[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AM6PR08MB437667C6304BB9A99932EAF4F71F9@AM6PR08MB4376.eurprd08.prod.outlook.com>
Date: Fri, 2 Jul 2021 06:36:51 +0000
From: Justin He <Justin.He@....com>
To: Petr Mladek <pmladek@...e.com>
CC: Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
"Peter Zijlstra (Intel)" <peterz@...radead.org>,
Eric Biggers <ebiggers@...gle.com>,
"Ahmed S. Darwish" <a.darwish@...utronix.de>,
"linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org>,
Matthew Wilcox <willy@...radead.org>,
Christoph Hellwig <hch@...radead.org>, nd <nd@....com>,
Steven Rostedt <rostedt@...dmis.org>,
Sergey Senozhatsky <senozhatsky@...omium.org>,
Rasmus Villemoes <linux@...musvillemoes.dk>,
Jonathan Corbet <corbet@....net>,
Alexander Viro <viro@...iv.linux.org.uk>,
Linus Torvalds <torvalds@...ux-foundation.org>
Subject: RE: [PATCH v2 1/4] fs: introduce helper d_path_unsafe()
Hi Petr
> -----Original Message-----
> From: Petr Mladek <pmladek@...e.com>
> Sent: Monday, June 28, 2021 5:07 PM
> To: Justin He <Justin.He@....com>
> Cc: Andy Shevchenko <andriy.shevchenko@...ux.intel.com>; Peter Zijlstra
> (Intel) <peterz@...radead.org>; Eric Biggers <ebiggers@...gle.com>; Ahmed S.
> Darwish <a.darwish@...utronix.de>; linux-doc@...r.kernel.org; linux-
> kernel@...r.kernel.org; linux-fsdevel@...r.kernel.org; Matthew Wilcox
> <willy@...radead.org>; Christoph Hellwig <hch@...radead.org>; nd
> <nd@....com>; Steven Rostedt <rostedt@...dmis.org>; Sergey Senozhatsky
> <senozhatsky@...omium.org>; Rasmus Villemoes <linux@...musvillemoes.dk>;
> Jonathan Corbet <corbet@....net>; Alexander Viro <viro@...iv.linux.org.uk>;
> Linus Torvalds <torvalds@...ux-foundation.org>
> Subject: Re: [PATCH v2 1/4] fs: introduce helper d_path_unsafe()
>
> On Mon 2021-06-28 05:13:51, Justin He wrote:
> > Hi Andy, Petr
> >
> > > -----Original Message-----
> > > From: Jia He <justin.he@....com>
> > > Sent: Wednesday, June 23, 2021 1:50 PM
> > > To: Petr Mladek <pmladek@...e.com>; Steven Rostedt
> <rostedt@...dmis.org>;
> > > Sergey Senozhatsky <senozhatsky@...omium.org>; Andy Shevchenko
> > > <andriy.shevchenko@...ux.intel.com>; Rasmus Villemoes
> > > <linux@...musvillemoes.dk>; Jonathan Corbet <corbet@....net>; Alexander
> > > Viro <viro@...iv.linux.org.uk>; Linus Torvalds <torvalds@...ux-
> > > foundation.org>
> > > Cc: Peter Zijlstra (Intel) <peterz@...radead.org>; Eric Biggers
> > > <ebiggers@...gle.com>; Ahmed S. Darwish <a.darwish@...utronix.de>;
> linux-
> > > doc@...r.kernel.org; linux-kernel@...r.kernel.org; linux-
> > > fsdevel@...r.kernel.org; Matthew Wilcox <willy@...radead.org>;
> Christoph
> > > Hellwig <hch@...radead.org>; nd <nd@....com>; Justin He
> <Justin.He@....com>
> > > Subject: [PATCH v2 1/4] fs: introduce helper d_path_unsafe()
> > >
> > > This helper is similar to d_path() except that it doesn't take any
> > > seqlock/spinlock. It is typical for debugging purposes. Besides,
> > > an additional return value *prenpend_len* is used to get the full
> > > path length of the dentry, ingoring the tail '\0'.
> > > the full path length = end - buf - prepend_length - 1.
> > >
> > > Previously it will skip the prepend_name() loop at once in
> > > __prepen_path() when the buffer length is not enough or even negative.
> > > prepend_name_with_len() will get the full length of dentry name
> > > together with the parent recursively regardless of the buffer length.
