From: Ondrej Mosnacek Date: Wed, 6 Jan 2021 13:26:22 +0000 (+0100) Subject: selinux: mark selinux_xfrm_refcount as __read_mostly X-Git-Tag: accepted/tizen/unified/20230118.172025~7511^2~12 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=e0de8a9aebd01589c0246facf1eb533dd1b7a506;p=platform%2Fkernel%2Flinux-rpi.git selinux: mark selinux_xfrm_refcount as __read_mostly This is motivated by a perfomance regression of selinux_xfrm_enabled() that happened on a RHEL kernel due to false sharing between selinux_xfrm_refcount and (the late) selinux_ss.policy_rwlock (i.e. the .bss section memory layout changed such that they happened to share the same cacheline). Since the policy rwlock's memory region was modified upon each read-side critical section, the readers of selinux_xfrm_refcount had frequent cache misses, eventually leading to a significant performance degradation under a TCP SYN flood on a system with many cores (32 in this case, but it's detectable on less cores as well). While upstream has since switched to RCU locking, so the same can no longer happen here, selinux_xfrm_refcount could still share a cacheline with another frequently written region, thus marking it __read_mostly still makes sense. __read_mostly helps, because it will put the symbol in a separate section along with other read-mostly variables, so there should never be a clash with frequently written data. Since selinux_xfrm_refcount is modified only in case of an explicit action, it should be safe to do this (i.e. it shouldn't disrupt other read-mostly variables too much). Signed-off-by: Ondrej Mosnacek Signed-off-by: Paul Moore --- diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c index c367d36..634f3db 100644 --- a/security/selinux/xfrm.c +++ b/security/selinux/xfrm.c @@ -47,7 +47,7 @@ #include "xfrm.h" /* Labeled XFRM instance counter */ -atomic_t selinux_xfrm_refcount = ATOMIC_INIT(0); +atomic_t selinux_xfrm_refcount __read_mostly = ATOMIC_INIT(0); /* * Returns true if the context is an LSM/SELinux context.