2 * Generic RPC credential
4 * Copyright (C) 2008, Trond Myklebust <Trond.Myklebust@netapp.com>
8 #include <linux/slab.h>
9 #include <linux/types.h>
10 #include <linux/module.h>
11 #include <linux/sched.h>
12 #include <linux/sunrpc/auth.h>
13 #include <linux/sunrpc/clnt.h>
14 #include <linux/sunrpc/debug.h>
15 #include <linux/sunrpc/sched.h>
18 # define RPCDBG_FACILITY RPCDBG_AUTH
21 #define RPC_MACHINE_CRED_USERID GLOBAL_ROOT_UID
22 #define RPC_MACHINE_CRED_GROUPID GLOBAL_ROOT_GID
25 struct rpc_cred gc_base
;
26 struct auth_cred acred
;
29 static struct rpc_auth generic_auth
;
30 static const struct rpc_credops generic_credops
;
33 * Public call interface
35 struct rpc_cred
*rpc_lookup_cred(void)
37 return rpcauth_lookupcred(&generic_auth
, 0);
39 EXPORT_SYMBOL_GPL(rpc_lookup_cred
);
42 * Public call interface for looking up machine creds.
44 struct rpc_cred
*rpc_lookup_machine_cred(const char *service_name
)
46 struct auth_cred acred
= {
47 .uid
= RPC_MACHINE_CRED_USERID
,
48 .gid
= RPC_MACHINE_CRED_GROUPID
,
49 .principal
= service_name
,
53 dprintk("RPC: looking up machine cred for service %s\n",
55 return generic_auth
.au_ops
->lookup_cred(&generic_auth
, &acred
, 0);
57 EXPORT_SYMBOL_GPL(rpc_lookup_machine_cred
);
59 static struct rpc_cred
*generic_bind_cred(struct rpc_task
*task
,
60 struct rpc_cred
*cred
, int lookupflags
)
62 struct rpc_auth
*auth
= task
->tk_client
->cl_auth
;
63 struct auth_cred
*acred
= &container_of(cred
, struct generic_cred
, gc_base
)->acred
;
65 return auth
->au_ops
->lookup_cred(auth
, acred
, lookupflags
);
69 * Lookup generic creds for current process
71 static struct rpc_cred
*
72 generic_lookup_cred(struct rpc_auth
*auth
, struct auth_cred
*acred
, int flags
)
74 return rpcauth_lookup_credcache(&generic_auth
, acred
, flags
);
77 static struct rpc_cred
*
78 generic_create_cred(struct rpc_auth
*auth
, struct auth_cred
*acred
, int flags
)
80 struct generic_cred
*gcred
;
82 gcred
= kmalloc(sizeof(*gcred
), GFP_KERNEL
);
84 return ERR_PTR(-ENOMEM
);
86 rpcauth_init_cred(&gcred
->gc_base
, acred
, &generic_auth
, &generic_credops
);
87 gcred
->gc_base
.cr_flags
= 1UL << RPCAUTH_CRED_UPTODATE
;
89 gcred
->acred
.uid
= acred
->uid
;
90 gcred
->acred
.gid
= acred
->gid
;
91 gcred
->acred
.group_info
= acred
->group_info
;
92 gcred
->acred
.ac_flags
= 0;
93 if (gcred
->acred
.group_info
!= NULL
)
94 get_group_info(gcred
->acred
.group_info
);
95 gcred
->acred
.machine_cred
= acred
->machine_cred
;
96 gcred
->acred
.principal
= acred
->principal
;
98 dprintk("RPC: allocated %s cred %p for uid %d gid %d\n",
99 gcred
->acred
.machine_cred
? "machine" : "generic",
101 from_kuid(&init_user_ns
, acred
->uid
),
102 from_kgid(&init_user_ns
, acred
->gid
));
103 return &gcred
->gc_base
;
107 generic_free_cred(struct rpc_cred
*cred
)
109 struct generic_cred
*gcred
= container_of(cred
, struct generic_cred
, gc_base
);
111 dprintk("RPC: generic_free_cred %p\n", gcred
);
112 if (gcred
->acred
.group_info
!= NULL
)
113 put_group_info(gcred
->acred
.group_info
);
118 generic_free_cred_callback(struct rcu_head
*head
)
120 struct rpc_cred
*cred
= container_of(head
, struct rpc_cred
, cr_rcu
);
121 generic_free_cred(cred
);
125 generic_destroy_cred(struct rpc_cred
*cred
)
127 call_rcu(&cred
->cr_rcu
, generic_free_cred_callback
);
131 machine_cred_match(struct auth_cred
*acred
, struct generic_cred
*gcred
, int flags
)
133 if (!gcred
->acred
.machine_cred
||
134 gcred
->acred
.principal
!= acred
->principal
||
135 !uid_eq(gcred
->acred
.uid
, acred
->uid
) ||
136 !gid_eq(gcred
->acred
.gid
, acred
->gid
))
142 * Match credentials against current process creds.
