Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1360942rdb; Tue, 30 Jan 2024 16:48:37 -0800 (PST) X-Google-Smtp-Source: AGHT+IFiQBq1RvJzBoIUmJKkFwKbn/JiXm+HektEEPKNn9SUcZBqE2t47nT+cngQH8erqk/8zPG/ X-Received: by 2002:a05:6512:32b6:b0:510:293e:83a with SMTP id q22-20020a05651232b600b00510293e083amr159597lfe.28.1706662117185; Tue, 30 Jan 2024 16:48:37 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706662117; cv=pass; d=google.com; s=arc-20160816; b=dm2r07IsWaRbD1dRcAyBathKKYVLEvZU4i79dK45V1UMhxM421imeLgS29xb5cQkTG aH+dxegPGfJtatHZasLNxxjoO0XadEUhS7y7kWK7YHexwie8Zn7W8yk6yXox5U5pNGiR NEnKzAH1dV7R4ecTjr5HdBYm6ghRFbtN4xLy+0SjoAVeAABani0qJTvju33XGiuzyvRf /gWR3jm4SytIPiKWfft9HhFPJtSMnILUUMthV0jsxObNO8DWXkWsajk6vnD4tnnOy/6R Ccoat0KhfuJMz1zP1u5xDnfO+sfYEyagm4Ts0inUKTKZdbWRA8GuAktqSo6Y6VDokYMp cojA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=nH5PMZOJ3HAEPCU6dRr90IDAHi7df2Lyb481mba0emk=; fh=z2mZPWeFOjZDhxFlQuLsJZCae7+IL7PJsF4xAreuVs4=; b=YP9nBYpCQlojTBJE4PnNEwhxjxOlnq3RneXaB/CuE9MRgQ3stE82eMCMbrX/R2T9as QTIgitjl2v4NWxKpVwQQVr9EsGAMOpzFIbFruRNiOK2BgquQHX1jAxkcTpmTMrpzGK2K qCc2j0XIH/DFGraC/tfvOK7Ikro7bz1JfeR+Ybt6Jgpz8C4HcYHmiAP6OR3y1GyEVcfe EL0zRNSB1WBOsFyeHAvOOu6SpBhW3ozaAhoH1gXdmkPZa8BGzKVqOLf+kyk8zyNsaWvr jbkm0isoCTSE1BesWXSZG+GRL+3pyNb+eeLBQYw0IhDJVKWej6Gcb1/uufjOqsBO7unL YfjQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LmoHVBiq; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-ext4+bounces-1033-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-ext4+bounces-1033-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id n12-20020a170906688c00b00a359e07324fsi2849482ejr.116.2024.01.30.16.48.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 16:48:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4+bounces-1033-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LmoHVBiq; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-ext4+bounces-1033-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-ext4+bounces-1033-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id BBBC71F22CE4 for ; Wed, 31 Jan 2024 00:48:36 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5CE094C6F; Wed, 31 Jan 2024 00:47:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="LmoHVBiq" X-Original-To: linux-ext4@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CC8AD185E; Wed, 31 Jan 2024 00:47:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706662046; cv=none; b=rZlUQU2i7thxhtIuufSP9JtjuG7mOjkXPDWrm5HyAqdqUrV8QSMu8ErPD/wul/Y2/3jZbhpk7RUt6PASjd3oeJ5JZ4sdSpX3ZOx6wrhIBrawu56LFpL9Ky5pvMxINlyZaC39xTQ5PUKFjaoQ7Z8+OwQsXWvs7SkmcZ+kL7mrPOU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706662046; c=relaxed/simple; bh=rV7wK+L19fmxaxl/W1mi4BvAypDvQMbo6pwGGFaxUL8=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=phvapPR3g40VNyc20JA6koJGvXqPO9RM4OT0YX1DcCC3VVDHao7Wrx7FvzZzYdr0I4tet2xaPheTdY3u43bb1d7Uw+19QG/sFur7Adod2BFJP5LnWLBZlEQvfSZUnuKFBa79VB3leCsaHJYdTVnqynAfDTrrzo5ZCzSWshbUxJ0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=LmoHVBiq; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 12D39C433C7; Wed, 31 Jan 2024 00:47:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706662046; bh=rV7wK+L19fmxaxl/W1mi4BvAypDvQMbo6pwGGFaxUL8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LmoHVBiqwCOGoG4zg2ywsClj7kFrRUiadSDvkIO+nq5XGRfbwNXui5F6nJ2FJ5oyx V6h44ZwDx9QmuPII0gfaSGSJ7Zx4H5POiGm3TNg4zugezD2TR0ym/1sXQfPdINZcOH