_work;
|
2019-11-13 13:31:31 +08:00
|
|
|
|
2021-02-20 03:33:30 +08:00
|
|
|
struct io_wq_hash *hash;
|
|
|
|
|
2021-02-27 00:47:20 +08:00
|
|
|
atomic_t worker_refs;
|
|
|
|
struct completion worker_done;
|
|
|
|
|
2020-10-22 23:02:50 +08:00
|
|
|
struct hlist_node cpuhp_node;
|
2021-02-17 05:15:30 +08:00
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
struct task_struct *task;
|
2021-06-14 09:36:12 +08:00
|
|
|
|
|
|
|
struct io_wqe *wqes[];
|
2019-10-23 00:25:58 +08:00
|
|
|
};
|
|
|
|
|
2020-10-22 23:02:50 +08:00
|
|
|
static enum cpuhp_state io_wq_online;
|
|
|
|
|
2021-03-04 06:47:04 +08:00
|
|
|
struct io_cb_cancel_data {
|
|
|
|
work_cancel_fn *fn;
|
|
|
|
void *data;
|
|
|
|
int nr_running;
|
|
|
|
int nr_pending;
|
|
|
|
bool cancel_all;
|
|
|
|
};
|
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
static bool create_io_worker(struct io_wq *wq, struct io_wqe *wqe, int index);
|
2021-08-03 23:14:35 +08:00
|
|
|
static void io_wqe_dec_running(struct io_worker *worker);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
static bool io_acct_cancel_pending_work(struct io_wqe *wqe,
|
|
|
|
struct io_wqe_acct *acct,
|
|
|
|
struct io_cb_cancel_data *match);
|
2021-03-04 06:47:04 +08:00
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
static bool io_worker_get(struct io_worker *worker)
|
|
|
|
{
|
|
|
|
return refcount_inc_not_zero(&worker->ref);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void io_worker_release(struct io_worker *worker)
|
|
|
|
{
|
|
|
|
if (refcount_dec_and_test(&worker->ref))
|
2021-02-24 10:59:06 +08:00
|
|
|
complete(&worker->ref_done);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-22 09:58:28 +08:00
|
|
|
static inline struct io_wqe_acct *io_get_acct(struct io_wqe *wqe, bool bound)
|
|
|
|
{
|
|
|
|
return &wqe->acct[bound ? IO_WQ_ACCT_BOUND : IO_WQ_ACCT_UNBOUND];
|
|
|
|
}
|
|
|
|
|
2019-11-08 02:41:16 +08:00
|
|
|
static inline struct io_wqe_acct *io_work_get_acct(struct io_wqe *wqe,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
{
|
2021-03-22 09:58:28 +08:00
|
|
|
return io_get_acct(wqe, !(work->flags & IO_WQ_WORK_UNBOUND));
|
2019-11-08 02:41:16 +08:00
|
|
|
}
|
|
|
|
|
2021-02-18 00:00:57 +08:00
|
|
|
static inline struct io_wqe_acct *io_wqe_get_acct(struct io_worker *worker)
|
2019-11-08 02:41:16 +08:00
|
|
|
{
|
2021-03-22 09:58:28 +08:00
|
|
|
return io_get_acct(worker->wqe, worker->flags & IO_WORKER_F_BOUND);
|
2019-11-08 02:41:16 +08:00
|
|
|
}
|
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
static void io_worker_ref_put(struct io_wq *wq)
|
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&wq->worker_refs))
|
|
|
|
complete(&wq->worker_done);
|
|
|
|
}
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
static void io_worker_exit(struct io_worker *worker)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = worker->wqe;
|
|
|
|
|
2021-02-24 10:59:06 +08:00
|
|
|
if (refcount_dec_and_test(&worker->ref))
|
|
|
|
complete(&worker->ref_done);
|
|
|
|
wait_for_completion(&worker->ref_done);
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-08-03 23:14:35 +08:00
|
|
|
if (worker->flags & IO_WORKER_F_FREE)
|
2021-02-17 09:00:55 +08:00
|
|
|
hlist_nulls_del_rcu(&worker->nulls_node);
|
2019-11-14 04:54:49 +08:00
|
|
|
list_del_rcu(&worker->all_list);
|
2021-08-03 23:14:35 +08:00
|
|
|
preempt_disable();
|
|
|
|
io_wqe_dec_running(worker);
|
|
|
|
worker->flags = 0;
|
|
|
|
current->flags &= ~PF_IO_WORKER;
|
|
|
|
preempt_enable();
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2019-11-02 15:55:01 +08:00
|
|
|
kfree_rcu(worker, rcu);
|
2021-03-09 00:37:51 +08:00
|
|
|
io_worker_ref_put(wqe->wq);
|
2021-03-05 03:39:36 +08:00
|
|
|
do_exit(0);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2021-09-01 03:57:32 +08:00
|
|
|
static inline bool io_acct_run_queue(struct io_wqe_acct *acct)
|
2019-11-08 02:41:16 +08:00
|
|
|
{
|
2021-09-01 03:57:32 +08:00
|
|
|
if (!wq_list_empty(&acct->work_list) &&
|
|
|
|
!test_bit(IO_ACCT_STALLED_BIT, &acct->flags))
|
2019-11-08 02:41:16 +08:00
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check head of free list for an available worker. If one isn't available,
|
2021-03-09 00:37:51 +08:00
|
|
|
* caller must create one.
|
2019-11-08 02:41:16 +08:00
|
|
|
*/
|
2021-09-01 03:57:32 +08:00
|
|
|
static bool io_wqe_activate_free_worker(struct io_wqe *wqe,
|
|
|
|
struct io_wqe_acct *acct)
|
2019-11-08 02:41:16 +08:00
|
|
|
__must_hold(RCU)
|
|
|
|
{
|
|
|
|
struct hlist_nulls_node *n;
|
|
|
|
struct io_worker *worker;
|
|
|
|
|
2021-08-03 23:14:35 +08:00
|
|
|
/*
|
|
|
|
* Iterate free_list and see if we can find an idle worker to
|
|
|
|
* activate. If a given worker is on the free_list but in the process
|
|
|
|
* of exiting, keep trying.
|
|
|
|
*/
|
|
|
|
hlist_nulls_for_each_entry_rcu(worker, n, &wqe->free_list, nulls_node) {
|
|
|
|
if (!io_worker_get(worker))
|
|
|
|
continue;
|
2021-09-01 03:57:32 +08:00
|
|
|
if (io_wqe_get_acct(worker) != acct) {
|
|
|
|
io_worker_release(worker);
|
|
|
|
continue;
|
|
|
|
}
|
2021-08-03 23:14:35 +08:00
|
|
|
if (wake_up_process(worker->task)) {
|
|
|
|
io_worker_release(worker);
|
|
|
|
return true;
|
|
|
|
}
|
2019-11-08 02:41:16 +08:00
|
|
|
io_worker_release(worker);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We need a worker. If we find a free one, we're good. If not, and we're
|
2021-03-09 00:37:51 +08:00
|
|
|
* below the max number of workers, create one.
|
2019-11-08 02:41:16 +08:00
|
|
|
*/
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
static bool io_wqe_create_worker(struct io_wqe *wqe, struct io_wqe_acct *acct)
|
2019-11-08 02:41:16 +08:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Most likely an attempt to queue unbounded work on an io_wq that
|
|
|
|
* wasn't setup with any unbounded workers.
