2 * Generic RPC credential
4 * Copyright (C) 2008, Trond Myklebust <Trond.Myklebust@netapp.com>
8 #include <linux/slab.h>
9 #include <linux/types.h>
10 #include <linux/module.h>
11 #include <linux/sched.h>
12 #include <linux/sunrpc/auth.h>
13 #include <linux/sunrpc/clnt.h>
14 #include <linux/sunrpc/debug.h>
15 #include <linux/sunrpc/sched.h>
17 #if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
18 # define RPCDBG_FACILITY RPCDBG_AUTH
21 #define RPC_MACHINE_CRED_USERID GLOBAL_ROOT_UID
22 #define RPC_MACHINE_CRED_GROUPID GLOBAL_ROOT_GID
25 struct rpc_cred gc_base
;
26 struct auth_cred acred
;
29 static struct rpc_auth generic_auth
;
30 static const struct rpc_credops generic_credops
;
33 * Public call interface
35 struct rpc_cred
*rpc_lookup_cred(void)
37 return rpcauth_lookupcred(&generic_auth
, 0);
39 EXPORT_SYMBOL_GPL(rpc_lookup_cred
);
42 rpc_lookup_generic_cred(struct auth_cred
*acred
, int flags
, gfp_t gfp
)
44 return rpcauth_lookup_credcache(&generic_auth
, acred
, flags
, gfp
);
46 EXPORT_SYMBOL_GPL(rpc_lookup_generic_cred
);
48 struct rpc_cred
*rpc_lookup_cred_nonblock(void)
50 return rpcauth_lookupcred(&generic_auth
, RPCAUTH_LOOKUP_RCU
);
52 EXPORT_SYMBOL_GPL(rpc_lookup_cred_nonblock
);
55 * Public call interface for looking up machine creds.
57 struct rpc_cred
*rpc_lookup_machine_cred(const char *service_name
)
59 struct auth_cred acred
= {
60 .uid
= RPC_MACHINE_CRED_USERID
,
61 .gid
= RPC_MACHINE_CRED_GROUPID
,
62 .principal
= service_name
,
66 dprintk("RPC: looking up machine cred for service %s\n",
68 return generic_auth
.au_ops
->lookup_cred(&generic_auth
, &acred
, 0);
70 EXPORT_SYMBOL_GPL(rpc_lookup_machine_cred
);
72 static struct rpc_cred
*generic_bind_cred(struct rpc_task
*task
,
73 struct rpc_cred
*cred
, int lookupflags
)
75 struct rpc_auth
*auth
= task
->tk_client
->cl_auth
;
76 struct auth_cred
*acred
= &container_of(cred
, struct generic_cred
, gc_base
)->acred
;
78 return auth
->au_ops
->lookup_cred(auth
, acred
, lookupflags
);
82 * Lookup generic creds for current process
84 static struct rpc_cred
*
85 generic_lookup_cred(struct rpc_auth
*auth
, struct auth_cred
*acred
, int flags
)
87 return rpcauth_lookup_credcache(&generic_auth
, acred
, flags
, GFP_KERNEL
);
90 static struct rpc_cred
*
91 generic_create_cred(struct rpc_auth
*auth
, struct auth_cred
*acred
, int flags
, gfp_t gfp
)
93 struct generic_cred
*gcred
;
95 gcred
= kmalloc(sizeof(*gcred
), gfp
);
97 return ERR_PTR(-ENOMEM
);
99 rpcauth_init_cred(&gcred
->gc_base
, acred
, &generic_auth
, &generic_credops
);
100 gcred
->gc_base
.cr_flags
= 1UL << RPCAUTH_CRED_UPTODATE
;
102 gcred
->acred
.uid
= acred
->uid
;
103 gcred
->acred
.gid
= acred
->gid
;
104 gcred
->acred
.group_info
= acred
->group_info
;
105 gcred
->acred
.ac_flags
= 0;
106 if (gcred
->acred
.group_info
!= NULL
)
107 get_group_info(gcred
->acred
.group_info
);
108 gcred
->acred
.machine_cred
= acred
->machine_cred
;
109 gcred
->acred
.principal
= acred
->principal
;
111 dprintk("RPC: allocated %s cred %p for uid %d gid %d\n",
112 gcred
->acred
.machine_cred
? "machine" : "generic",
114 from_kuid(&init_user_ns
, acred
->uid
),
115 from_kgid(&init_user_ns
, acred
->gid
));
116 return &gcred
->gc_base
;
120 generic_free_cred(struct rpc_cred
*cred
)
122 struct generic_cred
*gcred
= container_of(cred
, struct generic_cred
, gc_base
);
124 dprintk("RPC: generic_free_cred %p\n", gcred
);
125 if (gcred
->acred
.group_info
!= NULL
)
126 put_group_info(gcred
->acred
.group_info
);
131 generic_free_cred_callback(struct rcu_head
*head
)
133 struct rpc_cred
*cred
= container_of(head
, struct rpc_cred
, cr_rcu
);
134 generic_free_cred(cred
);
138 generic_destroy_cred(struct rpc_cred
*cred
)
140 call_rcu(&cred
->cr_rcu
, generic_free_cred_callback
);
144 machine_cred_match(struct auth_cred
*acred
, struct generic_cred
*gcred
, int flags
)
146 if (!gcred
->acred
.machine_cred
||
147 gcred
->acred
.principal
!= acred
->principal
||
148 !uid_eq(gcred
->acred
.uid
, acred
->uid
) ||
149 !gid_eq(gcred
->acred
.gid
, acred
->gid
))
155 * Match credentials against current process creds.
