From patchwork Wed Jul 28 20:59:05 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ronnie Sahlberg X-Patchwork-Id: 1510974 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=linux-cifs-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=iI3WwbfN; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4GZmHV1bvgz9sRN for ; Thu, 29 Jul 2021 06:59:18 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231825AbhG1U7R (ORCPT ); Wed, 28 Jul 2021 16:59:17 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:45091 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231666AbhG1U7R (ORCPT ); Wed, 28 Jul 2021 16:59:17 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1627505955; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=UcyRLkwlIcNaW0i4OmvuvVpLcd4EW2LVh9Mr6yIipa4=; b=iI3WwbfNSoAtEPEPvCvGNchMUq9tksU9rQz3vf8S81XP0uRUZBg50Ce5VnmfA3emWR+Js0 zCMWaNF2RFUezUIJf9acc007NrAV1jqxD0k4vrf3rAyJAdg/jawsq2KAu/rO2oQqYUlVl+ 6+fSqUdkLw3NG840/wcGA91gWeFJtFg= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-114-yglPKF7FM_iNlZq9rH9IJg-1; Wed, 28 Jul 2021 16:59:13 -0400 X-MC-Unique: yglPKF7FM_iNlZq9rH9IJg-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C3555100A605; Wed, 28 Jul 2021 20:59:12 +0000 (UTC) Received: from localhost.localdomain (vpn2-54-204.bne.redhat.com [10.64.54.204]) by smtp.corp.redhat.com (Postfix) with ESMTP id 597B8136F5; Wed, 28 Jul 2021 20:59:12 +0000 (UTC) From: Ronnie Sahlberg To: linux-cifs Cc: Steve French Subject: [PATCH] cifs: add missing parsing of backupuid Date: Thu, 29 Jul 2021 06:59:05 +1000 Message-Id: <20210728205905.38004-1-lsahlber@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Precedence: bulk List-ID: X-Mailing-List: linux-cifs@vger.kernel.org We lost parsing of backupuid in the switch to new mount API. Add it back. Reported-by: Xiaoli Feng Signed-off-by: Ronnie Sahlberg --- fs/cifs/fs_context.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/fs/cifs/fs_context.c b/fs/cifs/fs_context.c index 9a59d7ff9a11..eed59bc1d913 100644 --- a/fs/cifs/fs_context.c +++ b/fs/cifs/fs_context.c @@ -925,6 +925,13 @@ static int smb3_fs_context_parse_param(struct fs_context *fc, ctx->cred_uid = uid; ctx->cruid_specified = true; break; + case Opt_backupuid: + uid = make_kuid(current_user_ns(), result.uint_32); + if (!uid_valid(uid)) + goto cifs_parse_mount_err; + ctx->backupuid = uid; + ctx->backupuid_specified = true; + break; case Opt_backupgid: gid = make_kgid(current_user_ns(), result.uint_32); if (!gid_valid(gid))