Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp208586pxj; Fri, 28 May 2021 01:58:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDdYEj3W1wU6r85vKYoQz7UTLoka3IjR/FdN5BRMx6+2jTHaXlBmut1wswhj0qP1RV5tFb X-Received: by 2002:a05:6402:4256:: with SMTP id g22mr8601771edb.214.1622192311405; Fri, 28 May 2021 01:58:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622192311; cv=none; d=google.com; s=arc-20160816; b=AYnit/JVr9IB11WquJ0rBQEoR0uR6JCMYlwX7JOKDskFB8s+YzrtBSu6KNPKTv8MWi X6xltcq9MuDpIezNkRmzVp5LRtO7uz/c06LGF93bgdha0+pRMf+qowdAtpYHJ6luY1G5 JROZ712Ba2VF+LJsh/AKe1NTDTH47eKIp7d3IBzvgz22SmHwVm/YZ+h0rW7JyasgEx1e nb0Wi9TbqGAA0loJpc/g3qTsiT5zctumxp6ctv4oHUwgQ0NnY9sjXjym8IMyIlNCJY2r pQUCjufw02DofSH39AzPyS6oJxmLywWkBZJzNN9AFT9PTAIZrTokMkbEXekZi3X+ejXY B73g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject; bh=v6LkI+U5X5oxbb/JAL62wQBTyRn14YcYKjMvCIf1SIg=; b=DlASrdq+H2e0Bc2HvMi8HDWJC0OyP230s6M/Ha9avSNRAh+HaBFwBuDZyel6ETU5Z4 5vwD6LG66Hf8gzswHEALBKaklRdTW5u2DPYoxXM9dsRfGFnBQqaZD4sVPKFaSiVvYwVe q0cUUyNPUSxIWCvHUAH2ouJiQpQuisGsqAuB0vT/aOSi3rA697RctUjBfIGDuzTtvhw7 6UZlXTwNrSa05vMG7bIQIB6RiwE/k4CyzcX2AX73SdEIyab/wCPPQUX7ZuqpAtgIRWvi wUUpFV7IM9u8JKkFSky1QOaxKZLXU8yAq7LpwWscwAasoSuFLigin/HtLna9u6b4uVrq KzuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a20si5690945edj.72.2021.05.28.01.58.08; Fri, 28 May 2021 01:58:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234187AbhE1GgJ convert rfc822-to-8bit (ORCPT + 99 others); Fri, 28 May 2021 02:36:09 -0400 Received: from us-smtp-delivery-44.mimecast.com ([205.139.111.44]:47454 "EHLO us-smtp-delivery-44.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229940AbhE1Gfu (ORCPT ); Fri, 28 May 2021 02:35:50 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-434-VwkpEfrcPiijzoUPh1SiZg-1; Fri, 28 May 2021 02:34:11 -0400 X-MC-Unique: VwkpEfrcPiijzoUPh1SiZg-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 6E2A0801817; Fri, 28 May 2021 06:34:10 +0000 (UTC) Received: from web.messagingengine.com (ovpn-116-22.sin2.redhat.com [10.67.116.22]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2916BE2CB; Fri, 28 May 2021 06:34:06 +0000 (UTC) Subject: [REPOST PATCH v4 2/5] kernfs: use VFS negative dentry caching From: Ian Kent To: Greg Kroah-Hartman , Tejun Heo Cc: Eric Sandeen , Fox Chen , Brice Goglin , Al Viro , Rick Lindsley , David Howells , Miklos Szeredi , Marcelo Tosatti , linux-fsdevel , Kernel Mailing List Date: Fri, 28 May 2021 14:34:05 +0800 Message-ID: <162218364554.34379.636306635794792903.stgit@web.messagingengine.com> In-Reply-To: <162218354775.34379.5629941272050849549.stgit@web.messagingengine.com> References: <162218354775.34379.5629941272050849549.stgit@web.messagingengine.com> User-Agent: StGit/0.23 MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=raven@themaw.net X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: themaw.net Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If there are many lookups for non-existent paths these negative lookups can lead to a lot of overhead during path walks. The VFS allows dentries to be created as negative and hashed, and caches them so they can be used to reduce the fairly high overhead alloc/free cycle that occurs during these lookups. Signed-off-by: Ian Kent --- fs/kernfs/dir.c | 55 +++++++++++++++++++++++++++++++++---------------------- 1 file changed, 33 insertions(+), 22 deletions(-) diff --git a/fs/kernfs/dir.c b/fs/kernfs/dir.c index 4c69e2af82dac..5151c712f06f5 100644 --- a/fs/kernfs/dir.c +++ b/fs/kernfs/dir.c @@ -1037,12 +1037,33 @@ static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags) if (flags & LOOKUP_RCU) return -ECHILD; - /* Always perform fresh lookup for negatives */ - if (d_really_is_negative(dentry)) - goto out_bad_unlocked; + mutex_lock(&kernfs_mutex); kn = kernfs_dentry_node(dentry); - mutex_lock(&kernfs_mutex); + + /* Negative hashed dentry? */ + if (!kn) { + struct kernfs_node *parent; + + /* If the kernfs node can be found this is a stale negative + * hashed dentry so it must be discarded and the lookup redone. + */ + parent = kernfs_dentry_node(dentry->d_parent); + if (parent) { + const void *ns = NULL; + + if (kernfs_ns_enabled(parent)) + ns = kernfs_info(dentry->d_sb)->ns; + kn = kernfs_find_ns(parent, dentry->d_name.name, ns); + if (kn) + goto out_bad; + } + + /* The kernfs node doesn't exist, leave the dentry negative + * and return success. + */ + goto out; + } /* The kernfs node has been deactivated */ if (!kernfs_active_read(kn)) @@ -1060,12 +1081,11 @@ static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags) if (kn->parent && kernfs_ns_enabled(kn->parent) && kernfs_info(dentry->d_sb)->ns != kn->ns) goto out_bad; - +out: mutex_unlock(&kernfs_mutex); return 1; out_bad: mutex_unlock(&kernfs_mutex); -out_bad_unlocked: return 0; } @@ -1080,33 +1100,24 @@ static struct dentry *kernfs_iop_lookup(struct inode *dir, struct dentry *ret; struct kernfs_node *parent = dir->i_private; struct kernfs_node *kn; - struct inode *inode; + struct inode *inode = NULL; const void *ns = NULL; mutex_lock(&kernfs_mutex); - if (kernfs_ns_enabled(parent)) ns = kernfs_info(dir->i_sb)->ns; kn = kernfs_find_ns(parent, dentry->d_name.name, ns); - - /* no such entry */ - if (!kn || !kernfs_active(kn)) { - ret = NULL; - goto out_unlock; - } - /* attach dentry and inode */ - inode = kernfs_get_inode(dir->i_sb, kn); - if (!inode) { - ret = ERR_PTR(-ENOMEM); - goto out_unlock; + if (kn && kernfs_active(kn)) { + inode = kernfs_get_inode(dir->i_sb, kn); + if (!inode) + inode = ERR_PTR(-ENOMEM); } - - /* instantiate and hash dentry */ + /* instantiate and hash (possibly negative) dentry */ ret = d_splice_alias(inode, dentry); - out_unlock: mutex_unlock(&kernfs_mutex); + return ret; }