Blame view
net/sunrpc/svcauth_unix.c
21 KB
1da177e4c Linux-2.6.12-rc2 |
1 2 3 4 5 6 7 |
#include <linux/types.h> #include <linux/sched.h> #include <linux/module.h> #include <linux/sunrpc/types.h> #include <linux/sunrpc/xdr.h> #include <linux/sunrpc/svcsock.h> #include <linux/sunrpc/svcauth.h> |
c4170583f knfsd: nfsd4: sto... |
8 |
#include <linux/sunrpc/gss_api.h> |
5976687a2 sunrpc: move addr... |
9 |
#include <linux/sunrpc/addr.h> |
1da177e4c Linux-2.6.12-rc2 |
10 11 12 |
#include <linux/err.h> #include <linux/seq_file.h> #include <linux/hash.h> |
543537bd9 [PATCH] create a ... |
13 |
#include <linux/string.h> |
5a0e3ad6a include cleanup: ... |
14 |
#include <linux/slab.h> |
7b2b1fee3 [PATCH] knfsd: kn... |
15 |
#include <net/sock.h> |
f15364bd4 IPv6 support for ... |
16 17 |
#include <net/ipv6.h> #include <linux/kernel.h> |
ae2975bc3 userns: Convert g... |
18 |
#include <linux/user_namespace.h> |
1da177e4c Linux-2.6.12-rc2 |
19 |
#define RPCDBG_FACILITY RPCDBG_AUTH |
90d51b02f sunrpc: Make the ... |
20 |
#include "netns.h" |
1da177e4c Linux-2.6.12-rc2 |
21 22 23 24 25 26 |
/* * AUTHUNIX and AUTHNULL credentials are both handled here. * AUTHNULL is treated just like AUTHUNIX except that the uid/gid * are always nobody (-2). i.e. we do the same IP address checks for * AUTHNULL as for AUTHUNIX, and that is done here. */ |
1da177e4c Linux-2.6.12-rc2 |
27 28 |
struct unix_domain { struct auth_domain h; |
1da177e4c Linux-2.6.12-rc2 |
29 30 |
/* other stuff later */ }; |
13e0e958e svcauth_unix.c: q... |
31 |
extern struct auth_ops svcauth_null; |
efc36aa56 [PATCH] knfsd: Ch... |
32 |
extern struct auth_ops svcauth_unix; |
8b3e07ac9 svcrpc: fix rare ... |
33 34 35 36 37 38 39 |
static void svcauth_unix_domain_release(struct auth_domain *dom) { struct unix_domain *ud = container_of(dom, struct unix_domain, h); kfree(dom->name); kfree(ud); } |
1da177e4c Linux-2.6.12-rc2 |
40 41 |
struct auth_domain *unix_domain_find(char *name) { |
efc36aa56 [PATCH] knfsd: Ch... |
42 43 44 45 46 |
struct auth_domain *rv; struct unix_domain *new = NULL; rv = auth_domain_lookup(name, NULL); while(1) { |
ad1b5229d [PATCH] knfsd: Ti... |
47 48 |
if (rv) { if (new && rv != &new->h) |
352b5d13c svcrpc: fix bad a... |
49 |
svcauth_unix_domain_release(&new->h); |
ad1b5229d [PATCH] knfsd: Ti... |
50 51 52 53 54 |
if (rv->flavour != &svcauth_unix) { auth_domain_put(rv); return NULL; } |
efc36aa56 [PATCH] knfsd: Ch... |
55 56 |
return rv; } |
efc36aa56 [PATCH] knfsd: Ch... |
57 58 59 60 61 62 |
new = kmalloc(sizeof(*new), GFP_KERNEL); if (new == NULL) return NULL; kref_init(&new->h.ref); new->h.name = kstrdup(name, GFP_KERNEL); |
dd08d6ea4 [PATCH] knfsd: Do... |
63 64 65 66 |
if (new->h.name == NULL) { kfree(new); return NULL; } |
efc36aa56 [PATCH] knfsd: Ch... |
67 |
new->h.flavour = &svcauth_unix; |
efc36aa56 [PATCH] knfsd: Ch... |
68 |
rv = auth_domain_lookup(name, &new->h); |
1da177e4c Linux-2.6.12-rc2 |
69 |
} |
1da177e4c Linux-2.6.12-rc2 |
70 |
} |
24c3767e4 SUNRPC: The sunrp... |
71 |
EXPORT_SYMBOL_GPL(unix_domain_find); |
1da177e4c Linux-2.6.12-rc2 |
72 |
|
1da177e4c Linux-2.6.12-rc2 |
73 74 75 76 77 78 79 |
/************************************************** * cache for IP address to unix_domain * as needed by AUTH_UNIX */ #define IP_HASHBITS 8 #define IP_HASHMAX (1<<IP_HASHBITS) |
1da177e4c Linux-2.6.12-rc2 |
80 81 82 83 |
struct ip_map { struct cache_head h; char m_class[8]; /* e.g. "nfsd" */ |
f15364bd4 IPv6 support for ... |
84 |
struct in6_addr m_addr; |
1da177e4c Linux-2.6.12-rc2 |
85 |
struct unix_domain *m_client; |
1da177e4c Linux-2.6.12-rc2 |
86 |
}; |
1da177e4c Linux-2.6.12-rc2 |
87 |
|
baab935ff [PATCH] knfsd: Co... |
88 |
static void ip_map_put(struct kref *kref) |
1da177e4c Linux-2.6.12-rc2 |
89 |
{ |
baab935ff [PATCH] knfsd: Co... |
90 |
struct cache_head *item = container_of(kref, struct cache_head, ref); |
1da177e4c Linux-2.6.12-rc2 |
91 |
struct ip_map *im = container_of(item, struct ip_map,h); |
baab935ff [PATCH] knfsd: Co... |
92 93 94 95 96 |
if (test_bit(CACHE_VALID, &item->flags) && !test_bit(CACHE_NEGATIVE, &item->flags)) auth_domain_put(&im->m_client->h); kfree(im); |
1da177e4c Linux-2.6.12-rc2 |
97 |
} |
ddbe50320 ipv6: add ipv6_ad... |
98 |
static inline int hash_ip6(const struct in6_addr *ip) |
f15364bd4 IPv6 support for ... |
99 |
{ |
ddbe50320 ipv6: add ipv6_ad... |
100 |
return hash_32(ipv6_addr_hash(ip), IP_HASHBITS); |
f15364bd4 IPv6 support for ... |
101 |
} |
