4 * UID and GID to name mapping for clients.
6 * Copyright (c) 2002 The Regents of the University of Michigan.
9 * Marius Aamodt Eriksen <marius@umich.edu>
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. Neither the name of the University nor the names of its
21 * contributors may be used to endorse or promote products derived
22 * from this software without specific prior written permission.
24 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
25 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
26 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
31 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 #include <linux/types.h>
37 #include <linux/parser.h>
39 #include <linux/nfs_idmap.h>
40 #include <net/net_namespace.h>
41 #include <linux/sunrpc/rpc_pipe_fs.h>
42 #include <linux/nfs_fs.h>
43 #include <linux/nfs_fs_sb.h>
44 #include <linux/key.h>
45 #include <linux/keyctl.h>
46 #include <linux/key-type.h>
47 #include <keys/user-type.h>
48 #include <linux/module.h>
53 #define NFS_UINT_MAXLEN 11
55 static const struct cred
*id_resolver_cache
;
56 static struct key_type key_type_id_resolver_legacy
;
58 struct idmap_legacy_upcalldata
{
59 struct rpc_pipe_msg pipe_msg
;
60 struct idmap_msg idmap_msg
;
61 struct key_construction
*key_cons
;
66 struct rpc_pipe
*idmap_pipe
;
67 struct idmap_legacy_upcalldata
*idmap_upcall_data
;
68 struct mutex idmap_mutex
;
72 * nfs_fattr_init_names - initialise the nfs_fattr owner_name/group_name fields
73 * @fattr: fully initialised struct nfs_fattr
74 * @owner_name: owner name string cache
75 * @group_name: group name string cache
77 void nfs_fattr_init_names(struct nfs_fattr
*fattr
,
78 struct nfs4_string
*owner_name
,
79 struct nfs4_string
*group_name
)
81 fattr
->owner_name
= owner_name
;
82 fattr
->group_name
= group_name
;
85 static void nfs_fattr_free_owner_name(struct nfs_fattr
*fattr
)
87 fattr
->valid
&= ~NFS_ATTR_FATTR_OWNER_NAME
;
88 kfree(fattr
->owner_name
->data
);
91 static void nfs_fattr_free_group_name(struct nfs_fattr
*fattr
)
93 fattr
->valid
&= ~NFS_ATTR_FATTR_GROUP_NAME
;
94 kfree(fattr
->group_name
->data
);
97 static bool nfs_fattr_map_owner_name(struct nfs_server
*server
, struct nfs_fattr
*fattr
)
99 struct nfs4_string
*owner
= fattr
->owner_name
;
102 if (!(fattr
->valid
& NFS_ATTR_FATTR_OWNER_NAME
))
104 if (nfs_map_name_to_uid(server
, owner
->data
, owner
->len
, &uid
) == 0) {
106 fattr
->valid
|= NFS_ATTR_FATTR_OWNER
;
111 static bool nfs_fattr_map_group_name(struct nfs_server
*server
, struct nfs_fattr
*fattr
)
113 struct nfs4_string
*group
= fattr
->group_name
;
116 if (!(fattr
->valid
& NFS_ATTR_FATTR_GROUP_NAME
))
118 if (nfs_map_group_to_gid(server
, group
->data
, group
->len
, &gid
) == 0) {
120 fattr
->valid
|= NFS_ATTR_FATTR_GROUP
;
126 * nfs_fattr_free_names - free up the NFSv4 owner and group strings
127 * @fattr: a fully initialised nfs_fattr structure
129 void nfs_fattr_free_names(struct nfs_fattr
*fattr
)
131 if (fattr
->valid
& NFS_ATTR_FATTR_OWNER_NAME
)
132 nfs_fattr_free_owner_name(fattr
);
133 if (fattr
->valid
& NFS_ATTR_FATTR_GROUP_NAME
)
134 nfs_fattr_free_group_name(fattr
);
138 * nfs_fattr_map_and_free_names - map owner/group strings into uid/gid and free
139 * @server: pointer to the filesystem nfs_server structure
140 * @fattr: a fully initialised nfs_fattr structure
142 * This helper maps the cached NFSv4 owner/group strings in fattr into
143 * their numeric uid/gid equivalents, and then frees the cached strings.
