X-Git-Url: https://git.whamcloud.com/?p=fs%2Flustre-release.git;a=blobdiff_plain;f=lustre%2Fobdclass%2Fcapa.c;h=5b5b3b1cc337d979b3f8d4f81f2794e57fddfdc5;hp=b832580b0874ae16d0e9bb0e6c02f4f0ac77581c;hb=8701e7e4b5ec1b34700c95b9b6588f4745730b72;hpb=4380cd857e3477a67e2325e26198b8de3a31a695 diff --git a/lustre/obdclass/capa.c b/lustre/obdclass/capa.c index b832580..5b5b3b1 100644 --- a/lustre/obdclass/capa.c +++ b/lustre/obdclass/capa.c @@ -1,30 +1,44 @@ -/* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*- - * vim:expandtab:shiftwidth=8:tabstop=8: +/* + * GPL HEADER START * - * lustre/obdclass/capa.c - * Lustre Capability Cache Management + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * - * Copyright (c) 2001-2003 Cluster File Systems, Inc. - * Author: Lai Siyao + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 only, + * as published by the Free Software Foundation. * - * This file is part of Lustre, http://www.lustre.org. + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License version 2 for more details (a copy is included + * in the LICENSE file that accompanied this code). * - * Lustre is free software; you can redistribute it and/or - * modify it under the terms of version 2 of the GNU General Public - * License as published by the Free Software Foundation. + * You should have received a copy of the GNU General Public License + * version 2 along with this program; If not, see + * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf * - * Lustre is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. + * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, + * CA 95054 USA or visit www.sun.com if you need additional information or + * have any questions. * - * You should have received a copy of the GNU General Public License - * along with Lustre; if not, write to the Free Software - * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. + * GPL HEADER END + */ +/* + * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved. + * Use is subject to license terms. + * + * Copyright (c) 2012, Intel Corporation. + */ +/* + * This file is part of Lustre, http://www.lustre.org/ + * Lustre is a trademark of Sun Microsystems, Inc. + * + * lustre/obdclass/capa.c + * + * Lustre Capability Hash Management + * + * Author: Lai Siyao */ -#ifndef EXPORT_SYMTAB -# define EXPORT_SYMTAB -#endif #define DEBUG_SUBSYSTEM S_SEC @@ -36,367 +50,406 @@ #include #include -#include -#include -#include -#include +#include +#include +#include #else #include #endif #include -#include +#include -kmem_cache_t *capa_cachep = NULL; +#define NR_CAPAHASH 32 +#define CAPA_HASH_SIZE 3000 /* for MDS & OSS */ -/* capa_lock protect capa hash, list and content. */ -spinlock_t capa_lock = SPIN_LOCK_UNLOCKED; -struct hlist_head *capa_hash; -struct list_head capa_list[3]; -static int capa_count[3] = { 0 }; +struct kmem_cache *capa_cachep; -/* TODO: mdc and llite all need this, so define it here. - * in the future it will be moved to ll_sb_info to support multi- - * mount point */ -struct timer_list ll_capa_timer; +#ifdef __KERNEL__ +/* lock for capa hash/capa_list/fo_capa_keys */ +DEFINE_SPINLOCK(capa_lock); -EXPORT_SYMBOL(capa_lock); -EXPORT_SYMBOL(capa_hash); +struct list_head capa_list[CAPA_SITE_MAX]; + +static