From: Chris Mason <clm@meta.com>
To: Mateusz Guzik <mjguzik@gmail.com>
Cc: Chris Mason <clm@meta.com>, <brauner@kernel.org>,
<viro@zeniv.linux.org.uk>, <jack@suse.cz>,
<linux-kernel@vger.kernel.org>, <linux-fsdevel@vger.kernel.org>
Subject: Re: [PATCH v5] fs: add predicts based on nd->depth
Date: Thu, 11 Dec 2025 17:22:32 -0800 [thread overview]
Message-ID: <20251212012236.3231369-1-clm@meta.com> (raw)
In-Reply-To: <20251119142954.2909394-1-mjguzik@gmail.com>
On Wed, 19 Nov 2025 15:29:54 +0100 Mateusz Guzik <mjguzik@gmail.com> wrote:
Hi everyone,
I ran some of the recent commits through the AI review prompts and it
flagged this one. The comments look right to me:
[ ... ]
> diff --git a/fs/namei.c b/fs/namei.c
> index a5bffc2a29f6c..5fbb05fb96b75 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
[ ... ]
> @@ -882,7 +883,7 @@ static bool try_to_unlazy(struct nameidata *nd)
>
> BUG_ON(!(nd->flags & LOOKUP_RCU));
>
> - if (unlikely(!legitimize_links(nd)))
> + if (unlikely(nd->depth && !legitimize_links(nd)))
> goto out1;
When nd->depth is 0, this short-circuits and never calls legitimize_links().
However, legitimize_links() contains a LOOKUP_CACHED check that was moved
there in commit b93a6e389bdc7 ("fix handling of nd->depth on LOOKUP_CACHED
failures in try_to_unlazy*"):
static bool legitimize_links(struct nameidata *nd)
{
if (unlikely(nd->flags & LOOKUP_CACHED)) {
drop_links(nd);
nd->depth = 0;
return false;
}
...
}
Before that commit, the LOOKUP_CACHED check was done directly in
try_to_unlazy() before calling legitimize_links(). It was moved into
legitimize_links() for consolidation, not because it's semantically
related to having links.
With LOOKUP_CACHED set (used by io_uring for non-blocking opens) and
nd->depth == 0, try_to_unlazy() now proceeds to legitimize_path() and may
succeed, when previously it would have failed. This can cause
lookup_fast()->try_to_unlazy() to succeed, leading the caller to call
lookup_slow() which takes inode_lock_shared() and blocks - violating
LOOKUP_CACHED semantics.
Should the LOOKUP_CACHED check be moved back to try_to_unlazy() before
the depth check, like:
if (unlikely(nd->flags & LOOKUP_CACHED))
goto out1;
if (unlikely(nd->depth && !legitimize_links(nd)))
goto out1;
> if (unlikely(!legitimize_path(nd, &nd->path, nd->seq)))
> goto out;
[ ... ]
> @@ -917,7 +918,7 @@ static bool try_to_unlazy_next(struct nameidata *nd, struct dentry *dentry)
> int res;
> BUG_ON(!(nd->flags & LOOKUP_RCU));
>
> - if (unlikely(!legitimize_links(nd)))
> + if (unlikely(nd->depth && !legitimize_links(nd)))
> goto out2;
The same issue applies here in try_to_unlazy_next().
[ ... ]
-chris
next prev parent reply other threads:[~2025-12-12 1:23 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-19 14:29 [PATCH v5] fs: add predicts based on nd->depth Mateusz Guzik
2025-11-25 9:04 ` Christian Brauner
2025-12-12 1:22 ` Chris Mason [this message]
2025-12-12 11:55 ` Mateusz Guzik
2025-12-12 20:57 ` Chris Mason
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251212012236.3231369-1-clm@meta.com \
--to=clm@meta.com \
--cc=brauner@kernel.org \
--cc=jack@suse.cz \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mjguzik@gmail.com \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).