1a9917c2d [PATCH] knfsd: Co... |
102 |
static int ip_map_match(struct cache_head *corig, struct cache_head *cnew) |
1da177e4c Linux-2.6.12-rc2 |
103 |
{ |
1a9917c2d [PATCH] knfsd: Co... |
104 105 |
struct ip_map *orig = container_of(corig, struct ip_map, h); struct ip_map *new = container_of(cnew, struct ip_map, h); |
f64f9e719 net: Move && and ... |
106 107 |
return strcmp(orig->m_class, new->m_class) == 0 && ipv6_addr_equal(&orig->m_addr, &new->m_addr); |
1da177e4c Linux-2.6.12-rc2 |
108 |
} |
1a9917c2d [PATCH] knfsd: Co... |
109 |
static void ip_map_init(struct cache_head *cnew, struct cache_head *citem) |
1da177e4c Linux-2.6.12-rc2 |
110 |
{ |
1a9917c2d [PATCH] knfsd: Co... |
111 112 |
struct ip_map *new = container_of(cnew, struct ip_map, h); struct ip_map *item = container_of(citem, struct ip_map, h); |
1da177e4c Linux-2.6.12-rc2 |
113 |
strcpy(new->m_class, item->m_class); |
4e3fd7a06 net: remove ipv6_... |
114 |
new->m_addr = item->m_addr; |
1da177e4c Linux-2.6.12-rc2 |
115 |
} |
1a9917c2d [PATCH] knfsd: Co... |
116 |
static void update(struct cache_head *cnew, struct cache_head *citem) |
1da177e4c Linux-2.6.12-rc2 |
117 |
{ |
1a9917c2d [PATCH] knfsd: Co... |
118 119 |
struct ip_map *new = container_of(cnew, struct ip_map, h); struct ip_map *item = container_of(citem, struct ip_map, h); |
efc36aa56 [PATCH] knfsd: Ch... |
120 |
kref_get(&item->m_client->h.ref); |
1da177e4c Linux-2.6.12-rc2 |
121 |
new->m_client = item->m_client; |
1da177e4c Linux-2.6.12-rc2 |
122 |
} |
1a9917c2d [PATCH] knfsd: Co... |
123 124 125 126 127 128 129 130 |
static struct cache_head *ip_map_alloc(void) { struct ip_map *i = kmalloc(sizeof(*i), GFP_KERNEL); if (i) return &i->h; else return NULL; } |
1da177e4c Linux-2.6.12-rc2 |
131 132 133 134 135 |
static void ip_map_request(struct cache_detail *cd, struct cache_head *h, char **bpp, int *blen) { |
f15364bd4 IPv6 support for ... |
136 |
char text_addr[40]; |
1da177e4c Linux-2.6.12-rc2 |
137 |
struct ip_map *im = container_of(h, struct ip_map, h); |
1da177e4c Linux-2.6.12-rc2 |
138 |
|
f15364bd4 IPv6 support for ... |
139 |
if (ipv6_addr_v4mapped(&(im->m_addr))) { |
21454aaad net: replace NIPQ... |
140 |
snprintf(text_addr, 20, "%pI4", &im->m_addr.s6_addr32[3]); |
f15364bd4 IPv6 support for ... |
141 |
} else { |
5b095d989 net: replace %p6 ... |
142 |
snprintf(text_addr, 40, "%pI6", &im->m_addr); |
f15364bd4 IPv6 support for ... |
143 |
} |
1da177e4c Linux-2.6.12-rc2 |
144 145 146 147 148 |
qword_add(bpp, blen, im->m_class); qword_add(bpp, blen, text_addr); (*bpp)[-1] = ' '; } |
bf18ab32f sunrpc: Pass the ... |
149 150 |
static struct ip_map *__ip_map_lookup(struct cache_detail *cd, char *class, struct in6_addr *addr); static int __ip_map_update(struct cache_detail *cd, struct ip_map *ipm, struct unix_domain *udom, time_t expiry); |
1da177e4c Linux-2.6.12-rc2 |
151 152 153 154 155 156 157 158 159 |
static int ip_map_parse(struct cache_detail *cd, char *mesg, int mlen) { /* class ipaddress [domainname] */ /* should be safe just to use the start of the input buffer * for scratch: */ char *buf = mesg; int len; |
1a9917c2d [PATCH] knfsd: Co... |
160 |
char class[8]; |
07396051a SUNRPC: Use rpc_p... |
161 162 163 164 165 166 |
union { struct sockaddr sa; struct sockaddr_in s4; struct sockaddr_in6 s6; } address; struct sockaddr_in6 sin6; |
1a9917c2d [PATCH] knfsd: Co... |
167 168 169 |
int err; struct ip_map *ipmp; |
1da177e4c Linux-2.6.12-rc2 |
170 171 172 173 174 175 176 177 178 |
struct auth_domain *dom; time_t expiry; if (mesg[mlen-1] != ' ') return -EINVAL; mesg[mlen-1] = 0; /* class */ |
1a9917c2d [PATCH] knfsd: Co... |
179 |
len = qword_get(&mesg, class, sizeof(class)); |
1da177e4c Linux-2.6.12-rc2 |
180 181 182 183 184 |
if (len <= 0) return -EINVAL; /* ip address */ len = qword_get(&mesg, buf, mlen); if (len <= 0) return -EINVAL; |
d05cc1040 SUNRPC: ip map ca... |
185 |
if (rpc_pton(cd->net, buf, len, &address.sa, sizeof(address)) == 0) |
1da177e4c Linux-2.6.12-rc2 |
186 |
return -EINVAL; |
07396051a SUNRPC: Use rpc_p... |
187 188 189 |
switch (address.sa.sa_family) { case AF_INET: /* Form a mapped IPv4 address in sin6 */ |
07396051a SUNRPC: Use rpc_p... |
190 |
sin6.sin6_family = AF_INET6; |
70dc78da2 sunrpc: Use helpe... |
191 192 |
ipv6_addr_set_v4mapped(address.s4.sin_addr.s_addr, &sin6.sin6_addr); |
07396051a SUNRPC: Use rpc_p... |
193 |
break; |
dfd56b8b3 net: use IS_ENABL... |
194 |
#if IS_ENABLED(CONFIG_IPV6) |
07396051a SUNRPC: Use rpc_p... |
