Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp178811iob; Mon, 2 May 2022 16:24:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/GShbVnvI3jc7+xjoZN0DMCWTDc/PsfwN1pAfB+2kmSWJ+V8fLEOiclJmTfVIZKCFebIU X-Received: by 2002:a05:6a00:a0e:b0:4fd:fa6e:95fc with SMTP id p14-20020a056a000a0e00b004fdfa6e95fcmr13259487pfh.17.1651533839960; Mon, 02 May 2022 16:23:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651533839; cv=none; d=google.com; s=arc-20160816; b=Q3OWCbn/PJluvVavapxOtLxagrYEidpUkiR0Hjg4YUrWOeTvxZsJfHLJlWp1XE71Bu JYjjtP9qK/AiyqDym6JhR9Mi2W4zEkBT4FVIRIxDPGSpbY6qNxIMm2JEP8M0nnzJGFTp RaQW+JjAYuBTOAlG0u5deG4D+dRkLwDpmURNbn53ckZpwcbHp0PAPSYFMEhWzovPw4Cg ZCprANCIJxnDpCc1TqqplYfI5xSl/M9JcxYDBgOSxbbcvhcyaJ091LWWQJFSeZqKCEvN fV37bb4PuYs8O3rfIq82AJT33GcPV/GJoWhhQaLEZSIPfSHHNifOrYubf92ZwJ9lyyFB B8mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:organization:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=WXFXGQi+iet5+lgGzqg5SszKRG5EecB0RAmpnm9jraE=; b=THbRIB52gJVWPxkdxsEZZgnlVPh4YFgPi1iz1u+lrY6dXYWmHCe8Nk/GBsYZk16P1k O5I5e8TlrdD93E1UZOzC4T05pgi4lKQ3n4frk1yVczt4jUzuKi2khIQJD6zwNB4ME8fi +nHM2HUDKEqb6D4QsGyHbNHn1yNzSMm6lpQ902XjWGyIfJ5GiONXxdjYCZhwEN99DWiz akFD/59cvMv11mQiUz+xz9MqnN/NCqt8k5HS4Z06dgAqY19A4smu97mPiygw8qioux1L M6sdv38tfU/KvNXh0L4SzFUcUt0BkmhYZTNhXeGu8CxVqYWVKFup+33ZT/5IcUCdP/Kq 8Tzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=LgM2jeaQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id z2-20020a1709028f8200b0015893aa584csi4520856plo.272.2022.05.02.16.23.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 16:23:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=LgM2jeaQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 68C472A24F; Mon, 2 May 2022 16:23:48 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1384575AbiEBKaL (ORCPT + 99 others); Mon, 2 May 2022 06:30:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49816 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1384529AbiEBK3g (ORCPT ); Mon, 2 May 2022 06:29:36 -0400 Received: from mail-pg1-x536.google.com (mail-pg1-x536.google.com [IPv6:2607:f8b0:4864:20::536]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21CD51B7AD; Mon, 2 May 2022 03:25:48 -0700 (PDT) Received: by mail-pg1-x536.google.com with SMTP id j70so467644pge.1; Mon, 02 May 2022 03:25:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :organization; bh=WXFXGQi+iet5+lgGzqg5SszKRG5EecB0RAmpnm9jraE=; b=LgM2jeaQmqcHIf89473SvD++ixQlMsXNmu8NVUFzdYWl8614h0OaUr/cxF5wPOJ/qj +pL6KJpLnAHVVszczpfO0ZHlHXngRvrTxRmso+E4B0gZV0yaQeqOu3ADBVYo8EY3D5q5 iw1crHn6CvqLi4hDRS1Jcn6+L3RiV5nASY9WKSS5TuNn9X/ZclxHIl7HxgEfQ/KMC2WU +Se5cnMaHVH9DJe6Ts658ApiO6uU15Z3OhUt8AtWCpLTGoeEgQzBB821kVyKc8Fdn2ET wO/rbf4YAJVZvDneqfBD9UvSEXyhZAsCnxRJNhNTlk0Moc/ni8m9jjEQ78G4UZCUBn/W RKUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:organization; bh=WXFXGQi+iet5+lgGzqg5SszKRG5EecB0RAmpnm9jraE=; b=8R+M458Nz+SCAnkNA7NOXoLfYzNr5Gl/XQqzMQ/eswUVOey/r16s95aRhA4dY34yWT hCj+BXY0xpExfd1snGsxBSGg6KtEXsGKG2x7dWMMRCFaopyHCl/Zim9MWpw/CUYkdHz/ 0l/K0EnL8mqVvs3tenELbc2YbtjoAiIzvuFNa5kvJEUb87a0POn1Kog1TdNnYAHgxLxn Gt0UL5jB0X811RWSL+kg2LtIwK3Bj0pcIOfGcx+zKGrCxTEmYdiD29lGRc6Ld7XW7Y5f Mk1edIn8iaN98KnN/wUNQ8tyqRxo/v37gQVKlIA/Kd7Upqn9PNOaLHureU/wGzeUCo2n OCqA== X-Gm-Message-State: AOAM5322oywD6hERdX7d38JxI/zSfBloCQNzHACp91QfBIvMJAsN1jbO pwgfH6f/JpLZPT8YELQr8b8= X-Received: by 2002:a63:8c1:0:b0:3c1:7c1b:7084 with SMTP id 184-20020a6308c1000000b003c17c1b7084mr9033750pgi.438.1651487147386; Mon, 02 May 2022 03:25:47 -0700 (PDT) Received: from localhost.localdomain ([123.201.245.164]) by smtp.googlemail.com with ESMTPSA id j14-20020aa7800e000000b0050dc762816bsm4347953pfi.69.2022.05.02.03.25.