|
|
|
|
*/
|
2021-06-18 01:13:59 +08:00
|
|
|
if (unlikely(!acct->max_workers))
|
|
|
|
pr_warn_once("io-wq is not configured for unbound workers");
|
2019-11-08 02:41:16 +08:00
|
|
|
|
2021-08-31 01:55:22 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-10-20 03:31:26 +08:00
|
|
|
if (acct->nr_workers >= acct->max_workers) {
|
2021-09-12 03:40:50 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
return true;
|
2021-08-31 01:55:22 +08:00
|
|
|
}
|
2021-09-12 03:40:50 +08:00
|
|
|
acct->nr_workers++;
|
2021-08-31 01:55:22 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-09-12 03:40:50 +08:00
|
|
|
atomic_inc(&acct->nr_running);
|
|
|
|
atomic_inc(&wqe->wq->worker_refs);
|
|
|
|
return create_io_worker(wqe->wq, wqe, acct->index);
|
2019-11-08 02:41:16 +08:00
|
|
|
}
|
|
|
|
|
2021-02-18 00:00:57 +08:00
|
|
|
static void io_wqe_inc_running(struct io_worker *worker)
|
2019-11-08 02:41:16 +08:00
|
|
|
{
|
2021-02-18 00:00:57 +08:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
2019-11-08 02:41:16 +08:00
|
|
|
|
|
|
|
atomic_inc(&acct->nr_running);
|
|
|
|
}
|
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
static void create_worker_cb(struct callback_head *cb)
|
|
|
|
{
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
struct io_worker *worker;
|
2021-03-09 00:37:51 +08:00
|
|
|
struct io_wq *wq;
|
2021-08-05 18:05:38 +08:00
|
|
|
struct io_wqe *wqe;
|
|
|
|
struct io_wqe_acct *acct;
|
2021-09-02 03:01:17 +08:00
|
|
|
bool do_create = false;
|
2021-03-09 00:37:51 +08:00
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
|
|
|
wqe = worker->wqe;
|
2021-08-05 18:05:38 +08:00
|
|
|
wq = wqe->wq;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
acct = &wqe->acct[worker->create_index];
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-08-08 21:54:33 +08:00
|
|
|
if (acct->nr_workers < acct->max_workers) {
|
2021-08-05 18:05:38 +08:00
|
|
|
acct->nr_workers++;
|
2021-08-08 21:54:33 +08:00
|
|
|
do_create = true;
|
|
|
|
}
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-08-08 21:54:33 +08:00
|
|
|
if (do_create) {
|
2021-09-02 03:01:17 +08:00
|
|
|
create_io_worker(wq, wqe, worker->create_index);
|
2021-08-08 21:54:33 +08:00
|
|
|
} else {
|
|
|
|
atomic_dec(&acct->nr_running);
|
|
|
|
io_worker_ref_put(wq);
|
|
|
|
}
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
io_worker_release(worker);
|
2021-03-09 00:37:51 +08:00
|
|
|
}
|
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
static bool io_queue_worker_create(struct io_worker *worker,
|
|
|
|
struct io_wqe_acct *acct,
|
|
|
|
task_work_func_t func)
|
2021-03-09 00:37:51 +08:00
|
|
|
{
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
struct io_wqe *wqe = worker->wqe;
|
2021-03-09 00:37:51 +08:00
|
|
|
struct io_wq *wq = wqe->wq;
|
|
|
|
|
|
|
|
/* raced with exit, just ignore create call */
|
|
|
|
if (test_bit(IO_WQ_BIT_EXIT, &wq->state))
|
|
|
|
goto fail;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
if (!io_worker_get(worker))
|
|
|
|
goto fail;
|
|
|
|
/*
|
|
|
|
* create_state manages ownership of create_work/index. We should
|
|
|
|
* only need one entry per worker, as the worker going to sleep
|
|
|
|
* will trigger the condition, and waking will clear it once it
|
|
|
|
* runs the task_work.
|
|
|
|
*/
|
|
|
|
if (test_bit(0, &worker->create_state) ||
|
|
|
|
test_and_set_bit_lock(0, &worker->create_state))
|
|
|
|
goto fail_release;
|
2021-03-09 00:37:51 +08:00
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
init_task_work(&worker->create_work, func);
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
worker->create_index = acct->index;
|
|
|
|
if (!task_work_add(wq->task, &worker->create_work, TWA_SIGNAL))
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
return true;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
fail_release:
|
|
|
|
io_worker_release(worker);
|
2021-03-09 00:37:51 +08:00
|
|
|
fail:
|
|
|
|
atomic_dec(&acct->nr_running);
|
|
|
|
io_worker_ref_put(wq);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
return false;
|
2021-03-09 00:37:51 +08:00
|
|
|
}
|
|
|
|
|
2021-02-18 00:00:57 +08:00
|
|
|
static void io_wqe_dec_running(struct io_worker *worker)
|
2019-11-08 02:41:16 +08:00
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
2021-02-18 00:00:57 +08:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
|
|
|
struct io_wqe *wqe = worker->wqe;
|
2019-11-08 02:41:16 +08:00
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
if (!(worker->flags & IO_WORKER_F_UP))
|
|
|
|
return;
|
|
|
|
|
2021-09-01 03:57:32 +08:00
|
|
|
if (atomic_dec_and_test(&acct->nr_running) && io_acct_run_queue(acct)) {
|
2021-03-09 00:37:51 +08:00
|
|
|
atomic_inc(&acct->nr_running);
|
|
|
|
atomic_inc(&wqe->wq->worker_refs);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
io_queue_worker_create(worker, acct, create_worker_cb);
|
2021-03-09 00:37:51 +08:00
|
|
|
}
|
2019-11-08 02:41:16 +08:00
|
|
|
}
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
/*
|
|
|
|
* Worker will start processing some work. Move it to the busy list, if
|
|
|
|
* it's currently on the freelist
|
|
|
|
*/
|
|
|
|
static void __io_worker_busy(struct io_wqe *wqe, struct io_worker *worker,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
|
|
|
if (worker->flags & IO_WORKER_F_FREE) {
|
|
|
|
worker->flags &= ~IO_WORKER_F_FREE;
|
|
|
|
hlist_nulls_del_init_rcu(&worker->nulls_node);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No work, worker going to sleep. Move to freelist, and unuse mm if we
|
|
|
|
* have one attached. Dropping the mm may potentially sleep, so we drop
|
|
|
|
* the lock in that case and return success. Since the caller has to
|
|
|
|
* retry the loop in that case (we changed task state), we don't regrab
|
|
|
|
* the lock if we return success.
|
|
|
|
*/
|
2021-02-16 04:26:34 +08:00
|
|
|
static void __io_worker_idle(struct io_wqe *wqe, struct io_worker *worker)
|
2019-10-23 00:25:58 +08:00
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
|
|
|
if (!(worker->flags & IO_WORKER_F_FREE)) {
|
|
|
|
worker->flags |= IO_WORKER_F_FREE;
|
2019-11-14 23:00:41 +08:00
|
|
|
hlist_nulls_add_head_rcu(&worker->nulls_node, &wqe->free_list);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-14 05:31:05 +08:00
|
|
|
static inline unsigned int io_get_work_hash(struct io_wq_work *work)
|
|
|
|
{
|
|
|
|
return work->flags >> IO_WQ_HASH_SHIFT;
|
|
|
|
}
|
|
|
|
|
2021-02-20 03:33:30 +08:00
|
|
|
static void io_wait_on_hash(struct io_wqe *wqe, unsigned int hash)
|
|
|
|
{
|
|
|
|
struct io_wq *wq = wqe->wq;
|
|
|
|
|
2021-08-31 20:57:25 +08:00
|
|
|
spin_lock_irq(&wq->hash->wait.lock);
|
2021-02-20 03:33:30 +08:00
|
|
|
if (list_empty(&wqe->wait.entry)) {
|
|
|
|
__add_wait_queue(&wq->hash->wait, &wqe->wait);
|
|
|
|
if (!test_bit(hash, &wq->hash->map)) {
|
|
|
|
__set_current_state(TASK_RUNNING);
|
|
|
|
list_del_init(&wqe->wait.entry);
|
|
|
|
}
|
|
|
|
}
|
2021-08-31 20:57:25 +08:00
|
|
|
spin_unlock_irq(&wq->hash->wait.lock);
|
2021-02-20 03:33:30 +08:00
|
|
|
}
|
|
|
|
|
2021-09-01 03:57:32 +08:00
|
|
|
static struct io_wq_work *io_get_next_work(struct io_wqe_acct *acct,
|
2021-09-01 03:53:00 +08:00
|
|
|
struct io_worker *worker)
|
2019-10-23 00:25:58 +08:00
|
|
|
__must_hold(wqe->lock)
|
|
|
|
{
|
2019-11-27 02:59:32 +08:00
|
|
|
struct io_wq_work_node *node, *prev;
|
2020-03-24 03:57:22 +08:00
|
|
|
struct io_wq_work *work, *tail;
|
2021-02-20 03:33:30 +08:00
|
|
|
unsigned int stall_hash = -1U;
|
2021-09-01 03:57:32 +08:00
|
|
|
struct io_wqe *wqe = worker->wqe;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-09-01 03:57:32 +08:00
|
|
|
wq_list_for_each(node, prev, &acct->work_list) {
|
2021-02-20 03:33:30 +08:00
|
|
|
unsigned int hash;
|
|
|
|
|
2019-11-27 02:59:32 +08:00
|
|
|
work = container_of(node, struct io_wq_work, list);
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
/* not hashed, can run anytime */
|
2020-03-14 05:31:04 +08:00
|
|
|
if (!io_wq_is_hashed(work)) {
|
2021-09-01 03:57:32 +08:00
|
|
|
wq_list_del(&acct->work_list, node, prev);
|
2019-10-23 00:25:58 +08:00
|
|
|
return work;
|
|
|
|
}
|
|
|
|
|
2020-03-14 05:31:05 +08:00
|
|
|
hash = io_get_work_hash(work);
|
2021-02-20 03:33:30 +08:00
|
|
|
/* all items with this hash lie in [work, tail] */
|
|
|
|
tail = wqe->hash_tail[hash];
|
|
|
|
|
|
|
|
/* hashed, can run if not already running */
|
|
|
|
if (!test_and_set_bit(hash, &wqe->wq->hash->map)) {
|
2020-03-24 03:57:22 +08:00
|
|
|
wqe->hash_tail[hash] = NULL;
|
2021-09-01 03:57:32 +08:00
|
|
|
wq_list_cut(&acct->work_list, &tail->list, prev);
|
2019-10-23 00:25:58 +08:00
|
|
|
return work;
|
|
|
|
}
|
2021-02-20 03:33:30 +08:00
|
|
|
if (stall_hash == -1U)
|
|
|
|
stall_hash = hash;
|
|
|
|
/* fast forward to a next hash, for-each will fix up @prev */
|
|
|
|
node = &tail->list;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stall_hash != -1U) {
|
2021-09-01 03:53:00 +08:00
|
|
|
/*
|
|
|
|
* Set this before dropping the lock to avoid racing with new
|
|
|
|
* work being added and clearing the stalled bit.