195 196 197 198 199 200 201 |
case AF_INET6: memcpy(&sin6, &address.s6, sizeof(sin6)); break; #endif default: return -EINVAL; } |
cca5172a7 [NET] SUNRPC: Fix... |
202 |
|
1da177e4c Linux-2.6.12-rc2 |
203 204 205 206 207 208 209 210 211 212 213 214 215 216 |
expiry = get_expiry(&mesg); if (expiry ==0) return -EINVAL; /* domainname, or empty for NEGATIVE */ len = qword_get(&mesg, buf, mlen); if (len < 0) return -EINVAL; if (len) { dom = unix_domain_find(buf); if (dom == NULL) return -ENOENT; } else dom = NULL; |
07396051a SUNRPC: Use rpc_p... |
217 |
/* IPv6 scope IDs are ignored for now */ |
bf18ab32f sunrpc: Pass the ... |
218 |
ipmp = __ip_map_lookup(cd, class, &sin6.sin6_addr); |
1a9917c2d [PATCH] knfsd: Co... |
219 |
if (ipmp) { |
bf18ab32f sunrpc: Pass the ... |
220 |
err = __ip_map_update(cd, ipmp, |
1a9917c2d [PATCH] knfsd: Co... |
221 222 |
container_of(dom, struct unix_domain, h), expiry); |
1da177e4c Linux-2.6.12-rc2 |
223 |
} else |
1a9917c2d [PATCH] knfsd: Co... |
224 |
err = -ENOMEM; |
1da177e4c Linux-2.6.12-rc2 |
225 |
|
1da177e4c Linux-2.6.12-rc2 |
226 227 |
if (dom) auth_domain_put(dom); |
1a9917c2d [PATCH] knfsd: Co... |
228 |
|
1da177e4c Linux-2.6.12-rc2 |
229 |
cache_flush(); |
1a9917c2d [PATCH] knfsd: Co... |
230 |
return err; |
1da177e4c Linux-2.6.12-rc2 |
231 232 233 234 235 236 237 |
} static int ip_map_show(struct seq_file *m, struct cache_detail *cd, struct cache_head *h) { struct ip_map *im; |
f15364bd4 IPv6 support for ... |
238 |
struct in6_addr addr; |
1da177e4c Linux-2.6.12-rc2 |
239 240 241 242 243 244 245 246 247 |
char *dom = "-no-domain-"; if (h == NULL) { seq_puts(m, "#class IP domain "); return 0; } im = container_of(h, struct ip_map, h); /* class addr domain */ |
4e3fd7a06 net: remove ipv6_... |
248 |
addr = im->m_addr; |
1da177e4c Linux-2.6.12-rc2 |
249 |
|
cca5172a7 [NET] SUNRPC: Fix... |
250 |
if (test_bit(CACHE_VALID, &h->flags) && |
1da177e4c Linux-2.6.12-rc2 |
251 252 |
!test_bit(CACHE_NEGATIVE, &h->flags)) dom = im->m_client->h.name; |
f15364bd4 IPv6 support for ... |
253 |
if (ipv6_addr_v4mapped(&addr)) { |
21454aaad net: replace NIPQ... |
254 255 256 |
seq_printf(m, "%s %pI4 %s ", im->m_class, &addr.s6_addr32[3], dom); |
f15364bd4 IPv6 support for ... |
257 |
} else { |
5b095d989 net: replace %p6 ... |
258 259 |
seq_printf(m, "%s %pI6 %s ", im->m_class, &addr, dom); |
f15364bd4 IPv6 support for ... |
260 |
} |
1da177e4c Linux-2.6.12-rc2 |
261 262 |
return 0; } |
cca5172a7 [NET] SUNRPC: Fix... |
263 |
|
1da177e4c Linux-2.6.12-rc2 |
264 |
|
bf18ab32f sunrpc: Pass the ... |
265 266 |
static struct ip_map *__ip_map_lookup(struct cache_detail *cd, char *class, struct in6_addr *addr) |
1a9917c2d [PATCH] knfsd: Co... |
267 268 269 270 271 |
{ struct ip_map ip; struct cache_head *ch; strcpy(ip.m_class, class); |
4e3fd7a06 net: remove ipv6_... |
272 |
ip.m_addr = *addr; |
bf18ab32f sunrpc: Pass the ... |
273 |
ch = sunrpc_cache_lookup(cd, &ip.h, |
1a9917c2d [PATCH] knfsd: Co... |
274 |
hash_str(class, IP_HASHBITS) ^ |
ddbe50320 ipv6: add ipv6_ad... |
275 |
hash_ip6(addr)); |
1a9917c2d [PATCH] knfsd: Co... |
276 277 278 279 280 281 |
if (ch) return container_of(ch, struct ip_map, h); else return NULL; } |
1da177e4c Linux-2.6.12-rc2 |
282 |
|
352114f39 sunrpc: Add net t... |
283 284 |
static inline struct ip_map *ip_map_lookup(struct net *net, char *class, struct in6_addr *addr) |
bf18ab32f sunrpc: Pass the ... |
285 |
{ |
90d51b02f sunrpc: Make the ... |
286 287 288 289 |
struct sunrpc_net *sn; sn = net_generic(net, sunrpc_net_id); return __ip_map_lookup(sn->ip_map_cache, class, addr); |
bf18ab32f sunrpc: Pass the ... |
290 291 292 293 |
} static int __ip_map_update(struct cache_detail *cd, struct ip_map *ipm, struct unix_domain *udom, time_t expiry) |
1a9917c2d [PATCH] knfsd: Co... |
294 295 296 297 298 299 300 301 |
{ struct ip_map ip; struct cache_head *ch; ip.m_client = udom; ip.h.flags = 0; if (!udom) set_bit(CACHE_NEGATIVE, &ip.h.flags); |
1a9917c2d [PATCH] knfsd: Co... |
302 |
ip.h.expiry_time = expiry; |
bf18ab32f sunrpc: Pass the ... |
303 |
ch = sunrpc_cache_update(cd, &ip.h, &ipm->h, |
1a9917c2d [PATCH] knfsd: Co... |
304 |
hash_str(ipm->m_class, IP_HASHBITS) ^ |
ddbe50320 ipv6: add ipv6_ad... |
305 |
hash_ip6(&ipm->m_addr)); |
1a9917c2d [PATCH] knfsd: Co... |
306 307 |
if (!ch) return -ENOMEM; |
bf18ab32f sunrpc: Pass the ... |
308 |
cache_put(ch, cd); |
1a9917c2d [PATCH] knfsd: Co... |
309 310 |
return 0; } |
1da177e4c Linux-2.6.12-rc2 |