158 generic_match(struct auth_cred
*acred
, struct rpc_cred
*cred
, int flags
)
160 struct generic_cred
*gcred
= container_of(cred
, struct generic_cred
, gc_base
);
163 if (acred
->machine_cred
)
164 return machine_cred_match(acred
, gcred
, flags
);
166 if (!uid_eq(gcred
->acred
.uid
, acred
->uid
) ||
167 !gid_eq(gcred
->acred
.gid
, acred
->gid
) ||
168 gcred
->acred
.machine_cred
!= 0)
171 /* Optimisation in the case where pointers are identical... */
172 if (gcred
->acred
.group_info
== acred
->group_info
)
176 if (gcred
->acred
.group_info
->ngroups
!= acred
->group_info
->ngroups
)
178 for (i
= 0; i
< gcred
->acred
.group_info
->ngroups
; i
++) {
179 if (!gid_eq(GROUP_AT(gcred
->acred
.group_info
, i
),
180 GROUP_AT(acred
->group_info
, i
)))
189 int __init
rpc_init_generic_auth(void)
191 return rpcauth_init_credcache(&generic_auth
);
194 void rpc_destroy_generic_auth(void)
196 rpcauth_destroy_credcache(&generic_auth
);
200 * Test the the current time (now) against the underlying credential key expiry
201 * minus a timeout and setup notification.
204 * If 'now' is before the key expiry minus RPC_KEY_EXPIRE_TIMEO, set
205 * the RPC_CRED_NOTIFY_TIMEOUT flag to setup the underlying credential
206 * rpc_credops crmatch routine to notify this generic cred when it's key
207 * expiration is within RPC_KEY_EXPIRE_TIMEO, and return 0.
210 * If the underlying cred lookup fails, return -EACCES.
212 * The 'almost' error case:
213 * If 'now' is within key expiry minus RPC_KEY_EXPIRE_TIMEO, but not within
214 * key expiry minus RPC_KEY_EXPIRE_FAIL, set the RPC_CRED_EXPIRE_SOON bit
215 * on the acred ac_flags and return 0.
218 generic_key_timeout(struct rpc_auth
*auth
, struct rpc_cred
*cred
)
220 struct auth_cred
*acred
= &container_of(cred
, struct generic_cred
,
222 struct rpc_cred
*tcred
;
226 /* Fast track for non crkey_timeout (no key) underlying credentials */
227 if (test_bit(RPC_CRED_NO_CRKEY_TIMEOUT
, &acred
->ac_flags
))
230 /* Fast track for the normal case */
231 if (test_bit(RPC_CRED_NOTIFY_TIMEOUT
, &acred
->ac_flags
))
234 /* lookup_cred either returns a valid referenced rpc_cred, or PTR_ERR */
235 tcred
= auth
->au_ops
->lookup_cred(auth
, acred
, 0);
239 if (!tcred
->cr_ops
->crkey_timeout
) {
240 set_bit(RPC_CRED_NO_CRKEY_TIMEOUT
, &acred
->ac_flags
);
245 /* Test for the almost error case */
246 ret
= tcred
->cr_ops
->crkey_timeout(tcred
);
248 set_bit(RPC_CRED_KEY_EXPIRE_SOON
, &acred
->ac_flags
);
251 /* In case underlying cred key has been reset */
252 if (test_and_clear_bit(RPC_CRED_KEY_EXPIRE_SOON
,
254 dprintk("RPC: UID %d Credential key reset\n",
255 from_kuid(&init_user_ns
, tcred
->cr_uid
));
256 /* set up fasttrack for the normal case */
257 set_bit(RPC_CRED_NOTIFY_TIMEOUT
, &acred
->ac_flags
);
265 static const struct rpc_authops generic_auth_ops
= {
266 .owner
= THIS_MODULE
,
267 .au_name
= "Generic",
268 .lookup_cred
= generic_lookup_cred
,
269 .crcreate
= generic_create_cred
,
270 .key_timeout
= generic_key_timeout
,
273 static struct rpc_auth generic_auth
= {
274 .au_ops
= &generic_auth_ops
,
275 .au_count
= ATOMIC_INIT(0),
278 static bool generic_key_to_expire(struct rpc_cred
*cred
)
280 struct auth_cred
*acred
= &container_of(cred
, struct generic_cred
,
285 ret
= test_bit(RPC_CRED_KEY_EXPIRE_SOON
, &acred
->ac_flags
);
291 static const struct rpc_credops generic_credops
= {
292 .cr_name
= "Generic cred",
293 .crdestroy
= generic_destroy_cred
,
294 .crbind
= generic_bind_cred
,
295 .crmatch
= generic_match
,
296 .crkey_to_expire
= generic_key_to_expire
,