|
|
|
|
*/
|
2021-09-01 03:57:32 +08:00
|
|
|
set_bit(IO_ACCT_STALLED_BIT, &acct->flags);
|
2021-02-20 03:33:30 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
io_wait_on_hash(wqe, stall_hash);
|
|
|
|
raw_spin_lock(&wqe->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-03-21 21:06:56 +08:00
|
|
|
static bool io_flush_signals(void)
|
2020-01-28 07:34:48 +08:00
|
|
|
{
|
2021-03-22 04:16:08 +08:00
|
|
|
if (unlikely(test_thread_flag(TIF_NOTIFY_SIGNAL))) {
|
2021-03-21 21:06:56 +08:00
|
|
|
__set_current_state(TASK_RUNNING);
|
2021-03-22 04:16:08 +08:00
|
|
|
tracehook_notify_signal();
|
2021-03-21 21:06:56 +08:00
|
|
|
return true;
|
2020-01-28 07:34:48 +08:00
|
|
|
}
|
2021-03-21 21:06:56 +08:00
|
|
|
return false;
|
2020-03-04 21:14:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void io_assign_current_work(struct io_worker *worker,
|
|
|
|
struct io_wq_work *work)
|
|
|
|
{
|
2020-03-14 05:31:03 +08:00
|
|
|
if (work) {
|
2021-02-17 05:15:30 +08:00
|
|
|
io_flush_signals();
|
2020-03-14 05:31:03 +08:00
|
|
|
cond_resched();
|
|
|
|
}
|
2020-03-04 21:14:09 +08:00
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
spin_lock(&worker->lock);
|
2020-03-04 21:14:09 +08:00
|
|
|
worker->cur_work = work;
|
2021-08-30 20:33:08 +08:00
|
|
|
spin_unlock(&worker->lock);
|
2020-03-04 21:14:09 +08:00
|
|
|
}
|
|
|
|
|
2020-03-14 05:31:05 +08:00
|
|
|
static void io_wqe_enqueue(struct io_wqe *wqe, struct io_wq_work *work);
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
static void io_worker_handle_work(struct io_worker *worker)
|
|
|
|
__releases(wqe->lock)
|
|
|
|
{
|
2021-09-01 03:57:32 +08:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wqe *wqe = worker->wqe;
|
|
|
|
struct io_wq *wq = wqe->wq;
|
2021-04-08 08:54:42 +08:00
|
|
|
bool do_kill = test_bit(IO_WQ_BIT_EXIT, &wq->state);
|
2019-10-23 00:25:58 +08:00
|
|
|
|
|
|
|
do {
|
2020-03-24 03:57:22 +08:00
|
|
|
struct io_wq_work *work;
|
2020-03-04 21:14:11 +08:00
|
|
|
get_next:
|
2019-10-23 00:25:58 +08:00
|
|
|
/*
|
|
|
|
* If we got some work, mark us as busy. If we didn't, but
|
|
|
|
* the list isn't empty, it means we stalled on hashed work.
|
|
|
|
* Mark us stalled so we don't keep looking for work when we
|
|
|
|
* can't make progress, any work completion or insertion will
|
|
|
|
* clear the stalled flag.
|
|
|
|
*/
|
2021-09-01 03:57:32 +08:00
|
|
|
work = io_get_next_work(acct, worker);
|
2019-10-23 00:25:58 +08:00
|
|
|
if (work)
|
|
|
|
__io_worker_busy(wqe, worker, work);
|
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
if (!work)
|
|
|
|
break;
|
2020-03-04 21:14:10 +08:00
|
|
|
io_assign_current_work(worker, work);
|
2021-02-20 03:33:30 +08:00
|
|
|
__set_current_state(TASK_RUNNING);
|
2019-11-14 00:43:34 +08:00
|
|
|
|
2020-03-04 21:14:09 +08:00
|
|
|
/* handle a whole dependent link */
|
|
|
|
do {
|
2021-02-04 21:52:08 +08:00
|
|
|
struct io_wq_work *next_hashed, *linked;
|
2020-07-25 19:42:00 +08:00
|
|
|
unsigned int hash = io_get_work_hash(work);
|
2020-03-04 21:14:09 +08:00
|
|
|
|
2020-03-24 03:57:22 +08:00
|
|
|
next_hashed = wq_next_work(work);
|
2021-04-08 08:54:42 +08:00
|
|
|
|
|
|
|
if (unlikely(do_kill) && (work->flags & IO_WQ_WORK_UNBOUND))
|
|
|
|
work->flags |= IO_WQ_WORK_CANCEL;
|
2021-02-04 21:52:08 +08:00
|
|
|
wq->do_work(work);
|
|
|
|
io_assign_current_work(worker, NULL);
|
2020-03-04 21:14:09 +08:00
|
|
|
|
2021-02-04 21:52:08 +08:00
|
|
|
linked = wq->free_work(work);
|
2020-03-24 03:57:22 +08:00
|
|
|
work = next_hashed;
|
|
|
|
if (!work && linked && !io_wq_is_hashed(linked)) {
|
|
|
|
work = linked;
|
|
|
|
linked = NULL;
|
|
|
|
}
|
|
|
|
io_assign_current_work(worker, work);
|
|
|
|
if (linked)
|
|
|
|
io_wqe_enqueue(wqe, linked);
|
|
|
|
|
|
|
|
if (hash != -1U && !next_hashed) {
|
2021-02-20 03:33:30 +08:00
|
|
|
clear_bit(hash, &wq->hash->map);
|
2021-09-01 03:57:32 +08:00
|
|
|
clear_bit(IO_ACCT_STALLED_BIT, &acct->flags);
|
2021-02-20 03:33:30 +08:00
|
|
|
if (wq_has_sleeper(&wq->hash->wait))
|
|
|
|
wake_up(&wq->hash->wait);
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2020-03-04 21:14:11 +08:00
|
|
|
/* skip unnecessary unlock-lock wqe->lock */
|
|
|
|
if (!work)
|
|
|
|
goto get_next;
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-11-13 13:31:31 +08:00
|
|
|
}
|
2020-03-04 21:14:10 +08:00
|
|
|
} while (work);
|
2019-11-13 13:31:31 +08:00
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
} while (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int io_wqe_worker(void *data)
|
|
|
|
{
|
|
|
|
struct io_worker *worker = data;
|
2021-09-01 03:57:32 +08:00
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wqe *wqe = worker->wqe;
|
|
|
|
struct io_wq *wq = wqe->wq;
|
2021-09-02 03:01:17 +08:00
|
|
|
bool last_timeout = false;
|
2021-03-05 03:39:36 +08:00
|
|
|
char buf[TASK_COMM_LEN];
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-03-05 03:39:36 +08:00
|
|
|
worker->flags |= (IO_WORKER_F_UP | IO_WORKER_F_RUNNING);
|
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
snprintf(buf, sizeof(buf), "iou-wrk-%d", wq->task->pid);
|
2021-03-05 03:39:36 +08:00
|
|
|
set_task_comm(current, buf);
|
2019-10-23 00:25:58 +08:00
|
|
|
|
|
|
|
while (!test_bit(IO_WQ_BIT_EXIT, &wq->state)) {
|
2021-03-13 11:26:13 +08:00
|
|
|
long ret;
|
|
|
|
|
2019-12-08 12:03:59 +08:00
|
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
2019-12-08 12:06:46 +08:00
|
|
|
loop:
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-09-01 03:57:32 +08:00
|
|
|
if (io_acct_run_queue(acct)) {
|
2019-10-23 00:25:58 +08:00
|
|
|
io_worker_handle_work(worker);
|
2019-12-08 12:06:46 +08:00
|
|
|
goto loop;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
2021-09-02 03:01:17 +08:00
|
|
|
/* timed out, exit unless we're the last worker */
|
|
|
|
if (last_timeout && acct->nr_workers > 1) {
|
2021-09-12 03:40:52 +08:00
|
|
|
acct->nr_workers--;
|
2021-09-02 03:01:17 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
__set_current_state(TASK_RUNNING);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
last_timeout = false;
|
2021-02-16 04:26:34 +08:00
|
|
|
__io_worker_idle(wqe, worker);
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-03-21 21:06:56 +08:00
|
|
|
if (io_flush_signals())
|
|
|
|
continue;
|
2021-03-13 11:26:13 +08:00
|
|
|
ret = schedule_timeout(WORKER_IDLE_TIMEOUT);
|
2021-03-26 08:16:06 +08:00
|
|
|
if (signal_pending(current)) {
|
|
|
|
struct ksignal ksig;
|
|
|
|
|
|
|
|
if (!get_signal(&ksig))
|
|
|
|
continue;
|
2021-09-28 00:04:10 +08:00
|
|
|
break;
|
2021-03-26 08:16:06 +08:00
|
|
|
}
|
2021-09-02 03:01:17 +08:00
|
|
|
last_timeout = !ret;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(IO_WQ_BIT_EXIT, &wq->state)) {
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-06-14 09:36:17 +08:00
|
|
|
io_worker_handle_work(worker);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
io_worker_exit(worker);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called when a worker is scheduled in. Mark us as currently running.