311 |
|
352114f39 sunrpc: Add net t... |
312 313 |
static inline int ip_map_update(struct net *net, struct ip_map *ipm, struct unix_domain *udom, time_t expiry) |
bf18ab32f sunrpc: Pass the ... |
314 |
{ |
90d51b02f sunrpc: Make the ... |
315 316 317 318 |
struct sunrpc_net *sn; sn = net_generic(net, sunrpc_net_id); return __ip_map_update(sn->ip_map_cache, ipm, udom, expiry); |
bf18ab32f sunrpc: Pass the ... |
319 |
} |
e5f06f720 nfsd: make expkey... |
320 |
void svcauth_unix_purge(struct net *net) |
1da177e4c Linux-2.6.12-rc2 |
321 |
{ |
e5f06f720 nfsd: make expkey... |
322 |
struct sunrpc_net *sn; |
90d51b02f sunrpc: Make the ... |
323 |
|
e5f06f720 nfsd: make expkey... |
324 325 |
sn = net_generic(net, sunrpc_net_id); cache_purge(sn->ip_map_cache); |
1da177e4c Linux-2.6.12-rc2 |
326 |
} |
24c3767e4 SUNRPC: The sunrp... |
327 |
EXPORT_SYMBOL_GPL(svcauth_unix_purge); |
1da177e4c Linux-2.6.12-rc2 |
328 |
|
7b2b1fee3 [PATCH] knfsd: kn... |
329 |
static inline struct ip_map * |
3be4479fd sunrpc: Pass xprt... |
330 |
ip_map_cached_get(struct svc_xprt *xprt) |
7b2b1fee3 [PATCH] knfsd: kn... |
331 |
{ |
def13d740 svc: Move the aut... |
332 |
struct ip_map *ipm = NULL; |
90d51b02f sunrpc: Make the ... |
333 |
struct sunrpc_net *sn; |
def13d740 svc: Move the aut... |
334 335 336 337 338 |
if (test_bit(XPT_CACHE_AUTH, &xprt->xpt_flags)) { spin_lock(&xprt->xpt_lock); ipm = xprt->xpt_auth_cache; if (ipm != NULL) { |
7715cde86 net/sunrpc: xpt_a... |
339 340 |
sn = net_generic(xprt->xpt_net, sunrpc_net_id); if (cache_is_expired(sn->ip_map_cache, &ipm->h)) { |
def13d740 svc: Move the aut... |
341 342 343 344 345 346 347 |
/* * The entry has been invalidated since it was * remembered, e.g. by a second mount from the * same IP address. */ xprt->xpt_auth_cache = NULL; spin_unlock(&xprt->xpt_lock); |
90d51b02f sunrpc: Make the ... |
348 |
cache_put(&ipm->h, sn->ip_map_cache); |
def13d740 svc: Move the aut... |
349 350 351 |
return NULL; } cache_get(&ipm->h); |
7b2b1fee3 [PATCH] knfsd: kn... |
352 |
} |
def13d740 svc: Move the aut... |
353 |
spin_unlock(&xprt->xpt_lock); |
7b2b1fee3 [PATCH] knfsd: kn... |
354 355 356 357 358 |
} return ipm; } static inline void |
3be4479fd sunrpc: Pass xprt... |
359 |
ip_map_cached_put(struct svc_xprt *xprt, struct ip_map *ipm) |
7b2b1fee3 [PATCH] knfsd: kn... |
360 |
{ |
def13d740 svc: Move the aut... |
361 362 363 364 365 366 367 368 |
if (test_bit(XPT_CACHE_AUTH, &xprt->xpt_flags)) { spin_lock(&xprt->xpt_lock); if (xprt->xpt_auth_cache == NULL) { /* newly cached, keep the reference */ xprt->xpt_auth_cache = ipm; ipm = NULL; } spin_unlock(&xprt->xpt_lock); |
30f3deeee knfsd: use a spin... |
369 |
} |
90d51b02f sunrpc: Make the ... |
370 371 372 373 374 375 |
if (ipm) { struct sunrpc_net *sn; sn = net_generic(xprt->xpt_net, sunrpc_net_id); cache_put(&ipm->h, sn->ip_map_cache); } |
7b2b1fee3 [PATCH] knfsd: kn... |
376 377 378 |
} void |
e3bfca01c sunrpc: Make xprt... |
379 |
svcauth_unix_info_release(struct svc_xprt *xpt) |
7b2b1fee3 [PATCH] knfsd: kn... |
380 |
{ |
e3bfca01c sunrpc: Make xprt... |
381 382 383 |
struct ip_map *ipm; ipm = xpt->xpt_auth_cache; |
90d51b02f sunrpc: Make the ... |
384 385 386 387 388 389 |
if (ipm != NULL) { struct sunrpc_net *sn; sn = net_generic(xpt->xpt_net, sunrpc_net_id); cache_put(&ipm->h, sn->ip_map_cache); } |
7b2b1fee3 [PATCH] knfsd: kn... |
390 |
} |
3fc605a2a [PATCH] knfsd: al... |
391 392 393 |
/**************************************************************************** * auth.unix.gid cache * simple cache to map a UID to a list of GIDs |
5786461bd sunrpc: rename NF... |
394 |
* because AUTH_UNIX aka AUTH_SYS has a max of UNX_NGROUPS |
3fc605a2a [PATCH] knfsd: al... |
395 396 397 |
*/ #define GID_HASHBITS 8 #define GID_HASHMAX (1<<GID_HASHBITS) |
3fc605a2a [PATCH] knfsd: al... |
398 399 400 |
struct unix_gid { struct cache_head h; |
7eaf040b7 sunrpc: Use kuid_... |
401 |
kuid_t uid; |
3fc605a2a [PATCH] knfsd: al... |
402 403 |
struct group_info *gi; }; |
3fc605a2a [PATCH] knfsd: al... |
404 |
|
9e469e30d sunrpc: Hash uids... |
405 406 407 408 |
static int unix_gid_hash(kuid_t uid) { return hash_long(from_kuid(&init_user_ns, uid), GID_HASHBITS); } |
3fc605a2a [PATCH] knfsd: al... |
409 410 411 412 413 414 415 416 417 418 419 420 421 422 |