145 void nfs_fattr_map_and_free_names(struct nfs_server
*server
, struct nfs_fattr
*fattr
)
147 if (nfs_fattr_map_owner_name(server
, fattr
))
148 nfs_fattr_free_owner_name(fattr
);
149 if (nfs_fattr_map_group_name(server
, fattr
))
150 nfs_fattr_free_group_name(fattr
);
153 static int nfs_map_string_to_numeric(const char *name
, size_t namelen
, __u32
*res
)
158 if (memchr(name
, '@', namelen
) != NULL
|| namelen
>= sizeof(buf
))
160 memcpy(buf
, name
, namelen
);
162 if (kstrtoul(buf
, 0, &val
) != 0)
168 static int nfs_map_numeric_to_string(__u32 id
, char *buf
, size_t buflen
)
170 return snprintf(buf
, buflen
, "%u", id
);
173 static struct key_type key_type_id_resolver
= {
174 .name
= "id_resolver",
175 .instantiate
= user_instantiate
,
177 .revoke
= user_revoke
,
178 .destroy
= user_destroy
,
179 .describe
= user_describe
,
183 static int nfs_idmap_init_keyring(void)
189 printk(KERN_NOTICE
"NFS: Registering the %s key type\n",
190 key_type_id_resolver
.name
);
192 cred
= prepare_kernel_cred(NULL
);
196 keyring
= keyring_alloc(".id_resolver",
197 GLOBAL_ROOT_UID
, GLOBAL_ROOT_GID
, cred
,
198 (KEY_POS_ALL
& ~KEY_POS_SETATTR
) |
199 KEY_USR_VIEW
| KEY_USR_READ
,
200 KEY_ALLOC_NOT_IN_QUOTA
, NULL
);
201 if (IS_ERR(keyring
)) {
202 ret
= PTR_ERR(keyring
);
203 goto failed_put_cred
;
206 ret
= register_key_type(&key_type_id_resolver
);
210 ret
= register_key_type(&key_type_id_resolver_legacy
);
212 goto failed_reg_legacy
;
214 set_bit(KEY_FLAG_ROOT_CAN_CLEAR
, &keyring
->flags
);
215 cred
->thread_keyring
= keyring
;
216 cred
->jit_keyring
= KEY_REQKEY_DEFL_THREAD_KEYRING
;
217 id_resolver_cache
= cred
;
221 unregister_key_type(&key_type_id_resolver
);
229 static void nfs_idmap_quit_keyring(void)
231 key_revoke(id_resolver_cache
->thread_keyring
);
232 unregister_key_type(&key_type_id_resolver
);
233 unregister_key_type(&key_type_id_resolver_legacy
);
234 put_cred(id_resolver_cache
);
238 * Assemble the description to pass to request_key()
239 * This function will allocate a new string and update dest to point
240 * at it. The caller is responsible for freeing dest.
242 * On error 0 is returned. Otherwise, the length of dest is returned.
244 static ssize_t
nfs_idmap_get_desc(const char *name
, size_t namelen
,
245 const char *type
, size_t typelen
, char **desc
)
248 size_t desclen
= typelen
+ namelen
+ 2;
250 *desc
= kmalloc(desclen
, GFP_KERNEL
);
255 memcpy(cp
, type
, typelen
);
259 memcpy(cp
, name
, namelen
);
265 static ssize_t
nfs_idmap_request_key(struct key_type
*key_type
,
266 const char *name
, size_t namelen
,
267 const char *type
, void *data
,
268 size_t data_size
, struct idmap
*idmap
)
270 const struct cred
*saved_cred
;
273 struct user_key_payload
*payload
;
276 ret
= nfs_idmap_get_desc(name
, namelen
, type
, strlen(type
), &desc
);
280 saved_cred
= override_creds(id_resolver_cache
);
282 rkey
= request_key_with_auxdata(key_type
, desc
, "", 0, idmap
);
284 rkey
= request_key(&key_type_id_resolver
, desc
, "");
285 revert_creds(saved_cred
);
294 rkey
->perm
|= KEY_USR_VIEW
;
296 ret
= key_validate(rkey
);
300 payload
= rcu_dereference(rkey
->payload
.data
);
301 if (IS_ERR_OR_NULL(payload
)) {
302 ret
