linux-nfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "J. Bruce Fields" <bfields@fieldses.org>
To: Trond Myklebust <trond.myklebust@primarydata.com>
Cc: linux-nfs@vger.kernel.org
Subject: Re: [PATCH 1/2] SUNRPC: Enforce an upper limit on the number of cached credentials
Date: Mon, 21 Jul 2014 17:09:05 -0400	[thread overview]
Message-ID: <20140721210905.GK8438@fieldses.org> (raw)
In-Reply-To: <1405969902-11477-1-git-send-email-trond.myklebust@primarydata.com>

On Mon, Jul 21, 2014 at 03:11:41PM -0400, Trond Myklebust wrote:
> In some cases where the credentials are not often reused, we may want
> to limit their total number just in order to make the negative lookups
> in the hash table more manageable.

Out of curiosity--how would somebody know that might need to set this?

--b.

> 
> Signed-off-by: Trond Myklebust <trond.myklebust@primarydata.com>
> ---
>  net/sunrpc/auth.c | 44 +++++++++++++++++++++++++++++++++++---------
>  1 file changed, 35 insertions(+), 9 deletions(-)
> 
> diff --git a/net/sunrpc/auth.c b/net/sunrpc/auth.c
> index 2bc7bb82b162..360decdddc78 100644
> --- a/net/sunrpc/auth.c
> +++ b/net/sunrpc/auth.c
> @@ -80,6 +80,10 @@ static struct kernel_param_ops param_ops_hashtbl_sz = {
>  module_param_named(auth_hashtable_size, auth_hashbits, hashtbl_sz, 0644);
>  MODULE_PARM_DESC(auth_hashtable_size, "RPC credential cache hashtable size");
>  
> +static unsigned long auth_max_cred_cachesize = ULONG_MAX;
> +module_param(auth_max_cred_cachesize, ulong, 0644);
> +MODULE_PARM_DESC(auth_max_cred_cachesize, "RPC credential maximum total cache size");
> +
>  static u32
>  pseudoflavor_to_flavor(u32 flavor) {
>  	if (flavor > RPC_AUTH_MAXFLAVOR)
> @@ -481,6 +485,20 @@ rpcauth_prune_expired(struct list_head *free, int nr_to_scan)
>  	return freed;
>  }
>  
> +static unsigned long
> +rpcauth_cache_do_shrink(int nr_to_scan)
> +{
> +	LIST_HEAD(free);
> +	unsigned long freed;
> +
> +	spin_lock(&rpc_credcache_lock);
> +	freed = rpcauth_prune_expired(&free, nr_to_scan);
> +	spin_unlock(&rpc_credcache_lock);
> +	rpcauth_destroy_credlist(&free);
> +
> +	return freed;
> +}
> +
>  /*
>   * Run memory cache shrinker.
>   */
> @@ -488,9 +506,6 @@ static unsigned long
>  rpcauth_cache_shrink_scan(struct shrinker *shrink, struct shrink_control *sc)
>  
>  {
> -	LIST_HEAD(free);
> -	unsigned long freed;
> -
>  	if ((sc->gfp_mask & GFP_KERNEL) != GFP_KERNEL)
>  		return SHRINK_STOP;
>  
> @@ -498,12 +513,7 @@ rpcauth_cache_shrink_scan(struct shrinker *shrink, struct shrink_control *sc)
>  	if (list_empty(&cred_unused))
>  		return SHRINK_STOP;
>  
> -	spin_lock(&rpc_credcache_lock);
> -	freed = rpcauth_prune_expired(&free, sc->nr_to_scan);
> -	spin_unlock(&rpc_credcache_lock);
> -	rpcauth_destroy_credlist(&free);
> -
> -	return freed;
> +	return rpcauth_cache_do_shrink(sc->nr_to_scan);
>  }
>  
>  static unsigned long
> @@ -513,6 +523,21 @@ rpcauth_cache_shrink_count(struct shrinker *shrink, struct shrink_control *sc)
>  	return (number_cred_unused / 100) * sysctl_vfs_cache_pressure;
>  }
>  
> +static void
> +rpcauth_cache_enforce_limit(void)
> +{
> +	unsigned long diff;
> +	unsigned int nr_to_scan;
> +
> +	if (number_cred_unused <= auth_max_cred_cachesize)
> +		return;
> +	diff = number_cred_unused - auth_max_cred_cachesize;
> +	nr_to_scan = 100;
> +	if (diff < nr_to_scan)
> +		nr_to_scan = diff;
> +	rpcauth_cache_do_shrink(nr_to_scan);
> +}
> +
>  /*
>   * Look up a process' credentials in the authentication cache
>   */
> @@ -566,6 +591,7 @@ rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred,
>  	} else
>  		list_add_tail(&new->cr_lru, &free);
>  	spin_unlock(&cache->lock);
> +	rpcauth_cache_enforce_limit();
>  found:
>  	if (test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags) &&
>  	    cred->cr_ops->cr_init != NULL &&
> -- 
> 1.9.3
> 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

  parent reply	other threads:[~2014-07-21 21:09 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-07-21 19:11 [PATCH 1/2] SUNRPC: Enforce an upper limit on the number of cached credentials Trond Myklebust
2014-07-21 19:11 ` [PATCH 2/2] NFS: Enforce an upper limit on the number of cached access call Trond Myklebust
2014-07-21 21:09 ` J. Bruce Fields [this message]
2014-07-21 22:33   ` [PATCH 1/2] SUNRPC: Enforce an upper limit on the number of cached credentials Trond Myklebust

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140721210905.GK8438@fieldses.org \
    --to=bfields@fieldses.org \
    --cc=linux-nfs@vger.kernel.org \
    --cc=trond.myklebust@primarydata.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).