rpc: let xdr layer allocate gssproxy receieve pages
authorJ. Bruce Fields <bfields@redhat.com>
Fri, 23 Aug 2013 21:26:28 +0000 (17:26 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 1 Oct 2013 16:17:48 +0000 (09:17 -0700)
commit d4a516560fc96a9d486a9939bcb567e3fdce8f49 upstream.

In theory the linux cred in a gssproxy reply can include up to
NGROUPS_MAX data, 256K of data.  In the common case we expect it to be
shorter.  So do as the nfsv3 ACL code does and let the xdr code allocate
the pages as they come in, instead of allocating a lot of pages that
won't typically be used.

Tested-by: Simo Sorce <simo@redhat.com>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/sunrpc/auth_gss/gss_rpc_upcall.c

index be95af3d1058c3c9dbd2ffc9482a6b5cc404ef19..f1eb0d16666c2750b0001d923fabbd572f2cbe7d 100644 (file)
@@ -223,18 +223,14 @@ static void gssp_free_receive_pages(struct gssx_arg_accept_sec_context *arg)
 
 static int gssp_alloc_receive_pages(struct gssx_arg_accept_sec_context *arg)
 {
-       int i;
-
        arg->npages = DIV_ROUND_UP(NGROUPS_MAX * 4, PAGE_SIZE);
        arg->pages = kzalloc(arg->npages * sizeof(struct page *), GFP_KERNEL);
-
-       for (i=0; i < arg->npages; i++) {
-               arg->pages[i] = alloc_page(GFP_KERNEL);
-               if (arg->pages[i] == NULL) {
-                       gssp_free_receive_pages(arg);
-                       return -ENOMEM;
-               }
-       }
+       /*
+        * XXX: actual pages are allocated by xdr layer in
+        * xdr_partial_copy_from_skb.
+        */
+       if (!arg->pages)
+               return -ENOMEM;
        return 0;
 }