= PTR_ERR(payload
);
306 ret
= payload
->datalen
;
307 if (ret
> 0 && ret
<= data_size
)
308 memcpy(data
, payload
->data
, ret
);
319 static ssize_t
nfs_idmap_get_key(const char *name
, size_t namelen
,
320 const char *type
, void *data
,
321 size_t data_size
, struct idmap
*idmap
)
323 ssize_t ret
= nfs_idmap_request_key(&key_type_id_resolver
,
324 name
, namelen
, type
, data
,
327 mutex_lock(&idmap
->idmap_mutex
);
328 ret
= nfs_idmap_request_key(&key_type_id_resolver_legacy
,
329 name
, namelen
, type
, data
,
331 mutex_unlock(&idmap
->idmap_mutex
);
337 static ssize_t
nfs_idmap_lookup_name(__u32 id
, const char *type
, char *buf
,
338 size_t buflen
, struct idmap
*idmap
)
340 char id_str
[NFS_UINT_MAXLEN
];
344 id_len
= snprintf(id_str
, sizeof(id_str
), "%u", id
);
345 ret
= nfs_idmap_get_key(id_str
, id_len
, type
, buf
, buflen
, idmap
);
352 static int nfs_idmap_lookup_id(const char *name
, size_t namelen
, const char *type
,
353 __u32
*id
, struct idmap
*idmap
)
355 char id_str
[NFS_UINT_MAXLEN
];
360 data_size
= nfs_idmap_get_key(name
, namelen
, type
, id_str
, NFS_UINT_MAXLEN
, idmap
);
361 if (data_size
<= 0) {
364 ret
= kstrtol(id_str
, 10, &id_long
);
365 *id
= (__u32
)id_long
;
370 /* idmap classic begins here */
373 Opt_find_uid
, Opt_find_gid
, Opt_find_user
, Opt_find_group
, Opt_find_err
376 static const match_table_t nfs_idmap_tokens
= {
377 { Opt_find_uid
, "uid:%s" },
378 { Opt_find_gid
, "gid:%s" },
379 { Opt_find_user
, "user:%s" },
380 { Opt_find_group
, "group:%s" },
381 { Opt_find_err
, NULL
}
384 static int nfs_idmap_legacy_upcall(struct key_construction
*, const char *, void *);
385 static ssize_t
idmap_pipe_downcall(struct file
*, const char __user
*,
387 static void idmap_release_pipe(struct inode
*);
388 static void idmap_pipe_destroy_msg(struct rpc_pipe_msg
*);
390 static const struct rpc_pipe_ops idmap_upcall_ops
= {
391 .upcall
= rpc_pipe_generic_upcall
,
392 .downcall
= idmap_pipe_downcall
,
393 .release_pipe
= idmap_release_pipe
,
394 .destroy_msg
= idmap_pipe_destroy_msg
,
397 static struct key_type key_type_id_resolver_legacy
= {
399 .instantiate
= user_instantiate
,
401 .revoke
= user_revoke
,
402 .destroy
= user_destroy
,
403 .describe
= user_describe
,
405 .request_key
= nfs_idmap_legacy_upcall
,
408 static void __nfs_idmap_unregister(struct rpc_pipe
*pipe
)
411 rpc_unlink(pipe
->dentry
);
414 static int __nfs_idmap_register(struct dentry
*dir
,
416 struct rpc_pipe
*pipe
)
418 struct dentry
*dentry
;
420 dentry
= rpc_mkpipe_dentry(dir
, "idmap", idmap
, pipe
);
422 return PTR_ERR(dentry
);
423 pipe
->dentry
= dentry
;
427 static void nfs_idmap_unregister(struct nfs_client
*clp
,
428 struct rpc_pipe
*pipe
)
430 struct net
*net
= clp
->cl_net
;
431 struct super_block
*pipefs_sb
;
433 pipefs_sb
= rpc_get_sb_net(net
);
435 __nfs_idmap_unregister(pipe
);
440 static int nfs_idmap_register(struct nfs_client
*clp
,
442 struct rpc_pipe
*pipe
)
444 struct net
*net
= clp
->cl_net
;
445 struct super_block
*pipefs_sb
;
448 pipefs_sb
= rpc_get_sb_net(net
);
450 if (clp
->cl_rpcclient
->cl_dentry
)
451 err
= __nfs_idmap_register(clp
->cl_rpcclient
->cl_dentry
,
459 nfs_idmap_new(struct nfs_client
*clp
