Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp831878rdb; Fri, 17 Nov 2023 14:14:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IEraoQGI417P4FGqIY7MNPzJUIaey3zEGGfZkgRMruHTP+TH8dVc2h6qtDkV8nKXpAN9GrZ X-Received: by 2002:a05:6a21:33aa:b0:187:c082:3e35 with SMTP id yy42-20020a056a2133aa00b00187c0823e35mr575711pzb.14.1700259293740; Fri, 17 Nov 2023 14:14:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700259293; cv=none; d=google.com; s=arc-20160816; b=gpztSLHnZJYDqxMRYjEWwwlgLaaP01S5NR/7lHr37FDmIbmW3bN9w4kuEisjY4DAnR 5Otn3qJLCfE6H6MaZZTkNPQcmw2EaD1iFqSEzurG45GHjfTW8s1GUFQIbA2ljv51yG6l jW8LfN0/+bN06wC8p3P9oGVKe+JpIJ9/Jgddqr2DrPOSXhm+dWpUnZD4/PareZA3H9sE 8CYD3PIZZITKMFVIXBndioP/sLyLsPXrclb7eWgd4EMFo/Wre8MbUBSR+WAay3qSMG0l QvNOaVskZ2ARj0xKkzD1H9FFCkBwTKRfgrzecgkteZzOI5cEyfyZGtX61NVjck0ZJybP Z8wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:to:from:subject :dkim-signature; bh=0GN7PyWHnuRhP+Mz1HPDMaaDHml3mPZIAox3xjSIW+s=; fh=Mys3y4MwsHRytUQMpdfGBn3oGRYLcLloxNwkFYMYMmg=; b=xNfUY5ToT2Q1V4UHKMbhe26rp1PtpNOW8hoBpeUlK+mrVVIKmIQxj/3V27Y1ZxJhd1 yn10ZXnMvXRHUI65U8QGG9Ze3ogmAfUOlgrH5kF6QfRBh02fD5NyD9YGhM3sbbU4A0TD 2DR5rDn2wKPAsGH6OqPU8gsfou9mC8rOc0sYRiZIFsJaQ3CHyncgiiIPMreq7/rjkEHb euANuPpPKcmZloKeMdImrIOp5UmI73ozYj70zpWniuuyWoYu2R1gOstfVLKS1Ow+xKp4 8g9Bm0bdSdZ/PicRvr04HBtJNAZLdQzLKiJZ3QFTHi3xQCJLXvVwvxNWqntK5VGjnENb sZ2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=s5t9kyKS; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id bd32-20020a056a0027a000b006be0f4747e3si2808295pfb.123.2023.11.17.14.14.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Nov 2023 14:14:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=s5t9kyKS; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id DC7598257E0D; Fri, 17 Nov 2023 14:14:49 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233844AbjKQWOv (ORCPT + 99 others); Fri, 17 Nov 2023 17:14:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48274 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232628AbjKQWOv (ORCPT ); Fri, 17 Nov 2023 17:14:51 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E31BCD4E for ; Fri, 17 Nov 2023 14:14:47 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7132FC433C8 for ; Fri, 17 Nov 2023 22:14:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1700259287; bh=9oe8uXCu9s6YhWdGkxYpeJvuS+hFH9+8s2vul0ErwoA=; h=Subject:From:To:Date:In-Reply-To:References:From; b=s5t9kyKSsmEd4H1xyGDWQr3AgUWILwL0dCHjHjZl964c5lkv18eD9yb9rODC8LqiE 1OL7eLxUuMeYKz5ojU3HVXPBp2R0Ie5+V/Jdd0rkJksJMy3eJqi8sFSynFix5ymt3L 1y/Y3zhoDZWX+NbBRGjqzW9T9qpmsNDNCwV5PLhKIFoeZZVAY1ARAepNNNcgLnpBsT zCgDp91oTUgomodPNgJXCWLCEdxv1EgD35e0udxAYUWbAEVmo2WpRywBanRZbBf4aB 0wQhcrC8sZfTGKLrOOyzJFEkc/WhbxjCmZ5T2i/G8JvRr6rKfR/Zz4HJ4aFsc4GXG5 4ehTaExiPkhXQ== Subject: [PATCH v2 4/4] SUNRPC: Remove RQ_SPLICE_OK From: Chuck Lever To: linux-nfs@vger.kernel.org Date: Fri, 17 Nov 2023 17:14:46 -0500 Message-ID: <170025928643.4577.11219746525309912238.stgit@bazille.1015granger.net> In-Reply-To: <170025895725.4577.18051288602708688381.stgit@bazille.1015granger.net> References: <170025895725.4577.18051288602708688381.stgit@bazille.1015granger.net> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Fri, 17 Nov 2023 14:14:50 -0800 (PST) From: Chuck Lever This flag is no longer used. Signed-off-by: Chuck Lever --- include/linux/sunrpc/svc.h | 2 -- include/trace/events/sunrpc.h | 1 - net/sunrpc/auth_gss/svcauth_gss.c | 10 ---------- net/sunrpc/svc.c | 2 -- 4 files changed, 15 deletions(-) diff --git a/include/linux/sunrpc/svc.h b/include/linux/sunrpc/svc.h index b10f987509cc..544fcfe07479 100644 --- a/include/linux/sunrpc/svc.h +++ b/include/linux/sunrpc/svc.h @@ -260,8 +260,6 @@ enum { RQ_LOCAL, /* local request */ RQ_USEDEFERRAL, /* use deferral */ RQ_DROPME, /* drop current reply */ - RQ_SPLICE_OK, /* turned off in gss privacy to prevent - * encrypting page cache pages */ RQ_VICTIM, /* Have agreed to shut down */ RQ_DATA, /* request has data */ }; diff --git a/include/trace/events/sunrpc.h b/include/trace/events/sunrpc.h index 337c90787fb1..cdd3a45e6003 100644 --- a/include/trace/events/sunrpc.h +++ b/include/trace/events/sunrpc.h @@ -1675,7 +1675,6 @@ DEFINE_SVCXDRBUF_EVENT(sendto); svc_rqst_flag(LOCAL) \ svc_rqst_flag(USEDEFERRAL) \ svc_rqst_flag(DROPME) \ - svc_rqst_flag(SPLICE_OK) \ svc_rqst_flag(VICTIM) \ svc_rqst_flag_end(DATA) diff --git a/net/sunrpc/auth_gss/svcauth_gss.c b/net/sunrpc/auth_gss/svcauth_gss.c index 104d9a320142..24de94184700 100644 --- a/net/sunrpc/auth_gss/svcauth_gss.c +++ b/net/sunrpc/auth_gss/svcauth_gss.c @@ -866,14 +866,6 @@ svcauth_gss_unwrap_integ(struct svc_rqst *rqstp, u32 seq, struct gss_ctx *ctx) struct xdr_buf databody_integ; struct xdr_netobj checksum; - /* NFS READ normally uses splice to send data in-place. However - * the data in cache can change after the reply's MIC is computed - * but before the RPC reply is sent. To prevent the client from - * rejecting the server-computed MIC in this somewhat rare case, - * do not use splice with the GSS integrity service. - */ - clear_bit(RQ_SPLICE_OK, &rqstp->rq_flags); - /* Did we already verify the signature on the original pass through? */ if (rqstp->rq_deferred) return 0; @@ -948,8 +940,6 @@ svcauth_gss_unwrap_priv(struct svc_rqst *rqstp, u32 seq, struct gss_ctx *ctx) struct xdr_buf *buf = xdr->buf; unsigned int saved_len; - clear_bit(RQ_SPLICE_OK, &rqstp->rq_flags); - if (xdr_stream_decode_u32(xdr, &len) < 0) goto unwrap_failed; if (rqstp->rq_deferred) { diff --git a/net/sunrpc/svc.c b/net/sunrpc/svc.c index 3f2ea7a0496f..fa4e23fa0e09 100644 --- a/net/sunrpc/svc.c +++ b/net/sunrpc/svc.c @@ -1305,8 +1305,6 @@ svc_process_common(struct svc_rqst *rqstp) int rc; __be32 *p; - /* Will be turned off by GSS integrity and privacy services */ - set_bit(RQ_SPLICE_OK, &rqstp->rq_flags); /* Will be turned off only when NFSv4 Sessions are used */ set_bit(RQ_USEDEFERRAL, &rqstp->rq_flags); clear_bit(RQ_DROPME, &rqstp->rq_flags);