static void unix_gid_put(struct kref *kref) { struct cache_head *item = container_of(kref, struct cache_head, ref); struct unix_gid *ug = container_of(item, struct unix_gid, h); if (test_bit(CACHE_VALID, &item->flags) && !test_bit(CACHE_NEGATIVE, &item->flags)) put_group_info(ug->gi); kfree(ug); } static int unix_gid_match(struct cache_head *corig, struct cache_head *cnew) { struct unix_gid *orig = container_of(corig, struct unix_gid, h); struct unix_gid *new = container_of(cnew, struct unix_gid, h); |
0b4d51b02 sunrpc: Use uid_e... |
423 |
return uid_eq(orig->uid, new->uid); |
3fc605a2a [PATCH] knfsd: al... |
424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 |
} static void unix_gid_init(struct cache_head *cnew, struct cache_head *citem) { struct unix_gid *new = container_of(cnew, struct unix_gid, h); struct unix_gid *item = container_of(citem, struct unix_gid, h); new->uid = item->uid; } static void unix_gid_update(struct cache_head *cnew, struct cache_head *citem) { struct unix_gid *new = container_of(cnew, struct unix_gid, h); struct unix_gid *item = container_of(citem, struct unix_gid, h); get_group_info(item->gi); new->gi = item->gi; } static struct cache_head *unix_gid_alloc(void) { struct unix_gid *g = kmalloc(sizeof(*g), GFP_KERNEL); if (g) return &g->h; else return NULL; } static void unix_gid_request(struct cache_detail *cd, struct cache_head *h, char **bpp, int *blen) { char tuid[20]; struct unix_gid *ug = container_of(h, struct unix_gid, h); |
25da92637 sunrpc: Properly ... |
454 |
snprintf(tuid, 20, "%u", from_kuid(&init_user_ns, ug->uid)); |
3fc605a2a [PATCH] knfsd: al... |
455 456 457 458 |
qword_add(bpp, blen, tuid); (*bpp)[-1] = ' '; } |
7eaf040b7 sunrpc: Use kuid_... |
459 |
static struct unix_gid *unix_gid_lookup(struct cache_detail *cd, kuid_t uid); |
3fc605a2a [PATCH] knfsd: al... |
460 461 462 463 464 |
static int unix_gid_parse(struct cache_detail *cd, char *mesg, int mlen) { /* uid expiry Ngid gid0 gid1 ... gidN-1 */ |
25da92637 sunrpc: Properly ... |
465 466 |
int id; kuid_t uid; |
3fc605a2a [PATCH] knfsd: al... |
467 468 469 470 471 472 |
int gids; int rv; int i; int err; time_t expiry; struct unix_gid ug, *ugp; |
3476964db nfsd: remove some... |
473 474 |
if (mesg[mlen - 1] != ' ') |
3fc605a2a [PATCH] knfsd: al... |
475 476 |
return -EINVAL; mesg[mlen-1] = 0; |
25da92637 sunrpc: Properly ... |
477 |
rv = get_int(&mesg, &id); |
3fc605a2a [PATCH] knfsd: al... |
478 479 |
if (rv) return -EINVAL; |
25da92637 sunrpc: Properly ... |
480 |
uid = make_kuid(&init_user_ns, id); |
3fc605a2a [PATCH] knfsd: al... |
481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 |
ug.uid = uid; expiry = get_expiry(&mesg); if (expiry == 0) return -EINVAL; rv = get_int(&mesg, &gids); if (rv || gids < 0 || gids > 8192) return -EINVAL; ug.gi = groups_alloc(gids); if (!ug.gi) return -ENOMEM; for (i = 0 ; i < gids ; i++) { int gid; |
ae2975bc3 userns: Convert g... |
497 |
kgid_t kgid; |
3fc605a2a [PATCH] knfsd: al... |
498 499 500 501 |
rv = get_int(&mesg, &gid); err = -EINVAL; if (rv) goto out; |
ae2975bc3 userns: Convert g... |
502 503 504 |
kgid = make_kgid(&init_user_ns, gid); if (!gid_valid(kgid)) goto out; |
81243eacf cred: simpler, 1D... |
505 |
ug.gi->gid[i] = kgid; |
3fc605a2a [PATCH] knfsd: al... |
506 |
} |
c5d9b78d5 kernel: make grou... |
507 |
groups_sort(ug.gi); |
73393232d SUNRPC: create un... |
508 |
ugp = unix_gid_lookup(cd, uid); |
3fc605a2a [PATCH] knfsd: al... |
509 510 511 512 |
if (ugp) { struct cache_head *ch; ug.h.flags = 0; ug.h.expiry_time = expiry; |
73393232d SUNRPC: create un... |
513 |
ch = sunrpc_cache_update(cd, |
3fc605a2a [PATCH] knfsd: al... |
514 |
&ug.h, &ugp->h, |
9e469e30d sunrpc: Hash uids... |
515 |
unix_gid_hash(uid)); |
3fc605a2a [PATCH] knfsd: al... |
516 517 518 519 |
if (!ch) err = -ENOMEM; else { err = 0; |
73393232d SUNRPC: create un... |
520 |
cache_put(ch, cd); |
3fc605a2a [PATCH] knfsd: al... |
521 522 523 524 525 526 527 528 529 530 531 532 533 |
} } else err = -ENOMEM; out: if (ug.gi) put_group_info(ug.gi); return err; } static int unix_gid_show(struct seq_file *m, struct cache_detail *cd, struct cache_head *h) { |
25da92637 sunrpc: Properly ... |
534 |
struct user_namespace *user_ns = &init_user_ns; |
3fc605a2a [PATCH] knfsd: al... |
535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 |
struct unix_gid *ug; int i; int glen; if (h == NULL) { seq_puts(m, "#uid cnt: gids... "); return 0; } ug = container_of(h, struct unix_gid, h); if (test_bit(CACHE_VALID, &h->flags) && !test_bit(CACHE_NEGATIVE, &h->flags)) glen = ug->gi->ngroups; else glen = 0; |
25da92637 sunrpc: Properly ... |
550 |