|
|
|
|
*/
|
|
|
|
void io_wq_worker_running(struct task_struct *tsk)
|
|
|
|
{
|
2021-02-17 05:15:30 +08:00
|
|
|
struct io_worker *worker = tsk->pf_io_worker;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-02-17 05:15:30 +08:00
|
|
|
if (!worker)
|
|
|
|
return;
|
2019-10-23 00:25:58 +08:00
|
|
|
if (!(worker->flags & IO_WORKER_F_UP))
|
|
|
|
return;
|
|
|
|
if (worker->flags & IO_WORKER_F_RUNNING)
|
|
|
|
return;
|
|
|
|
worker->flags |= IO_WORKER_F_RUNNING;
|
2021-02-18 00:00:57 +08:00
|
|
|
io_wqe_inc_running(worker);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called when worker is going to sleep. If there are no workers currently
|
2021-03-09 00:37:51 +08:00
|
|
|
* running and we have work pending, wake up a free one or create a new one.
|
2019-10-23 00:25:58 +08:00
|
|
|
*/
|
|
|
|
void io_wq_worker_sleeping(struct task_struct *tsk)
|
|
|
|
{
|
2021-02-17 05:15:30 +08:00
|
|
|
struct io_worker *worker = tsk->pf_io_worker;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-02-17 05:15:30 +08:00
|
|
|
if (!worker)
|
|
|
|
return;
|
2019-10-23 00:25:58 +08:00
|
|
|
if (!(worker->flags & IO_WORKER_F_UP))
|
|
|
|
return;
|
|
|
|
if (!(worker->flags & IO_WORKER_F_RUNNING))
|
|
|
|
return;
|
|
|
|
|
|
|
|
worker->flags &= ~IO_WORKER_F_RUNNING;
|
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&worker->wqe->lock);
|
2021-02-18 00:00:57 +08:00
|
|
|
io_wqe_dec_running(worker);
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&worker->wqe->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
static void io_init_new_worker(struct io_wqe *wqe, struct io_worker *worker,
|
|
|
|
struct task_struct *tsk)
|
|
|
|
{
|
|
|
|
tsk->pf_io_worker = worker;
|
|
|
|
worker->task = tsk;
|
|
|
|
set_cpus_allowed_ptr(tsk, wqe->cpu_mask);
|
|
|
|
tsk->flags |= PF_NO_SETAFFINITY;
|
|
|
|
|
|
|
|
raw_spin_lock(&wqe->lock);
|
|
|
|
hlist_nulls_add_head_rcu(&worker->nulls_node, &wqe->free_list);
|
|
|
|
list_add_tail_rcu(&worker->all_list, &wqe->all_list);
|
|
|
|
worker->flags |= IO_WORKER_F_FREE;
|
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
wake_up_new_task(tsk);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool io_wq_work_match_all(struct io_wq_work *work, void *data)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool io_should_retry_thread(long err)
|
|
|
|
{
|
|
|
|
switch (err) {
|
|
|
|
case -EAGAIN:
|
|
|
|
case -ERESTARTSYS:
|
|
|
|
case -ERESTARTNOINTR:
|
|
|
|
case -ERESTARTNOHAND:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void create_worker_cont(struct callback_head *cb)
|
|
|
|
{
|
|
|
|
struct io_worker *worker;
|
|
|
|
struct task_struct *tsk;
|
|
|
|
struct io_wqe *wqe;
|
|
|
|
|
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
wqe = worker->wqe;
|
|
|
|
tsk = create_io_thread(io_wqe_worker, worker, wqe->node);
|
|
|
|
if (!IS_ERR(tsk)) {
|
|
|
|
io_init_new_worker(wqe, worker, tsk);
|
|
|
|
io_worker_release(worker);
|
|
|
|
return;
|
|
|
|
} else if (!io_should_retry_thread(PTR_ERR(tsk))) {
|
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
|
|
|
|
|
|
|
atomic_dec(&acct->nr_running);
|
|
|
|
raw_spin_lock(&wqe->lock);
|
|
|
|
acct->nr_workers--;
|
|
|
|
if (!acct->nr_workers) {
|
|
|
|
struct io_cb_cancel_data match = {
|
|
|
|
.fn = io_wq_work_match_all,
|
|
|
|
.cancel_all = true,
|
|
|
|
};
|
|
|
|
|
|
|
|
while (io_acct_cancel_pending_work(wqe, acct, &match))
|
|
|
|
raw_spin_lock(&wqe->lock);
|
|
|
|
}
|
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
io_worker_ref_put(wqe->wq);
|
2021-09-09 19:58:22 +08:00
|
|
|
kfree(worker);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* re-create attempts grab a new worker ref, drop the existing one */
|
|
|
|
io_worker_release(worker);
|
|
|
|
schedule_work(&worker->work);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void io_workqueue_create(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct io_worker *worker = container_of(work, struct io_worker, work);
|
|
|
|
struct io_wqe_acct *acct = io_wqe_get_acct(worker);
|
|
|
|
|
|
|
|
if (!io_queue_worker_create(worker, acct, create_worker_cont)) {
|
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
io_worker_release(worker);
|
2021-09-09 19:58:22 +08:00
|
|
|
kfree(worker);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool create_io_worker(struct io_wq *wq, struct io_wqe *wqe, int index)
|
2021-02-17 05:15:30 +08:00
|
|
|
{
|
2021-03-05 03:39:36 +08:00
|
|
|
struct io_wqe_acct *acct = &wqe->acct[index];
|
2021-02-17 05:15:30 +08:00
|
|
|
struct io_worker *worker;
|
2021-03-05 03:39:36 +08:00
|
|
|
struct task_struct *tsk;
|
2021-02-17 05:15:30 +08:00
|
|
|
|
2021-02-24 06:34:06 +08:00
|
|
|
__set_current_state(TASK_RUNNING);
|
|
|
|
|
2021-02-17 05:15:30 +08:00
|
|
|
worker = kzalloc_node(sizeof(*worker), GFP_KERNEL, wqe->node);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
if (!worker) {
|
2021-03-09 00:37:51 +08:00
|
|
|
fail:
|
|
|
|
atomic_dec(&acct->nr_running);
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-08-05 18:05:37 +08:00
|
|
|
acct->nr_workers--;
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-03-09 00:37:51 +08:00
|
|
|
io_worker_ref_put(wq);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
return false;
|
2021-02-17 05:15:30 +08:00
|
|
|
}
|
2021-03-05 03:39:36 +08:00
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
refcount_set(&worker->ref, 1);
|
|
|
|
worker->wqe = wqe;
|
|
|
|
spin_lock_init(&worker->lock);
|
|
|
|
init_completion(&worker->ref_done);
|
2021-03-05 03:39:36 +08:00
|
|
|
|
|
|
|
if (index == IO_WQ_ACCT_BOUND)
|
|
|
|
worker->flags |= IO_WORKER_F_BOUND;
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
|
|
|
|
tsk = create_io_thread(io_wqe_worker, worker, wqe->node);
|
|
|
|
if (!IS_ERR(tsk)) {
|
|
|
|
io_init_new_worker(wqe, worker, tsk);
|
|
|
|
} else if (!io_should_retry_thread(PTR_ERR(tsk))) {
|
2021-09-09 19:58:22 +08:00
|
|
|