)
462 struct rpc_pipe
*pipe
;
465 idmap
= kzalloc(sizeof(*idmap
), GFP_KERNEL
);
469 pipe
= rpc_mkpipe_data(&idmap_upcall_ops
, 0);
471 error
= PTR_ERR(pipe
);
475 error
= nfs_idmap_register(clp
, idmap
, pipe
);
477 rpc_destroy_pipe_data(pipe
);
481 idmap
->idmap_pipe
= pipe
;
482 mutex_init(&idmap
->idmap_mutex
);
484 clp
->cl_idmap
= idmap
;
489 nfs_idmap_delete(struct nfs_client
*clp
)
491 struct idmap
*idmap
= clp
->cl_idmap
;
495 nfs_idmap_unregister(clp
, idmap
->idmap_pipe
);
496 rpc_destroy_pipe_data(idmap
->idmap_pipe
);
497 clp
->cl_idmap
= NULL
;
501 static int __rpc_pipefs_event(struct nfs_client
*clp
, unsigned long event
,
502 struct super_block
*sb
)
507 case RPC_PIPEFS_MOUNT
:
508 err
= __nfs_idmap_register(clp
->cl_rpcclient
->cl_dentry
,
510 clp
->cl_idmap
->idmap_pipe
);
512 case RPC_PIPEFS_UMOUNT
:
513 if (clp
->cl_idmap
->idmap_pipe
) {
514 struct dentry
*parent
;
516 parent
= clp
->cl_idmap
->idmap_pipe
->dentry
->d_parent
;
517 __nfs_idmap_unregister(clp
->cl_idmap
->idmap_pipe
);
519 * Note: This is a dirty hack. SUNRPC hook has been
520 * called already but simple_rmdir() call for the
521 * directory returned with error because of idmap pipe
522 * inside. Thus now we have to remove this directory
525 if (rpc_rmdir(parent
))
526 printk(KERN_ERR
"NFS: %s: failed to remove "
527 "clnt dir!\n", __func__
);
531 printk(KERN_ERR
"NFS: %s: unknown event: %ld\n", __func__
,
538 static struct nfs_client
*nfs_get_client_for_event(struct net
*net
, int event
)
540 struct nfs_net
*nn
= net_generic(net
, nfs_net_id
);
541 struct dentry
*cl_dentry
;
542 struct nfs_client
*clp
;
546 spin_lock(&nn
->nfs_client_lock
);
547 list_for_each_entry(clp
, &nn
->nfs_client_list
, cl_share_link
) {
548 /* Wait for initialisation to finish */
549 if (clp
->cl_cons_state
== NFS_CS_INITING
) {
550 atomic_inc(&clp
->cl_count
);
551 spin_unlock(&nn
->nfs_client_lock
);
552 err
= nfs_wait_client_init_complete(clp
);
558 /* Skip nfs_clients that failed to initialise */
559 if (clp
->cl_cons_state
< 0)
562 if (clp
->rpc_ops
!= &nfs_v4_clientops
)
564 cl_dentry
= clp
->cl_idmap
->idmap_pipe
->dentry
;
565 if (((event
== RPC_PIPEFS_MOUNT
) && cl_dentry
) ||
566 ((event
== RPC_PIPEFS_UMOUNT
) && !cl_dentry
))
568 atomic_inc(&clp
->cl_count
);
569 spin_unlock(&nn
->nfs_client_lock
);
572 spin_unlock(&nn
->nfs_client_lock
);
576 static int rpc_pipefs_event(struct notifier_block
*nb
, unsigned long event
,
579 struct super_block
*sb
= ptr
;
580 struct nfs_client
*clp
;
583 if (!try_module_get(THIS_MODULE
))
586 while ((clp
= nfs_get_client_for_event(sb
->s_fs_info
, event
))) {
587 error
= __rpc_pipefs_event(clp
, event
, sb
);
592 module_put(THIS_MODULE
);
596 #define PIPEFS_NFS_PRIO 1
598 static struct notifier_block nfs_idmap_block
= {
599 .notifier_call
= rpc_pipefs_event
,
600 .priority
= SUNRPC_PIPEFS_NFS_PRIO
,
603 int nfs_idmap_init(void)
606 ret
= nfs_idmap_init_keyring();
609 ret
= rpc_pipefs_notifier_register(&nfs_idmap_block
);
611 nfs_idmap_quit_keyring();
616 void nfs_idmap_quit(void)
618 rpc_pipefs_notifier_unregister(&nfs_idmap_block
);
619 nfs_idmap_quit_keyring();
622 static int nfs_idmap_prepare_message(char *desc
, struct idmap