seq_printf(m, "%u %d:", from_kuid_munged(user_ns, ug->uid), glen); |
3fc605a2a [PATCH] knfsd: al... |
551 |
for (i = 0; i < glen; i++) |
81243eacf cred: simpler, 1D... |
552 |
seq_printf(m, " %d", from_kgid_munged(user_ns, ug->gi->gid[i])); |
3fc605a2a [PATCH] knfsd: al... |
553 554 555 556 |
seq_printf(m, " "); return 0; } |
73393232d SUNRPC: create un... |
557 |
static struct cache_detail unix_gid_cache_template = { |
3fc605a2a [PATCH] knfsd: al... |
558 559 |
.owner = THIS_MODULE, .hash_size = GID_HASHMAX, |
3fc605a2a [PATCH] knfsd: al... |
560 561 |
.name = "auth.unix.gid", .cache_put = unix_gid_put, |
73fb847a4 SUNRPC: introduce... |
562 |
.cache_request = unix_gid_request, |
3fc605a2a [PATCH] knfsd: al... |
563 564 565 566 567 568 569 |
.cache_parse = unix_gid_parse, .cache_show = unix_gid_show, .match = unix_gid_match, .init = unix_gid_init, .update = unix_gid_update, .alloc = unix_gid_alloc, }; |
73393232d SUNRPC: create un... |
570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 |
int unix_gid_cache_create(struct net *net) { struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); struct cache_detail *cd; int err; cd = cache_create_net(&unix_gid_cache_template, net); if (IS_ERR(cd)) return PTR_ERR(cd); err = cache_register_net(cd, net); if (err) { cache_destroy_net(cd, net); return err; } sn->unix_gid_cache = cd; return 0; } void unix_gid_cache_destroy(struct net *net) { struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); struct cache_detail *cd = sn->unix_gid_cache; sn->unix_gid_cache = NULL; cache_purge(cd); cache_unregister_net(cd, net); cache_destroy_net(cd, net); } |
7eaf040b7 sunrpc: Use kuid_... |
598 |
static struct unix_gid *unix_gid_lookup(struct cache_detail *cd, kuid_t uid) |
3fc605a2a [PATCH] knfsd: al... |
599 600 601 602 603 |
{ struct unix_gid ug; struct cache_head *ch; ug.uid = uid; |
9e469e30d sunrpc: Hash uids... |
604 |
ch = sunrpc_cache_lookup(cd, &ug.h, unix_gid_hash(uid)); |
3fc605a2a [PATCH] knfsd: al... |
605 606 607 608 609 |
if (ch) return container_of(ch, struct unix_gid, h); else return NULL; } |
7eaf040b7 sunrpc: Use kuid_... |
610 |
static struct group_info *unix_gid_find(kuid_t uid, struct svc_rqst *rqstp) |
3fc605a2a [PATCH] knfsd: al... |
611 |
{ |
dc83d6e27 nfsd4: don't try ... |
612 613 614 |
struct unix_gid *ug; struct group_info *gi; int ret; |
73393232d SUNRPC: create un... |
615 616 |
struct sunrpc_net *sn = net_generic(rqstp->rq_xprt->xpt_net, sunrpc_net_id); |
dc83d6e27 nfsd4: don't try ... |
617 |
|
73393232d SUNRPC: create un... |
618 |
ug = unix_gid_lookup(sn->unix_gid_cache, uid); |
3fc605a2a [PATCH] knfsd: al... |
619 |
if (!ug) |
dc83d6e27 nfsd4: don't try ... |
620 |
return ERR_PTR(-EAGAIN); |
73393232d SUNRPC: create un... |
621 |
ret = cache_check(sn->unix_gid_cache, &ug->h, &rqstp->rq_chandle); |
dc83d6e27 nfsd4: don't try ... |
622 |
switch (ret) { |
3fc605a2a [PATCH] knfsd: al... |
623 |
case -ENOENT: |
dc83d6e27 nfsd4: don't try ... |
624 |
return ERR_PTR(-ENOENT); |
1ebede86b sunrpc: close con... |
625 626 |
case -ETIMEDOUT: return ERR_PTR(-ESHUTDOWN); |
3fc605a2a [PATCH] knfsd: al... |
627 |
case 0: |
dc83d6e27 nfsd4: don't try ... |
628 |
gi = get_group_info(ug->gi); |
73393232d SUNRPC: create un... |
629 |
cache_put(&ug->h, sn->unix_gid_cache); |
dc83d6e27 nfsd4: don't try ... |
630 |
return gi; |
3fc605a2a [PATCH] knfsd: al... |
631 |
default: |
dc83d6e27 nfsd4: don't try ... |
632 |
return ERR_PTR(-EAGAIN); |
3fc605a2a [PATCH] knfsd: al... |
633 634 |
} } |
3ab4d8b12 knfsd: nfsd: set ... |
635 |
int |
1da177e4c Linux-2.6.12-rc2 |
636 637 |
svcauth_unix_set_client(struct svc_rqst *rqstp) { |
f15364bd4 IPv6 support for ... |
638 639 |
struct sockaddr_in *sin; struct sockaddr_in6 *sin6, sin6_storage; |
1a9917c2d [PATCH] knfsd: Co... |
640 |
struct ip_map *ipm; |
dc83d6e27 nfsd4: don't try ... |
641 642 |
struct group_info *gi; struct svc_cred *cred = &rqstp->rq_cred; |
3be4479fd sunrpc: Pass xprt... |
643 |
struct svc_xprt *xprt = rqstp->rq_xprt; |
90d51b02f sunrpc: Make the ... |
644 645 |
struct net *net = xprt->xpt_net; struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
1da177e4c Linux-2.6.12-rc2 |
646 |
|
f15364bd4 IPv6 support for ... |
647 648 649 650 |
switch (rqstp->rq_addr.ss_family) { case AF_INET: sin = svc_addr_in(rqstp); sin6 = &sin6_storage; |
b301e82cf IPv6: use ipv6_ad... |
651 |
ipv6_addr_set_v4mapped(sin->sin_addr.s_addr, &sin6->sin6_addr); |
f15364bd4 IPv6 support for ... |
652 653 654 655 656 657 658 |
