Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6371009imu; Sun, 2 Dec 2018 16:37:27 -0800 (PST) X-Google-Smtp-Source: AFSGD/Vbjjpt4hVms6yEqrULuUNLRTzkr/bbH5NkpkwEhJj4fqSq9lfSbPgKKmFWAXw/nwT8fy4h X-Received: by 2002:a17:902:d70b:: with SMTP id w11mr14204274ply.294.1543797447560; Sun, 02 Dec 2018 16:37:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543797447; cv=none; d=google.com; s=arc-20160816; b=voqNsyi42woCWL+hprbk5lTDqtUrF8noFLVFexW4k7JShPDgZTgKpB98Y3JmyWY/wv +/t+6xtN0j9iQgQz4lcVSAxMn5WWDbV5uILdrIGqLVN5o8/a/pgWwywgoDcjdWKPvp58 C0mBaYeWgXnUE0pYYBmp/kc8E5KpDnn1sJR8IxfwaJzwaNWUvm21b0gk357VG5n0L/1l X2onbtiLBCk7+zMccldXLKymFwIa6FhHfzKOowqYBY08n6EjexQXC9GrL4zns6cTX9Vr lEijRImad/cjXnYSy08dzDdgX8jvaX3gVw4NtjccjSC5Lw/77Q4XAsQ2H1QiU+iC/LQL +K1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:cc:subject:date:to :from; bh=1lHQQshzG4Ls9TAfm5L7/8YSpk6YNSWj9yF/jzr8GXA=; b=TrDgZp6Nq0ziUmH8aSnYJSyNch3W1NGXmn72Y7bSlIzelPKYRvp3l3DyBwqG/OE5/F r2pQL3JiXWc0DxeRYuPo7xG8vP6mO2vWnOo0d8xckVh/rd9TntyhBr2QJve6IWPPsvMX PO2qWaL6biWk6Hg1RjVSKRlzDWaNZHV9UUXdOyMdol386kB8KqGskPnY+w7hbhdsZUNi forE5/H/pAVk2lEO0ncWm8JkScOKwFR07O2sr9BWWztm9o2AI0I/KPlK2/qykHP/zrvQ 17NYwwCAsr3IFVLB18Sh9/mJjOJbDwo4k6aNr3fpUrSELSCBj3x5/ISG7t2YHtbi/zd7 DuRA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q127si14404375pfq.19.2018.12.02.16.37.13; Sun, 02 Dec 2018 16:37:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726168AbeLCAed (ORCPT + 99 others); Sun, 2 Dec 2018 19:34:33 -0500 Received: from mx2.suse.de ([195.135.220.15]:41534 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725954AbeLCAec (ORCPT ); Sun, 2 Dec 2018 19:34:32 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id DC31CAC9C; Mon, 3 Dec 2018 00:34:24 +0000 (UTC) From: NeilBrown To: "J. Bruce Fields" , Chuck Lever , Jeff Layton , Trond Myklebust , Anna Schumaker Date: Mon, 03 Dec 2018 11:30:31 +1100 Subject: [PATCH 23/23] SUNRPC discard cr_uid from struct rpc_cred. Cc: Linux NFS Mailing List , linux-kernel@vger.kernel.org Message-ID: <154379703112.28598.17550217807806355303.stgit@noble> In-Reply-To: <154379689752.28598.6750646657534626618.stgit@noble> References: <154379689752.28598.6750646657534626618.stgit@noble> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Just use ->cr_cred->fsuid directly. Signed-off-by: NeilBrown --- include/linux/sunrpc/auth.h | 2 -- net/sunrpc/auth.c | 1 - net/sunrpc/auth_gss/auth_gss.c | 12 ++++++------ 3 files changed, 6 insertions(+), 9 deletions(-) diff --git a/include/linux/sunrpc/auth.h b/include/linux/sunrpc/auth.h index 5486082d3d63..eed3cb16ccf1 100644 --- a/include/linux/sunrpc/auth.h +++ b/include/linux/sunrpc/auth.h @@ -58,8 +58,6 @@ struct rpc_cred { refcount_t cr_count; /* ref count */ const struct cred *cr_cred; - kuid_t cr_uid; - /* per-flavor data */ }; #define RPCAUTH_CRED_NEW 0 diff --git a/net/sunrpc/auth.c b/net/sunrpc/auth.c index a07a7c59d3a4..1ff9768f5456 100644 --- a/net/sunrpc/auth.c +++ b/net/sunrpc/auth.c @@ -655,7 +655,6 @@ rpcauth_init_cred(struct rpc_cred *cred, const struct auth_cred *acred, cred->cr_ops = ops; cred->cr_expire = jiffies; cred->cr_cred = get_cred(acred->cred); - cred->cr_uid = acred->cred->fsuid; } EXPORT_SYMBOL_GPL(rpcauth_init_cred); diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index 1af8b3c365e1..42d5fa8852b2 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b/net/sunrpc/auth_gss/auth_gss.c @@ -565,7 +565,7 @@ gss_setup_upcall(struct gss_auth *gss_auth, struct rpc_cred *cred) struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base); struct gss_upcall_msg *gss_new, *gss_msg; - kuid_t uid = cred->cr_uid; + kuid_t uid = cred->cr_cred->fsuid; gss_new = gss_alloc_msg(gss_auth, uid, gss_cred->gc_principal); if (IS_ERR(gss_new)) @@ -604,7 +604,7 @@ gss_refresh_upcall(struct rpc_task *task) int err = 0; dprintk("RPC: %5u %s for uid %u\n", - task->tk_pid, __func__, from_kuid(&init_user_ns, cred->cr_uid)); + task->tk_pid, __func__, from_kuid(&init_user_ns, cred->cr_cred->fsuid)); gss_msg = gss_setup_upcall(gss_auth, cred); if (PTR_ERR(gss_msg) == -EAGAIN) { /* XXX: warning on the first, under the assumption we @@ -637,7 +637,7 @@ gss_refresh_upcall(struct rpc_task *task) out: dprintk("RPC: %5u %s for uid %u result %d\n", task->tk_pid, __func__, - from_kuid(&init_user_ns, cred->cr_uid), err); + from_kuid(&init_user_ns, cred->cr_cred->fsuid), err); return err; } @@ -653,7 +653,7 @@ gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred) int err; dprintk("RPC: %s for uid %u\n", - __func__, from_kuid(&init_user_ns, cred->cr_uid)); + __func__, from_kuid(&init_user_ns, cred->cr_cred->fsuid)); retry: err = 0; /* if gssd is down, just skip upcalling altogether */ @@ -701,7 +701,7 @@ gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred) gss_release_msg(gss_msg); out: dprintk("RPC: %s for uid %u result %d\n", - __func__, from_kuid(&init_user_ns, cred->cr_uid), err); + __func__, from_kuid(&init_user_ns, cred->cr_cred->fsuid), err); return err; } @@ -1520,7 +1520,7 @@ gss_match(struct auth_cred *acred, struct rpc_cred *rc, int flags) } else { if (gss_cred->gc_principal != NULL) return 0; - ret = uid_eq(rc->cr_uid, acred->cred->fsuid); + ret = uid_eq(rc->cr_cred->fsuid, acred->cred->fsuid); } return ret; }