2 * linux/net/sunrpc/auth_unix.c
4 * UNIX-style authentication; no AUTH_SHORT support
6 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
9 #include <linux/slab.h>
10 #include <linux/types.h>
11 #include <linux/sched.h>
12 #include <linux/module.h>
13 #include <linux/sunrpc/clnt.h>
14 #include <linux/sunrpc/auth.h>
15 #include <linux/user_namespace.h>
18 struct rpc_cred uc_base
;
20 kgid_t uc_gids
[UNX_NGROUPS
];
22 #define uc_uid uc_base.cr_uid
24 #if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
25 # define RPCDBG_FACILITY RPCDBG_AUTH
28 static struct rpc_auth unix_auth
;
29 static const struct rpc_credops unix_credops
;
31 static struct rpc_auth
*
32 unx_create(struct rpc_auth_create_args
*args
, struct rpc_clnt
*clnt
)
34 dprintk("RPC: creating UNIX authenticator for client %p\n",
36 atomic_inc(&unix_auth
.au_count
);
41 unx_destroy(struct rpc_auth
*auth
)
43 dprintk("RPC: destroying UNIX authenticator %p\n", auth
);
44 rpcauth_clear_credcache(auth
->au_credcache
);
48 unx_hash_cred(struct auth_cred
*acred
, unsigned int hashbits
)
50 return hash_64(from_kgid(&init_user_ns
, acred
->gid
) |
51 ((u64
)from_kuid(&init_user_ns
, acred
->uid
) <<
52 (sizeof(gid_t
) * 8)), hashbits
);
56 * Lookup AUTH_UNIX creds for current process
58 static struct rpc_cred
*
59 unx_lookup_cred(struct rpc_auth
*auth
, struct auth_cred
*acred
, int flags
)
61 return rpcauth_lookup_credcache(auth
, acred
, flags
, GFP_NOFS
);
64 static struct rpc_cred
*
65 unx_create_cred(struct rpc_auth
*auth
, struct auth_cred
*acred
, int flags
, gfp_t gfp
)
67 struct unx_cred
*cred
;
68 unsigned int groups
= 0;
71 dprintk("RPC: allocating UNIX cred for uid %d gid %d\n",
72 from_kuid(&init_user_ns
, acred
->uid
),
73 from_kgid(&init_user_ns
, acred
->gid
));
75 if (!(cred
= kmalloc(sizeof(*cred
), gfp
)))
76 return ERR_PTR(-ENOMEM
);
78 rpcauth_init_cred(&cred
->uc_base
, acred
, auth
, &unix_credops
);
79 cred
->uc_base
.cr_flags
= 1UL << RPCAUTH_CRED_UPTODATE
;
81 if (acred
->group_info
!= NULL
)
82 groups
= acred
->group_info
->ngroups
;
83 if (groups
> UNX_NGROUPS
)
86 cred
->uc_gid
= acred
->gid
;
87 for (i
= 0; i
< groups
; i
++)
88 cred
->uc_gids
[i
] = acred
->group_info
->gid
[i
];
90 cred
->uc_gids
[i
] = INVALID_GID
;
92 return &cred
->uc_base
;
96 unx_free_cred(struct unx_cred
*unx_cred
)
98 dprintk("RPC: unx_free_cred %p\n", unx_cred
);
103 unx_free_cred_callback(struct rcu_head
*head
)
105 struct unx_cred
*unx_cred
= container_of(head
, struct unx_cred
, uc_base
.cr_rcu
);
106 unx_free_cred(unx_cred
);
110 unx_destroy_cred(struct rpc_cred
*cred
)
112 call_rcu(&cred
->cr_rcu
, unx_free_cred_callback
);
116 * Match credentials against current process creds.
117 * The root_override argument takes care of cases where the caller may
118 * request root creds (e.g. for NFS swapping).