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 03:25:47 -0700 (PDT) From: Dharmendra Singh To: miklos@szeredi.hu Cc: Dharmendra Singh , linux-fsdevel@vger.kernel.org, fuse-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, bschubert@ddn.com, Dharmendra Singh Subject: [PATCH v4 3/3] FUSE: Avoid lookup in d_revalidate() Date: Mon, 2 May 2022 15:55:21 +0530 Message-Id: <20220502102521.22875-4-dharamhans87@gmail.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220502102521.22875-1-dharamhans87@gmail.com> References: <20220502102521.22875-1-dharamhans87@gmail.com> Organization: DDN STORAGE X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dharmendra Singh With atomic open + lookup implemented, it is possible to avoid lookups in FUSE d_revalidate() for objects other than directories. If FUSE is mounted with default permissions then this optimization is not possible as we need to fetch fresh inode attributes for permission check. This lookup skipped in d_revalidate() can be performed as part of open call into libfuse which is made from fuse_file_open(). And when we return from USER SPACE with file opened and fresh attributes, we can revalidate the inode. Signed-off-by: Dharmendra Singh Reported-by: kernel test robot --- fs/fuse/dir.c | 89 ++++++++++++++++++++++++++++++++++++++++++------ fs/fuse/file.c | 30 ++++++++++++++-- fs/fuse/fuse_i.h | 10 +++++- fs/fuse/ioctl.c | 2 +- 4 files changed, 115 insertions(+), 16 deletions(-) diff --git a/fs/fuse/dir.c b/fs/fuse/dir.c index 6879d3a86796..1594fecc920f 100644 --- a/fs/fuse/dir.c +++ b/fs/fuse/dir.c @@ -196,6 +196,7 @@ static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, * the lookup once more. If the lookup results in the same inode, * then refresh the attributes, timeouts and mark the dentry valid. */ + static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) { struct inode *inode; @@ -224,6 +225,17 @@ static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) fm = get_fuse_mount(inode); + /* If atomic open is supported by FUSE then use this opportunity + * (only for non-dir) to avoid this lookup and combine + * lookup + open into single call. + */ + if (!fm->fc->default_permissions && fm->fc->do_atomic_open && + !(flags & (LOOKUP_EXCL | LOOKUP_REVAL)) && + (flags & LOOKUP_OPEN) && !S_ISDIR(inode->i_mode)) { + ret = 1; + goto out; + } + forget = fuse_alloc_forget(); ret = -ENOMEM; if (!forget) @@ -515,14 +527,52 @@ static int get_security_context(struct dentry *entry, umode_t mode, return err; } +/* + * Revalidate the inode after we got fresh attributes from user space. + */ +static int fuse_atomic_open_revalidate_inode(struct inode *reval_inode, + struct dentry *entry, + struct fuse_forget_link *forget, + struct fuse_entry_out *outentry, + u64 attr_version) +{ + struct fuse_inode *fi; + struct fuse_conn *fc = get_fuse_conn(reval_inode); + + /* Mode should be other than directory */ + BUG_ON(S_ISDIR(reval_inode->i_mode)); + + if (outentry->nodeid != get_node_id(reval_inode)) { + fuse_queue_forget(fc, forget, outentry->nodeid, 1); + return -ESTALE; + } + if (fuse_stale_inode(reval_inode, outentry->generation, + &outentry->attr)) { + fuse_make_bad(reval_inode); + return -ESTALE; + } + fi = get_fuse_inode(reval_inode); + spin_lock(&fi->lock); + fi->nlookup++; + spin_unlock(&fi->lock); + + forget_all_cached_acls(reval_inode); + fuse_change_attributes(reval_inode, &outentry->attr, + entry_attr_timeout(outentry), attr_version); + fuse_change_entry_timeout(entry, outentry); + return 0; +} + + /* * This is common function for initiating atomic operations into libfuse. * Currently being used by Atomic create(atomic lookup + create) and * Atomic open(atomic lookup + open). */ -static int fuse_atomic_do_common(struct inode *dir, struct dentry *entry, +static int fuse_do_atomic_common(struct inode *dir, struct dentry *entry, struct dentry **alias, struct file *file, - unsigned int flags, umode_t mode, uint32_t opcode) + struct inode *reval_inode, unsigned int flags, + umode_t mode, uint32_t opcode) { int err; struct inode *inode; @@ -541,6 +591,8 @@ static int fuse_atomic_do_common(struct inode *dir, struct dentry *entry, bool atomic_create = (opcode == FUSE_ATOMIC_CREATE ? true : false); bool create_op = (opcode == FUSE_CREATE || opcode == FUSE_ATOMIC_CREATE) ? true : false; + u64 attr_version = fuse_get_attr_version(fm->fc); + if (alias) *alias = NULL; @@ -609,6 +661,20 @@ static int fuse_atomic_do_common(struct inode *dir, struct dentry *entry, ff->fh = outopen.fh; ff->nodeid = outentry.nodeid; ff->open_flags = outopen.open_flags; + + /* Inode revalidation was bypassed previously for type other than + * directories, revalidate now as we got fresh attributes. + */ + if (reval_inode) { + err = fuse_atomic_open_revalidate_inode(reval_inode, entry, + forget, &outentry, + attr_version); + if (err) + goto out_free_ff; + inode = reval_inode; + kfree(forget); + goto out_finish_open; + } inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, &outentry.attr, entry_attr_timeout(&outentry), 0); if (!inode) { @@ -659,6 +725,7 @@ static int fuse_atomic_do_common(struct inode *dir, struct dentry *entry, if (!atomic_create || (outopen.open_flags & FOPEN_FILE_CREATED)) fuse_dir_changed(dir); err = finish_open(file, entry, generic_file_open); +out_finish_open: if (err) { fi = get_fuse_inode(inode); fuse_sync_release(fi, ff, flags); @@ -686,7 +753,7 @@ static int fuse_atomic_create(struct inode *dir, struct dentry *entry, if (fc->no_atomic_create) return -ENOSYS; - err = fuse_atomic_do_common(dir, entry, NULL, file, flags, mode, + err = fuse_do_atomic_common(dir, entry, NULL, file, NULL, flags, mode, FUSE_ATOMIC_CREATE); /* If atomic create is not implemented then indicate in fc so that next * request falls back to normal create instead of going into libufse and @@ -699,9 +766,10 @@ static int fuse_atomic_create(struct inode *dir, struct dentry *entry, return err; } -static int fuse_do_atomic_open(struct inode *dir, struct dentry *entry, - struct dentry **alias, struct file *file, - unsigned int flags, umode_t mode) +int fuse_do_atomic_open(struct inode *dir, struct dentry *entry, + struct dentry **alias, struct file *file, + struct inode *reval_inode, unsigned int flags, + umode_t mode) { int err; struct fuse_conn *fc = get_fuse_conn(dir); @@ -709,8 +777,8 @@ static int fuse_do_atomic_open(struct inode *dir, struct dentry *entry, if (!fc->do_atomic_open) return -ENOSYS; - err = fuse_atomic_do_common(dir, entry, alias, file, flags, mode, - FUSE_ATOMIC_OPEN); + err = fuse_do_atomic_common(dir, entry, alias, file, reval_inode, flags, + mode, FUSE_ATOMIC_OPEN); /* Atomic open imply atomic trunc as well i.e truncate should be performed * as part of atomic open call itself. */ @@ -718,7 +786,6 @@ static int fuse_do_atomic_open(struct inode *dir, struct dentry *entry, if (fc->do_atomic_open) fc->atomic_o_trunc = 1; } - return err; } @@ -738,7 +805,7 @@ static int fuse_atomic_open(struct inode *dir, struct dentry *entry, if (!create) { err = fuse_do_atomic_open(dir, entry, &alias, - file, flags, mode); + file, NULL, flags, mode); res = alias; if (!err || err != -ENOSYS) goto out_dput; @@ -774,7 +841,7 @@ static int fuse_atomic_open(struct inode *dir, struct dentry *entry, * 'mknod' + 'open' requests. */ if (err == -ENOSYS) { - err = fuse_atomic_do_common(dir, entry, NULL, file, flags, + err = fuse_do_atomic_common(dir, entry, NULL, file, NULL, flags, mode, FUSE_CREATE); } if (err == -ENOSYS) { diff --git a/fs/fuse/file.c b/fs/fuse/file.c index 829094451774..2b0548163249 100644 --- a/fs/fuse/file.c +++ b/fs/fuse/file.c @@ -125,11 +125,15 @@ static void fuse_file_put(struct fuse_file *ff, bool sync, bool isdir) } struct fuse_file *fuse_file_open(struct fuse_mount *fm, u64 nodeid, - unsigned int open_flags, bool isdir) + struct file *file, unsigned int open_flags, + bool isdir) { struct fuse_conn *fc = fm->fc; struct fuse_file *ff; + struct dentry *dentry = NULL; + struct dentry *parent = NULL; int opcode = isdir ? FUSE_OPENDIR : FUSE_OPEN; + int ret; ff = fuse_file_alloc(fm); if (!ff) @@ -138,6 +142,11 @@ struct fuse_file *fuse_file_open(struct fuse_mount *fm, u64 nodeid, ff->fh = 0; /* Default for no-open */ ff->open_flags = FOPEN_KEEP_CACHE | (isdir ? FOPEN_CACHE_DIR : 0); + + /* For directories we already had lookup */ + if (!isdir && fc->do_atomic_open && file != NULL) + goto revalidate_atomic_open; + if (isdir ? !fc->no_opendir : !fc->no_open) { struct fuse_open_out outarg; int err; @@ -164,12 +173,27 @@ struct fuse_file *fuse_file_open(struct fuse_mount *fm, u64 nodeid, ff->nodeid = nodeid; return ff; + +revalidate_atomic_open: + dentry = file->f_path.dentry; + /* Get ref on parent */ + parent = dget_parent(dentry); + open_flags &= ~(O_CREAT | O_EXCL | O_NOCTTY); + ret = fuse_do_atomic_open(d_inode_rcu(parent), dentry, NULL, file, + d_inode_rcu(dentry), open_flags, 0); + dput(parent); + if (ret) + goto err_out; + ff = file->private_data; + return ff; +err_out: + return ERR_PTR(ret); } int fuse_do_open(struct fuse_mount *fm, u64 nodeid, struct file *file, bool isdir) { - struct fuse_file *ff = fuse_file_open(fm, nodeid, file->f_flags, isdir); + struct fuse_file *ff = fuse_file_open(fm, nodeid, file, file->f_flags, isdir); if (!IS_ERR(ff)) file->private_data = ff; @@ -252,7 +276,7 @@ int fuse_open_common(struct inode *inode, struct file *file, bool isdir) } err = fuse_do_open(fm, get_node_id(inode), file, isdir); - if (!err) + if (!err && (!fc->do_atomic_open || isdir)) fuse_finish_open(inode, file); out: diff --git a/fs/fuse/fuse_i.h b/fs/fuse/fuse_i.h index 24793b82303f..5c83e4249b7e 100644 --- a/fs/fuse/fuse_i.h +++ b/fs/fuse/fuse_i.h @@ -1014,6 +1014,13 @@ void fuse_finish_open(struct inode *inode, struct file *file); void fuse_sync_release(struct fuse_inode *fi, struct fuse_file *ff, unsigned int flags); +/** + * Send atomic create + open or lookup + open + */ +int fuse_do_atomic_open(struct inode *dir, struct dentry *entry, + struct dentry **alias, struct file *file, + struct inode *reval_inode, unsigned int flags, + umode_t mode); /** * Send RELEASE or RELEASEDIR request */ @@ -1317,7 +1324,8 @@ int fuse_fileattr_set(struct user_namespace *mnt_userns, /* file.c */ struct fuse_file *fuse_file_open(struct fuse_mount *fm, u64 nodeid, - unsigned int open_flags, bool isdir); + struct file *file, unsigned int open_flags, + bool isdir); void fuse_file_release(struct inode *inode, struct fuse_file *ff, unsigned int open_flags, fl_owner_t id, bool isdir); diff --git a/fs/fuse/ioctl.c b/fs/fuse/ioctl.c index fbc09dab1f85..63106a54ba1a 100644 --- a/fs/fuse/ioctl.c +++ b/fs/fuse/ioctl.c @@ -408,7 +408,7 @@ static struct fuse_file *fuse_priv_ioctl_prepare(struct inode *inode) if (!S_ISREG(inode->i_mode) && !isdir) return ERR_PTR(-ENOTTY); - return fuse_file_open(fm, get_node_id(inode), O_RDONLY, isdir); + return fuse_file_open(fm, get_node_id(inode), NULL, O_RDONLY, isdir); } static void fuse_priv_ioctl_cleanup(struct inode *inode, struct fuse_file *ff) -- 2.17.1