Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3135041pxj; Mon, 7 Jun 2021 03:17:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzhiEQqk2E+4Col1dyVn+TpCjZzmGFEdg+Ebma8h1TV7fhP1VvAWcKjcFV+zbTRtOCuYsth X-Received: by 2002:a17:906:4e06:: with SMTP id z6mr17730837eju.34.1623061033327; Mon, 07 Jun 2021 03:17:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623061033; cv=none; d=google.com; s=arc-20160816; b=NhW6t1AHeXlfhZ6/FlywA8Gmgj5ztBn3mLfsuK+pdRlLXh/mUAgmun4geOS52wD+Ta 8fu52Z5x73b62wgTLWy4rAbEZicILowH7ugkF/cBgJHzKqLYVvJkjI28M+fHhB34Huod pJzT78bNcRricc1A02lZbjI8uZ6CPGvG96AjQrkshhtPoviI0GZCvwkajRC7iBqzaroq oGVp4OJI+u9gFWBkOEzcet3gMneA0+uPyUU3fWQsTwjUeooY4MCd58qmaEeuwJmWu5MH 3/VbNc9ZiPrPCk+fC9OOtOZnpp7OioUloNci199YW1oy2nql6KrK+BWJyWO6duluoU2A orNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject; bh=8agoaWZ3hMk6l8YWbBEqqH5hKX6v0aZLtsO/ZqP1rnc=; b=XGgekRsW4KlQe+ZyV8XVPZFiieNnpB2hKuWfnSpJKGzy4Kov4OapQTjhjpaicUHh27 Ovkjh//7J8pv/mSYZvMurU6hlxOx2dH6nMgfFWW3PPqYuzNT0tDAOwMuwj/lOY1yA5fG zKQKRgNAsFrB/T4R5TsgyPBPcEZYRI4OtCi4bI/CkgGBaOtQ3CDwKrrXcLdpkd0/SvZl cnbXlBaaKeUXecM9G6jcSeQu9ZiXF5dH63CYZiFw6bMB6SgoyYgJKTNfqInxfup7BsLF Ez2JSv58U6JMstOiDu6bFETv6orutiTZG3yHth6MDHEqdsX48hBS0skUhyZqiZA9TKcb 7d+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id eb8si14905527edb.249.2021.06.07.03.16.50; Mon, 07 Jun 2021 03:17:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230203AbhFGKOi convert rfc822-to-8bit (ORCPT + 99 others); Mon, 7 Jun 2021 06:14:38 -0400 Received: from us-smtp-delivery-44.mimecast.com ([207.211.30.44]:39549 "EHLO us-smtp-delivery-44.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230383AbhFGKOi (ORCPT ); Mon, 7 Jun 2021 06:14:38 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-3-mrOjFtkONRmMaYZfFQN4-Q-1; Mon, 07 Jun 2021 06:12:43 -0400 X-MC-Unique: mrOjFtkONRmMaYZfFQN4-Q-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id A10AD106BAE3; Mon, 7 Jun 2021 10:12:41 +0000 (UTC) Received: from web.messagingengine.com (ovpn-116-49.sin2.redhat.com [10.67.116.49]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9D7CF6060F; Mon, 7 Jun 2021 10:12:31 +0000 (UTC) Subject: [PATCH v5 5/6] kernfs: use i_lock to protect concurrent inode updates From: Ian Kent To: Greg Kroah-Hartman , Tejun Heo Cc: Eric Sandeen , Fox Chen , Brice Goglin , Al Viro , Rick Lindsley , David Howells , Miklos Szeredi , Marcelo Tosatti , "Eric W. Biederman" , Carlos Maiolino , linux-fsdevel , Kernel Mailing List Date: Mon, 07 Jun 2021 18:12:30 +0800 Message-ID: <162306075002.69474.15394284254002538094.stgit@web.messagingengine.com> In-Reply-To: <162306058093.69474.2367505736322611930.stgit@web.messagingengine.com> References: <162306058093.69474.2367505736322611930.stgit@web.messagingengine.com> User-Agent: StGit/0.23 MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=raven@themaw.net X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: themaw.net Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The inode operations .permission() and .getattr() use the kernfs node write lock but all that's needed is to keep the rb tree stable while updating the inode attributes as well as protecting the update itself against concurrent changes. And .permission() is called frequently during path walks and can cause quite a bit of contention between kernfs node operations and path walks when the number of concurrent walks is high. To change kernfs_iop_getattr() and kernfs_iop_permission() to take the rw sem read lock instead of the write lock an additional lock is needed to protect against multiple processes concurrently updating the inode attributes and link count in kernfs_refresh_inode(). The inode i_lock seems like the sensible thing to use to protect these inode attribute updates so use it in kernfs_refresh_inode(). The last hunk in the patch, applied to kernfs_fill_super(), is possibly not needed but taking the lock was present originally and I prefer to continue to take it so the rb tree is held stable during the call to kernfs_refresh_inode() made by kernfs_get_inode(). Signed-off-by: Ian Kent --- fs/kernfs/inode.c | 10 ++++++---- fs/kernfs/mount.c | 4 ++-- 2 files changed, 8 insertions(+), 6 deletions(-) diff --git a/fs/kernfs/inode.c b/fs/kernfs/inode.c index 3b01e9e61f14e..6728ecd81eb37 100644 --- a/fs/kernfs/inode.c +++ b/fs/kernfs/inode.c @@ -172,6 +172,7 @@ static void kernfs_refresh_inode(struct kernfs_node *kn, struct inode *inode) { struct kernfs_iattrs *attrs = kn->iattr; + spin_lock(&inode->i_lock); inode->i_mode = kn->mode; if (attrs) /* @@ -182,6 +183,7 @@ static void kernfs_refresh_inode(struct kernfs_node *kn, struct inode *inode) if (kernfs_type(kn) == KERNFS_DIR) set_nlink(inode, kn->dir.subdirs + 2); + spin_unlock(&inode->i_lock); } int kernfs_iop_getattr(struct user_namespace *mnt_userns, @@ -191,9 +193,9 @@ int kernfs_iop_getattr(struct user_namespace *mnt_userns, struct inode *inode = d_inode(path->dentry); struct kernfs_node *kn = inode->i_private; - down_write(&kernfs_rwsem); + down_read(&kernfs_rwsem); kernfs_refresh_inode(kn, inode); - up_write(&kernfs_rwsem); + up_read(&kernfs_rwsem); generic_fillattr(&init_user_ns, inode, stat); return 0; @@ -284,9 +286,9 @@ int kernfs_iop_permission(struct user_namespace *mnt_userns, kn = inode->i_private; - down_write(&kernfs_rwsem); + down_read(&kernfs_rwsem); kernfs_refresh_inode(kn, inode); - up_write(&kernfs_rwsem); + up_read(&kernfs_rwsem); return generic_permission(&init_user_ns, inode, mask); } diff --git a/fs/kernfs/mount.c b/fs/kernfs/mount.c index baa4155ba2edf..f2f909d09f522 100644 --- a/fs/kernfs/mount.c +++ b/fs/kernfs/mount.c @@ -255,9 +255,9 @@ static int kernfs_fill_super(struct super_block *sb, struct kernfs_fs_context *k sb->s_shrink.seeks = 0; /* get root inode, initialize and unlock it */ - down_write(&kernfs_rwsem); + down_read(&kernfs_rwsem); inode = kernfs_get_inode(sb, info->root->kn); - up_write(&kernfs_rwsem); + up_read(&kernfs_rwsem); if (!inode) { pr_debug("kernfs: could not get root inode\n"); return -ENOMEM;