xref: /openbmc/linux/net/sunrpc/auth_unix.c (revision 80125d4a)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  * linux/net/sunrpc/auth_unix.c
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  * UNIX-style authentication; no AUTH_SHORT support
61da177e4SLinus Torvalds  *
71da177e4SLinus Torvalds  * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
81da177e4SLinus Torvalds  */
91da177e4SLinus Torvalds 
105a0e3ad6STejun Heo #include <linux/slab.h>
111da177e4SLinus Torvalds #include <linux/types.h>
121da177e4SLinus Torvalds #include <linux/sched.h>
131da177e4SLinus Torvalds #include <linux/module.h>
142edd8d74SNeilBrown #include <linux/mempool.h>
151da177e4SLinus Torvalds #include <linux/sunrpc/clnt.h>
161da177e4SLinus Torvalds #include <linux/sunrpc/auth.h>
17ae2975bcSEric W. Biederman #include <linux/user_namespace.h>
181da177e4SLinus Torvalds 
191da177e4SLinus Torvalds 
20f895b252SJeff Layton #if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
211da177e4SLinus Torvalds # define RPCDBG_FACILITY	RPCDBG_AUTH
221da177e4SLinus Torvalds #endif
231da177e4SLinus Torvalds 
241da177e4SLinus Torvalds static struct rpc_auth		unix_auth;
25f1c0a861STrond Myklebust static const struct rpc_credops	unix_credops;
262edd8d74SNeilBrown static mempool_t		*unix_pool;
271da177e4SLinus Torvalds 
281da177e4SLinus Torvalds static struct rpc_auth *
2982b98ca5SSargun Dhillon unx_create(const struct rpc_auth_create_args *args, struct rpc_clnt *clnt)
301da177e4SLinus Torvalds {
31331bc71cSTrond Myklebust 	refcount_inc(&unix_auth.au_count);
321da177e4SLinus Torvalds 	return &unix_auth;
331da177e4SLinus Torvalds }
341da177e4SLinus Torvalds 
351da177e4SLinus Torvalds static void
361da177e4SLinus Torvalds unx_destroy(struct rpc_auth *auth)
371da177e4SLinus Torvalds {
381e035d06SFrank Sorenson }
391e035d06SFrank Sorenson 
401da177e4SLinus Torvalds /*
411da177e4SLinus Torvalds  * Lookup AUTH_UNIX creds for current process
421da177e4SLinus Torvalds  */
431da177e4SLinus Torvalds static struct rpc_cred *
441da177e4SLinus Torvalds unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
451da177e4SLinus Torvalds {
462edd8d74SNeilBrown 	struct rpc_cred *ret = mempool_alloc(unix_pool, GFP_NOFS);
471da177e4SLinus Torvalds 
482edd8d74SNeilBrown 	rpcauth_init_cred(ret, acred, auth, &unix_credops);
492edd8d74SNeilBrown 	ret->cr_flags = 1UL << RPCAUTH_CRED_UPTODATE;
502edd8d74SNeilBrown 	return ret;
5131be5bf1STrond Myklebust }
52696e38dfSTrond Myklebust 
5331be5bf1STrond Myklebust static void
5431be5bf1STrond Myklebust unx_free_cred_callback(struct rcu_head *head)
5531be5bf1STrond Myklebust {
562edd8d74SNeilBrown 	struct rpc_cred *rpc_cred = container_of(head, struct rpc_cred, cr_rcu);
5780125d4aSChuck Lever 
582edd8d74SNeilBrown 	put_cred(rpc_cred->cr_cred);
592edd8d74SNeilBrown 	mempool_free(rpc_cred, unix_pool);
6031be5bf1STrond Myklebust }
6131be5bf1STrond Myklebust 
6231be5bf1STrond Myklebust static void
6331be5bf1STrond Myklebust unx_destroy_cred(struct rpc_cred *cred)
6431be5bf1STrond Myklebust {
6531be5bf1STrond Myklebust 	call_rcu(&cred->cr_rcu, unx_free_cred_callback);
661da177e4SLinus Torvalds }
671da177e4SLinus Torvalds 
681da177e4SLinus Torvalds /*
692edd8d74SNeilBrown  * Match credentials against current the auth_cred.