struct capa_hmac_alg capa_hmac_algs[] = { + DEF_CAPA_HMAC_ALG("sha1", SHA1, 20, 20), +}; +#endif +/* capa count */ +int capa_count[CAPA_SITE_MAX] = { 0, }; + +EXPORT_SYMBOL(capa_cachep); EXPORT_SYMBOL(capa_list); -EXPORT_SYMBOL(ll_capa_timer); +EXPORT_SYMBOL(capa_lock); +EXPORT_SYMBOL(capa_count); -static inline int const -capa_hashfn(unsigned int uid, int capa_op, __u64 mdsid, unsigned long ino) +struct hlist_head *init_capa_hash(void) { - return (ino ^ uid) * (unsigned long)capa_op * (unsigned long)mdsid % - NR_CAPAHASH; + struct hlist_head *hash; + int nr_hash, i; + + OBD_ALLOC(hash, PAGE_CACHE_SIZE); + if (!hash) + return NULL; + + nr_hash = PAGE_CACHE_SIZE / sizeof(struct hlist_head); + LASSERT(nr_hash > NR_CAPAHASH); + + for (i = 0; i < NR_CAPAHASH; i++) + INIT_HLIST_HEAD(hash + i); + return hash; } +EXPORT_SYMBOL(init_capa_hash); -int capa_op(int flags) +#ifdef __KERNEL__ +static inline int capa_on_server(struct obd_capa *ocapa) { - if (flags & (FMODE_WRITE|MDS_OPEN_TRUNC)) - return CAPA_WRITE; - else if (flags & FMODE_READ) - return CAPA_READ; + return ocapa->c_site == CAPA_SITE_SERVER; +} - LBUG(); /* should be either MAY_READ or MAY_WRITE */ - return 0; +static inline void capa_delete(struct obd_capa *ocapa) +{ + LASSERT(capa_on_server(ocapa)); + hlist_del_init(&ocapa->u.tgt.c_hash); + list_del_init(&ocapa->c_list); + capa_count[ocapa->c_site]--; + /* release the ref when alloc */ + capa_put(ocapa); } -static struct obd_capa * -find_capa(struct hlist_head *head, uid_t uid, int capa_op, __u64 mdsid, - unsigned long ino, int type) +void cleanup_capa_hash(struct hlist_head *hash) { - struct hlist_node *pos; - struct obd_capa *ocapa; - uid_t ouid; + int i; + struct hlist_node *pos, *next; + struct obd_capa *oc; + + spin_lock(&capa_lock); + for (i = 0; i < NR_CAPAHASH; i++) { + cfs_hlist_for_each_entry_safe(oc, pos, next, hash + i, + u.tgt.c_hash) + capa_delete(oc); + } + spin_unlock(&capa_lock); + + OBD_FREE(hash, PAGE_CACHE_SIZE); +} +EXPORT_SYMBOL(cleanup_capa_hash); - hlist_for_each_entry(ocapa, pos, head, c_hash) { - if (ocapa->c_capa.lc_ino != ino) - continue; - if (ocapa->c_capa.lc_mdsid != mdsid) - continue; - if (ocapa->c_capa.lc_op != capa_op) - continue; - if (ocapa->c_type != type) - continue; +static inline int capa_hashfn(struct lu_fid *fid) +{ + return (fid_oid(fid) ^ fid_ver(fid)) * + (unsigned long)(fid_seq(fid) + 1) % NR_CAPAHASH; +} + +/* capa renewal time check is earlier than that on client, which is to prevent + * client renew right after obtaining it. */ +static inline int capa_is_to_expire(struct obd_capa *oc) +{ + return cfs_time_before(cfs_time_sub(oc->c_expiry, + cfs_time_seconds(oc->c_capa.lc_timeout)*2/3), + cfs_time_current()); +} - if (ocapa->c_type == CLIENT_CAPA) - ouid = ocapa->c_capa.lc_ruid; - else - ouid = ocapa->c_capa.lc_uid; +static struct obd_capa *find_capa(struct lustre_capa *capa, + struct hlist_head *head, int alive) +{ + struct hlist_node *pos; + struct obd_capa *ocapa; + int len = alive ? offsetof(struct lustre_capa, lc_keyid):sizeof(*capa); - if (ouid != uid) + cfs_hlist_for_each_entry(ocapa, pos, head, u.tgt.c_hash) { + if (memcmp(&ocapa->c_capa, capa, len)) + continue; + /* don't return one that will expire soon in this case */ + if (alive && capa_is_to_expire(ocapa)) continue; - DEBUG_CAPA(D_CACHE, &ocapa->c_capa, "found"); + LASSERT(capa_on_server(ocapa)); + DEBUG_CAPA(D_SEC, &ocapa->c_capa, "found"); return ocapa; } return NULL; } -inline void __capa_get(struct obd_capa *ocapa) +#define LRU_CAPA_DELETE_COUNT 12 +static inline void capa_delete_lru(struct list_head *head) { - if (ocapa->c_type != CLIENT_CAPA) - atomic_inc(&ocapa->c_refc); + struct obd_capa *ocapa; + struct list_head *node = head->next; + int count = 0; + + /* free LRU_CAPA_DELETE_COUNT unused capa from head */ + while (count++ < LRU_CAPA_DELETE_COUNT) { + ocapa = list_entry(node, struct obd_capa, c_list); + node = node->next; + if (atomic_read(&ocapa->c_refc)) + continue; + + DEBUG_CAPA(D_SEC, &ocapa->c_capa, "free lru"); + capa_delete(ocapa); + } } -static struct obd_capa * -find_capa_locked(struct hlist_head *head, uid_t uid, int capa_op, __u64 mdsid, - unsigned long ino, int type) +/* add or update */ +struct obd_capa *capa_add(struct hlist_head *hash, struct lustre_capa *capa) { - struct obd_capa *ocapa; + struct hlist_head *head = hash + capa_hashfn(&capa->lc_fid); + struct obd_capa *ocapa, *old = NULL; + struct list_head *list = &capa_list[CAPA_SITE_SERVER]; - spin_lock(&capa_lock); - ocapa = find_capa(head, uid, capa_op, mdsid, ino, type); - if (ocapa) - __capa_get(ocapa); - spin_unlock(&capa_lock); + ocapa = alloc_capa(CAPA_SITE_SERVER); + if (IS_ERR(ocapa)) + return NULL; - return ocapa; + spin_lock(&capa_lock); + old = find_capa(capa, head, 0); + if (!old) { + ocapa->c_capa = *capa; + set_capa_expiry(ocapa); + hlist_add_head(&ocapa->u.tgt.c_hash, head); + list_add_tail(&ocapa->c_list, list); + capa_get(ocapa); + capa_count[CAPA_SITE_SERVER]++; + if (capa_count[CAPA_SITE_SERVER] > CAPA_HASH_SIZE) + capa_delete_lru(list); + spin_unlock(&capa_lock); + return ocapa; + } else { + capa_get(old); + spin_unlock(&capa_lock); + capa_put(ocapa); + return old; + } } +EXPORT_SYMBOL(capa_add); -static struct obd_capa *alloc_capa(void) +struct obd_capa *capa_lookup(struct hlist_head *hash, struct lustre_capa *capa, + int alive) { - struct obd_capa *ocapa; - - OBD_SLAB_ALLOC(ocapa, capa_cachep, SLAB_NOFS, sizeof(*ocapa)); - if (ocapa) { - INIT_HLIST_NODE(&ocapa->c_hash); - INIT_LIST_HEAD(&ocapa->c_list); - } + struct obd_capa *ocapa; - return ocapa; -} + spin_lock(&capa_lock); + ocapa = find_capa(capa, hash + capa_hashfn(&capa->lc_fid), alive); + if (ocapa) { + list_move_tail(&ocapa->c_list, &capa_list[CAPA_SITE_SERVER]); + capa_get(ocapa); + } + spin_unlock(&capa_lock); -static void __capa_put(struct obd_capa *ocapa) -{ - hlist_del_init(&ocapa->c_hash); - list_del_init(&ocapa->c_list); - capa_count[ocapa->c_type]--; + return ocapa; } +EXPORT_SYMBOL(capa_lookup); -static void destroy_capa(struct obd_capa *ocapa) +int capa_hmac(__u8 *hmac, struct lustre_capa *capa, __u8 *key) { - OBD_SLAB_FREE(ocapa, capa_cachep, sizeof(*ocapa)); -} - -int capa_cache_init(void) -{ - int nr_hash, i; + struct crypto_hash *tfm; + struct capa_hmac_alg *alg; + int keylen; + struct scatterlist sl; + + if (capa_alg(capa) != CAPA_HMAC_ALG_SHA1) { + CERROR("unknown capability hmac algorithm!