xref: /openbmc/linux/net/sunrpc/auth_unix.c (revision a0584ee9)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  * linux/net/sunrpc/auth_unix.c
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  * UNIX-style authentication; no AUTH_SHORT support
61da177e4SLinus Torvalds  *
71da177e4SLinus Torvalds  * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
81da177e4SLinus Torvalds  */
91da177e4SLinus Torvalds 
105a0e3ad6STejun Heo #include <linux/slab.h>
111da177e4SLinus Torvalds #include <linux/types.h>
121da177e4SLinus Torvalds #include <linux/sched.h>
131da177e4SLinus Torvalds #include <linux/module.h>
142edd8d74SNeilBrown #include <linux/mempool.h>
151da177e4SLinus Torvalds #include <linux/sunrpc/clnt.h>
161da177e4SLinus Torvalds #include <linux/sunrpc/auth.h>
17ae2975bcSEric W. Biederman #include <linux/user_namespace.h>
181da177e4SLinus Torvalds 
191da177e4SLinus Torvalds 
20f895b252SJeff Layton #if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
211da177e4SLinus Torvalds # define RPCDBG_FACILITY	RPCDBG_AUTH
221da177e4SLinus Torvalds #endif
231da177e4SLinus Torvalds 
241da177e4SLinus Torvalds static struct rpc_auth		unix_auth;
25f1c0a861STrond Myklebust static const struct rpc_credops	unix_credops;
262edd8d74SNeilBrown static mempool_t		*unix_pool;
271da177e4SLinus Torvalds 
281da177e4SLinus Torvalds static struct rpc_auth *
2982b98ca5SSargun Dhillon unx_create(const struct rpc_auth_create_args *args, struct rpc_clnt *clnt)
301da177e4SLinus Torvalds {
31331bc71cSTrond Myklebust 	refcount_inc(&unix_auth.au_count);
321da177e4SLinus Torvalds 	return &unix_auth;
331da177e4SLinus Torvalds }
341da177e4SLinus Torvalds 
351da177e4SLinus Torvalds static void
361da177e4SLinus Torvalds unx_destroy(struct rpc_auth *auth)
371da177e4SLinus Torvalds {
381e035d06SFrank Sorenson }
391e035d06SFrank Sorenson 
401da177e4SLinus Torvalds /*
411da177e4SLinus Torvalds  * Lookup AUTH_UNIX creds for current process
421da177e4SLinus Torvalds  */
431da177e4SLinus Torvalds static struct rpc_cred *
441da177e4SLinus Torvalds unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
451da177e4SLinus Torvalds {
462edd8d74SNeilBrown 	struct rpc_cred *ret = mempool_alloc(unix_pool, GFP_NOFS);
471da177e4SLinus Torvalds 
482edd8d74SNeilBrown 	rpcauth_init_cred(ret, acred, auth, &unix_credops);
492edd8d74SNeilBrown 	ret->cr_flags = 1UL << RPCAUTH_CRED_UPTODATE;
502edd8d74SNeilBrown 	return ret;
5131be5bf1STrond Myklebust }
52696e38dfSTrond Myklebust 
5331be5bf1STrond Myklebust static void
5431be5bf1STrond Myklebust unx_free_cred_callback(struct rcu_head *head)
5531be5bf1STrond Myklebust {
562edd8d74SNeilBrown 	struct rpc_cred *rpc_cred = container_of(head, struct rpc_cred, cr_rcu);
5780125d4aSChuck Lever 
582edd8d74SNeilBrown 	put_cred(rpc_cred->cr_cred);
592edd8d74SNeilBrown 	mempool_free(rpc_cred, unix_pool);
6031be5bf1STrond Myklebust }
6131be5bf1STrond Myklebust 
6231be5bf1STrond Myklebust static void
6331be5bf1STrond Myklebust unx_destroy_cred(struct rpc_cred *cred)
6431be5bf1STrond Myklebust {
6531be5bf1STrond Myklebust 	call_rcu(&cred->cr_rcu, unx_free_cred_callback);
661da177e4SLinus Torvalds }
671da177e4SLinus Torvalds 
681da177e4SLinus Torvalds /*
692edd8d74SNeilBrown  * Match credentials against current the auth_cred.
