Commit 95cd6232 authored by Trond Myklebust's avatar Trond Myklebust

SUNRPC: Clean up the AUTH cache code

Signed-off-by: default avatarTrond Myklebust <trond.myklebust@hammerspace.com>
parent 86bbd742
...@@ -291,25 +291,30 @@ rpcauth_release(struct rpc_auth *auth) ...@@ -291,25 +291,30 @@ rpcauth_release(struct rpc_auth *auth)
static DEFINE_SPINLOCK(rpc_credcache_lock); static DEFINE_SPINLOCK(rpc_credcache_lock);
static void /*
* On success, the caller is responsible for freeing the reference
* held by the hashtable
*/
static bool
rpcauth_unhash_cred_locked(struct rpc_cred *cred) rpcauth_unhash_cred_locked(struct rpc_cred *cred)
{ {
if (!test_and_clear_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags))
return false;
hlist_del_rcu(&cred->cr_hash); hlist_del_rcu(&cred->cr_hash);
smp_mb__before_atomic(); return true;
clear_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags);
} }
static int static bool
rpcauth_unhash_cred(struct rpc_cred *cred) rpcauth_unhash_cred(struct rpc_cred *cred)
{ {
spinlock_t *cache_lock; spinlock_t *cache_lock;
int ret; bool ret;
if (!test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags))
return false;
cache_lock = &cred->cr_auth->au_credcache->lock; cache_lock = &cred->cr_auth->au_credcache->lock;
spin_lock(cache_lock); spin_lock(cache_lock);
ret = atomic_read(&cred->cr_count) == 0; ret = rpcauth_unhash_cred_locked(cred);
if (ret)
rpcauth_unhash_cred_locked(cred);
spin_unlock(cache_lock); spin_unlock(cache_lock);
return ret; return ret;
} }
...@@ -388,6 +393,44 @@ void rpcauth_destroy_credlist(struct list_head *head) ...@@ -388,6 +393,44 @@ void rpcauth_destroy_credlist(struct list_head *head)
} }
} }
static void
rpcauth_lru_add_locked(struct rpc_cred *cred)
{
if (!list_empty(&cred->cr_lru))
return;
number_cred_unused++;
list_add_tail(&cred->cr_lru, &cred_unused);
}
static void
rpcauth_lru_add(struct rpc_cred *cred)
{
if (!list_empty(&cred->cr_lru))
return;
spin_lock(&rpc_credcache_lock);
rpcauth_lru_add_locked(cred);
spin_unlock(&rpc_credcache_lock);
}
static void
rpcauth_lru_remove_locked(struct rpc_cred *cred)
{
if (list_empty(&cred->cr_lru))
return;
number_cred_unused--;
list_del_init(&cred->cr_lru);
}
static void
rpcauth_lru_remove(struct rpc_cred *cred)
{
if (list_empty(&cred->cr_lru))
return;
spin_lock(&rpc_credcache_lock);
rpcauth_lru_remove_locked(cred);
spin_unlock(&rpc_credcache_lock);
}
/* /*
* Clear the RPC credential cache, and delete those credentials * Clear the RPC credential cache, and delete those credentials
* that are not referenced. * that are not referenced.
...@@ -407,13 +450,10 @@ rpcauth_clear_credcache(struct rpc_cred_cache *cache) ...@@ -407,13 +450,10 @@ rpcauth_clear_credcache(struct rpc_cred_cache *cache)
head = &cache->hashtable[i]; head = &cache->hashtable[i];
while (!hlist_empty(head)) { while (!hlist_empty(head)) {
cred = hlist_entry(head->first, struct rpc_cred, cr_hash); cred = hlist_entry(head->first, struct rpc_cred, cr_hash);
get_rpccred(cred);
if (!list_empty(&cred->cr_lru)) {
list_del(&cred->cr_lru);
number_cred_unused--;
}
list_add_tail(&cred->cr_lru, &free);
rpcauth_unhash_cred_locked(cred); rpcauth_unhash_cred_locked(cred);
/* Note: We now hold a reference to cred */
rpcauth_lru_remove_locked(cred);
list_add_tail(&cred->cr_lru, &free);
} }
} }
spin_unlock(&cache->lock); spin_unlock(&cache->lock);
...@@ -447,7 +487,6 @@ EXPORT_SYMBOL_GPL(rpcauth_destroy_credcache); ...@@ -447,7 +487,6 @@ EXPORT_SYMBOL_GPL(rpcauth_destroy_credcache);
static long static long
rpcauth_prune_expired(struct list_head *free, int nr_to_scan) rpcauth_prune_expired(struct list_head *free, int nr_to_scan)
{ {
spinlock_t *cache_lock;
struct rpc_cred *cred, *next; struct rpc_cred *cred, *next;
unsigned long expired = jiffies - RPC_AUTH_EXPIRY_MORATORIUM; unsigned long expired = jiffies - RPC_AUTH_EXPIRY_MORATORIUM;
long freed = 0; long freed = 0;
...@@ -456,32 +495,24 @@ rpcauth_prune_expired(struct list_head *free, int nr_to_scan) ...@@ -456,32 +495,24 @@ rpcauth_prune_expired(struct list_head *free, int nr_to_scan)
if (nr_to_scan-- == 0) if (nr_to_scan-- == 0)
break; break;
if (atomic_read(&cred->cr_count) > 1) {
rpcauth_lru_remove_locked(cred);
continue;
}
/* /*
* Enforce a 60 second garbage collection moratorium * Enforce a 60 second garbage collection moratorium
* Note that the cred_unused list must be time-ordered. * Note that the cred_unused list must be time-ordered.
