lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87czt2q2pl.fsf@disp2133>
Date:   Thu, 03 Jun 2021 12:26:30 -0500
From:   ebiederm@...ssion.com (Eric W. Biederman)
To:     Ian Kent <raven@...maw.net>
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Tejun Heo <tj@...nel.org>, Eric Sandeen <sandeen@...deen.net>,
        Fox Chen <foxhlchen@...il.com>,
        Brice Goglin <brice.goglin@...il.com>,
        Al Viro <viro@...IV.linux.org.uk>,
        Rick Lindsley <ricklind@...ux.vnet.ibm.com>,
        David Howells <dhowells@...hat.com>,
        Miklos Szeredi <miklos@...redi.hu>,
        Marcelo Tosatti <mtosatti@...hat.com>,
        linux-fsdevel <linux-fsdevel@...r.kernel.org>,
        Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [REPOST PATCH v4 2/5] kernfs: use VFS negative dentry caching

Ian Kent <raven@...maw.net> writes:

> If there are many lookups for non-existent paths these negative lookups
> can lead to a lot of overhead during path walks.
>
> The VFS allows dentries to be created as negative and hashed, and caches
> them so they can be used to reduce the fairly high overhead alloc/free
> cycle that occurs during these lookups.
>
> Signed-off-by: Ian Kent <raven@...maw.net>
> ---
>  fs/kernfs/dir.c |   55 +++++++++++++++++++++++++++++++++----------------------
>  1 file changed, 33 insertions(+), 22 deletions(-)
>
> diff --git a/fs/kernfs/dir.c b/fs/kernfs/dir.c
> index 4c69e2af82dac..5151c712f06f5 100644
> --- a/fs/kernfs/dir.c
> +++ b/fs/kernfs/dir.c
> @@ -1037,12 +1037,33 @@ static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags)
>  	if (flags & LOOKUP_RCU)
>  		return -ECHILD;
>  
> -	/* Always perform fresh lookup for negatives */
> -	if (d_really_is_negative(dentry))
> -		goto out_bad_unlocked;
> +	mutex_lock(&kernfs_mutex);
>  
>  	kn = kernfs_dentry_node(dentry);
> -	mutex_lock(&kernfs_mutex);

Why bring kernfs_dentry_node inside the mutex?

The inode lock of the parent should protect negative to positive
transitions not the kernfs_mutex.  So moving the code inside
the mutex looks unnecessary and confusing.

What NFS does is to check to see if the parent has been modified
since the negative dentry was created, can't kernfs do the same
and remove the need for taking the lock until the lookup that
makes the dentry positive?

Doing the lookup twice seems strange.

Perhaps this should happen as two changes.  One change to enable
negative dentries and a second change to optimize d_revalidate
of negative dentries.  That way the issues could be clearly separated
and looked at separately.

> +
> +	/* Negative hashed dentry? */
> +	if (!kn) {
> +		struct kernfs_node *parent;
> +
> +		/* If the kernfs node can be found this is a stale negative
> +		 * hashed dentry so it must be discarded and the lookup redone.
> +		 */
> +		parent = kernfs_dentry_node(dentry->d_parent);
> +		if (parent) {
> +			const void *ns = NULL;
> +
> +			if (kernfs_ns_enabled(parent))
> +				ns = kernfs_info(dentry->d_sb)->ns;
> +			kn = kernfs_find_ns(parent, dentry->d_name.name, ns);
> +			if (kn)
> +				goto out_bad;
> +		}
> +
> +		/* The kernfs node doesn't exist, leave the dentry negative
> +		 * and return success.
> +		 */
> +		goto out;
> +	}
>  
>  	/* The kernfs node has been deactivated */
>  	if (!kernfs_active_read(kn))
> @@ -1060,12 +1081,11 @@ static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags)
>  	if (kn->parent && kernfs_ns_enabled(kn->parent) &&
>  	    kernfs_info(dentry->d_sb)->ns != kn->ns)
>  		goto out_bad;
> -
> +out:
>  	mutex_unlock(&kernfs_mutex);
>  	return 1;
>  out_bad:
>  	mutex_unlock(&kernfs_mutex);
> -out_bad_unlocked:
>  	return 0;
>  }
>  
> @@ -1080,33 +1100,24 @@ static struct dentry *kernfs_iop_lookup(struct inode *dir,
>  	struct dentry *ret;
>  	struct kernfs_node *parent = dir->i_private;
>  	struct kernfs_node *kn;
> -	struct inode *inode;
> +	struct inode *inode = NULL;
>  	const void *ns = NULL;
>  
>  	mutex_lock(&kernfs_mutex);
> -
>  	if (kernfs_ns_enabled(parent))
>  		ns = kernfs_info(dir->i_sb)->ns;
>  
>  	kn = kernfs_find_ns(parent, dentry->d_name.name, ns);
> -
> -	/* no such entry */
> -	if (!kn || !kernfs_active(kn)) {
> -		ret = NULL;
> -		goto out_unlock;
> -	}
> -
>  	/* attach dentry and inode */
> -	inode = kernfs_get_inode(dir->i_sb, kn);
> -	if (!inode) {
> -		ret = ERR_PTR(-ENOMEM);
> -		goto out_unlock;
> +	if (kn && kernfs_active(kn)) {
> +		inode = kernfs_get_inode(dir->i_sb, kn);
> +		if (!inode)
> +			inode = ERR_PTR(-ENOMEM);
>  	}
> -
> -	/* instantiate and hash dentry */
> +	/* instantiate and hash (possibly negative) dentry */
>  	ret = d_splice_alias(inode, dentry);
> - out_unlock:
>  	mutex_unlock(&kernfs_mutex);
> +
>  	return ret;
>  }
>  

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