701da177e4SLinus Torvalds  */
711da177e4SLinus Torvalds static int
722edd8d74SNeilBrown unx_match(struct auth_cred *acred, struct rpc_cred *cred, int flags)
731da177e4SLinus Torvalds {
74af093835STrond Myklebust 	unsigned int groups = 0;
75af093835STrond Myklebust 	unsigned int i;
761da177e4SLinus Torvalds 
772edd8d74SNeilBrown 	if (cred->cr_cred == acred->cred)
782edd8d74SNeilBrown 		return 1;
791da177e4SLinus Torvalds 
802edd8d74SNeilBrown 	if (!uid_eq(cred->cr_cred->fsuid, acred->cred->fsuid) || !gid_eq(cred->cr_cred->fsgid, acred->cred->fsgid))
811da177e4SLinus Torvalds 		return 0;
821da177e4SLinus Torvalds 
83fc0664fdSNeilBrown 	if (acred->cred && acred->cred->group_info != NULL)
84fc0664fdSNeilBrown 		groups = acred->cred->group_info->ngroups;
855786461bSKinglong Mee 	if (groups > UNX_NGROUPS)
865786461bSKinglong Mee 		groups = UNX_NGROUPS;
872edd8d74SNeilBrown 	if (cred->cr_cred->group_info == NULL)
882edd8d74SNeilBrown 		return groups == 0;
892edd8d74SNeilBrown 	if (groups != cred->cr_cred->group_info->ngroups)
901da177e4SLinus Torvalds 		return 0;
912edd8d74SNeilBrown 
922edd8d74SNeilBrown 	for (i = 0; i < groups ; i++)
932edd8d74SNeilBrown 		if (!gid_eq(cred->cr_cred->group_info->gid[i], acred->cred->group_info->gid[i]))
94dc6f55e9SNeilBrown 			return 0;
951da177e4SLinus Torvalds 	return 1;
961da177e4SLinus Torvalds }
971da177e4SLinus Torvalds 
981da177e4SLinus Torvalds /*
991da177e4SLinus Torvalds  * Marshal credentials.
1001da177e4SLinus Torvalds  * Maybe we should keep a cached credential for performance reasons.
1011da177e4SLinus Torvalds  */
102e8680a24SChuck Lever static int
103e8680a24SChuck Lever unx_marshal(struct rpc_task *task, struct xdr_stream *xdr)
1041da177e4SLinus Torvalds {
1051da177e4SLinus Torvalds 	struct rpc_clnt	*clnt = task->tk_client;
1062edd8d74SNeilBrown 	struct rpc_cred	*cred = task->tk_rqstp->rq_cred;
107e8680a24SChuck Lever 	__be32		*p, *cred_len, *gidarr_len;
1081da177e4SLinus Torvalds 	int		i;
1092edd8d74SNeilBrown 	struct group_info *gi = cred->cr_cred->group_info;
1101da177e4SLinus Torvalds 
111e8680a24SChuck Lever 	/* Credential */
1121da177e4SLinus Torvalds 
113e8680a24SChuck Lever 	p = xdr_reserve_space(xdr, 3 * sizeof(*p));
114e8680a24SChuck Lever 	if (!p)
115e8680a24SChuck Lever 		goto marshal_failed;
116e8680a24SChuck Lever 	*p++ = rpc_auth_unix;
117e8680a24SChuck Lever 	cred_len = p++;
118e8680a24SChuck Lever 	*p++ = xdr_zero;	/* stamp */
119e8680a24SChuck Lever 	if (xdr_stream_encode_opaque(xdr, clnt->cl_nodename,
120e8680a24SChuck Lever 				     clnt->cl_nodelen) < 0)