kfree(worker);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
goto fail;
|
|
|
|
} else {
|
|
|
|
INIT_WORK(&worker->work, io_workqueue_create);
|
|
|
|
schedule_work(&worker->work);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2020-09-26 21:26:55 +08:00
|
|
|
/*
|
|
|
|
* Iterate the passed in list and call the specific function for each
|
|
|
|
* worker that isn't exiting
|
|
|
|
*/
|
|
|
|
static bool io_wq_for_each_worker(struct io_wqe *wqe,
|
|
|
|
bool (*func)(struct io_worker *, void *),
|
|
|
|
void *data)
|
|
|
|
{
|
|
|
|
struct io_worker *worker;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
list_for_each_entry_rcu(worker, &wqe->all_list, all_list) {
|
|
|
|
if (io_worker_get(worker)) {
|
|
|
|
/* no task if node is/was offline */
|
|
|
|
if (worker->task)
|
|
|
|
ret = func(worker, data);
|
|
|
|
io_worker_release(worker);
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool io_wq_worker_wake(struct io_worker *worker, void *data)
|
|
|
|
{
|
2021-03-05 03:39:36 +08:00
|
|
|
set_notify_signal(worker->task);
|
2020-09-26 21:26:55 +08:00
|
|
|
wake_up_process(worker->task);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:14:12 +08:00
|
|
|
static void io_run_cancel(struct io_wq_work *work, struct io_wqe *wqe)
|
2020-03-02 00:18:19 +08:00
|
|
|
{
|
2020-03-04 21:14:12 +08:00
|
|
|
struct io_wq *wq = wqe->wq;
|
|
|
|
|
2020-03-02 00:18:19 +08:00
|
|
|
do {
|
|
|
|
work->flags |= IO_WQ_WORK_CANCEL;
|
2021-02-04 21:52:08 +08:00
|
|
|
wq->do_work(work);
|
|
|
|
work = wq->free_work(work);
|
2020-03-02 00:18:19 +08:00
|
|
|
} while (work);
|
|
|
|
}
|
|
|
|
|
2020-03-24 03:57:22 +08:00
|
|
|
static void io_wqe_insert_work(struct io_wqe *wqe, struct io_wq_work *work)
|
|
|
|
{
|
2021-09-01 03:57:32 +08:00
|
|
|
struct io_wqe_acct *acct = io_work_get_acct(wqe, work);
|
2020-03-24 03:57:22 +08:00
|
|
|
unsigned int hash;
|
|
|
|
struct io_wq_work *tail;
|
|
|
|
|
|
|
|
if (!io_wq_is_hashed(work)) {
|
|
|
|
append:
|
2021-09-01 03:57:32 +08:00
|
|
|
wq_list_add_tail(&work->list, &acct->work_list);
|
2020-03-24 03:57:22 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
hash = io_get_work_hash(work);
|
|
|
|
tail = wqe->hash_tail[hash];
|
|
|
|
wqe->hash_tail[hash] = work;
|
|
|
|
if (!tail)
|
|
|
|
goto append;
|
|
|
|
|
2021-09-01 03:57:32 +08:00
|
|
|
wq_list_add_after(&work->list, &tail->list, &acct->work_list);
|
2020-03-24 03:57:22 +08:00
|
|
|
}
|
|
|
|
|
2021-09-08 17:09:29 +08:00
|
|
|
static bool io_wq_work_match_item(struct io_wq_work *work, void *data)
|
|
|
|
{
|
|
|
|
return work == data;
|
|
|
|
}
|
|
|
|
|
2019-10-23 00:25:58 +08:00
|
|
|
static void io_wqe_enqueue(struct io_wqe *wqe, struct io_wq_work *work)
|
|
|
|
{
|
2019-11-08 02:41:16 +08:00
|
|
|
struct io_wqe_acct *acct = io_work_get_acct(wqe, work);
|
2021-08-31 01:55:22 +08:00
|
|
|
unsigned work_flags = work->flags;
|
|
|
|
bool do_create;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-07-24 01:53:54 +08:00
|
|
|
/*
|
|
|
|
* If io-wq is exiting for this task, or if the request has explicitly
|
|
|
|
* been marked as one that should not get executed, cancel it here.
|
|
|
|
*/
|
|
|
|
if (test_bit(IO_WQ_BIT_EXIT, &wqe->wq->state) ||
|
|
|
|
(work->flags & IO_WQ_WORK_CANCEL)) {
|
2021-03-09 11:04:10 +08:00
|
|
|
io_run_cancel(work, wqe);
|
2021-02-26 01:17:09 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2020-03-24 03:57:22 +08:00
|
|
|
io_wqe_insert_work(wqe, work);
|
2021-09-01 03:57:32 +08:00
|
|
|
clear_bit(IO_ACCT_STALLED_BIT, &acct->flags);
|
2021-08-31 01:55:22 +08:00
|
|
|
|
|
|
|
rcu_read_lock();
|
2021-09-01 03:57:32 +08:00
|
|
|
do_create = !io_wqe_activate_free_worker(wqe, acct);
|
2021-08-31 01:55:22 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-08-31 01:55:22 +08:00
|
|
|
if (do_create && ((work_flags & IO_WQ_WORK_CONCURRENT) ||
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
!atomic_read(&acct->nr_running))) {
|
|
|
|
bool did_create;
|
|
|
|
|
|
|
|
did_create = io_wqe_create_worker(wqe, acct);
|
2021-09-08 17:09:29 +08:00
|
|
|
if (likely(did_create))
|
|
|
|
return;
|
|
|
|
|
|
|
|
raw_spin_lock(&wqe->lock);
|
|
|
|
/* fatal condition, failed to create the first worker */
|
|
|
|
if (!acct->nr_workers) {
|
|
|
|
struct io_cb_cancel_data match = {
|
|
|
|
.fn = io_wq_work_match_item,
|
|
|
|
.data = work,
|
|
|
|
.cancel_all = false,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (io_acct_cancel_pending_work(wqe, acct, &match))
|
|
|
|
raw_spin_lock(&wqe->lock);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
}
|
2021-09-08 17:09:29 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
}
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void io_wq_enqueue(struct io_wq *wq, struct io_wq_work *work)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = wq->wqes[numa_node_id()];
|
|
|
|
|
|
|
|
io_wqe_enqueue(wqe, work);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-03-14 05:31:04 +08:00
|
|
|
* Work items that hash to the same value will not be done in parallel.
|
|
|
|
* Used to limit concurrent writes, generally hashed by inode.
|
2019-10-23 00:25:58 +08:00
|
|
|
*/
|
2020-03-14 05:31:04 +08:00
|
|
|
void io_wq_hash_work(struct io_wq_work *work, void *val)
|
2019-10-23 00:25:58 +08:00
|
|
|
{
|
2020-03-14 05:31:04 +08:00
|
|
|
unsigned int bit;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
|
|
|
bit = hash_ptr(val, IO_WQ_HASH_ORDER);
|
|
|
|
work->flags |= (IO_WQ_WORK_HASHED | (bit << IO_WQ_HASH_SHIFT));
|
|
|
|
}
|
|
|
|
|
2020-03-07 06:15:39 +08:00
|
|
|
static bool io_wq_worker_cancel(struct io_worker *worker, void *data)
|
2019-10-29 11:49:21 +08:00
|
|
|
{
|
2020-03-07 06:15:39 +08:00
|
|
|
struct io_cb_cancel_data *match = data;
|
2019-10-29 11:49:21 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Hold the lock to avoid ->cur_work going out of scope, caller
|
2019-11-14 00:43:34 +08:00
|
|
|
* may dereference the passed in work.
