Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2685308imu; Tue, 6 Nov 2018 20:17:36 -0800 (PST) X-Google-Smtp-Source: AJdET5eQHts50VDCsNYQ4PlpihMT4uxWw80KtU5HTKtsEpTGSrI8xWmci99qGobsHJg5QDMuZw8M X-Received: by 2002:a63:111c:: with SMTP id g28mr309690pgl.85.1541564256325; Tue, 06 Nov 2018 20:17:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541564256; cv=none; d=google.com; s=arc-20160816; b=0ULhT6P/zDz8/RhxdO+ukXBxFCkZNTty/ekgZp1yQ7+jPbGvIpMrKrjCEOqxpChHX8 x25lzJRD5bTrpi3qvmmPLURz9ptMJj+fcqBoL10eubinoPyqngiER2GM1kk6+isRhGUo KK1cdNvTUeDuDmmDwobblK1yypcIfQ2LDaIwrvCvyvHTotHUnqpj8V0ZK3DfJXdilxKr kBNKSYT3WRhDbM3B5Q+z52Yd0pR8wH/4igpeuLQeeZLDT5pHhvl/0jJ4Jvwn3xNEx2ez QYgqkzHqmxaGZpjbv+oYMNTckWv0oAhUFKQpvg1UEYCmcm2qKvsTYt1yQYUFzogTjI2y e21g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:cc:subject:date:to :from; bh=2YQGhFZAOWo6S8q/7sJP3gj9qVISdac90WFw4f/UNEo=; b=S/GCn8euyBDhLLYRaATGBhz8KaMsYnaVVaFtlTLBTNNqsH+7grHmZgYlRnof/zjoHG aHYmuGSq5Ja+Bo4qtxHEXNucYAXYDkEOHDXCj2VhqV1JjyI/n9P6Gkqn7GDZ3VPtNZty VNuE6+CCIwfORr6bsNLC6FgGXDAjaMfWJKIM9vkYOzVUbzded918ail7nAgy/rZMLqa7 qf6axcPiJHIRRX4ZOcO8FCHLmh9M89myhrGp7vnuIPBn2DFDVoXKj74xrJZ+Q1VkVSfc HJM/FiRfBO96gMWzNqu5UxxGb8XZWpP0LNkfPo1MIwm84tJFmPE8pSns2Num4Eu9DIXh ayTA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d8-v6si21855938pll.220.2018.11.06.20.17.21; Tue, 06 Nov 2018 20:17:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389438AbeKGNoi (ORCPT + 99 others); Wed, 7 Nov 2018 08:44:38 -0500 Received: from mx2.suse.de ([195.135.220.15]:57170 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2388667AbeKGNoh (ORCPT ); Wed, 7 Nov 2018 08:44:37 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2C106B659; Wed, 7 Nov 2018 04:16:00 +0000 (UTC) From: NeilBrown To: "J. Bruce Fields" , Chuck Lever , Jeff Layton , Trond Myklebust , Anna Schumaker Date: Wed, 07 Nov 2018 15:12:31 +1100 Subject: [PATCH 23/23] SUNRPC discard cr_uid from struct rpc_cred. Cc: Linux NFS Mailing List , linux-kernel@vger.kernel.org Message-ID: <154156395166.24086.4433778895891818320.stgit@noble> In-Reply-To: <154156285766.24086.14262073575778354276.stgit@noble> References: <154156285766.24086.14262073575778354276.stgit@noble> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Just use ->cr_cred->fsuid directly. Signed-off-by: NeilBrown --- include/linux/sunrpc/auth.h | 2 -- net/sunrpc/auth.c | 1 - net/sunrpc/auth_gss/auth_gss.c | 12 ++++++------ 3 files changed, 6 insertions(+), 9 deletions(-) diff --git a/include/linux/sunrpc/auth.h b/include/linux/sunrpc/auth.h index 5486082d3d63..eed3cb16ccf1 100644 --- a/include/linux/sunrpc/auth.h +++ b/include/linux/sunrpc/auth.h @@ -58,8 +58,6 @@ struct rpc_cred { refcount_t cr_count; /* ref count */ const struct cred *cr_cred; - kuid_t cr_uid; - /* per-flavor data */ }; #define RPCAUTH_CRED_NEW 0 diff --git a/net/sunrpc/auth.c b/net/sunrpc/auth.c index a07a7c59d3a4..1ff9768f5456 100644 --- a/net/sunrpc/auth.c +++ b/net/sunrpc/auth.c @@ -655,7 +655,6 @@ rpcauth_init_cred(struct rpc_cred *cred, const struct auth_cred *acred, cred->cr_ops = ops; cred->cr_expire = jiffies; cred->cr_cred = get_cred(acred->cred); - cred->cr_uid = acred->cred->fsuid; } EXPORT_SYMBOL_GPL(rpcauth_init_cred); diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index 4fa1881d31ca..9ab100e3346a 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b/net/sunrpc/auth_gss/auth_gss.c @@ -565,7 +565,7 @@ gss_setup_upcall(struct gss_auth *gss_auth, struct rpc_cred *cred) struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base); struct gss_upcall_msg *gss_new, *gss_msg; - kuid_t uid = cred->cr_uid; + kuid_t uid = cred->cr_cred->fsuid; gss_new = gss_alloc_msg(gss_auth, uid, gss_cred->gc_principal); if (IS_ERR(gss_new)) @@ -604,7 +604,7 @@ gss_refresh_upcall(struct rpc_task *task) int err = 0; dprintk("RPC: %5u %s for uid %u\n", - task->tk_pid, __func__, from_kuid(&init_user_ns, cred->cr_uid)); + task->tk_pid, __func__, from_kuid(&init_user_ns, cred->cr_cred->fsuid)); gss_msg = gss_setup_upcall(gss_auth, cred); if (PTR_ERR(gss_msg) == -EAGAIN) { /* XXX: warning on the first, under the assumption we @@ -637,7 +637,7 @@ gss_refresh_upcall(struct rpc_task *task) out: dprintk("RPC: %5u %s for uid %u result %d\n", task->tk_pid, __func__, - from_kuid(&init_user_ns, cred->cr_uid), err); + from_kuid(&init_user_ns, cred->cr_cred->fsuid), err); return err; } @@ -653,7 +653,7 @@ gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred) int err; dprintk("RPC: %s for uid %u\n", - __func__, from_kuid(&init_user_ns, cred->cr_uid)); + __func__, from_kuid(&init_user_ns, cred->cr_cred->fsuid)); retry: err = 0; /* if gssd is down, just skip upcalling altogether */ @@ -701,7 +701,7 @@ gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred) gss_release_msg(gss_msg); out: dprintk("RPC: %s for uid %u result %d\n", - __func__, from_kuid(&init_user_ns, cred->cr_uid), err); + __func__, from_kuid(&init_user_ns, cred->cr_cred->fsuid), err); return err; } @@ -1497,7 +1497,7 @@ gss_match(struct auth_cred *acred, struct rpc_cred *rc, int flags) } else { if (gss_cred->gc_principal != NULL) return 0; - ret = uid_eq(rc->cr_uid, acred->cred->fsuid); + ret = uid_eq(rc->cr_cred->fsuid, acred->cred->fsuid); } return ret; }