\n"); + return -EFAULT; + } - OBD_ALLOC(capa_hash, PAGE_SIZE); - if (!capa_hash) - return -ENOMEM; + alg = &capa_hmac_algs[capa_alg(capa)]; - nr_hash = PAGE_SIZE / sizeof(struct hlist_head); - LASSERT(nr_hash > NR_CAPAHASH); + tfm = crypto_alloc_hash(alg->ha_name, 0, 0); + if (IS_ERR(tfm)) { + CERROR("crypto_alloc_tfm failed, check whether your kernel" + "has crypto support!\n"); + return PTR_ERR(tfm); + } + keylen = alg->ha_keylen; - for (i = 0; i < NR_CAPAHASH; i++) - INIT_HLIST_HEAD(capa_hash + i); + sg_init_table(&sl, 1); + sg_set_page(&sl, virt_to_page(capa), + offsetof(struct lustre_capa, lc_hmac), + (unsigned long)(capa) % PAGE_CACHE_SIZE); - for (i = 0; i < 3; i++) - INIT_LIST_HEAD(&capa_list[i]); + ll_crypto_hmac(tfm, key, &keylen, &sl, sl.length, hmac); + crypto_free_hash(tfm); return 0; } +EXPORT_SYMBOL(capa_hmac); -void capa_cache_cleanup(void) +int capa_encrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen) { - struct obd_capa *ocapa; - struct hlist_node *pos, *n; - - hlist_for_each_entry_safe(ocapa, pos, n, capa_hash, c_hash) { - LASSERT(ocapa->c_type != CLIENT_CAPA); - __capa_put(ocapa); - destroy_capa(ocapa); + struct crypto_blkcipher *tfm; + struct scatterlist sd; + struct scatterlist ss; + struct blkcipher_desc desc; + unsigned int min; + int rc; + char alg[CRYPTO_MAX_ALG_NAME+1] = "aes"; + ENTRY; + + /* passing "aes" in a variable instead of a constant string keeps gcc + * 4.3.2 happy */ + tfm = crypto_alloc_blkcipher(alg, 0, 0 ); + if (IS_ERR(tfm)) { + CERROR("failed to load transform for aes\n"); + RETURN(PTR_ERR(tfm)); + } + + min = ll_crypto_tfm_alg_min_keysize(tfm); + if (keylen < min) { + CERROR("keylen at least %d bits for aes\n", min * 8); + GOTO(out, rc = -EINVAL); } - OBD_FREE(capa_hash, PAGE_SIZE); -} - - -static inline void list_add_capa(struct obd_capa *ocapa, struct list_head *head) -{ - struct obd_capa *tmp; - - /* XXX: capa is sorted in client, this could be optimized */ - if (ocapa->c_type == CLIENT_CAPA) { - list_for_each_entry_reverse(tmp, head, c_list) { - if (ocapa->c_capa.lc_expiry > tmp->c_capa.lc_expiry) { - list_add(&ocapa->c_list, &tmp->c_list); - return; - } - } + rc = crypto_blkcipher_setkey(tfm, key, min); + if (rc) { + CERROR("failed to setting key for aes\n"); + GOTO(out, rc); } - list_add_tail(&ocapa->c_list, head); -} - -static inline void do_update_capa(struct obd_capa *ocapa, struct lustre_capa *capa) -{ - memcpy(&ocapa->c_capa, capa, sizeof(*capa)); -} - -static struct obd_capa * -get_new_capa_locked(struct hlist_head *head, int type, struct lustre_capa *capa) -{ - uid_t uid = capa->lc_uid; - int capa_op = capa->lc_op; - __u64 mdsid = capa->lc_mdsid; - unsigned long ino = capa->lc_ino; - struct obd_capa *ocapa, *old; - - ocapa = alloc_capa(); - if (!ocapa) - return NULL; - - spin_lock(&capa_lock); - old = find_capa(head, uid, capa_op, mdsid, ino, type); - if (!old) { - do_update_capa(ocapa, capa); - ocapa->c_type = type; - list_add_capa(ocapa, &capa_list[type]); - hlist_add_head(&ocapa->c_hash, capa_hash); - if (type == CLIENT_CAPA) - INIT_LIST_HEAD(&ocapa->c_lli_list); - - capa_count[type]++; - - DEBUG_CAPA(D_CACHE, &ocapa->c_capa, "new"); - - if (type != CLIENT_CAPA && capa_count[type] > CAPA_CACHE_SIZE) { - struct list_head *node = capa_list[type].next; - struct obd_capa *tcapa; - int count = 0; - - /* free 12 unused capa from head */ - while (node->next != &capa_list[type] && count < 12) { - tcapa = list_entry(node, struct obd_capa, - c_list); - node = node->next; - if (atomic_read(&tcapa->c_refc) > 0) - continue; - DEBUG_CAPA(D_CACHE, &ocapa->c_capa, - "free unused"); - __capa_put(tcapa); - destroy_capa(tcapa); - count++; - } - } - - spin_unlock(&capa_lock); - return ocapa; + sg_init_table(&sd, 1); + sg_set_page(&sd, virt_to_page(d), 16, + (unsigned long)(d) % PAGE_CACHE_SIZE); + + sg_init_table(&ss, 1); + sg_set_page(&ss, virt_to_page(s), 16, + (unsigned long)(s) % PAGE_CACHE_SIZE); + desc.tfm = tfm; + desc.info = NULL; + desc.flags = 0; + rc = crypto_blkcipher_encrypt(&desc, &sd, &ss, 16); + if (rc) { + CERROR("failed to encrypt for aes\n"); + GOTO(out, rc); } - spin_unlock(&capa_lock); - destroy_capa(ocapa); - return old; -} + EXIT; -struct obd_capa * -capa_get(uid_t uid, int capa_op,__u64 mdsid, unsigned long ino, int type) -{ - struct hlist_head *head = capa_hash + - capa_hashfn(uid, capa_op, mdsid, ino); - struct obd_capa *ocapa; - - ocapa = find_capa_locked(head, uid, capa_op, mdsid, ino, type); - - return ocapa; +out: + crypto_free_blkcipher(tfm); + return rc; } +EXPORT_SYMBOL(capa_encrypt_id); -void capa_put(struct obd_capa *ocapa) +int capa_decrypt_id(__u32 *d, __u32 *s, __u8 *key, int keylen) { - if (!ocapa) - return; - - DEBUG_CAPA(D_CACHE, &ocapa->c_capa, "put"); - spin_lock(&capa_lock); - if (ocapa->c_type == CLIENT_CAPA) { - list_del_init(&ocapa->c_lli_list); - __capa_put(ocapa); - destroy_capa(ocapa); - } else { - atomic_dec(&ocapa->c_refc); + struct crypto_blkcipher *tfm; + struct scatterlist sd; + struct scatterlist ss; + struct blkcipher_desc desc; + unsigned int min; + int rc; + char alg[CRYPTO_MAX_ALG_NAME+1] = "aes"; + ENTRY; + + /* passing "aes" in a variable instead of a constant string keeps gcc + * 4.3.2 happy */ + tfm = crypto_alloc_blkcipher(alg, 0, 0 ); + if (IS_ERR(tfm)) { + CERROR("failed to load transform for aes\n"); + RETURN(PTR_ERR(tfm)); + } + + min = ll_crypto_tfm_alg_min_keysize(tfm); + if (keylen < min) { + CERROR("keylen at least %d bits for aes\n", min * 8); + GOTO(out, rc = -EINVAL); } - spin_unlock(&capa_lock); -} -static struct obd_capa *update_capa_locked(struct lustre_capa *capa, int type) -{ - uid_t uid = capa->lc_uid; - int capa_op = capa->lc_op; - __u64 mdsid = capa->lc_mdsid; - unsigned long ino = capa->lc_ino; - struct hlist_head *head = capa_hash + - capa_hashfn(uid, capa_op, mdsid, ino); - struct obd_capa *ocapa; + rc = crypto_blkcipher_setkey(tfm, key, min); + if (rc) { + CERROR("failed to setting key for aes\n"); + GOTO(out, rc); + } - spin_lock(&capa_lock); - ocapa = find_capa(head, uid, capa_op, mdsid, ino, type); - if (ocapa) - do_update_capa(ocapa, capa); - spin_unlock(&capa_lock); + sg_init_table(&sd, 1); + sg_set_page(&sd, virt_to_page(d), 16, + (unsigned long)(d) % PAGE_CACHE_SIZE); + + sg_init_table(&ss, 1); + sg_set_page(&ss, virt_to_page(s), 16, + (unsigned long)(s) % PAGE_CACHE_SIZE); + + desc.tfm = tfm; + desc.info = NULL; + desc.flags = 0; + rc = crypto_blkcipher_decrypt(&desc, &sd, &ss, 16); + if (rc) { + CERROR("failed to decrypt for aes\n"); + GOTO(out, rc); + } - if (!ocapa) - ocapa = get_new_capa_locked(head, type, capa); + EXIT; - return ocapa; +out: + crypto_free_blkcipher(tfm); + return rc; } +EXPORT_SYMBOL(capa_decrypt_id); +#endif -struct obd_capa *capa_renew(struct lustre_capa *capa, int type) +void capa_cpy(void *capa, struct obd_capa *ocapa) { - DEBUG_CAPA(D_INFO, capa, "renew"); - - return update_capa_locked(capa, type); + spin_lock(&ocapa->c_lock); + *(struct lustre_capa *)capa = ocapa->c_capa; + spin_unlock(&ocapa->c_lock); } +EXPORT_SYMBOL(capa_cpy); -void capa_hmac(struct crypto_tfm *tfm, __u8 *key, struct lustre_capa *capa) +void _debug_capa(struct lustre_capa *c, + struct libcfs_debug_msg_data *msgdata, + const char *fmt, ... ) { - int keylen = CAPA_KEY_LEN; - struct scatterlist sl = { - .page = virt_to_page(capa), - .offset = (unsigned long)(capa) % PAGE_SIZE, - .length = sizeof(struct lustre_capa_data), - }; - - LASSERT(tfm); - crypto_hmac(tfm, key, &keylen, &sl, 1, capa->lc_hmac); + va_list args; + va_start(args, fmt); + libcfs_debug_vmsg2(msgdata, fmt, args, + " capability@%p fid "DFID" opc "LPX64" uid "LPU64 + " gid "LPU64" flags %u alg %d keyid %u timeout %u " + "expiry %u\n", c, PFID(capa_fid(c)), capa_opc(c), + capa_uid(c), capa_gid(c), capa_flags(c), + capa_alg(c), capa_keyid(c), capa_timeout(c), + capa_expiry(c)); + va_end(args); } +EXPORT_SYMBOL(_debug_capa); -void capa_dup(void *dst, struct obd_capa *ocapa) -{ - spin_lock(&capa_lock); - memcpy(dst, &ocapa->c_capa, sizeof(ocapa->c_capa)); - spin_unlock(&capa_lock); -} +/* + * context key constructor/destructor: + * lu_capainfo_key_init, lu_capainfo_key_fini + */ +LU_KEY_INIT_FINI(lu_capainfo, struct lu_capainfo); -void capa_dup2(void *dst, struct lustre_capa *capa) -{ - spin_lock(&capa_lock); - memcpy(dst, capa, sizeof(*capa)); - spin_unlock(&capa_lock); -} +struct lu_context_key lu_capainfo_key = { + .lct_tags = LCT_SERVER_SESSION, + .lct_init = lu_capainfo_key_init, + .lct_fini = lu_capainfo_key_fini +}; -int capa_expired(struct lustre_capa *capa) +struct lu_capainfo *lu_capainfo_get(const struct lu_env *env) { - struct timeval tv; - - do_gettimeofday(&tv); - return (capa->lc_expiry < tv.tv_sec) ? 1 : 0; + /* NB, in mdt_init0 */ + if (env->le_ses == NULL) + return NULL; + return lu_context_key_get(env->le_ses, &lu_capainfo_key); } +EXPORT_SYMBOL(lu_capainfo_get); -int __capa_is_to_expire(struct obd_capa *ocapa) +/** + * Initialization of lu_capainfo_key data. + */ +int lu_capainfo_init(void) { - struct timeval tv; - int pre_expiry = capa_pre_expiry(&ocapa->c_capa); + int rc; - do_gettimeofday(&tv); - return (ocapa->c_capa.lc_expiry - pre_expiry - 1 <= tv.tv_sec)? 1 : 0; + LU_CONTEXT_KEY_INIT(&lu_capainfo_key); + rc = lu_context_key_register(&lu_capainfo_key); + return rc; } -int capa_is_to_expire(struct obd_capa *ocapa) +/** + * Dual to lu_capainfo_init(). + */ +void lu_capainfo_fini(void) { - int rc; - - spin_lock(&capa_lock); - rc = __capa_is_to_expire(ocapa); - spin_unlock(&capa_lock); - - return rc; + lu_context_key_degister(&lu_capainfo_key); } - -EXPORT_SYMBOL(capa_op); -EXPORT_SYMBOL(capa_get); -EXPORT_SYMBOL(capa_put); -EXPORT_SYMBOL(capa_renew); -EXPORT_SYMBOL(__capa_get); -EXPORT_SYMBOL(capa_hmac); -EXPORT_SYMBOL(capa_dup); -EXPORT_SYMBOL(capa_dup2); -EXPORT_SYMBOL(capa_expired); -EXPORT_SYMBOL(__capa_is_to_expire); -EXPORT_SYMBOL(capa_is_to_expire);