701da177e4SLinus Torvalds  */
711da177e4SLinus Torvalds static int
722edd8d74SNeilBrown unx_match(struct auth_cred *acred, struct rpc_cred *cred, int flags)
731da177e4SLinus Torvalds {
74af093835STrond Myklebust 	unsigned int groups = 0;
75af093835STrond Myklebust 	unsigned int i;
761da177e4SLinus Torvalds 
772edd8d74SNeilBrown 	if (cred->cr_cred == acred->cred)
782edd8d74SNeilBrown 		return 1;
791da177e4SLinus Torvalds 
802edd8d74SNeilBrown 	if (!uid_eq(cred->cr_cred->fsuid, acred->cred->fsuid) || !gid_eq(cred->cr_cred->fsgid, acred->cred->fsgid))
811da177e4SLinus Torvalds 		return 0;
821da177e4SLinus Torvalds 
83fc0664fdSNeilBrown 	if (acred->cred && acred->cred->group_info != NULL)
84fc0664fdSNeilBrown 		groups = acred->cred->group_info->ngroups;
855786461bSKinglong Mee 	if (groups > UNX_NGROUPS)
865786461bSKinglong Mee 		groups = UNX_NGROUPS;
872edd8d74SNeilBrown 	if (cred->cr_cred->group_info == NULL)
882edd8d74SNeilBrown 		return groups == 0;
892edd8d74SNeilBrown 	if (groups != cred->cr_cred->group_info->ngroups)
901da177e4SLinus Torvalds 		return 0;
912edd8d74SNeilBrown 
922edd8d74SNeilBrown 	for (i = 0; i < groups ; i++)
932edd8d74SNeilBrown 		if (!gid_eq(cred->cr_cred->group_info->gid[i], acred->cred->group_info->gid[i]))
94dc6f55e9SNeilBrown 			return 0;
951da177e4SLinus Torvalds 	return 1;
961da177e4SLinus Torvalds }
971da177e4SLinus Torvalds 
981da177e4SLinus Torvalds /*
991da177e4SLinus Torvalds  * Marshal credentials.
1001da177e4SLinus Torvalds  * Maybe we should keep a cached credential for performance reasons.
1011da177e4SLinus Torvalds  */
102d8ed029dSAlexey Dobriyan static __be32 *
103d8ed029dSAlexey Dobriyan unx_marshal(struct rpc_task *task, __be32 *p)
1041da177e4SLinus Torvalds {
1051da177e4SLinus Torvalds 	struct rpc_clnt	*clnt = task->tk_client;
1062edd8d74SNeilBrown 	struct rpc_cred	*cred = task->tk_rqstp->rq_cred;
107d8ed029dSAlexey Dobriyan 	__be32		*base, *hold;
1081da177e4SLinus Torvalds 	int		i;
1092edd8d74SNeilBrown 	struct group_info *gi = cred->cr_cred->group_info;
1101da177e4SLinus Torvalds 
1111da177e4SLinus Torvalds 	*p++ = htonl(RPC_AUTH_UNIX);
1121da177e4SLinus Torvalds 	base = p++;
1131da177e4SLinus Torvalds 	*p++ = htonl(jiffies/HZ);
1141da177e4SLinus Torvalds 
1151da177e4SLinus Torvalds 	/*
1161da177e4SLinus Torvalds 	 * Copy the UTS nodename captured when the client was created.
1171da177e4SLinus Torvalds 	 */
1181da177e4SLinus Torvalds 	p = xdr_encode_array(p, clnt->cl_nodename, clnt->cl_nodelen);
1191da177e4SLinus Torvalds 
1202edd8d74SNeilBrown 	*p++ = htonl((u32) from_kuid(&init_user_ns, cred->cr_cred->fsuid));
1212edd8d74SNeilBrown 	*p++ = htonl((u32) from_kgid(&init_user_ns, cred->cr_cred->fsgid));
1221da177e4SLinus Torvalds 	hold = p++;
1232edd8d74SNeilBrown 	if (gi)
1242edd8d74SNeilBrown 		for (i = 0; i < UNX_NGROUPS && i < gi->ngroups; i++)
1252edd8d74SNeilBrown 			*p++ = htonl((u32) from_kgid(&init_user_ns, gi->gid[i]));
1261da177e4SLinus Torvalds 	*hold = htonl(p - hold - 1);		/* gid array length */
1271da177e4SLinus Torvalds 	*base = htonl((p - base - 1) << 2);	/* cred length */
1281da177e4SLinus Torvalds 
1291da177e4SLinus Torvalds 	*p++ = htonl(RPC_AUTH_NULL);
1301da177e4SLinus Torvalds 	*p++ = htonl(0);
1311da177e4SLinus Torvalds 
1321da177e4SLinus Torvalds 	return p;
1331da177e4SLinus Torvalds }
1341da177e4SLinus Torvalds 
1351da177e4SLinus Torvalds /*
1361da177e4SLinus Torvalds  * Refresh credentials. This is a no-op for AUTH_UNIX