121 unx_match(struct auth_cred
*acred
, struct rpc_cred
*rcred
, int flags
)
123 struct unx_cred
*cred
= container_of(rcred
, struct unx_cred
, uc_base
);
124 unsigned int groups
= 0;
128 if (!uid_eq(cred
->uc_uid
, acred
->uid
) || !gid_eq(cred
->uc_gid
, acred
->gid
))
131 if (acred
->group_info
!= NULL
)
132 groups
= acred
->group_info
->ngroups
;
133 if (groups
> UNX_NGROUPS
)
134 groups
= UNX_NGROUPS
;
135 for (i
= 0; i
< groups
; i
++)
136 if (!gid_eq(cred
->uc_gids
[i
], acred
->group_info
->gid
[i
]))
138 if (groups
< UNX_NGROUPS
&& gid_valid(cred
->uc_gids
[groups
]))
144 * Marshal credentials.
145 * Maybe we should keep a cached credential for performance reasons.
148 unx_marshal(struct rpc_task
*task
, __be32
*p
)
150 struct rpc_clnt
*clnt
= task
->tk_client
;
151 struct unx_cred
*cred
= container_of(task
->tk_rqstp
->rq_cred
, struct unx_cred
, uc_base
);
155 *p
++ = htonl(RPC_AUTH_UNIX
);
157 *p
++ = htonl(jiffies
/HZ
);
160 * Copy the UTS nodename captured when the client was created.
162 p
= xdr_encode_array(p
, clnt
->cl_nodename
, clnt
->cl_nodelen
);
164 *p
++ = htonl((u32
) from_kuid(&init_user_ns
, cred
->uc_uid
));
165 *p
++ = htonl((u32
) from_kgid(&init_user_ns
, cred
->uc_gid
));
167 for (i
= 0; i
< UNX_NGROUPS
&& gid_valid(cred
->uc_gids
[i
]); i
++)
168 *p
++ = htonl((u32
) from_kgid(&init_user_ns
, cred
->uc_gids
[i
]));
169 *hold
= htonl(p
- hold
- 1); /* gid array length */
170 *base
= htonl((p
- base
- 1) << 2); /* cred length */
172 *p
++ = htonl(RPC_AUTH_NULL
);
179 * Refresh credentials. This is a no-op for AUTH_UNIX
182 unx_refresh(struct rpc_task
*task
)
184 set_bit(RPCAUTH_CRED_UPTODATE
, &task
->tk_rqstp
->rq_cred
->cr_flags
);
189 unx_validate(struct rpc_task
*task
, __be32
*p
)
191 rpc_authflavor_t flavor
;
194 flavor
= ntohl(*p
++);
195 if (flavor
!= RPC_AUTH_NULL
&&
196 flavor
!= RPC_AUTH_UNIX
&&
197 flavor
!= RPC_AUTH_SHORT
) {
198 printk("RPC: bad verf flavor: %u\n", flavor
);
199 return ERR_PTR(-EIO
);
203 if (size
> RPC_MAX_AUTH_SIZE
) {
204 printk("RPC: giant verf size: %u\n", size
);
205 return ERR_PTR(-EIO
);
207 task
->tk_rqstp
->rq_cred
->cr_auth
->au_rslack
= (size
>> 2) + 2;
213 int __init
rpc_init_authunix(void)
215 return rpcauth_init_credcache(&unix_auth
);
218 void rpc_destroy_authunix(void)
220 rpcauth_destroy_credcache(&unix_auth
);
223 const struct rpc_authops authunix_ops
= {
224 .owner
= THIS_MODULE
,
225 .au_flavor
= RPC_AUTH_UNIX
,
227 .create
= unx_create
,
228 .destroy
= unx_destroy
,
229 .hash_cred
= unx_hash_cred
,
230 .lookup_cred
= unx_lookup_cred
,
231 .crcreate
= unx_create_cred
,
235 struct rpc_auth unix_auth
= {
236 .au_cslack
= UNX_CALLSLACK
,
237 .au_rslack
= NUL_REPLYSLACK
,
238 .au_flags
= RPCAUTH_AUTH_NO_CRKEY_TIMEOUT
,
239 .au_ops
= &authunix_ops
,
240 .au_flavor
= RPC_AUTH_UNIX
,
241 .au_count
= ATOMIC_INIT(0),
245 const struct rpc_credops unix_credops
= {
246 .cr_name
= "AUTH_UNIX",
247 .crdestroy
= unx_destroy_cred
,
248 .crbind
= rpcauth_generic_bind_cred
,
249 .crmatch
= unx_match
,
250 .crmarshal
= unx_marshal
,
251 .crrefresh
= unx_refresh
,
252 .crvalidate
= unx_validate
,