Return-Path: Received: from mx2.suse.de ([195.135.220.15]:49140 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S969985AbdAFX7f (ORCPT ); Fri, 6 Jan 2017 18:59:35 -0500 From: NeilBrown To: "J. Bruce Fields" Date: Sat, 07 Jan 2017 10:59:26 +1100 Cc: andros@netapp.com, linux-nfs@vger.kernel.org Subject: Re: [PATCH Version 4] SVCAUTH reap the rsc cache entry on RPC_SS_PROC_DESTROY In-Reply-To: <20170106210111.GA31401@fieldses.org> References: <1482428286-33744-1-git-send-email-andros@netapp.com> <1482428286-33744-2-git-send-email-andros@netapp.com> <20170104202634.GA21562@fieldses.org> <8737gymss7.fsf@notabene.neil.brown.name> <20170106210111.GA31401@fieldses.org> Message-ID: <874m1bloyp.fsf@notabene.neil.brown.name> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" Sender: linux-nfs-owner@vger.kernel.org List-ID: --=-=-= Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Sat, Jan 07 2017, J. Bruce Fields wrote: > On Thu, Jan 05, 2017 at 08:14:48AM +1100, NeilBrown wrote: >> On Thu, Jan 05 2017, J. Bruce Fields wrote: >>=20 >> > I'm not against the patch, but I'm still not convinced by the >> > explanation: >> > >> > On Thu, Dec 22, 2016 at 12:38:06PM -0500, andros@netapp.com wrote: >> >> From: Neil Brown >> >>=20 >> >> The rsc cache code operates in a read_lock/write_lock environment. >> >> Changes to a cache entry should use the provided rsc_update >> >> routine which takes the write_lock. >> > >> > It looks pretty suspicious to be setting CACHE_NEGATIVE without the >> > cache_lock for write, but I'm not actually convinced there's a bug the= re >> > either. In any case not one that you'd be hitting reliably. >> > >> >> The current code sets the expiry_time and the CACHE_NEGATIVE flag >> >> without taking the write_lock as it does not call rsc_update. >> >> Without this patch, while cache_clean sees the entries to be >> >> removed, it does not remove the rsc_entries. This is because >> >> rsc_update updates other fields such as flush_time and last_refresh >> >> in the entry to trigger cache_clean to reap the entry. >> > >> > I think the root cause of the particular behavior you were seeing was >> > actually an oversight from Neil's c5b29f885afe "sunrpc: use seconds >> > since boot in expiry cache", which missed this one occurrence of >> > get_seconds(). So it's setting the item's entry to something decades = in >> > the future. >> > >> > And that's probably not been a huge deal since these entries aren't so >> > big, and they will eventually get cleaned up by cache_purge when the >> > cache is destroyed. Still, I can imagine it slowing down cache lookups >> > on a long-lived server. >> > >> > The one-liner: >> > >> > - rsci->h.expiry_time =3D get_seconds(); >> > + rsci->h.expiry_time =3D seconds_since_boot(); >> > >> > would probably also do the job. Am I missing something? >>=20 >> I was missing that get_seconds() bug - thanks. >> The other real bug is that setting h.expiry_time backwards should >> really set cd->nextcheck backwards too. I thought I had found code >> which did that, but I think I was confusing ->nextcheck with ->flush_tim= e. >>=20 >> > >> > But, OK, I think Neil's patch will ensure entries get cleaned up more >> > quickly than that would, and might also fix a rare race. >>=20 >> Yes. The patch doesn't just fix the bug, whatever it is. It provides a >> proper interface for functionality that wasn't previously supported, and >> so had been hacked into place. > > Got it. So, with another changelog rewrite, I'm applying it like the > below. > > Another question is whether it's worth a stable cc.... I think so, as > all it would take is a case where a server gets a lot of PROC_DESTROYs > over its lifetime. That's not hard to imagine. And the symptoms are > probably non-obvious and cured by a reboot, which might explain it not > having seen bug reports. How about applying >> > - rsci->h.expiry_time =3D get_seconds(); >> > + rsci->h.expiry_time =3D seconds_since_boot(); first with a Cc: to stable (and a Fixes:), then this patch on top of that without the Cc. With the code as it is, destroyed entries won't expire for years. With the above change, they will expire within half an hour, as cache_clean() looks at every cache at least every 30 minutes. If we also added code to reduce ->nextcheck (which would require a write lock), then they would expired within 30 seconds, as do_cache_clean() runs cache_clean() at least ever 30 seconds (I wonder if we should make it more demand-driven?). With the full patch, it is removed instantly. I think a 30 minutes guarantee is enough for -stable, especially as it is achieved with such a tiny, obviously correct, patch. > > --b. > > commit 27297f41527d > Author: Neil Brown > Date: Thu Dec 22 12:38:06 2016 -0500 > > svcauth_gss: free context promptly on PROC_DESTROY >=20=20=20=20=20 > Since c5b29f885afe "sunrpc: use seconds since boot in expiry cache", = the > expiry_time field has been in units of seconds since boot, but that > patch overlooked the server code that handles RPC_GSS_PROC_DESTROY > requests. The result is that when we get a request from a client to > destroy a context, we set that context's expiry time to a time decades > in the future. >=20=20=20=20=20 > The context will still be cleaned up by cache_purge when the module is > unloaded or the container shut down, but a lot of contexts could pile= up > before then. >=20=20=20=20=20 > The simple fix would be just to set expiry_time to seconds_since_boot= (), > but modifying the entry outside the cache_lock is also looks dubious > (though I'm not completely sure what the race would be). So let's > provide a helper that does this properly, taking the lock and removing > the entry immediately. I don't think the locking is an issue at all. Setting h.expiry_time backwards without also setting cd->next_check backwards results in internal inconsistencies, so is wrong for that reason. Setting CACHE_NEGATIVE is not "obviously correct" as, in general, value fields are only allocateed when CACHE_NEGATIVE is not set, so they might not be freed when it is. The doesn't actually apply to this cache, so it would work but is not consistent with the intended (undocumented) interface usage. Up to you how much of this you spell out. I don't object to your changelog above if you want to stay with it. Thanks, NeilBrown >=20=20=20=20=20 > Signed-off-by: Neil Brown > Reported-by: Andy Adamson > Signed-off-by: Andy Adamson > Signed-off-by: J. Bruce Fields > > diff --git a/include/linux/sunrpc/cache.h b/include/linux/sunrpc/cache.h > index 62a60eeacb0a..9dcf2c8fe1c5 100644 > --- a/include/linux/sunrpc/cache.h > +++ b/include/linux/sunrpc/cache.h > @@ -227,6 +227,7 @@ extern void sunrpc_destroy_cache_detail(struct cache_= detail *cd); > extern int sunrpc_cache_register_pipefs(struct dentry *parent, const cha= r *, > umode_t, struct cache_detail *); > extern void sunrpc_cache_unregister_pipefs(struct cache_detail *); > +extern void sunrpc_cache_unhash(struct cache_detail *, struct cache_head= *); >=20=20 > /* Must store cache_detail in seq_file->private if using next three func= tions */ > extern void *cache_seq_start(struct seq_file *file, loff_t *pos); > diff --git a/net/sunrpc/auth_gss/svcauth_gss.c b/net/sunrpc/auth_gss/svca= uth_gss.c > index 886e9d381771..a54a7a3d28f5 100644 > --- a/net/sunrpc/auth_gss/svcauth_gss.c > +++ b/net/sunrpc/auth_gss/svcauth_gss.c > @@ -1489,8 +1489,8 @@ svcauth_gss_accept(struct svc_rqst *rqstp, __be32 *= authp) > case RPC_GSS_PROC_DESTROY: > if (gss_write_verf(rqstp, rsci->mechctx, gc->gc_seq)) > goto auth_err; > - rsci->h.expiry_time =3D get_seconds(); > - set_bit(CACHE_NEGATIVE, &rsci->h.flags); > + /* Delete the entry from the cache_list and call cache_put */ > + sunrpc_cache_unhash(sn->rsc_cache, &rsci->h); > if (resv->iov_len + 4 > PAGE_SIZE) > goto drop; > svc_putnl(resv, RPC_SUCCESS); > diff --git a/net/sunrpc/cache.c b/net/sunrpc/cache.c > index 8147e8d56eb2..502b9fe9817b 100644 > --- a/net/sunrpc/cache.c > +++ b/net/sunrpc/cache.c > @@ -1855,3 +1855,15 @@ void sunrpc_cache_unregister_pipefs(struct cache_d= etail *cd) > } > EXPORT_SYMBOL_GPL(sunrpc_cache_unregister_pipefs); >=20=20 > +void sunrpc_cache_unhash(struct cache_detail *cd, struct cache_head *h) > +{ > + write_lock(&cd->hash_lock); > + if (!hlist_unhashed(&h->cache_list)){ > + hlist_del_init(&h->cache_list); > + cd->entries--; > + write_unlock(&cd->hash_lock); > + cache_put(h, cd); > + } else > + write_unlock(&cd->hash_lock); > +} > +EXPORT_SYMBOL_GPL(sunrpc_cache_unhash); --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEG8Yp69OQ2HB7X0l6Oeye3VZigbkFAlhwL18ACgkQOeye3VZi gbkYLA/9EGT9gfZCFHaFpUF8QB/BGBu9AmD/OrIW0tOzsDBhg1eWwNfzKVTUqFn6 HsuAoK7qGM4WQAbb5+9bYiBA1gOQTl5ZiNNhXoiuuyMtJODzoNTKuMZafEtCHHeJ DLHCw4g0IPOp/Aikt8kNKL2QtXB69rIBqIMyD9aMsPzooNGZM31AN+6QkPrYJsdX vZjxOWiwVk4tfKGcdjlgqF4amd6wlDndrzhWPlTV1CW50ptz66sWuui1sjNLIUgl hoJg5mi7+M4WyZ41UmCxZEaI+G7pSGH1gmlULxsHGXIrHCjeufJ+KJWeNRJy8TxT okGg9KjUgrnsgRDi6rj4cYPgKA+pwss/mu/TlodpCuPYUxK4y0uT20rs7Z79K0sw YeIZHgxDKRip+HeecUlVJRVoIHh0E4FIchJBdHIHPdg4PK/i/lWku/Yk0xQz2ldB j/M+B9298W0R/W6Ykf8uCKNBN+xjtVZN6gwrNgzgxHUxMIfvVozo5QYPpsdj2c+x cW/2iK2dgm6XBUYQb0UEJpo81IzUIaN+BWyWE4pIltX6K0B0oEPFnB/tevi60o09 S9RpOkHLg/HhszQsYViumTKv9UtmPs1d0HqaydwVa4398iGWyA9KvjxmWOEc5oFa iMmKuPofu0cLsdFhPUMMScyyPQMGHENSaU6hhQDRQFm89AXQq6Q= =+pVS -----END PGP SIGNATURE----- --=-=-=--