1371da177e4SLinus Torvalds  */
1381da177e4SLinus Torvalds static int
1391da177e4SLinus Torvalds unx_refresh(struct rpc_task *task)
1401da177e4SLinus Torvalds {
141a17c2153STrond Myklebust 	set_bit(RPCAUTH_CRED_UPTODATE, &task->tk_rqstp->rq_cred->cr_flags);
1421da177e4SLinus Torvalds 	return 0;
1431da177e4SLinus Torvalds }
1441da177e4SLinus Torvalds 
145d8ed029dSAlexey Dobriyan static __be32 *
146d8ed029dSAlexey Dobriyan unx_validate(struct rpc_task *task, __be32 *p)
1471da177e4SLinus Torvalds {
1481da177e4SLinus Torvalds 	rpc_authflavor_t	flavor;
1491da177e4SLinus Torvalds 	u32			size;
1501da177e4SLinus Torvalds 
1511da177e4SLinus Torvalds 	flavor = ntohl(*p++);
1521da177e4SLinus Torvalds 	if (flavor != RPC_AUTH_NULL &&
1531da177e4SLinus Torvalds 	    flavor != RPC_AUTH_UNIX &&
1541da177e4SLinus Torvalds 	    flavor != RPC_AUTH_SHORT) {
1551da177e4SLinus Torvalds 		printk("RPC: bad verf flavor: %u\n", flavor);
15635fa5f7bSAndy Adamson 		return ERR_PTR(-EIO);
1571da177e4SLinus Torvalds 	}
1581da177e4SLinus Torvalds 
1591da177e4SLinus Torvalds 	size = ntohl(*p++);
1601da177e4SLinus Torvalds 	if (size > RPC_MAX_AUTH_SIZE) {
1611da177e4SLinus Torvalds 		printk("RPC: giant verf size: %u\n", size);
16235fa5f7bSAndy Adamson 		return ERR_PTR(-EIO);
1631da177e4SLinus Torvalds 	}
164a17c2153STrond Myklebust 	task->tk_rqstp->rq_cred->cr_auth->au_rslack = (size >> 2) + 2;
1651da177e4SLinus Torvalds 	p += (size >> 2);
1661da177e4SLinus Torvalds 
1671da177e4SLinus Torvalds 	return p;
1681da177e4SLinus Torvalds }
1691da177e4SLinus Torvalds 
1705d8d9a4dSTrond Myklebust int __init rpc_init_authunix(void)
1719499b434STrond Myklebust {
1722edd8d74SNeilBrown 	unix_pool = mempool_create_kmalloc_pool(16, sizeof(struct rpc_cred));
1732edd8d74SNeilBrown 	return unix_pool ? 0 : -ENOMEM;
1745d8d9a4dSTrond Myklebust }
1755d8d9a4dSTrond Myklebust 
1765d8d9a4dSTrond Myklebust void rpc_destroy_authunix(void)
1775d8d9a4dSTrond Myklebust {
1782edd8d74SNeilBrown 	mempool_destroy(unix_pool);
1799499b434STrond Myklebust }
1809499b434STrond Myklebust 
181f1c0a861STrond Myklebust const struct rpc_authops authunix_ops = {
1821da177e4SLinus Torvalds 	.owner		= THIS_MODULE,
1831da177e4SLinus Torvalds 	.au_flavor	= RPC_AUTH_UNIX,
1841da177e4SLinus Torvalds 	.au_name	= "UNIX",
1851da177e4SLinus Torvalds 	.create		= unx_create,
1861da177e4SLinus Torvalds 	.destroy	= unx_destroy,
1871da177e4SLinus Torvalds 	.lookup_cred	= unx_lookup_cred,
1881da177e4SLinus Torvalds };
1891da177e4SLinus Torvalds 
1901da177e4SLinus Torvalds static
1911da177e4SLinus Torvalds struct rpc_auth		unix_auth = {
1924500632fSChuck Lever 	.au_cslack	= UNX_CALLSLACK,
1934500632fSChuck Lever 	.au_rslack	= NUL_REPLYSLACK,
1941da177e4SLinus Torvalds 	.au_ops		= &authunix_ops,
19581039f1fSTrond Myklebust 	.au_flavor	= RPC_AUTH_UNIX,
196331bc71cSTrond Myklebust 	.au_count	= REFCOUNT_INIT(1),
1971da177e4SLinus Torvalds };
1981da177e4SLinus Torvalds 
1991da177e4SLinus Torvalds static
200f1c0a861STrond Myklebust const struct rpc_credops unix_credops = {
2011da177e4SLinus Torvalds 	.cr_name	= "AUTH_UNIX",
2021da177e4SLinus Torvalds 	.crdestroy	= unx_destroy_cred,
2031da177e4SLinus Torvalds 	.crmatch	= unx_match,
2041da177e4SLinus Torvalds 	.crmarshal	= unx_marshal,
2051da177e4SLinus Torvalds 	.crrefresh	= unx_refresh,
2061da177e4SLinus Torvalds 	.crvalidate	= unx_validate,
2071da177e4SLinus Torvalds };
208