break; case AF_INET6: sin6 = svc_addr_in6(rqstp); break; default: BUG(); } |
1da177e4c Linux-2.6.12-rc2 |
659 660 661 |
rqstp->rq_client = NULL; if (rqstp->rq_proc == 0) return SVC_OK; |
3be4479fd sunrpc: Pass xprt... |
662 |
ipm = ip_map_cached_get(xprt); |
7b2b1fee3 [PATCH] knfsd: kn... |
663 |
if (ipm == NULL) |
90d51b02f sunrpc: Make the ... |
664 |
ipm = __ip_map_lookup(sn->ip_map_cache, rqstp->rq_server->sv_program->pg_class, |
f15364bd4 IPv6 support for ... |
665 |
&sin6->sin6_addr); |
1da177e4c Linux-2.6.12-rc2 |
666 667 668 |
if (ipm == NULL) return SVC_DENIED; |
90d51b02f sunrpc: Make the ... |
669 |
switch (cache_check(sn->ip_map_cache, &ipm->h, &rqstp->rq_chandle)) { |
1da177e4c Linux-2.6.12-rc2 |
670 671 |
default: BUG(); |
e0bb89ef0 [PATCH] knfsd: nf... |
672 |
case -ETIMEDOUT: |
1ebede86b sunrpc: close con... |
673 674 |
return SVC_CLOSE; case -EAGAIN: |
1da177e4c Linux-2.6.12-rc2 |
675 676 677 678 679 |
return SVC_DROP; case -ENOENT: return SVC_DENIED; case 0: rqstp->rq_client = &ipm->m_client->h; |
efc36aa56 [PATCH] knfsd: Ch... |
680 |
kref_get(&rqstp->rq_client->ref); |
3be4479fd sunrpc: Pass xprt... |
681 |
ip_map_cached_put(xprt, ipm); |
1da177e4c Linux-2.6.12-rc2 |
682 683 |
break; } |
dc83d6e27 nfsd4: don't try ... |
684 685 686 687 688 |
gi = unix_gid_find(cred->cr_uid, rqstp); switch (PTR_ERR(gi)) { case -EAGAIN: return SVC_DROP; |
1ebede86b sunrpc: close con... |
689 690 |
case -ESHUTDOWN: return SVC_CLOSE; |
dc83d6e27 nfsd4: don't try ... |
691 692 693 694 695 696 |
case -ENOENT: break; default: put_group_info(cred->cr_group_info); cred->cr_group_info = gi; } |
1da177e4c Linux-2.6.12-rc2 |
697 698 |
return SVC_OK; } |
24c3767e4 SUNRPC: The sunrp... |
699 |
EXPORT_SYMBOL_GPL(svcauth_unix_set_client); |
3ab4d8b12 knfsd: nfsd: set ... |
700 |
|
1da177e4c Linux-2.6.12-rc2 |
701 |
static int |
d8ed029d6 [SUNRPC]: trivial... |
702 |
svcauth_null_accept(struct svc_rqst *rqstp, __be32 *authp) |
1da177e4c Linux-2.6.12-rc2 |
703 704 705 706 |
{ struct kvec *argv = &rqstp->rq_arg.head[0]; struct kvec *resv = &rqstp->rq_res.head[0]; struct svc_cred *cred = &rqstp->rq_cred; |
1da177e4c Linux-2.6.12-rc2 |
707 708 |
if (argv->iov_len < 3*4) return SVC_GARBAGE; |
cca5172a7 [NET] SUNRPC: Fix... |
709 |
if (svc_getu32(argv) != 0) { |
1da177e4c Linux-2.6.12-rc2 |
710 711 712 713 714 |
dprintk("svc: bad null cred "); *authp = rpc_autherr_badcred; return SVC_DENIED; } |
769943130 [SUNRPC]: svc_{ge... |
715 |
if (svc_getu32(argv) != htonl(RPC_AUTH_NULL) || svc_getu32(argv) != 0) { |
1da177e4c Linux-2.6.12-rc2 |
716 717 718 719 720 721 722 |
dprintk("svc: bad null verf "); *authp = rpc_autherr_badverf; return SVC_DENIED; } /* Signal that mapping to nobody uid/gid is required */ |
bf37f7943 sunrpc: Use usern... |
723 724 |
cred->cr_uid = INVALID_UID; cred->cr_gid = INVALID_GID; |
1da177e4c Linux-2.6.12-rc2 |
725 726 |
cred->cr_group_info = groups_alloc(0); if (cred->cr_group_info == NULL) |
1ebede86b sunrpc: close con... |
727 |
return SVC_CLOSE; /* kmalloc failure - client must retry */ |
1da177e4c Linux-2.6.12-rc2 |
728 729 |
/* Put NULL verifier */ |
769943130 [SUNRPC]: svc_{ge... |
730 731 |
svc_putnl(resv, RPC_AUTH_NULL); svc_putnl(resv, 0); |
1da177e4c Linux-2.6.12-rc2 |
732 |
|
d5497fc69 nfsd4: move rq_fl... |
733 |
rqstp->rq_cred.cr_flavor = RPC_AUTH_NULL; |
1da177e4c Linux-2.6.12-rc2 |
734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 |
return SVC_OK; } static int svcauth_null_release(struct svc_rqst *rqstp) { if (rqstp->rq_client) auth_domain_put(rqstp->rq_client); rqstp->rq_client = NULL; if (rqstp->rq_cred.cr_group_info) put_group_info(rqstp->rq_cred.cr_group_info); rqstp->rq_cred.cr_group_info = NULL; return 0; /* don't drop */ } struct auth_ops svcauth_null = { .name = "null", .owner = THIS_MODULE, .flavour = RPC_AUTH_NULL, .accept = svcauth_null_accept, .release = svcauth_null_release, .set_client = svcauth_unix_set_client, }; static int |
d8ed029d6 [SUNRPC]: trivial... |
762 |
svcauth_unix_accept(struct svc_rqst *rqstp, __be32 *authp) |
1da177e4c Linux-2.6.12-rc2 |
763 764 765 766 767 768 |
{ struct kvec *argv = &rqstp->rq_arg.head[0]; struct kvec *resv = &rqstp->rq_res.head[0]; struct svc_cred *cred = &rqstp->rq_cred; u32 slen, i; int len = argv->iov_len; |
1da177e4c Linux-2.6.12-rc2 |
769 770 771 772 773 |
if ((len -= 3*4) < 0) return SVC_GARBAGE; svc_getu32(argv); /* length */ svc_getu32(argv); /* time stamp */ |
769943130 [SUNRPC]: svc_{ge... |