gyXRTipbVQCso0rzE1WEh5AHq1Z7/Xpwgdu+yA2rAn6iCzqdqKOlvSk9vhh+QHNrin KqxQkPIy6wB9ciYAxOJpzM/2r7dgIa1nmNbXnGAB1OaC8qaoWyjSaM3B7AhSL42B4+ iVDusfCjBzxuf+7b5gg4rpu/1omDGxtOmIHi5kKSngQdtQLumhQx9nrJwtptpEX+G7 rMDIgk+pIAbcA== Date: Tue, 30 Jan 2024 16:47:24 -0800 From: Eric Biggers To: Gabriel Krisman Bertazi Cc: viro@zeniv.linux.org.uk, jaegeuk@kernel.org, tytso@mit.edu, amir73il@gmail.com, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v5 04/12] fscrypt: Drop d_revalidate for valid dentries during lookup Message-ID: <20240131004724.GC2020@sol.localdomain> References: <20240129204330.32346-1-krisman@suse.de> <20240129204330.32346-5-krisman@suse.de> Precedence: bulk X-Mailing-List: linux-ext4@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240129204330.32346-5-krisman@suse.de> On Mon, Jan 29, 2024 at 05:43:22PM -0300, Gabriel Krisman Bertazi wrote: > Unencrypted and encrypted-dentries where the key is available don't need > to be revalidated with regards to fscrypt, since they don't go stale > from under VFS and the key cannot be removed for the encrypted case > without evicting the dentry. Mark them with d_set_always_valid, to "d_set_always_valid" doesn't appear in the diff itself. > diff --git a/include/linux/fscrypt.h b/include/linux/fscrypt.h > index 4aaf847955c0..a22997b9f35c 100644 > --- a/include/linux/fscrypt.h > +++ b/include/linux/fscrypt.h > @@ -942,11 +942,22 @@ static inline int fscrypt_prepare_rename(struct inode *old_dir, > static inline void fscrypt_prepare_lookup_dentry(struct dentry *dentry, > bool is_nokey_name) > { > - if (is_nokey_name) { > - spin_lock(&dentry->d_lock); > + spin_lock(&dentry->d_lock); > + > + if (is_nokey_name) > dentry->d_flags |= DCACHE_NOKEY_NAME; > - spin_unlock(&dentry->d_lock); > + else if (dentry->d_flags & DCACHE_OP_REVALIDATE && > + dentry->d_op->d_revalidate == fscrypt_d_revalidate) { > + /* > + * Unencrypted dentries and encrypted dentries where the > + * key is available are always valid from fscrypt > + * perspective. Avoid the cost of calling > + * fscrypt_d_revalidate unnecessarily. > + */ > + dentry->d_flags &= ~DCACHE_OP_REVALIDATE; > } > + > + spin_unlock(&dentry->d_lock); This makes lookups in unencrypted directories start doing the spin_lock/spin_unlock pair. Is that really necessary? These changes also make the inline function fscrypt_prepare_lookup() very long (when including the fscrypt_prepare_lookup_dentry() that's inlined into it). The rule that I'm trying to follow is that to the extent that the fscrypt helper functions are inlined, the inline part should be a fast path for unencrypted directories. Encrypted directories should be handled out-of-line. So looking at the original fscrypt_prepare_lookup(): static inline int fscrypt_prepare_lookup(struct inode *dir, struct dentry *dentry, struct fscrypt_name *fname) { if (IS_ENCRYPTED(dir)) return __fscrypt_prepare_lookup(dir, dentry, fname); memset(fname, 0, sizeof(*fname)); fname->usr_fname = &dentry->d_name; fname->disk_name.name = (unsigned char *)dentry->d_name.name; fname->disk_name.len = dentry->d_name.len; return 0; } If you could just add the DCACHE_OP_REVALIDATE clearing for dentries in unencrypted directories just before the "return 0;", hopefully without the spinlock, that would be good. Yes, that does mean that __fscrypt_prepare_lookup() will have to handle it too, for the case of dentries in encrypted directories, but that seems okay. - Eric