|
2019-10-29 11:49:21 +08:00
|
|
|
*/
|
2021-08-30 20:33:08 +08:00
|
|
|
spin_lock(&worker->lock);
|
2019-10-29 11:49:21 +08:00
|
|
|
if (worker->cur_work &&
|
2020-03-07 06:15:39 +08:00
|
|
|
match->fn(worker->cur_work, match->data)) {
|
2021-02-17 05:15:30 +08:00
|
|
|
set_notify_signal(worker->task);
|
2020-06-15 15:24:03 +08:00
|
|
|
match->nr_running++;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
2021-08-30 20:33:08 +08:00
|
|
|
spin_unlock(&worker->lock);
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2020-06-15 15:24:03 +08:00
|
|
|
return match->nr_running && !match->cancel_all;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2020-08-24 01:33:10 +08:00
|
|
|
static inline void io_wqe_remove_pending(struct io_wqe *wqe,
|
|
|
|
struct io_wq_work *work,
|
|
|
|
struct io_wq_work_node *prev)
|
|
|
|
{
|
2021-09-01 03:57:32 +08:00
|
|
|
struct io_wqe_acct *acct = io_work_get_acct(wqe, work);
|
2020-08-24 01:33:10 +08:00
|
|
|
unsigned int hash = io_get_work_hash(work);
|
|
|
|
struct io_wq_work *prev_work = NULL;
|
|
|
|
|
|
|
|
if (io_wq_is_hashed(work) && work == wqe->hash_tail[hash]) {
|
|
|
|
if (prev)
|
|
|
|
prev_work = container_of(prev, struct io_wq_work, list);
|
|
|
|
if (prev_work && io_get_work_hash(prev_work) == hash)
|
|
|
|
wqe->hash_tail[hash] = prev_work;
|
|
|
|
else
|
|
|
|
wqe->hash_tail[hash] = NULL;
|
|
|
|
}
|
2021-09-01 03:57:32 +08:00
|
|
|
wq_list_del(&acct->work_list, &work->list, prev);
|
2020-08-24 01:33:10 +08:00
|
|
|
}
|
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
static bool io_acct_cancel_pending_work(struct io_wqe *wqe,
|
|
|
|
struct io_wqe_acct *acct,
|
|
|
|
struct io_cb_cancel_data *match)
|
|
|
|
__releases(wqe->lock)
|
2019-10-23 00:25:58 +08:00
|
|
|
{
|
2019-11-27 02:59:32 +08:00
|
|
|
struct io_wq_work_node *node, *prev;
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wq_work *work;
|
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
wq_list_for_each(node, prev, &acct->work_list) {
|
|
|
|
work = container_of(node, struct io_wq_work, list);
|
|
|
|
if (!match->fn(work, match->data))
|
|
|
|
continue;
|
|
|
|
io_wqe_remove_pending(wqe, work, prev);
|
|
|
|
raw_spin_unlock(&wqe->lock);
|
|
|
|
io_run_cancel(work, wqe);
|
|
|
|
match->nr_pending++;
|
|
|
|
/* not safe to continue after unlock */
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void io_wqe_cancel_pending_work(struct io_wqe *wqe,
|
|
|
|
struct io_cb_cancel_data *match)
|
|
|
|
{
|
|
|
|
int i;
|
2020-06-15 15:24:03 +08:00
|
|
|
retry:
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-09-01 03:57:32 +08:00
|
|
|
for (i = 0; i < IO_WQ_ACCT_NR; i++) {
|
|
|
|
struct io_wqe_acct *acct = io_get_acct(wqe, i == 0);
|
2020-06-15 15:24:03 +08:00
|
|
|
|
io-wq: make worker creation resilient against signals
If a task is queueing async work and also handling signals, then we can
run into the case where create_io_thread() is interrupted and returns
failure because of that. If this happens for creating the first worker
in a group, then that worker will never get created and we can hang the
ring.
If we do get a fork failure, retry from task_work. With signals we have
to be a bit careful as we cannot simply queue as task_work, as we'll
still have signals pending at that point. Punt over a normal workqueue
first and then create from task_work after that.
Lastly, ensure that we handle fatal worker creations. Worker creation
failures are normally not fatal, only if we fail to create one in an empty
worker group can we not make progress. Right now that is ignored, ensure
that we handle that and run cancel on the work item.
There are two paths that create new workers - one is the "existing worker
going to sleep", and the other is "no workers found for this work, create
one". The former is never fatal, as workers do exist in the group. Only
the latter needs to be carefully handled.
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-09-02 01:20:10 +08:00
|
|
|
if (io_acct_cancel_pending_work(wqe, acct, match)) {
|
|
|
|
if (match->cancel_all)
|
|
|
|
goto retry;
|
|
|
|
return;
|
2021-09-01 03:57:32 +08:00
|
|
|
}
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
2021-08-30 20:33:08 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2020-06-15 15:24:02 +08:00
|
|
|
}
|
|
|
|
|
2020-06-15 15:24:03 +08:00
|
|
|
static void io_wqe_cancel_running_work(struct io_wqe *wqe,
|
2020-06-15 15:24:02 +08:00
|
|
|
struct io_cb_cancel_data *match)
|
|
|
|
{
|
2019-10-23 00:25:58 +08:00
|
|
|
rcu_read_lock();
|
2020-06-15 15:24:03 +08:00
|
|
|
io_wq_for_each_worker(wqe, io_wq_worker_cancel, match);
|
2019-10-23 00:25:58 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
2020-03-07 06:15:39 +08:00
|
|
|
enum io_wq_cancel io_wq_cancel_cb(struct io_wq *wq, work_cancel_fn *cancel,
|
2020-06-15 15:24:03 +08:00
|
|
|
void *data, bool cancel_all)
|
2019-10-23 00:25:58 +08:00
|
|
|
{
|
2020-03-07 06:15:39 +08:00
|
|
|
struct io_cb_cancel_data match = {
|
2020-06-15 15:24:03 +08:00
|
|
|
.fn = cancel,
|
|
|
|
.data = data,
|
|
|
|
.cancel_all = cancel_all,
|
2020-02-09 10:13:32 +08:00
|
|
|
};
|
2019-11-27 02:10:20 +08:00
|
|
|
int node;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2020-06-15 15:24:02 +08:00
|
|
|
/*
|
|
|
|
* First check pending list, if we're lucky we can just remove it
|
|
|
|
* from there. CANCEL_OK means that the work is returned as-new,
|
|
|
|
* no completion will be posted for it.
|
|
|
|
*/
|
2019-11-27 02:10:20 +08:00
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2020-06-15 15:24:03 +08:00
|
|
|
io_wqe_cancel_pending_work(wqe, &match);
|
|
|
|
if (match.nr_pending && !match.cancel_all)
|
2020-06-15 15:24:02 +08:00
|
|
|
return IO_WQ_CANCEL_OK;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2020-06-15 15:24:02 +08:00
|
|
|
/*
|
|
|
|
* Now check if a free (going busy) or busy worker has the work
|
|
|
|
* currently running. If we find it there, we'll return CANCEL_RUNNING
|
|
|
|
* as an indication that we attempt to signal cancellation. The
|
|
|
|
* completion will run normally in this case.
|
|
|
|
*/
|
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
|
|
|
|
2020-06-15 15:24:03 +08:00
|
|
|
io_wqe_cancel_running_work(wqe, &match);
|
|
|
|
if (match.nr_running && !match.cancel_all)
|
2020-06-15 15:24:02 +08:00
|
|
|
return IO_WQ_CANCEL_RUNNING;
|
|
|
|
}
|
|
|
|
|
2020-06-15 15:24:03 +08:00
|
|
|
if (match.nr_running)
|
|
|
|
return IO_WQ_CANCEL_RUNNING;
|
|
|
|
if (match.nr_pending)
|
|
|
|
return IO_WQ_CANCEL_OK;
|
2020-06-15 15:24:02 +08:00
|
|
|
return IO_WQ_CANCEL_NOTFOUND;
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2021-02-20 03:33:30 +08:00
|
|
|
static int io_wqe_hash_wake(struct wait_queue_entry *wait, unsigned mode,
|
|
|
|
int sync, void *key)
|
|
|
|
{
|
|
|
|
struct io_wqe *wqe = container_of(wait, struct io_wqe, wait);
|
2021-09-01 03:57:32 +08:00
|
|
|
int i;
|
2021-02-20 03:33:30 +08:00
|
|
|
|
|
|
|
list_del_init(&wait->entry);
|
|
|
|
|
|
|
|
rcu_read_lock();
|
2021-09-01 03:57:32 +08:00
|
|
|
for (i = 0; i < IO_WQ_ACCT_NR; i++) {
|
|
|
|
struct io_wqe_acct *acct = &wqe->acct[i];
|
|
|
|
|
|
|
|
if (test_and_clear_bit(IO_ACCT_STALLED_BIT, &acct->flags))