774 |
slen = XDR_QUADLEN(svc_getnl(argv)); /* machname length */ |
1da177e4c Linux-2.6.12-rc2 |
775 776 |
if (slen > 64 || (len -= (slen + 3)*4) < 0) goto badcred; |
d8ed029d6 [SUNRPC]: trivial... |
777 |
argv->iov_base = (void*)((__be32*)argv->iov_base + slen); /* skip machname */ |
1da177e4c Linux-2.6.12-rc2 |
778 |
argv->iov_len -= slen*4; |
afe3c3fd5 svcrpc: fix failu... |
779 780 781 782 783 784 785 |
/* * Note: we skip uid_valid()/gid_valid() checks here for * backwards compatibility with clients that use -1 id's. * Instead, -1 uid or gid is later mapped to the * (export-specific) anonymous id by nfsd_setuser. * Supplementary gid's will be left alone. */ |
f025adf19 sunrpc: Properly ... |
786 787 |
cred->cr_uid = make_kuid(&init_user_ns, svc_getnl(argv)); /* uid */ cred->cr_gid = make_kgid(&init_user_ns, svc_getnl(argv)); /* gid */ |
769943130 [SUNRPC]: svc_{ge... |
788 |
slen = svc_getnl(argv); /* gids length */ |
5786461bd sunrpc: rename NF... |
789 |
if (slen > UNX_NGROUPS || (len -= (slen + 2)*4) < 0) |
1da177e4c Linux-2.6.12-rc2 |
790 |
goto badcred; |
dc83d6e27 nfsd4: don't try ... |
791 792 |
cred->cr_group_info = groups_alloc(slen); if (cred->cr_group_info == NULL) |
1ebede86b sunrpc: close con... |
793 |
return SVC_CLOSE; |
ae2975bc3 userns: Convert g... |
794 795 |
for (i = 0; i < slen; i++) { kgid_t kgid = make_kgid(&init_user_ns, svc_getnl(argv)); |
81243eacf cred: simpler, 1D... |
796 |
cred->cr_group_info->gid[i] = kgid; |
ae2975bc3 userns: Convert g... |
797 |
} |
c5d9b78d5 kernel: make grou... |
798 |
groups_sort(cred->cr_group_info); |
769943130 [SUNRPC]: svc_{ge... |
799 |
if (svc_getu32(argv) != htonl(RPC_AUTH_NULL) || svc_getu32(argv) != 0) { |
1da177e4c Linux-2.6.12-rc2 |
800 801 802 803 804 |
*authp = rpc_autherr_badverf; return SVC_DENIED; } /* Put NULL verifier */ |
769943130 [SUNRPC]: svc_{ge... |
805 806 |
svc_putnl(resv, RPC_AUTH_NULL); svc_putnl(resv, 0); |
1da177e4c Linux-2.6.12-rc2 |
807 |
|
d5497fc69 nfsd4: move rq_fl... |
808 |
rqstp->rq_cred.cr_flavor = RPC_AUTH_UNIX; |
1da177e4c Linux-2.6.12-rc2 |
809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 |
return SVC_OK; badcred: *authp = rpc_autherr_badcred; return SVC_DENIED; } static int svcauth_unix_release(struct svc_rqst *rqstp) { /* Verifier (such as it is) is already in place. */ if (rqstp->rq_client) auth_domain_put(rqstp->rq_client); rqstp->rq_client = NULL; if (rqstp->rq_cred.cr_group_info) put_group_info(rqstp->rq_cred.cr_group_info); rqstp->rq_cred.cr_group_info = NULL; return 0; } struct auth_ops svcauth_unix = { .name = "unix", .owner = THIS_MODULE, .flavour = RPC_AUTH_UNIX, .accept = svcauth_unix_accept, .release = svcauth_unix_release, .domain_release = svcauth_unix_domain_release, .set_client = svcauth_unix_set_client, }; |
d05cc1040 SUNRPC: ip map ca... |
841 842 843 844 845 |
static struct cache_detail ip_map_cache_template = { .owner = THIS_MODULE, .hash_size = IP_HASHMAX, .name = "auth.unix.ip", .cache_put = ip_map_put, |
73fb847a4 SUNRPC: introduce... |
846 |
.cache_request = ip_map_request, |
d05cc1040 SUNRPC: ip map ca... |
847 848 849 850 851 852 853 |
.cache_parse = ip_map_parse, .cache_show = ip_map_show, .match = ip_map_match, .init = ip_map_init, .update = update, .alloc = ip_map_alloc, }; |
90d51b02f sunrpc: Make the ... |
854 855 |
int ip_map_cache_create(struct net *net) { |
90d51b02f sunrpc: Make the ... |
856 |
struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
d05cc1040 SUNRPC: ip map ca... |
857 858 |
struct cache_detail *cd; int err; |
90d51b02f sunrpc: Make the ... |
859 |
|
d05cc1040 SUNRPC: ip map ca... |
860 861 862 |
cd = cache_create_net(&ip_map_cache_template, net); if (IS_ERR(cd)) return PTR_ERR(cd); |
90d51b02f sunrpc: Make the ... |
863 |
err = cache_register_net(cd, net); |
d05cc1040 SUNRPC: ip map ca... |
864 865 866 867 |
if (err) { cache_destroy_net(cd, net); return err; } |
90d51b02f sunrpc: Make the ... |
868 869 |
sn->ip_map_cache = cd; return 0; |
90d51b02f sunrpc: Make the ... |
870 871 872 873 |
} void ip_map_cache_destroy(struct net *net) { |
d05cc1040 SUNRPC: ip map ca... |
874 875 |
struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); struct cache_detail *cd = sn->ip_map_cache; |
90d51b02f sunrpc: Make the ... |
876 |
|
d05cc1040 SUNRPC: ip map ca... |
877 878 879 880 |
sn->ip_map_cache = NULL; cache_purge(cd); cache_unregister_net(cd, net); cache_destroy_net(cd, net); |
90d51b02f sunrpc: Make the ... |
881 |
} |