On 2026-02-06 15:19, Waiman Long wrote: > When the audit subsystem is enabled, it can do a lot of get_fs_pwd() > calls to get references to fs->pwd and then releasing those references > back with path_put() later. That may cause a lot of spinlock contention > on a single pwd's dentry lock because of the constant changes to the > reference count when there are many processes on the same working > directory actively doing open/close system calls. This can cause > noticeable performance regresssion when compared with the case where > the audit subsystem is turned off especially on systems with a lot of > CPUs which is becoming more common these days. > > A simple and elegant solution to avoid this kind of performance > regression is to add a common pool of extra fs->pwd references inside > the fs_struct. When a caller needs a pwd reference, it can borrow one > from pool, if available, to avoid an explicit path_get(). When it is > time to release the reference, it can put it back into the common pool > if fs->pwd isn't changed before without doing a path_put(). We still > need to acquire the fs's spinlock, but fs_struct is more distributed > and it is less common to have many tasks sharing a single fs_struct. > > A new set of get_fs_pwd_pool/put_fs_pwd_pool() APIs are introduced > with this patch to enable other subsystems to acquire and release > a pwd reference from the common pool without doing unnecessary > path_get/path_put(). > > Besides fs/fs_struct.c, the copy_mnt_ns() function of fs/namespace.c is > also modified to properly handle the extra pwd references, if available. > > Signed-off-by: Waiman Long <[email protected]>
Reviewed-by: Richard Guy Briggs <[email protected]> > --- > fs/fs_struct.c | 26 +++++++++++++++++++++----- > fs/namespace.c | 8 ++++++++ > include/linux/fs_struct.h | 30 +++++++++++++++++++++++++++++- > 3 files changed, 58 insertions(+), 6 deletions(-) > > diff --git a/fs/fs_struct.c b/fs/fs_struct.c > index b8c46c5a38a0..621fe1677913 100644 > --- a/fs/fs_struct.c > +++ b/fs/fs_struct.c > @@ -32,15 +32,19 @@ void set_fs_root(struct fs_struct *fs, const struct path > *path) > void set_fs_pwd(struct fs_struct *fs, const struct path *path) > { > struct path old_pwd; > + int count; > > path_get(path); > write_seqlock(&fs->seq); > old_pwd = fs->pwd; > fs->pwd = *path; > + count = fs->pwd_refs + 1; > + fs->pwd_refs = 0; > write_sequnlock(&fs->seq); > > if (old_pwd.dentry) > - path_put(&old_pwd); > + while (count--) > + path_put(&old_pwd); > } > > static inline int replace_path(struct path *p, const struct path *old, const > struct path *new) > @@ -62,10 +66,15 @@ void chroot_fs_refs(const struct path *old_root, const > struct path *new_root) > task_lock(p); > fs = p->fs; > if (fs) { > - int hits = 0; > + int hits; > + > write_seqlock(&fs->seq); > + hits = replace_path(&fs->pwd, old_root, new_root); > + if (hits && fs->pwd_refs) { > + count += fs->pwd_refs; > + fs->pwd_refs = 0; > + } > hits += replace_path(&fs->root, old_root, new_root); > - hits += replace_path(&fs->pwd, old_root, new_root); > while (hits--) { > count++; > path_get(new_root); > @@ -81,8 +90,11 @@ void chroot_fs_refs(const struct path *old_root, const > struct path *new_root) > > void free_fs_struct(struct fs_struct *fs) > { > + int count = fs->pwd_refs + 1; > + > path_put(&fs->root); > - path_put(&fs->pwd); > + while (count--) > + path_put(&fs->pwd); > kmem_cache_free(fs_cachep, fs); > } > > @@ -110,6 +122,7 @@ struct fs_struct *copy_fs_struct(struct fs_struct *old) > if (fs) { > fs->users = 1; > fs->in_exec = 0; > + fs->pwd_refs = 0; > seqlock_init(&fs->seq); > fs->umask = old->umask; > > @@ -117,7 +130,10 @@ struct fs_struct *copy_fs_struct(struct fs_struct *old) > fs->root = old->root; > path_get(&fs->root); > fs->pwd = old->pwd; > - path_get(&fs->pwd); > + if (old->pwd_refs) > + old->pwd_refs--; > + else > + path_get(&fs->pwd); > read_sequnlock_excl(&old->seq); > } > return fs; > diff --git a/fs/namespace.c b/fs/namespace.c > index c58674a20cad..a2323ba84d76 100644 > --- a/fs/namespace.c > +++ b/fs/namespace.c > @@ -4135,6 +4135,14 @@ struct mnt_namespace *copy_mnt_ns(u64 flags, struct > mnt_namespace *ns, > * as belonging to new namespace. We have already acquired a private > * fs_struct, so tsk->fs->lock is not needed. > */ > + if (new_fs) > + WARN_ON_ONCE(new_fs->users != 1); > + > + /* Release the extra pwd references of new_fs, if present. */ > + while (new_fs && new_fs->pwd_refs) { > + path_put(&new_fs->pwd); > + new_fs->pwd_refs--; > + } > p = old; > q = new; > while (p) { > diff --git a/include/linux/fs_struct.h b/include/linux/fs_struct.h > index 0070764b790a..093648e65c20 100644 > --- a/include/linux/fs_struct.h > +++ b/include/linux/fs_struct.h > @@ -8,10 +8,11 @@ > #include <linux/seqlock.h> > > struct fs_struct { > - int users; > seqlock_t seq; > + int users; > int umask; > int in_exec; > + int pwd_refs; /* A pool of extra pwd references */ > struct path root, pwd; > } __randomize_layout; > > @@ -40,6 +41,33 @@ static inline void get_fs_pwd(struct fs_struct *fs, struct > path *pwd) > read_sequnlock_excl(&fs->seq); > } > > +/* Acquire a pwd reference from the pwd_refs pool, if available */ > +static inline void get_fs_pwd_pool(struct fs_struct *fs, struct path *pwd) > +{ > + read_seqlock_excl(&fs->seq); > + *pwd = fs->pwd; > + if (fs->pwd_refs) > + fs->pwd_refs--; > + else > + path_get(pwd); > + read_sequnlock_excl(&fs->seq); > +} > + > +/* Release a pwd reference back to the pwd_refs pool, if appropriate */ > +static inline void put_fs_pwd_pool(struct fs_struct *fs, struct path *pwd) > +{ > + bool put = false; > + > + read_seqlock_excl(&fs->seq); > + if ((fs->pwd.dentry == pwd->dentry) && (fs->pwd.mnt == pwd->mnt)) > + fs->pwd_refs++; > + else > + put = true; > + read_sequnlock_excl(&fs->seq); > + if (put) > + path_put(pwd); > +} > + > extern bool current_chrooted(void); > > static inline int current_umask(void) > -- > 2.52.0 > - RGB -- Richard Guy Briggs <[email protected]> Sr. S/W Engineer, Kernel Security, Base Operating Systems Remote, Ottawa, Red Hat Canada Upstream IRC: SunRaycer Voice: +1.613.860 2354 SMS: +1.613.518.6570

