diff options
| author | Andrea Bastoni <bastoni@cs.unc.edu> | 2010-05-30 19:16:45 -0400 |
|---|---|---|
| committer | Andrea Bastoni <bastoni@cs.unc.edu> | 2010-05-30 19:16:45 -0400 |
| commit | ada47b5fe13d89735805b566185f4885f5a3f750 (patch) | |
| tree | 644b88f8a71896307d71438e9b3af49126ffb22b /net/sunrpc/auth.c | |
| parent | 43e98717ad40a4ae64545b5ba047c7b86aa44f4f (diff) | |
| parent | 3280f21d43ee541f97f8cda5792150d2dbec20d5 (diff) | |
Merge branch 'wip-2.6.34' into old-private-masterarchived-private-master
Diffstat (limited to 'net/sunrpc/auth.c')
| -rw-r--r-- | net/sunrpc/auth.c | 47 |
1 files changed, 27 insertions, 20 deletions
diff --git a/net/sunrpc/auth.c b/net/sunrpc/auth.c index 54a4e042f104..95afe79dd9d7 100644 --- a/net/sunrpc/auth.c +++ b/net/sunrpc/auth.c | |||
| @@ -123,16 +123,19 @@ rpcauth_unhash_cred_locked(struct rpc_cred *cred) | |||
| 123 | clear_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags); | 123 | clear_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags); |
| 124 | } | 124 | } |
| 125 | 125 | ||
| 126 | static void | 126 | static int |
| 127 | rpcauth_unhash_cred(struct rpc_cred *cred) | 127 | rpcauth_unhash_cred(struct rpc_cred *cred) |
| 128 | { | 128 | { |
| 129 | spinlock_t *cache_lock; | 129 | spinlock_t *cache_lock; |
| 130 | int ret; | ||
| 130 | 131 | ||
| 131 | cache_lock = &cred->cr_auth->au_credcache->lock; | 132 | cache_lock = &cred->cr_auth->au_credcache->lock; |
| 132 | spin_lock(cache_lock); | 133 | spin_lock(cache_lock); |
| 133 | if (atomic_read(&cred->cr_count) == 0) | 134 | ret = atomic_read(&cred->cr_count) == 0; |
| 135 | if (ret) | ||
| 134 | rpcauth_unhash_cred_locked(cred); | 136 | rpcauth_unhash_cred_locked(cred); |
| 135 | spin_unlock(cache_lock); | 137 | spin_unlock(cache_lock); |
| 138 | return ret; | ||
| 136 | } | 139 | } |
| 137 | 140 | ||
| 138 | /* | 141 | /* |
| @@ -234,7 +237,7 @@ rpcauth_prune_expired(struct list_head *free, int nr_to_scan) | |||
| 234 | list_for_each_entry_safe(cred, next, &cred_unused, cr_lru) { | 237 | list_for_each_entry_safe(cred, next, &cred_unused, cr_lru) { |
| 235 | 238 | ||
| 236 | /* Enforce a 60 second garbage collection moratorium */ | 239 | /* Enforce a 60 second garbage collection moratorium */ |
| 237 | if (time_in_range_open(cred->cr_expire, expired, jiffies) && | 240 | if (time_in_range(cred->cr_expire, expired, jiffies) && |
| 238 | test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) | 241 | test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) |
| 239 | continue; | 242 | continue; |
| 240 | 243 | ||
| @@ -332,9 +335,9 @@ rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred, | |||
| 332 | list_add_tail(&new->cr_lru, &free); | 335 | list_add_tail(&new->cr_lru, &free); |
| 333 | spin_unlock(&cache->lock); | 336 | spin_unlock(&cache->lock); |
| 334 | found: | 337 | found: |
| 335 | if (test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags) | 338 | if (test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags) && |
| 336 | && cred->cr_ops->cr_init != NULL | 339 | cred->cr_ops->cr_init != NULL && |
| 337 | && !(flags & RPCAUTH_LOOKUP_NEW)) { | 340 | !(flags & RPCAUTH_LOOKUP_NEW)) { |
| 338 | int res = cred->cr_ops->cr_init(auth, cred); | 341 | int res = cred->cr_ops->cr_init(auth, cred); |
| 339 | if (res < 0) { | 342 | if (res < 0) { |
| 340 | put_rpccred(cred); | 343 | put_rpccred(cred); |
| @@ -446,31 +449,35 @@ void | |||
| 446 | put_rpccred(struct rpc_cred *cred) | 449 | put_rpccred(struct rpc_cred *cred) |
| 447 | { | 450 | { |
| 448 | /* Fast path for unhashed credentials */ | 451 | /* Fast path for unhashed credentials */ |
| 449 | if (test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) | 452 | if (test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) == 0) { |
| 450 | goto need_lock; | 453 | if (atomic_dec_and_test(&cred->cr_count)) |
| 451 | 454 | cred->cr_ops->crdestroy(cred); | |
| 452 | if (!atomic_dec_and_test(&cred->cr_count)) | ||
| 453 | return; | 455 | return; |
| 454 | goto out_destroy; | 456 | } |
| 455 | need_lock: | 457 | |
| 456 | if (!atomic_dec_and_lock(&cred->cr_count, &rpc_credcache_lock)) | 458 | if (!atomic_dec_and_lock(&cred->cr_count, &rpc_credcache_lock)) |
| 457 | return; | 459 | return; |
| 458 | if (!list_empty(&cred->cr_lru)) { | 460 | if (!list_empty(&cred->cr_lru)) { |
| 459 | number_cred_unused--; | 461 | number_cred_unused--; |
| 460 | list_del_init(&cred->cr_lru); | 462 | list_del_init(&cred->cr_lru); |
| 461 | } | 463 | } |
| 462 | if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) == 0) | ||
| 463 | rpcauth_unhash_cred(cred); | ||
| 464 | if (test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) { | 464 | if (test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags) != 0) { |
| 465 | cred->cr_expire = jiffies; | 465 | if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) != 0) { |
| 466 | list_add_tail(&cred->cr_lru, &cred_unused); | 466 | cred->cr_expire = jiffies; |
| 467 | number_cred_unused++; | 467 | list_add_tail(&cred->cr_lru, &cred_unused); |
| 468 | spin_unlock(&rpc_credcache_lock); | 468 | number_cred_unused++; |
| 469 | return; | 469 | goto out_nodestroy; |
| 470 | } | ||
| 471 | if (!rpcauth_unhash_cred(cred)) { | ||
| 472 | /* We were hashed and someone looked us up... */ | ||
| 473 | goto out_nodestroy; | ||
| 474 | } | ||
| 470 | } | 475 | } |
| 471 | spin_unlock(&rpc_credcache_lock); | 476 | spin_unlock(&rpc_credcache_lock); |
| 472 | out_destroy: | ||
| 473 | cred->cr_ops->crdestroy(cred); | 477 | cred->cr_ops->crdestroy(cred); |
| 478 | return; | ||
| 479 | out_nodestroy: | ||
| 480 | spin_unlock(&rpc_credcache_lock); | ||
| 474 | } | 481 | } |
| 475 | EXPORT_SYMBOL_GPL(put_rpccred); | 482 | EXPORT_SYMBOL_GPL(put_rpccred); |
| 476 | 483 | ||