> > >
> > > Suggested-by: Matthew Wilcox <willy@...radead.org>
> > > Signed-off-by: Jia He <justin.he@....com>
> > > ---
> > > fs/d_path.c | 122 ++++++++++++++++++++++++++++++++++++++---
> > > include/linux/dcache.h | 1 +
> > > 2 files changed, 116 insertions(+), 7 deletions(-)
> > >
> > > diff --git a/fs/d_path.c b/fs/d_path.c
> > > index 23a53f7b5c71..7a3ea88f8c5c 100644
> > > --- a/fs/d_path.c
> > > +++ b/fs/d_path.c
> > > @@ -33,9 +33,8 @@ static void prepend(struct prepend_buffer *p, const
> char
> > > *str, int namelen)
> > >
> > > /**
> > > * prepend_name - prepend a pathname in front of current buffer
> pointer
> > > - * @buffer: buffer pointer
> > > - * @buflen: allocated length of the buffer
> > > - * @name: name string and length qstr structure
> > > + * @p: prepend buffer which contains buffer pointer and allocated
> length
> > > + * @name: name string and length qstr structure
> > > *
> > > * With RCU path tracing, it may race with d_move(). Use READ_ONCE()
> to
> > > * make sure that either the old or the new name pointer and length
> are
> > > @@ -68,9 +67,84 @@ static bool prepend_name(struct prepend_buffer *p,
> > > const struct qstr *name)
> > > return true;
> > > }
> > >
> > > +/**
> > > + * prepend_name_with_len - prepend a pathname in front of current
> buffer
> > > + * pointer with limited orig_buflen.
> > > + * @p: prepend buffer which contains buffer pointer and allocated
> length
> > > + * @name: name string and length qstr structure
> > > + * @orig_buflen: original length of the buffer
> > > + *
> > > + * p.ptr is updated each time when prepends dentry name and its parent.
> > > + * Given the orginal buffer length might be less than name string, the
> > > + * dentry name can be moved or truncated. Returns at once if !buf or
> > > + * original length is not positive to avoid memory copy.
> > > + *
> > > + * Load acquire is needed to make sure that we see that terminating
> NUL,
> > > + * which is similar to prepend_name().
> > > + */
> > > +static bool prepend_name_with_len(struct prepend_buffer *p,
> > > + const struct qstr *name, int orig_buflen)
> > > +{
> > > + const char *dname = smp_load_acquire(&name->name); /* ^^^ */
> > > + int dlen = READ_ONCE(name->len);
> > > + char *s;
> > > + int last_len = p->len;
> > > +
> > > + p->len -= dlen + 1;
> > > +
> > > + if (unlikely(!p->buf))
> > > + return false;
> > > +
> > > + if (orig_buflen <= 0)
> > > + return false;
> > > +
> > > + /*
> > > + * The first time we overflow the buffer. Then fill the string
> > > + * partially from the beginning
> > > + */
> > > + if (unlikely(p->len < 0)) {
> > > + int buflen = strlen(p->buf);
> > > +
> > > + /* memcpy src */
> > > + s = p->buf;
> > > +
> > > + /* Still have small space to fill partially */
> > > + if (last_len > 0) {
> > > + p->buf -= last_len;
> > > + buflen += last_len;
> > > + }
> > > +
> > > + if (buflen > dlen + 1) {
> > > + /* Dentry name can be fully filled */
> > > + memmove(p->buf + dlen + 1, s, buflen - dlen - 1);
> > > + p->buf[0] = '/';
> > > + memcpy(p->buf + 1, dname, dlen);
> > > + } else if (buflen > 0) {
> > > + /* Can be partially filled, and drop last dentry */
> > > + p->buf[0] = '/';
> > > + memcpy(p->buf + 1, dname, buflen - 1);
> > > + }
> > > +
> > > + return false;
> > > + }
> > > +
> > > + s = p->buf -= dlen + 1;
> > > + *s++ = '/';
> > > + while (dlen--) {
> > > + char c = *dname++;
> > > +
> > > + if (!c)
> > > + break;
> > > + *s++ = c;
> > > + }
> > > + return true;
> > > +}
> > > +
> > > static int __prepend_path(const struct dentry *dentry, const struct
> mount
> > > *mnt,
> > > const struct path *root, struct prepend_buffer *p)
> > > {
> > > + int orig_buflen = p->len;
> > > +
> > > while (dentry != root->dentry || &mnt->mnt != root->mnt) {
> > > const struct dentry *parent = READ_ONCE(dentry->d_parent);
> > >
> > > @@ -97,8 +171,7 @@ static int __prepend_path(const struct dentry
> *dentry,
> > > const struct mount *mnt,
> > > return 3;
> > >
> > > prefetch(parent);
> > > - if (!prepend_name(p, &dentry->d_name))
> > > - break;
> > > + prepend_name_with_len(p, &dentry->d_name, orig_buflen);
> >
> > I have new concern here.
> > Previously, __prepend_path() would break the loop at once when p.len<0.
> > And the return value of __prepend_path() was 0.
> > The caller of prepend_path() would typically check as follows:
> > if (prepend_path(...) > 0)
> > do_sth();
> >
> > After I replaced prepend_name() with prepend_name_with_len(),
> > the return value of prepend_path() is possibly positive
> > together with p.len<0. The behavior is different from previous.
>
> I do not feel qualified to make decision here.I do not have enough
> experience with this code.
>
> Anyway, the new behavior looks correct to me. The return values
> 1, 2, 3 mean that there was something wrong with the path. The
> new code checks the entire path which looks correct to me.
Okay, got it. Thanks for the explanation.
Seems my concern is not necessary. I once compared the old and new
prepend_path return value, they are always the same in my test scenarios.
--
Cheers,
Justin (Jia He)
Powered by blists - more mailing lists