*/ */
if (time_in_range(cred->cr_expire, expired, jiffies) && if (!time_in_range(cred->cr_expire, expired, jiffies))
test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) { continue;
freed = SHRINK_STOP; if (!rpcauth_unhash_cred(cred))
break;
}
list_del_init(&cred->cr_lru);
number_cred_unused--;
freed++;
if (atomic_read(&cred->cr_count) != 0)
continue; continue;
cache_lock = &cred->cr_auth->au_credcache->lock; rpcauth_lru_remove_locked(cred);
spin_lock(cache_lock); freed++;
if (atomic_read(&cred->cr_count) == 0) {
get_rpccred(cred);
list_add_tail(&cred->cr_lru, free); list_add_tail(&cred->cr_lru, free);
rpcauth_unhash_cred_locked(cred);
} }
spin_unlock(cache_lock); return freed ? freed : SHRINK_STOP;
}
return freed;
} }
static unsigned long static unsigned long
...@@ -595,6 +626,7 @@ rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred, ...@@ -595,6 +626,7 @@ rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred,
if (cred == NULL) { if (cred == NULL) {
cred = new; cred = new;
set_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags); set_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags);
atomic_inc(&cred->cr_count);
hlist_add_head_rcu(&cred->cr_hash, &cache->hashtable[nr]); hlist_add_head_rcu(&cred->cr_hash, &cache->hashtable[nr]);
} else } else
list_add_tail(&new->cr_lru, &free); list_add_tail(&new->cr_lru, &free);
...@@ -709,36 +741,29 @@ put_rpccred(struct rpc_cred *cred) ...@@ -709,36 +741,29 @@ put_rpccred(struct rpc_cred *cred)
{ {
if (cred == NULL) if (cred == NULL)
return; return;
/* Fast path for unhashed credentials */ rcu_read_lock();
if (test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) == 0) {
if (atomic_dec_and_test(&cred->cr_count)) if (atomic_dec_and_test(&cred->cr_count))
cred->cr_ops->crdestroy(cred); goto destroy;
return; if (atomic_read(&cred->cr_count) != 1 ||
} !test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags))
goto out;
if (!atomic_dec_and_lock(&cred->cr_count, &rpc_credcache_lock))
return;
if (!list_empty(&cred->cr_lru)) {
number_cred_unused--;
list_del_init(&cred->cr_lru);
}
if (test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) {
if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) != 0) { if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) != 0) {
cred->cr_expire = jiffies; cred->cr_expire = jiffies;
list_add_tail(&cred->cr_lru, &cred_unused); rpcauth_lru_add(cred);
number_cred_unused++; /* Race breaker */
goto out_nodestroy; if (unlikely(!test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags)))
} rpcauth_lru_remove(cred);
if (!rpcauth_unhash_cred(cred)) { } else if (rpcauth_unhash_cred(cred)) {
/* We were hashed and someone looked us up... */ rpcauth_lru_remove(cred);
goto out_nodestroy; if (atomic_dec_and_test(&cred->cr_count))
} goto destroy;
} }
spin_unlock(&rpc_credcache_lock); out:
cred->cr_ops->crdestroy(cred); rcu_read_unlock();
return; return;
out_nodestroy: destroy:
spin_unlock(&rpc_credcache_lock); rcu_read_unlock();
cred->cr_ops->crdestroy(cred);
} }
EXPORT_SYMBOL_GPL(put_rpccred); EXPORT_SYMBOL_GPL(put_rpccred);
......
...@@ -138,6 +138,6 @@ struct rpc_cred null_cred = { ...@@ -138,6 +138,6 @@ struct rpc_cred null_cred = {
.cr_lru = LIST_HEAD_INIT(null_cred.cr_lru), .cr_lru = LIST_HEAD_INIT(null_cred.cr_lru),
.cr_auth = &null_auth, .cr_auth = &null_auth,
.cr_ops = &null_credops, .cr_ops = &null_credops,
.cr_count = ATOMIC_INIT(1), .cr_count = ATOMIC_INIT(2),
.cr_flags = 1UL << RPCAUTH_CRED_UPTODATE, .cr_flags = 1UL << RPCAUTH_CRED_UPTODATE,
}; };
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment