<html><head><meta name="color-scheme" content="light dark"></head><body><pre style="word-wrap: break-word; white-space: pre-wrap;">
From: David Howells &lt;dhowells@redhat.com&gt;

The attached patch uses RCU to manage the session keyring pointer in struct
signal_struct.  This means that searching need not disable interrupts and get
a the sighand spinlock to access this pointer.  Furthermore, by judicious use
of rcu_read_(un)lock(), this patch also avoids the need to take and put
refcounts on the session keyring itself, thus saving on even more atomic ops.

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
---

 25-akpm/security/keys/process_keys.c |   42 +++++++++++++++++------------------
 25-akpm/security/keys/request_key.c  |    7 ++---
 2 files changed, 24 insertions(+), 25 deletions(-)

diff -puN security/keys/process_keys.c~keys-use-rcu-to-manage-session-keyring-pointer security/keys/process_keys.c
--- 25/security/keys/process_keys.c~keys-use-rcu-to-manage-session-keyring-pointer	Thu Mar 24 15:22:33 2005
+++ 25-akpm/security/keys/process_keys.c	Thu Mar 24 15:22:33 2005
@@ -1,6 +1,6 @@
 /* process_keys.c: management of a process's keyrings
  *
- * Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.
+ * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
  * Written by David Howells (dhowells@redhat.com)
  *
  * This program is free software; you can redistribute it and/or
@@ -181,7 +181,7 @@ static int install_process_keyring(struc
 			goto error;
 		}
 
-		/* attach or swap keyrings */
+		/* attach keyring */
 		spin_lock_irqsave(&amp;tsk-&gt;sighand-&gt;siglock, flags);
 		if (!tsk-&gt;signal-&gt;process_keyring) {
 			tsk-&gt;signal-&gt;process_keyring = keyring;
@@ -227,12 +227,14 @@ static int install_session_keyring(struc
 
 	/* install the keyring */
 	spin_lock_irqsave(&amp;tsk-&gt;sighand-&gt;siglock, flags);
-	old = tsk-&gt;signal-&gt;session_keyring;
-	tsk-&gt;signal-&gt;session_keyring = keyring;
+	old = rcu_dereference(tsk-&gt;signal-&gt;session_keyring);
+	rcu_assign_pointer(tsk-&gt;signal-&gt;session_keyring, keyring);
 	spin_unlock_irqrestore(&amp;tsk-&gt;sighand-&gt;siglock, flags);
 
 	ret = 0;
 
+	/* we're using RCU on the pointer */
+	synchronize_kernel();
 	key_put(old);
  error:
 	return ret;
@@ -245,8 +247,6 @@ static int install_session_keyring(struc
  */
 int copy_thread_group_keys(struct task_struct *tsk)
 {
-	unsigned long flags;
-
 	key_check(current-&gt;thread_group-&gt;session_keyring);
 	key_check(current-&gt;thread_group-&gt;process_keyring);
 
@@ -254,10 +254,10 @@ int copy_thread_group_keys(struct task_s
 	tsk-&gt;signal-&gt;process_keyring = NULL;
 
 	/* same session keyring */
-	spin_lock_irqsave(&amp;current-&gt;sighand-&gt;siglock, flags);
+	rcu_read_lock();
 	tsk-&gt;signal-&gt;session_keyring =
-		key_get(current-&gt;signal-&gt;session_keyring);
-	spin_unlock_irqrestore(&amp;current-&gt;sighand-&gt;siglock, flags);
+		key_get(rcu_dereference(current-&gt;signal-&gt;session_keyring));
+	rcu_read_unlock();
 
 	return 0;
 
@@ -381,8 +381,7 @@ struct key *search_process_keyrings_aux(
 					key_match_func_t match)
 {
 	struct task_struct *tsk = current;
-	unsigned long flags;
-	struct key *key, *ret, *err, *tmp;
+	struct key *key, *ret, *err;
 
 	/* we want to return -EAGAIN or -ENOKEY if any of the keyrings were
 	 * searchable, but we failed to find a key or we found a negative key;
@@ -436,17 +435,18 @@ struct key *search_process_keyrings_aux(
 	}
 
 	/* search the session keyring last */
-	spin_lock_irqsave(&amp;tsk-&gt;sighand-&gt;siglock, flags);
-
-	tmp = tsk-&gt;signal-&gt;session_keyring;
-	if (!tmp)
-		tmp = tsk-&gt;user-&gt;session_keyring;
-	atomic_inc(&amp;tmp-&gt;usage);
-
-	spin_unlock_irqrestore(&amp;tsk-&gt;sighand-&gt;siglock, flags);
+	if (tsk-&gt;signal-&gt;session_keyring) {
+		rcu_read_lock();
+		key = keyring_search_aux(
+			rcu_dereference(tsk-&gt;signal-&gt;session_keyring),
+			type, description, match);
+		rcu_read_unlock();
+	}
+	else {
+		key = keyring_search_aux(tsk-&gt;user-&gt;session_keyring,
+					 type, description, match);
+	}
 
-	key = keyring_search_aux(tmp, type, description, match);
-	key_put(tmp);
 	if (!IS_ERR(key))
 		goto found;
 
diff -puN security/keys/request_key.c~keys-use-rcu-to-manage-session-keyring-pointer security/keys/request_key.c
--- 25/security/keys/request_key.c~keys-use-rcu-to-manage-session-keyring-pointer	Thu Mar 24 15:22:33 2005
+++ 25-akpm/security/keys/request_key.c	Thu Mar 24 15:22:33 2005
@@ -175,13 +175,12 @@ static struct key *__request_key_constru
 	key-&gt;expiry = now.tv_sec + key_negative_timeout;
 
 	if (current-&gt;signal-&gt;session_keyring) {
-		unsigned long flags;
 		struct key *keyring;
 
-		spin_lock_irqsave(&amp;current-&gt;sighand-&gt;siglock, flags);
-		keyring = current-&gt;signal-&gt;session_keyring;
+		rcu_read_lock();
+		keyring = rcu_dereference(current-&gt;signal-&gt;session_keyring);
 		atomic_inc(&amp;keyring-&gt;usage);
-		spin_unlock_irqrestore(&amp;current-&gt;sighand-&gt;siglock, flags);
+		rcu_read_unlock();
 
 		key_link(keyring, key);
 		key_put(keyring);
_
</pre></body></html>