Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp598768pxb; Tue, 15 Feb 2022 23:19:54 -0800 (PST) X-Google-Smtp-Source: ABdhPJytVrydC3RZCk9sojjnsgZ6rGT7MQNVqmrZRuHYicqsrfSZkq1nFCeiTw+VyepBxxFYlPz9 X-Received: by 2002:a17:902:dac1:b0:14d:c0f7:3227 with SMTP id q1-20020a170902dac100b0014dc0f73227mr1154810plx.70.1644995994098; Tue, 15 Feb 2022 23:19:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644995994; cv=none; d=google.com; s=arc-20160816; b=qPAPxK/zlGwE4WGU3tTsLt3JCpJbwtvKaYhqHaoE1Q9s4E18W9iWvdo4l2sMU4TaBD TPba3KCm3NcBp2l0hZNUZ1n64b4UREz2gA9v4tr0Wxq2CxHQSX4eRcrFaV+knKTU45Ba RUtrt1thaM1ODs8+DUftaeherzACdO+lcUxdDsyd9uy/BWLcx3XgmjEDtvR7XZD5StwG uKIesQob/sD+HR6na0aiBTxZE1WioAbTFxQsgANDb1J7NJNJfRsHcOXTLqCZN9rUrjHg FVlkz3zDZmpij2678JIiW4bhT6aqTUe+rIosW7Q3HTdkhO+YkFmXFMb67wCHLMDGyHaK J/Gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=oqUmyU0T5PqaIp4X/+wPoWhyBLFvYVaXTUfVzTKfgx0=; b=Owm/hCrUUby1hY77mumtBV0QG6zFDtMaezYolTS19z1CY0JKqueAEpiRipCXeYi7e5 wB7AzXCfSc2zWXSNhq/4UXETnurXqGEXBCvGA3L761VaA9mrJunpVm/7LuxO0bvgBWZQ hgCQ8Yg2n8V7TW3rfPh9Khie+TvkbisWO00C2pJCN4HDbbcUuLcp1OPwN4r13cHCF8po oCHy80PZq1/42lIa3G0KukaYfgme1FOS/mLHq76xxWo/l7JjKuELhb6OlQfNG/qmpLBw Zya1rUmxvjHqLLDY6uHwWkEGHPLLU+MwBv/Pb3+HePkGw74L1a6+XGGNtaKdc9ylPJOe 9mUw== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id w13si16165853plq.358.2022.02.15.23.19.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 15 Feb 2022 23:19:54 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6F5BC278295; Tue, 15 Feb 2022 22:51:09 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344286AbiBPD1y (ORCPT + 99 others); Tue, 15 Feb 2022 22:27:54 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:40202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344279AbiBPD1w (ORCPT ); Tue, 15 Feb 2022 22:27:52 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19993F47F0; Tue, 15 Feb 2022 19:27:41 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1nKAyh-002ARZ-CP; Wed, 16 Feb 2022 03:27:39 +0000 Date: Wed, 16 Feb 2022 03:27:39 +0000 From: Al Viro To: Stephen Brennan Cc: linux-kernel@vger.kernel.org, Luis Chamberlain , Andrew Morton , Jan Kara , linux-fsdevel@vger.kernel.org, Arnd Bergmann , Amir Goldstein Subject: Re: [PATCH v2 1/4] dcache: sweep cached negative dentries to the end of list of siblings Message-ID: References: <20220209231406.187668-1-stephen.s.brennan@oracle.com> <20220209231406.187668-2-stephen.s.brennan@oracle.com> <875ypf8s5m.fsf@stepbren-lnx.us.oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <875ypf8s5m.fsf@stepbren-lnx.us.oracle.com> Sender: Al Viro X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 15, 2022 at 06:24:53PM -0800, Stephen Brennan wrote: > It seems to me that, if we had taken a reference on child by > incrementing the reference count prior to unlocking it, then > dentry_unlist could never have been called, since we would never have > made it into __dentry_kill. child would still be on the list, and any > cursor (or sweep_negative) list updates would now be reflected in > child->d_child.next. But dput is definitely not safe while holding a > lock on a parent dentry (even more so now thanks to my patch), so that > is out of the question. > > Would dput_to_list be an appropriate solution to that issue? We can > maintain a dispose list in d_walk and then for any dput which really > drops the refcount to 0, we can handle them after d_walk is done. It > shouldn't be that many dentries anyway. Interesting idea, but... what happens to behaviour of e.g. shrink_dcache_parent()? You'd obviously need to modify the test in select_collect(), but then the selected dentries become likely candidates for d_walk() itself wanting to move them over to its internal shrink list. OTOH, __dput_to_list() will just decrement the count and skip the sucker if it's already on a shrink list... It might work, but it really needs a careful analysis wrt. parallel d_walk(). What happens when you have two threads hitting shrink_dcache_parent() on two different places, one being an ancestor of another? That can happen in parallel, and currently it does work correctly, but that's fairly delicate and there are places where a minor change could turn O(n) into O(n^2), etc. Let me think about that - I'm not saying it's hopeless, and it would be nice to avoid that subtlety in dentry_unlist(), but there might be dragons.