*idmap
,
623 struct idmap_msg
*im
,
624 struct rpc_pipe_msg
*msg
)
629 im
->im_type
= IDMAP_TYPE_GROUP
;
630 token
= match_token(desc
, nfs_idmap_tokens
, &substr
);
634 im
->im_type
= IDMAP_TYPE_USER
;
636 im
->im_conv
= IDMAP_CONV_NAMETOID
;
637 ret
= match_strlcpy(im
->im_name
, &substr
, IDMAP_NAMESZ
);
641 im
->im_type
= IDMAP_TYPE_USER
;
643 im
->im_conv
= IDMAP_CONV_IDTONAME
;
644 ret
= match_int(&substr
, &im
->im_id
);
653 msg
->len
= sizeof(struct idmap_msg
);
660 nfs_idmap_prepare_pipe_upcall(struct idmap
*idmap
,
661 struct idmap_legacy_upcalldata
*data
)
663 if (idmap
->idmap_upcall_data
!= NULL
) {
667 idmap
->idmap_upcall_data
= data
;
672 nfs_idmap_complete_pipe_upcall_locked(struct idmap
*idmap
, int ret
)
674 struct key_construction
*cons
= idmap
->idmap_upcall_data
->key_cons
;
676 kfree(idmap
->idmap_upcall_data
);
677 idmap
->idmap_upcall_data
= NULL
;
678 complete_request_key(cons
, ret
);
682 nfs_idmap_abort_pipe_upcall(struct idmap
*idmap
, int ret
)
684 if (idmap
->idmap_upcall_data
!= NULL
)
685 nfs_idmap_complete_pipe_upcall_locked(idmap
, ret
);
688 static int nfs_idmap_legacy_upcall(struct key_construction
*cons
,
692 struct idmap_legacy_upcalldata
*data
;
693 struct rpc_pipe_msg
*msg
;
694 struct idmap_msg
*im
;
695 struct idmap
*idmap
= (struct idmap
*)aux
;
696 struct key
*key
= cons
->key
;
699 /* msg and im are freed in idmap_pipe_destroy_msg */
700 data
= kzalloc(sizeof(*data
), GFP_KERNEL
);
704 msg
= &data
->pipe_msg
;
705 im
= &data
->idmap_msg
;
707 data
->key_cons
= cons
;
709 ret
= nfs_idmap_prepare_message(key
->description
, idmap
, im
, msg
);
714 if (!nfs_idmap_prepare_pipe_upcall(idmap
, data
))
717 ret
= rpc_queue_upcall(idmap
->idmap_pipe
, msg
);
719 nfs_idmap_abort_pipe_upcall(idmap
, ret
);
725 complete_request_key(cons
, ret
);
729 static int nfs_idmap_instantiate(struct key
*key
, struct key
*authkey
, char *data
, size_t datalen
)
731 return key_instantiate_and_link(key
, data
, datalen
,
732 id_resolver_cache
->thread_keyring
,
736 static int nfs_idmap_read_and_verify_message(struct idmap_msg
*im
,
737 struct idmap_msg
*upcall
,
738 struct key
*key
, struct key
*authkey
)
740 char id_str
[NFS_UINT_MAXLEN
];
745 if (upcall
->im_type
!= im
->im_type
|| upcall
->im_conv
!= im
->im_conv
)
747 switch (im
->im_conv
) {
748 case IDMAP_CONV_NAMETOID
:
749 if (strcmp(upcall
->im_name
, im
->im_name
) != 0)
751 /* Note: here we store the NUL terminator too */
752 len
= sprintf(id_str
, "%d", im
->im_id
) + 1;
753 ret
= nfs_idmap_instantiate(key
, authkey
, id_str
, len
);
755 case IDMAP_CONV_IDTONAME
:
756 if (upcall
->im_id
!= im
->im_id
)
758 len
= strlen(im
->im_name
);
759 ret
= nfs_idmap_instantiate(key
, authkey
, im
->im_name
, len
);
769 idmap_pipe_downcall(struct file
*filp
, const char __user
*src
, size_t mlen
)
771 struct rpc_inode
*rpci
= RPC_I(file_inode(filp
));
772 struct idmap
*idmap
= (struct idmap
*)rpci
->private;
773 struct key_construction
*cons
;
778 /* If instantiation is successful, anyone waiting for key construction
779 * will have been woken up and someone else may now have used
780 * idmap_key_cons - so after this point we may no longer touch it.
