Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1006676pxj; Fri, 11 Jun 2021 18:26:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxlKphnGB8yZQcInBW+gPc/lH05Cuyan+J/8tq8axd1VjlZ++fMMzX50Qs0vVL920zPpS70 X-Received: by 2002:a17:906:e88:: with SMTP id p8mr6035460ejf.105.1623461206412; Fri, 11 Jun 2021 18:26:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623461206; cv=none; d=google.com; s=arc-20160816; b=C7fMCJK4UK5UhhaQw5WGUqZWV0yb3BOJ7uhgLoKbECidGO/1Ts4MQRAIbU2tTGEQ+f gbZMV8UB82krVXrLQoj7CUA+h2YMSQaH/cUb8O9aGrSfC0Xn9K2bRTNP8iyZSqgBx8Z0 6X1gSxiwHSvMxOicv6ZtGbGW6934jQiR8gMFq0MZlRe0GlEht0Xw3mOx51AGiH0j62h1 vm9Jx/d2/ZKObU/aPAqZmYMMCRk7FNcqeD7lO8DXeSCU01oIKEmN4W8tjUg+Sq3cCjXn cGTi68PC9cdW3hCiZYbq+bkIPzMw84sNj6cMD26s3ScVNKXeECzJIZJn8pmSeZBdS0K0 zUCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=4rnnZcRNyy6teEnCcobD+J0fdYXQ5tJ5qne52+/zbaY=; b=tBsmPCTjyZwX/XGqntglOKF2U/nYwU5oxceKtQLP0rgFWIsXtLLhOYmsDKRNcFm0I4 NvEYXc5BjZME1+H/WX8E58sJ9fXgG1+atNSuAvJcbg5RDiyk967cI5bJdjXdlI+5Vh1d 98uU66id1MVJW+xlphnLz2qWM+T3tg5eOIvWhwUsT3KleawSbBMtBwJWnRT/iAQ2aWwY Hv9gJH00DbDLFwrfoKO9HlV7FA2jWWW/0fDm4WNQdk9uNJJDsK4ZEmAOABEIX7fFiMWI BFmeupmKd+U9gfYjoKx+LELmWH1ftXF6oDx70nmc+8vYNudNFZ4XTjP+K4CnrCbQdy03 hv5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si5995594edp.191.2021.06.11.18.26.23; Fri, 11 Jun 2021 18:26:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230155AbhFLB0V (ORCPT + 99 others); Fri, 11 Jun 2021 21:26:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57366 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229622AbhFLB0U (ORCPT ); Fri, 11 Jun 2021 21:26:20 -0400 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 05548C061574; Fri, 11 Jun 2021 18:24:22 -0700 (PDT) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1lrsNb-0079kf-2D; Sat, 12 Jun 2021 01:24:07 +0000 Date: Sat, 12 Jun 2021 01:24:07 +0000 From: Al Viro To: Ian Kent Cc: Greg Kroah-Hartman , Tejun Heo , Eric Sandeen , Fox Chen , Brice Goglin , Rick Lindsley , David Howells , Miklos Szeredi , Marcelo Tosatti , "Eric W. Biederman" , Carlos Maiolino , linux-fsdevel , Kernel Mailing List Subject: Re: [PATCH v6 4/7] kernfs: switch kernfs to use an rwsem Message-ID: References: <162322846765.361452.17051755721944717990.stgit@web.messagingengine.com> <162322865230.361452.5882168567975703664.stgit@web.messagingengine.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <162322865230.361452.5882168567975703664.stgit@web.messagingengine.com> Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 09, 2021 at 04:50:52PM +0800, Ian Kent wrote: > The kernfs global lock restricts the ability to perform kernfs node > lookup operations in parallel during path walks. > > Change the kernfs mutex to an rwsem so that, when opportunity arises, > node searches can be done in parallel with path walk lookups. > diff --git a/fs/kernfs/symlink.c b/fs/kernfs/symlink.c > index 5432883d819f2..c8f8e41b84110 100644 > --- a/fs/kernfs/symlink.c > +++ b/fs/kernfs/symlink.c > @@ -116,9 +116,9 @@ static int kernfs_getlink(struct inode *inode, char *path) > struct kernfs_node *target = kn->symlink.target_kn; > int error; > > - mutex_lock(&kernfs_mutex); > + down_read(&kernfs_rwsem); > error = kernfs_get_target_path(parent, target, path); > - mutex_unlock(&kernfs_mutex); > + up_read(&kernfs_rwsem); Unrelated to this patchset, two notes from reading through that area: 1) parent is fetched outside of rwsem. Unstable, IOW. 2) kernfs_get_target_path() is an atrocity. On *any* symlink you get an arseload of ../ (up to kernfs root), followed by into whatever directory we want. Even if the target is in the same directory. Think what happens if you mount --bind a subtree that contains both the symlink and its destination. And try to follow that symlink. It really ought to generate the minimal relative pathname. And it's not hard to do: calculate the depth of source calculate the depth of destination walk up from the deeper one until we get to the depth of the shallower one. walk up from both in tandem until two paths converge. Now we have the LCA of those nodes and can use the to generate the relative pathname.