|
|
|
|
io_wqe_activate_free_worker(wqe, acct);
|
|
|
|
}
|
2021-02-20 03:33:30 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-11-25 23:49:20 +08:00
|
|
|
struct io_wq *io_wq_create(unsigned bounded, struct io_wq_data *data)
|
2019-10-23 00:25:58 +08:00
|
|
|
{
|
2021-09-01 03:57:32 +08:00
|
|
|
int ret, node, i;
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wq *wq;
|
|
|
|
|
2020-06-09 02:08:20 +08:00
|
|
|
if (WARN_ON_ONCE(!data->free_work || !data->do_work))
|
2020-03-04 21:14:12 +08:00
|
|
|
return ERR_PTR(-EINVAL);
|
2021-06-18 01:13:59 +08:00
|
|
|
if (WARN_ON_ONCE(!bounded))
|
|
|
|
return ERR_PTR(-EINVAL);
|
2020-03-04 21:14:12 +08:00
|
|
|
|
2021-06-14 09:36:12 +08:00
|
|
|
wq = kzalloc(struct_size(wq, wqes, nr_node_ids), GFP_KERNEL);
|
2019-10-23 00:25:58 +08:00
|
|
|
if (!wq)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2020-10-22 23:02:50 +08:00
|
|
|
ret = cpuhp_state_add_instance_nocalls(io_wq_online, &wq->cpuhp_node);
|
|
|
|
if (ret)
|
2021-06-14 09:36:12 +08:00
|
|
|
goto err_wq;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2021-02-20 03:33:30 +08:00
|
|
|
refcount_inc(&data->hash->refs);
|
|
|
|
wq->hash = data->hash;
|
2020-03-04 21:14:12 +08:00
|
|
|
wq->free_work = data->free_work;
|
2020-06-09 02:08:20 +08:00
|
|
|
wq->do_work = data->do_work;
|
2019-11-13 13:31:31 +08:00
|
|
|
|
2020-10-22 23:02:50 +08:00
|
|
|
ret = -ENOMEM;
|
2019-11-27 02:10:20 +08:00
|
|
|
for_each_node(node) {
|
2019-10-23 00:25:58 +08:00
|
|
|
struct io_wqe *wqe;
|
2020-02-11 21:30:06 +08:00
|
|
|
int alloc_node = node;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2020-02-11 21:30:06 +08:00
|
|
|
if (!node_online(alloc_node))
|
|
|
|
alloc_node = NUMA_NO_NODE;
|
|
|
|
wqe = kzalloc_node(sizeof(struct io_wqe), GFP_KERNEL, alloc_node);
|
2019-10-23 00:25:58 +08:00
|
|
|
if (!wqe)
|
2019-11-27 02:10:20 +08:00
|
|
|
goto err;
|
2021-06-18 00:08:11 +08:00
|
|
|
if (!alloc_cpumask_var(&wqe->cpu_mask, GFP_KERNEL))
|
|
|
|
goto err;
|
|
|
|
cpumask_copy(wqe->cpu_mask, cpumask_of_node(node));
|
2019-11-27 02:10:20 +08:00
|
|
|
wq->wqes[node] = wqe;
|
2020-02-11 21:30:06 +08:00
|
|
|
wqe->node = alloc_node;
|
2019-11-08 02:41:16 +08:00
|
|
|
wqe->acct[IO_WQ_ACCT_BOUND].max_workers = bounded;
|
2021-02-22 07:02:53 +08:00
|
|
|
wqe->acct[IO_WQ_ACCT_UNBOUND].max_workers =
|
2019-11-08 02:41:16 +08:00
|
|
|
task_rlimit(current, RLIMIT_NPROC);
|
2021-02-20 03:33:30 +08:00
|
|
|
INIT_LIST_HEAD(&wqe->wait.entry);
|
2021-09-01 03:57:32 +08:00
|
|
|
wqe->wait.func = io_wqe_hash_wake;
|
|
|
|
for (i = 0; i < IO_WQ_ACCT_NR; i++) {
|
|
|
|
struct io_wqe_acct *acct = &wqe->acct[i];
|
|
|
|
|
|
|
|
acct->index = i;
|
|
|
|
atomic_set(&acct->nr_running, 0);
|
|
|
|
INIT_WQ_LIST(&acct->work_list);
|
|
|
|
}
|
2019-10-23 00:25:58 +08:00
|
|
|
wqe->wq = wq;
|
2020-09-01 16:41:46 +08:00
|
|
|
raw_spin_lock_init(&wqe->lock);
|
2019-11-14 23:00:41 +08:00
|
|
|
INIT_HLIST_NULLS_HEAD(&wqe->free_list, 0);
|
2019-11-14 04:54:49 +08:00
|
|
|
INIT_LIST_HEAD(&wqe->all_list);
|
2019-10-23 00:25:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
wq->task = get_task_struct(data->task);
|
|
|
|
atomic_set(&wq->worker_refs, 1);
|
|
|
|
init_completion(&wq->worker_done);
|
|
|
|
return wq;
|
2019-11-19 23:37:07 +08:00
|
|
|
err:
|
2021-03-02 00:09:56 +08:00
|
|
|
io_wq_put_hash(data->hash);
|
2020-10-22 23:02:50 +08:00
|
|
|
cpuhp_state_remove_instance_nocalls(io_wq_online, &wq->cpuhp_node);
|
2021-06-18 00:08:11 +08:00
|
|
|
for_each_node(node) {
|
|
|
|
if (!wq->wqes[node])
|
|
|
|
continue;
|
|
|
|
free_cpumask_var(wq->wqes[node]->cpu_mask);
|
2019-11-27 02:10:20 +08:00
|
|
|
kfree(wq->wqes[node]);
|
2021-06-18 00:08:11 +08:00
|
|
|
}
|
2020-10-22 23:02:50 +08:00
|
|
|
err_wq:
|
2019-11-19 23:37:07 +08:00
|
|
|
kfree(wq);
|
2019-10-23 00:25:58 +08:00
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
|
2021-04-02 09:57:07 +08:00
|
|
|
static bool io_task_work_match(struct callback_head *cb, void *data)
|
|
|
|
{
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
struct io_worker *worker;
|
2021-04-02 09:57:07 +08:00
|
|
|
|
2021-09-09 09:57:26 +08:00
|
|
|
if (cb->func != create_worker_cb && cb->func != create_worker_cont)
|
2021-04-02 09:57:07 +08:00
|
|
|
return false;
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
|
|
|
return worker->wqe->wq == data;
|
2021-04-02 09:57:07 +08:00
|
|
|
}
|
|
|
|
|
2021-05-23 22:48:39 +08:00
|
|
|
void io_wq_exit_start(struct io_wq *wq)
|
|
|
|
{
|
|
|
|
set_bit(IO_WQ_BIT_EXIT, &wq->state);
|
|
|
|
}
|
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
static void io_wq_exit_workers(struct io_wq *wq)
|
2021-02-27 04:48:19 +08:00
|
|
|
{
|
2021-03-09 00:37:51 +08:00
|
|
|
struct callback_head *cb;
|
|
|
|
int node;
|
|
|
|
|
|
|
|
if (!wq->task)
|
|
|
|
return;
|
|
|
|
|
2021-04-02 09:57:07 +08:00
|
|
|
while ((cb = task_work_cancel_match(wq->task, io_task_work_match, wq)) != NULL) {
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
struct io_worker *worker;
|
2021-09-09 09:57:26 +08:00
|
|
|
struct io_wqe_acct *acct;
|
2021-03-09 00:37:51 +08:00
|
|
|
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
worker = container_of(cb, struct io_worker, create_work);
|
2021-09-09 09:57:26 +08:00
|
|
|
acct = io_wqe_get_acct(worker);
|
|
|
|
atomic_dec(&acct->nr_running);
|
|
|
|
raw_spin_lock(&worker->wqe->lock);
|
|
|
|
acct->nr_workers--;
|
|
|
|
raw_spin_unlock(&worker->wqe->lock);
|
2021-03-09 00:37:51 +08:00
|
|
|
io_worker_ref_put(wq);
|
io-wq: remove GFP_ATOMIC allocation off schedule out path
Daniel reports that the v5.14-rc4-rt4 kernel throws a BUG when running
stress-ng:
| [ 90.202543] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35
| [ 90.202549] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2047, name: iou-wrk-2041
| [ 90.202555] CPU: 5 PID: 2047 Comm: iou-wrk-2041 Tainted: G W 5.14.0-rc4-rt4+ #89
| [ 90.202559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
| [ 90.202561] Call Trace:
| [ 90.202577] dump_stack_lvl+0x34/0x44
| [ 90.202584] ___might_sleep.cold+0x87/0x94
| [ 90.202588] rt_spin_lock+0x19/0x70
| [ 90.202593] ___slab_alloc+0xcb/0x7d0
| [ 90.202598] ? newidle_balance.constprop.0+0xf5/0x3b0
| [ 90.202603] ? dequeue_entity+0xc3/0x290
| [ 90.202605] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202610] ? pick_next_task_fair+0xb9/0x330
| [ 90.202612] ? __schedule+0x670/0x1410
| [ 90.202615] ? io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202618] kmem_cache_alloc_trace+0x79/0x1f0
| [ 90.202621] io_wqe_dec_running.isra.0+0x98/0xe0
| [ 90.202625] io_wq_worker_sleeping+0x37/0x50
| [ 90.202628] schedule+0x30/0xd0
| [ 90.202630] schedule_timeout+0x8f/0x1a0
| [ 90.202634] ? __bpf_trace_tick_stop+0x10/0x10
| [ 90.202637] io_wqe_worker+0xfd/0x320
| [ 90.202641] ? finish_task_switch.isra.0+0xd3/0x290
| [ 90.202644] ? io_worker_handle_work+0x670/0x670
| [ 90.202646] ? io_worker_handle_work+0x670/0x670
| [ 90.202649] ret_from_fork+0x22/0x30
which is due to the RT kernel not liking a GFP_ATOMIC allocation inside
a raw spinlock. Besides that not working on RT, doing any kind of
allocation from inside schedule() is kind of nasty and should be avoided
if at all possible.
This particular path happens when an io-wq worker goes to sleep, and we
need a new worker to handle pending work. We currently allocate a small
data item to hold the information we need to create a new worker, but we
can instead include this data in the io_worker struct itself and just
protect it with a single bit lock. We only really need one per worker
anyway, as we will have run pending work between to sleep cycles.
https://lore.kernel.org/lkml/20210804082418.fbibprcwtzyt5qax@beryllium.lan/
Reported-by: Daniel Wagner <dwagner@suse.de>
Tested-by: Daniel Wagner <dwagner@suse.de>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
2021-08-04 22:37:25 +08:00
|
|
|
clear_bit_unlock(0, &worker->create_state);
|
|
|
|
io_worker_release(worker);
|
2021-03-09 00:37:51 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
|
|
|
|
|
|
|
io_wq_for_each_worker(wqe, io_wq_worker_wake, NULL);
|
2021-02-27 04:48:19 +08:00
|
|
|
}
|
2021-03-09 00:37:51 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
io_worker_ref_put(wq);
|
|
|
|
wait_for_completion(&wq->worker_done);
|
2021-05-26 13:08:26 +08:00
|
|
|
|
|
|
|
for_each_node(node) {
|
|
|
|
spin_lock_irq(&wq->hash->wait.lock);
|
|
|
|
list_del_init(&wq->wqes[node]->wait.entry);
|
|
|
|
spin_unlock_irq(&wq->hash->wait.lock);
|
|
|
|
}
|
2021-03-09 00:37:51 +08:00
|
|
|
put_task_struct(wq->task);
|
|
|
|
wq->task = NULL;
|
2021-02-27 04:48:19 +08:00
|
|
|
}
|
|
|
|
|
2021-02-26 01:17:09 +08:00
|
|
|
static void io_wq_destroy(struct io_wq *wq)
|
2019-10-23 00:25:58 +08:00
|
|
|
{
|
2019-11-27 02:10:20 +08:00
|
|
|
int node;
|
2019-10-23 00:25:58 +08:00
|
|
|
|
2020-10-22 23:02:50 +08:00
|
|
|
cpuhp_state_remove_instance_nocalls(io_wq_online, &wq->cpuhp_node);
|
|
|
|
|
2021-02-20 03:33:30 +08:00
|
|
|
for_each_node(node) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
2021-03-26 00:16:12 +08:00
|
|
|
struct io_cb_cancel_data match = {
|
|
|
|
.fn = io_wq_work_match_all,
|
|
|
|
.cancel_all = true,
|
|
|
|
};
|
|
|
|
io_wqe_cancel_pending_work(wqe, &match);
|
2021-06-18 00:08:11 +08:00
|
|
|
free_cpumask_var(wqe->cpu_mask);
|
2021-02-20 03:33:30 +08:00
|
|
|
kfree(wqe);
|
|
|
|
}
|
|
|
|
io_wq_put_hash(wq->hash);
|
2019-10-23 00:25:58 +08:00
|
|
|
kfree(wq);
|
2021-02-26 01:17:09 +08:00
|
|
|
}
|
|
|
|
|
2021-02-27 04:48:19 +08:00
|
|
|
void io_wq_put_and_exit(struct io_wq *wq)
|
|
|
|
{
|
2021-05-23 22:48:39 +08:00
|
|
|
WARN_ON_ONCE(!test_bit(IO_WQ_BIT_EXIT, &wq->state));
|
|
|
|
|
2021-03-09 00:37:51 +08:00
|
|
|
io_wq_exit_workers(wq);
|
2021-06-14 09:36:13 +08:00
|
|
|
io_wq_destroy(wq);
|
2021-02-27 04:48:19 +08:00
|
|
|
}
|
|
|
|
|
2021-06-18 00:08:11 +08:00
|
|
|
struct online_data {
|
|
|
|
unsigned int cpu;
|
|
|
|
bool online;
|
|
|
|
};
|
|
|
|
|
2020-10-22 23:02:50 +08:00
|
|
|
static bool io_wq_worker_affinity(struct io_worker *worker, void *data)
|
|
|
|
{
|
2021-06-18 00:08:11 +08:00
|
|
|
struct online_data *od = data;
|
2021-04-08 17:44:50 +08:00
|
|
|
|
2021-06-18 00:08:11 +08:00
|
|
|
if (od->online)
|
|
|
|
cpumask_set_cpu(od->cpu, worker->wqe->cpu_mask);
|
|
|
|
else
|
|
|
|
cpumask_clear_cpu(od->cpu, worker->wqe->cpu_mask);
|
2020-10-22 23:02:50 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-06-18 00:08:11 +08:00
|
|
|
static int __io_wq_cpu_online(struct io_wq *wq, unsigned int cpu, bool online)
|
2020-10-22 23:02:50 +08:00
|
|
|
{
|
2021-06-18 00:08:11 +08:00
|
|
|
struct online_data od = {
|
|
|
|
.cpu = cpu,
|
|
|
|
.online = online
|
|
|
|
};
|
2020-10-22 23:02:50 +08:00
|
|
|
int i;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(i)
|
2021-06-18 00:08:11 +08:00
|
|
|
io_wq_for_each_worker(wq->wqes[i], io_wq_worker_affinity, &od);
|
2020-10-22 23:02:50 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-06-18 00:08:11 +08:00
|
|
|
static int io_wq_cpu_online(unsigned int cpu, struct hlist_node *node)
|
|
|
|
{
|
|
|
|
struct io_wq *wq = hlist_entry_safe(node, struct io_wq, cpuhp_node);
|
|
|
|
|
|
|
|
return __io_wq_cpu_online(wq, cpu, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int io_wq_cpu_offline(unsigned int cpu, struct hlist_node *node)
|
|
|
|
{
|
|
|
|
struct io_wq *wq = hlist_entry_safe(node, struct io_wq, cpuhp_node);
|
|
|
|
|
|
|
|
return __io_wq_cpu_online(wq, cpu, false);
|
|
|
|
}
|
|
|
|
|
2021-06-18 00:19:54 +08:00
|
|
|
int io_wq_cpu_affinity(struct io_wq *wq, cpumask_var_t mask)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(i) {
|
|
|
|
struct io_wqe *wqe = wq->wqes[i];
|
|
|
|
|
|
|
|
if (mask)
|
|
|
|
cpumask_copy(wqe->cpu_mask, mask);
|
|
|
|
else
|
|
|
|
cpumask_copy(wqe->cpu_mask, cpumask_of_node(i));
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-08-28 01:33:19 +08:00
|
|
|
/*
|
|
|
|
* Set max number of unbounded workers, returns old value. If new_count is 0,
|
|
|
|
* then just return the old value.
|
|
|
|
*/
|
|
|
|
int io_wq_max_workers(struct io_wq *wq, int *new_count)
|
|
|
|
{
|
|
|
|
int i, node, prev = 0;
|
|
|
|
|
2021-09-13 23:44:15 +08:00
|
|
|
BUILD_BUG_ON((int) IO_WQ_ACCT_BOUND != (int) IO_WQ_BOUND);
|
|
|
|
BUILD_BUG_ON((int) IO_WQ_ACCT_UNBOUND != (int) IO_WQ_UNBOUND);
|
|
|
|
BUILD_BUG_ON((int) IO_WQ_ACCT_NR != 2);
|
|
|
|
|
2021-08-28 01:33:19 +08:00
|
|
|
for (i = 0; i < 2; i++) {
|
|
|
|
if (new_count[i] > task_rlimit(current, RLIMIT_NPROC))
|
|
|
|
new_count[i] = task_rlimit(current, RLIMIT_NPROC);
|
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for_each_node(node) {
|
2021-10-20 03:31:26 +08:00
|
|
|
struct io_wqe *wqe = wq->wqes[node];
|
2021-08-28 01:33:19 +08:00
|
|
|
struct io_wqe_acct *acct;
|
|
|
|
|
2021-10-20 03:31:26 +08:00
|
|
|
raw_spin_lock(&wqe->lock);
|
2021-09-01 03:57:32 +08:00
|
|
|
for (i = 0; i < IO_WQ_ACCT_NR; i++) {
|
2021-10-20 03:31:26 +08:00
|
|
|
acct = &wqe->acct[i];
|
2021-08-28 01:33:19 +08:00
|
|
|
prev = max_t(int, acct->max_workers, prev);
|
|
|
|
if (new_count[i])
|
|
|
|
acct->max_workers = new_count[i];
|
|
|
|
new_count[i] = prev;
|
|
|
|
}
|
2021-10-20 03:31:26 +08:00
|
|
|
raw_spin_unlock(&wqe->lock);
|
2021-08-28 01:33:19 +08:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-22 23:02:50 +08:00
|
|
|
static __init int io_wq_init(void)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = cpuhp_setup_state_multi(CPUHP_AP_ONLINE_DYN, "io-wq/online",
|
2021-06-18 00:08:11 +08:00
|
|
|
io_wq_cpu_online, io_wq_cpu_offline);
|
2020-10-22 23:02:50 +08:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
io_wq_online = ret;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
subsys_initcall(io_wq_init);
|