121e8680a24SChuck Lever 		goto marshal_failed;
122e8680a24SChuck Lever 	p = xdr_reserve_space(xdr, 3 * sizeof(*p));
123e8680a24SChuck Lever 	if (!p)
124e8680a24SChuck Lever 		goto marshal_failed;
125e8680a24SChuck Lever 	*p++ = cpu_to_be32(from_kuid(&init_user_ns, cred->cr_cred->fsuid));
126e8680a24SChuck Lever 	*p++ = cpu_to_be32(from_kgid(&init_user_ns, cred->cr_cred->fsgid));
1271da177e4SLinus Torvalds 
128e8680a24SChuck Lever 	gidarr_len = p++;
1292edd8d74SNeilBrown 	if (gi)
1302edd8d74SNeilBrown 		for (i = 0; i < UNX_NGROUPS && i < gi->ngroups; i++)
131e8680a24SChuck Lever 			*p++ = cpu_to_be32(from_kgid(&init_user_ns,
132e8680a24SChuck Lever 						     gi->gid[i]));
133e8680a24SChuck Lever 	*gidarr_len = cpu_to_be32(p - gidarr_len - 1);
134e8680a24SChuck Lever 	*cred_len = cpu_to_be32((p - cred_len - 1) << 2);
135e8680a24SChuck Lever 	p = xdr_reserve_space(xdr, (p - gidarr_len - 1) << 2);
136e8680a24SChuck Lever 	if (!p)
137e8680a24SChuck Lever 		goto marshal_failed;
1381da177e4SLinus Torvalds 
139e8680a24SChuck Lever 	/* Verifier */
1401da177e4SLinus Torvalds 
141e8680a24SChuck Lever 	p = xdr_reserve_space(xdr, 2 * sizeof(*p));
142e8680a24SChuck Lever 	if (!p)
143e8680a24SChuck Lever 		goto marshal_failed;
144e8680a24SChuck Lever 	*p++ = rpc_auth_null;
145e8680a24SChuck Lever 	*p   = xdr_zero;
146e8680a24SChuck Lever 
147e8680a24SChuck Lever 	return 0;
148e8680a24SChuck Lever 
149e8680a24SChuck Lever marshal_failed:
150e8680a24SChuck Lever 	return -EMSGSIZE;
1511da177e4SLinus Torvalds }
1521da177e4SLinus Torvalds 
1531da177e4SLinus Torvalds /*
1541da177e4SLinus Torvalds  * Refresh credentials. This is a no-op for AUTH_UNIX
1551da177e4SLinus Torvalds  */
1561da177e4SLinus Torvalds static int
1571da177e4SLinus Torvalds unx_refresh(struct rpc_task *task)
1581da177e4SLinus Torvalds {
159a17c2153STrond Myklebust 	set_bit(RPCAUTH_CRED_UPTODATE, &task->tk_rqstp->rq_cred->cr_flags);
1601da177e4SLinus Torvalds 	return 0;
1611da177e4SLinus Torvalds }
1621da177e4SLinus Torvalds 
163a0584ee9SChuck Lever static int
164a0584ee9SChuck Lever unx_validate(struct rpc_task *task, struct xdr_stream *xdr)
1651da177e4SLinus Torvalds {
166a0584ee9SChuck Lever 	__be32 *p;
1671da177e4SLinus Torvalds 	u32 size;
1681da177e4SLinus Torvalds 
169a0584ee9SChuck Lever 	p = xdr_inline_decode(xdr, 2 * sizeof(*p));
170a0584ee9SChuck Lever 	if (!p)
171a0584ee9SChuck Lever 		return -EIO;
172a0584ee9SChuck Lever 	switch (*p++) {
173a0584ee9SChuck Lever 	case rpc_auth_null:
174a0584ee9SChuck Lever 	case rpc_auth_unix:
175a0584ee9SChuck Lever 	case rpc_auth_short:
176a0584ee9SChuck Lever 		break;
177a0584ee9SChuck Lever 	default:
178a0584ee9SChuck Lever 		return -EIO;
1791da177e4SLinus Torvalds 	}
180a0584ee9SChuck Lever 	size = be32_to_cpup(p);
181a0584ee9SChuck Lever 	if (size > RPC_MAX_AUTH_SIZE)
182a0584ee9SChuck Lever 		return -EIO;
183a0584ee9SChuck Lever 	p = xdr_inline_decode(xdr, size);
184a0584ee9SChuck Lever 	if (!p)
185a0584ee9SChuck Lever 		return -EIO;
1861da177e4SLinus Torvalds 
187a17c2153STrond Myklebust 	task->tk_rqstp->rq_cred->cr_auth->au_rslack = (size >> 2) + 2;
188a0584ee9SChuck Lever 	return 0;
1891da177e4SLinus Torvalds }
1901da177e4SLinus Torvalds 
1915d8d9a4dSTrond Myklebust int __init rpc_init_authunix(void)
1929499b434STrond Myklebust {
1932edd8d74SNeilBrown 	unix_pool = mempool_create_kmalloc_pool(16, sizeof(struct rpc_cred));
1942edd8d74SNeilBrown 	return unix_pool ? 0 : -ENOMEM;
1955d8d9a4dSTrond Myklebust }
1965d8d9a4dSTrond Myklebust 
1975d8d9a4dSTrond Myklebust void rpc_destroy_authunix(void)
1985d8d9a4dSTrond Myklebust {
1992edd8d74SNeilBrown 	mempool_destroy(unix_pool);
2009499b434STrond Myklebust }
2019499b434STrond Myklebust 
202f1c0a861STrond Myklebust const struct rpc_authops authunix_ops = {
2031da177e4SLinus Torvalds 	.owner		= THIS_MODULE,
2041da177e4SLinus Torvalds 	.au_flavor	= RPC_AUTH_UNIX,
2051da177e4SLinus Torvalds 	.au_name	= "UNIX",
2061da177e4SLinus Torvalds 	.create		= unx_create,
2071da177e4SLinus Torvalds 	.destroy	= unx_destroy,
2081da177e4SLinus Torvalds 	.lookup_cred	= unx_lookup_cred,
2091da177e4SLinus Torvalds };
2101da177e4SLinus Torvalds 
2111da177e4SLinus Torvalds static
2121da177e4SLinus Torvalds struct rpc_auth		unix_auth = {
2134500632fSChuck Lever 	.au_cslack	= UNX_CALLSLACK,
2144500632fSChuck Lever 	.au_rslack	= NUL_REPLYSLACK,
2151da177e4SLinus Torvalds 	.au_ops		= &authunix_ops,
21681039f1fSTrond Myklebust 	.au_flavor	= RPC_AUTH_UNIX,
217331bc71cSTrond Myklebust 	.au_count	= REFCOUNT_INIT(1),
2181da177e4SLinus Torvalds };
2191da177e4SLinus Torvalds 
2201da177e4SLinus Torvalds static
221f1c0a861STrond Myklebust const struct rpc_credops unix_credops = {
2221da177e4SLinus Torvalds 	.cr_name	= "AUTH_UNIX",
2231da177e4SLinus Torvalds 	.crdestroy	= unx_destroy_cred,
2241da177e4SLinus Torvalds 	.crmatch	= unx_match,
2251da177e4SLinus Torvalds 	.crmarshal	= unx_marshal,
226e8680a24SChuck Lever 	.crwrap_req	= rpcauth_wrap_req_encode,
2271da177e4SLinus Torvalds 	.crrefresh	= unx_refresh,
2281da177e4SLinus Torvalds 	.crvalidate	= unx_validate,
229a0584ee9SChuck Lever 	.crunwrap_resp	= rpcauth_unwrap_resp_decode,
2301da177e4SLinus Torvalds };
231