782 if (idmap
->idmap_upcall_data
== NULL
)
785 cons
= idmap
->idmap_upcall_data
->key_cons
;
787 if (mlen
!= sizeof(im
)) {
792 if (copy_from_user(&im
, src
, mlen
) != 0) {
797 if (!(im
.im_status
& IDMAP_STATUS_SUCCESS
)) {
802 namelen_in
= strnlen(im
.im_name
, IDMAP_NAMESZ
);
803 if (namelen_in
== 0 || namelen_in
== IDMAP_NAMESZ
) {
808 ret
= nfs_idmap_read_and_verify_message(&im
,
809 &idmap
->idmap_upcall_data
->idmap_msg
,
810 cons
->key
, cons
->authkey
);
812 key_set_timeout(cons
->key
, nfs_idmap_cache_timeout
);
817 nfs_idmap_complete_pipe_upcall_locked(idmap
, ret
);
823 idmap_pipe_destroy_msg(struct rpc_pipe_msg
*msg
)
825 struct idmap_legacy_upcalldata
*data
= container_of(msg
,
826 struct idmap_legacy_upcalldata
,
828 struct idmap
*idmap
= data
->idmap
;
831 nfs_idmap_abort_pipe_upcall(idmap
, msg
->errno
);
835 idmap_release_pipe(struct inode
*inode
)
837 struct rpc_inode
*rpci
= RPC_I(inode
);
838 struct idmap
*idmap
= (struct idmap
*)rpci
->private;
840 nfs_idmap_abort_pipe_upcall(idmap
, -EPIPE
);
843 int nfs_map_name_to_uid(const struct nfs_server
*server
, const char *name
, size_t namelen
, kuid_t
*uid
)
845 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
849 if (!nfs_map_string_to_numeric(name
, namelen
, &id
))
850 ret
= nfs_idmap_lookup_id(name
, namelen
, "uid", &id
, idmap
);
852 *uid
= make_kuid(&init_user_ns
, id
);
853 if (!uid_valid(*uid
))
859 int nfs_map_group_to_gid(const struct nfs_server
*server
, const char *name
, size_t namelen
, kgid_t
*gid
)
861 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
865 if (!nfs_map_string_to_numeric(name
, namelen
, &id
))
866 ret
= nfs_idmap_lookup_id(name
, namelen
, "gid", &id
, idmap
);
868 *gid
= make_kgid(&init_user_ns
, id
);
869 if (!gid_valid(*gid
))
875 int nfs_map_uid_to_name(const struct nfs_server
*server
, kuid_t uid
, char *buf
, size_t buflen
)
877 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
881 id
= from_kuid(&init_user_ns
, uid
);
882 if (!(server
->caps
& NFS_CAP_UIDGID_NOMAP
))
883 ret
= nfs_idmap_lookup_name(id
, "user", buf
, buflen
, idmap
);
885 ret
= nfs_map_numeric_to_string(id
, buf
, buflen
);
888 int nfs_map_gid_to_group(const struct nfs_server
*server
, kgid_t gid
, char *buf
, size_t buflen
)
890 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
894 id
= from_kgid(&init_user_ns
, gid
);
895 if (!(server
->caps
& NFS_CAP_UIDGID_NOMAP
))
896 ret
= nfs_idmap_lookup_name(id
, "group", buf
, buflen
, idmap
);
898 ret
= nfs_map_numeric_to_string(id
, buf
, buflen
);