Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4996150pxj; Wed, 9 Jun 2021 06:59:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwB+FLfWsBDFO7DQdpXSp7XD0xHLiQkZDL88eIp7/LOaxG8VA4/YvX4MZ2XmBaKAx0BCLJI X-Received: by 2002:a17:906:2dcb:: with SMTP id h11mr32469eji.52.1623247198643; Wed, 09 Jun 2021 06:59:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623247198; cv=none; d=google.com; s=arc-20160816; b=q7gWGRm9rDwedldnW6ipvIGTQjcuEN5vL96UMoA8Ka5Psf0m1CPuGOVPfcepnBmtu0 qv04y7VhJj8HFo23tCY69rGcbOYiDTvmAdwAZHQizKdkKUovGxxCpxyyuvUYzP1v+htU bcL209YFd5Gm2Hqf4KNiKud9Y/1Jyxwr+1e4w9Z1cvO5/nqqyaW6R5JZvh9qzaL+EwMk EBOR3KXeDBatBlasrn5BBupTA9acMsYquQbHqmzTTiOhnFtqjvBq+IQnv4WCUYmjH37d jz9inb08vP5JYkaPm0ZDQjNqzotsTvWWKcJgmSn/ejtp23VFhkxbHR3hHP0SEqm+I5qP /7Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject; bh=DhIyGO3COcrTgn8cAiZno4YIJPS2VRwDSGxemU6i7N0=; b=SBrqmG9G3v5o8WSho7XKLmHmsPTfu9u4oi3zoMCAEFX+BTNlKLnDmUFHHPHXYTfeqm X7hipoKrLHog2gazKJ7+NwB9kkFcH31sKBE0piTJmzYkh5G7xtBNsj2H2d8if92olbgR uW7bUIuxalKL9e9wIKI5l2U76c/14HA/pjTDcUAzdtYUYuH6/15fWSlJ0HYVIiGZVsoF DY5tbdITcY2EvOYchyK8JOH4iqQJw9TXnSs5BRUVswU57K9W6jpZZMwsdMeeIZa8sLKi rKxWaGZ7NGVI8vx6Lu2TUNC7zxk5ewIdwgvz6tl+tW8pQpQKKrQ16b+P2+BkXGHXKdbo rlnA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b16si2228557ede.389.2021.06.09.06.59.34; Wed, 09 Jun 2021 06:59:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237766AbhFIIwr convert rfc822-to-8bit (ORCPT + 99 others); Wed, 9 Jun 2021 04:52:47 -0400 Received: from us-smtp-delivery-44.mimecast.com ([205.139.111.44]:28167 "EHLO us-smtp-delivery-44.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232870AbhFIIwq (ORCPT ); Wed, 9 Jun 2021 04:52:46 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-562-90EOlIFCNmSFizuN1V2kiw-1; Wed, 09 Jun 2021 04:50:48 -0400 X-MC-Unique: 90EOlIFCNmSFizuN1V2kiw-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id D4DB810C1ADC; Wed, 9 Jun 2021 08:50:46 +0000 (UTC) Received: from web.messagingengine.com (ovpn-116-20.sin2.redhat.com [10.67.116.20]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2B56E17C5F; Wed, 9 Jun 2021 08:50:31 +0000 (UTC) Subject: [PATCH v6 3/7] kernfs: use VFS negative dentry caching From: Ian Kent To: Greg Kroah-Hartman , Tejun Heo Cc: Eric Sandeen , Fox Chen , Brice Goglin , Al Viro , Rick Lindsley , David Howells , Miklos Szeredi , Marcelo Tosatti , "Eric W. Biederman" , Carlos Maiolino , linux-fsdevel , Kernel Mailing List Date: Wed, 09 Jun 2021 16:50:27 +0800 Message-ID: <162322862726.361452.10114120072438540655.stgit@web.messagingengine.com> In-Reply-To: <162322846765.361452.17051755721944717990.stgit@web.messagingengine.com> References: <162322846765.361452.17051755721944717990.stgit@web.messagingengine.com> User-Agent: StGit/0.23 MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=raven@themaw.net X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: themaw.net Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If there are many lookups for non-existent paths these negative lookups can lead to a lot of overhead during path walks. The VFS allows dentries to be created as negative and hashed, and caches them so they can be used to reduce the fairly high overhead alloc/free cycle that occurs during these lookups. Use the kernfs node parent revision to identify if a change has been made to the containing directory so that the negative dentry can be discarded and the lookup redone. Signed-off-by: Ian Kent --- fs/kernfs/dir.c | 52 ++++++++++++++++++++++++++++++++-------------------- 1 file changed, 32 insertions(+), 20 deletions(-) diff --git a/fs/kernfs/dir.c b/fs/kernfs/dir.c index b3d1bc0f317d0..4f037456a8e17 100644 --- a/fs/kernfs/dir.c +++ b/fs/kernfs/dir.c @@ -1039,9 +1039,28 @@ static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags) if (flags & LOOKUP_RCU) return -ECHILD; - /* Always perform fresh lookup for negatives */ - if (d_really_is_negative(dentry)) - goto out_bad_unlocked; + /* Negative hashed dentry? */ + if (d_really_is_negative(dentry)) { + struct dentry *d_parent = dget_parent(dentry); + struct kernfs_node *parent; + + /* If the kernfs parent node has changed discard and + * proceed to ->lookup. + */ + parent = kernfs_dentry_node(d_parent); + if (parent) { + if (kernfs_dir_changed(parent, dentry)) { + dput(d_parent); + return 0; + } + } + dput(d_parent); + + /* The kernfs node doesn't exist, leave the dentry + * negative and return success. + */ + return 1; + } kn = kernfs_dentry_node(dentry); mutex_lock(&kernfs_mutex); @@ -1067,7 +1086,6 @@ static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags) return 1; out_bad: mutex_unlock(&kernfs_mutex); -out_bad_unlocked: return 0; } @@ -1082,33 +1100,27 @@ static struct dentry *kernfs_iop_lookup(struct inode *dir, struct dentry *ret; struct kernfs_node *parent = dir->i_private; struct kernfs_node *kn; - struct inode *inode; + struct inode *inode = NULL; const void *ns = NULL; mutex_lock(&kernfs_mutex); - if (kernfs_ns_enabled(parent)) ns = kernfs_info(dir->i_sb)->ns; kn = kernfs_find_ns(parent, dentry->d_name.name, ns); - - /* no such entry */ - if (!kn || !kernfs_active(kn)) { - ret = NULL; - goto out_unlock; - } - /* attach dentry and inode */ - inode = kernfs_get_inode(dir->i_sb, kn); - if (!inode) { - ret = ERR_PTR(-ENOMEM); - goto out_unlock; + if (kn && kernfs_active(kn)) { + inode = kernfs_get_inode(dir->i_sb, kn); + if (!inode) + inode = ERR_PTR(-ENOMEM); } - - /* instantiate and hash dentry */ + /* Needed only for negative dentry validation */ + if (!inode) + kernfs_set_rev(parent, dentry); + /* instantiate and hash (possibly negative) dentry */ ret = d_splice_alias(inode, dentry); - out_unlock: mutex_unlock(&kernfs_mutex); + return ret; }