From: Alexey Gladkov <leg...@kernel.org>

commit 4999f8076579fec0aba45019489b2fe4894a101a from
https://github.com/altera-opensource/linux-socfpga.git

[upstream commit b6c336528926ef73b0f70260f2636de2c3b94c14]

The current implementation of the ucounts reference counter requires the
use of spin_lock. We're going to use get_ucounts() in more performance
critical areas like a handling of RLIMIT_SIGPENDING.

Now we need to use spin_lock only if we want to change the hashtable.

v10:
* Always try to put ucounts in case we cannot increase ucounts->count.
  This will allow to cover the case when all consumers will return
  ucounts at once.

v9:
* Use a negative value to check that the ucounts->count is close to
  overflow.

Signed-off-by: Alexey Gladkov <leg...@kernel.org>
Link: 
https://lkml.kernel.org/r/94d1dbecab060a6b116b0a2d1accd8ca1bbb4f5f.1619094428.git.leg...@kernel.org
Signed-off-by: Eric W. Biederman <ebied...@xmission.com>
Signed-off-by: Wenlin Kang <wenlin.k...@windriver.com>
---
 include/linux/user_namespace.h |  4 +--
 kernel/ucount.c                | 55 +++++++++++++---------------------
 2 files changed, 22 insertions(+), 37 deletions(-)

diff --git a/include/linux/user_namespace.h b/include/linux/user_namespace.h
index e1bd560da1cd..68fcbc7e3d53 100644
--- a/include/linux/user_namespace.h
+++ b/include/linux/user_namespace.h
@@ -96,7 +96,7 @@ struct ucounts {
        struct hlist_node node;
        struct user_namespace *ns;
        kuid_t uid;
-       int count;
+       atomic_t count;
        atomic_t ucount[UCOUNT_COUNTS];
 };
 
@@ -108,7 +108,7 @@ void retire_userns_sysctls(struct user_namespace *ns);
 struct ucounts *inc_ucount(struct user_namespace *ns, kuid_t uid, enum 
ucount_type type);
 void dec_ucount(struct ucounts *ucounts, enum ucount_type type);
 struct ucounts *alloc_ucounts(struct user_namespace *ns, kuid_t uid);
-struct ucounts *get_ucounts(struct ucounts *ucounts);
+struct ucounts * __must_check get_ucounts(struct ucounts *ucounts);
 void put_ucounts(struct ucounts *ucounts);
 
 #ifdef CONFIG_USER_NS
diff --git a/kernel/ucount.c b/kernel/ucount.c
index 06f278288091..5f8f0dfe5f7c 100644
--- a/kernel/ucount.c
+++ b/kernel/ucount.c
@@ -11,7 +11,7 @@
 struct ucounts init_ucounts = {
        .ns    = &init_user_ns,
        .uid   = GLOBAL_ROOT_UID,
-       .count = 1,
+       .count = ATOMIC_INIT(1),
 };
 
 #define UCOUNTS_HASHTABLE_BITS 10
@@ -139,6 +139,15 @@ static void hlist_add_ucounts(struct ucounts *ucounts)
        spin_unlock_irq(&ucounts_lock);
 }
 
+struct ucounts *get_ucounts(struct ucounts *ucounts)
+{
+       if (ucounts && atomic_add_negative(1, &ucounts->count)) {
+               put_ucounts(ucounts);
+               ucounts = NULL;
+       }
+       return ucounts;
+}
+
 struct ucounts *alloc_ucounts(struct user_namespace *ns, kuid_t uid)
 {
        struct hlist_head *hashent = ucounts_hashentry(ns, uid);
@@ -155,7 +164,7 @@ struct ucounts *alloc_ucounts(struct user_namespace *ns, 
kuid_t uid)
 
                new->ns = ns;
                new->uid = uid;
-               new->count = 0;
+               atomic_set(&new->count, 1);
 
                spin_lock_irq(&ucounts_lock);
                ucounts = find_ucounts(ns, uid, hashent);
@@ -163,34 +172,13 @@ struct ucounts *alloc_ucounts(struct user_namespace *ns, 
kuid_t uid)
                        kfree(new);
                } else {
                        hlist_add_head(&new->node, hashent);
-                       ucounts = new;
                        get_user_ns(new->ns);
+                       spin_unlock_irq(&ucounts_lock);
+                       return new;
                }
        }
-       if (ucounts->count == INT_MAX)
-               ucounts = NULL;
-       else
-               ucounts->count += 1;
        spin_unlock_irq(&ucounts_lock);
-       return ucounts;
-}
-
-struct ucounts *get_ucounts(struct ucounts *ucounts)
-{
-       unsigned long flags;
-
-       if (!ucounts)
-               return NULL;
-
-       spin_lock_irqsave(&ucounts_lock, flags);
-       if (ucounts->count == INT_MAX) {
-               WARN_ONCE(1, "ucounts: counter has reached its maximum value");
-               ucounts = NULL;
-       } else {
-               ucounts->count += 1;
-       }
-       spin_unlock_irqrestore(&ucounts_lock, flags);
-
+       ucounts = get_ucounts(ucounts);
        return ucounts;
 }
 
@@ -198,16 +186,13 @@ void put_ucounts(struct ucounts *ucounts)
 {
        unsigned long flags;
 
-       spin_lock_irqsave(&ucounts_lock, flags);
-       ucounts->count -= 1;
-       if (!ucounts->count)
+       if (atomic_dec_and_test(&ucounts->count)) {
+               spin_lock_irqsave(&ucounts_lock, flags);
                hlist_del_init(&ucounts->node);
-       else
-               ucounts = NULL;
-       spin_unlock_irqrestore(&ucounts_lock, flags);
-
-       kfree(ucounts);
-       put_user_ns(ucounts->ns);
+               spin_unlock_irqrestore(&ucounts_lock, flags);
+               put_user_ns(ucounts->ns);
+               kfree(ucounts);
+       }
 }
 
 static inline bool atomic_inc_below(atomic_t *v, int u)
-- 
2.25.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#12597): 
https://lists.yoctoproject.org/g/linux-yocto/message/12597
Mute This Topic: https://lists.yoctoproject.org/mt/98921520/21656
Group Owner: linux-yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/linux-yocto/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to