145 generic_match(struct auth_cred
*acred
, struct rpc_cred
*cred
, int flags
)
147 struct generic_cred
*gcred
= container_of(cred
, struct generic_cred
, gc_base
);
150 if (acred
->machine_cred
)
151 return machine_cred_match(acred
, gcred
, flags
);
153 if (!uid_eq(gcred
->acred
.uid
, acred
->uid
) ||
154 !gid_eq(gcred
->acred
.gid
, acred
->gid
) ||
155 gcred
->acred
.machine_cred
!= 0)
158 /* Optimisation in the case where pointers are identical... */
159 if (gcred
->acred
.group_info
== acred
->group_info
)
163 if (gcred
->acred
.group_info
->ngroups
!= acred
->group_info
->ngroups
)
165 for (i
= 0; i
< gcred
->acred
.group_info
->ngroups
; i
++) {
166 if (!gid_eq(GROUP_AT(gcred
->acred
.group_info
, i
),
167 GROUP_AT(acred
->group_info
, i
)))
176 int __init
rpc_init_generic_auth(void)
178 return rpcauth_init_credcache(&generic_auth
);
181 void rpc_destroy_generic_auth(void)
183 rpcauth_destroy_credcache(&generic_auth
);
187 * Test the the current time (now) against the underlying credential key expiry
188 * minus a timeout and setup notification.
191 * If 'now' is before the key expiry minus RPC_KEY_EXPIRE_TIMEO, set
192 * the RPC_CRED_NOTIFY_TIMEOUT flag to setup the underlying credential
193 * rpc_credops crmatch routine to notify this generic cred when it's key
194 * expiration is within RPC_KEY_EXPIRE_TIMEO, and return 0.
197 * If the underlying cred lookup fails, return -EACCES.
199 * The 'almost' error case:
200 * If 'now' is within key expiry minus RPC_KEY_EXPIRE_TIMEO, but not within
201 * key expiry minus RPC_KEY_EXPIRE_FAIL, set the RPC_CRED_EXPIRE_SOON bit
202 * on the acred ac_flags and return 0.
205 generic_key_timeout(struct rpc_auth
*auth
, struct rpc_cred
*cred
)
207 struct auth_cred
*acred
= &container_of(cred
, struct generic_cred
,
209 struct rpc_cred
*tcred
;
213 /* Fast track for non crkey_timeout (no key) underlying credentials */
214 if (test_bit(RPC_CRED_NO_CRKEY_TIMEOUT
, &acred
->ac_flags
))
217 /* Fast track for the normal case */
218 if (test_bit(RPC_CRED_NOTIFY_TIMEOUT
, &acred
->ac_flags
))
221 /* lookup_cred either returns a valid referenced rpc_cred, or PTR_ERR */
222 tcred
= auth
->au_ops
->lookup_cred(auth
, acred
, 0);
226 if (!tcred
->cr_ops
->crkey_timeout
) {
227 set_bit(RPC_CRED_NO_CRKEY_TIMEOUT
, &acred
->ac_flags
);
232 /* Test for the almost error case */
233 ret
= tcred
->cr_ops
->crkey_timeout(tcred
);
235 set_bit(RPC_CRED_KEY_EXPIRE_SOON
, &acred
->ac_flags
);
238 /* In case underlying cred key has been reset */
239 if (test_and_clear_bit(RPC_CRED_KEY_EXPIRE_SOON
,
241 dprintk("RPC: UID %d Credential key reset\n",
242 from_kuid(&init_user_ns
, tcred
->cr_uid
));
243 /* set up fasttrack for the normal case */
244 set_bit(RPC_CRED_NOTIFY_TIMEOUT
, &acred
->ac_flags
);
252 static const struct rpc_authops generic_auth_ops
= {
253 .owner
= THIS_MODULE
,
254 .au_name
= "Generic",
255 .lookup_cred
= generic_lookup_cred
,
256 .crcreate
= generic_create_cred
,
257 .key_timeout
= generic_key_timeout
,
260 static struct rpc_auth generic_auth
= {
261 .au_ops
= &generic_auth_ops
,
262 .au_count
= ATOMIC_INIT(0),
265 static bool generic_key_to_expire(struct rpc_cred
*cred
)
267 struct auth_cred
*acred
= &container_of(cred
, struct generic_cred
,
272 ret
= test_bit(RPC_CRED_KEY_EXPIRE_SOON
, &acred
->ac_flags
);
278 static const struct rpc_credops generic_credops
= {
279 .cr_name
= "Generic cred",
280 .crdestroy
= generic_destroy_cred
,
281 .crbind
= generic_bind_cred
,
282 .crmatch
= generic_match
,
283 .crkey_to_expire
= generic_key_to_expire
,