Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 1 | /* |
| 2 | * Generic RPC credential |
| 3 | * |
| 4 | * Copyright (C) 2008, Trond Myklebust <Trond.Myklebust@netapp.com> |
| 5 | */ |
| 6 | |
| 7 | #include <linux/err.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 8 | #include <linux/slab.h> |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 9 | #include <linux/types.h> |
| 10 | #include <linux/module.h> |
| 11 | #include <linux/sched.h> |
| 12 | #include <linux/sunrpc/auth.h> |
| 13 | #include <linux/sunrpc/clnt.h> |
| 14 | #include <linux/sunrpc/debug.h> |
| 15 | #include <linux/sunrpc/sched.h> |
| 16 | |
Jeff Layton | f895b25 | 2014-11-17 16:58:04 -0500 | [diff] [blame] | 17 | #if IS_ENABLED(CONFIG_SUNRPC_DEBUG) |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 18 | # define RPCDBG_FACILITY RPCDBG_AUTH |
| 19 | #endif |
| 20 | |
Eric W. Biederman | bf37f79 | 2013-02-01 15:55:38 -0800 | [diff] [blame] | 21 | #define RPC_MACHINE_CRED_USERID GLOBAL_ROOT_UID |
| 22 | #define RPC_MACHINE_CRED_GROUPID GLOBAL_ROOT_GID |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 23 | |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 24 | struct generic_cred { |
| 25 | struct rpc_cred gc_base; |
| 26 | struct auth_cred acred; |
| 27 | }; |
| 28 | |
| 29 | static struct rpc_auth generic_auth; |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 30 | static const struct rpc_credops generic_credops; |
| 31 | |
| 32 | /* |
| 33 | * Public call interface |
| 34 | */ |
| 35 | struct rpc_cred *rpc_lookup_cred(void) |
| 36 | { |
| 37 | return rpcauth_lookupcred(&generic_auth, 0); |
| 38 | } |
| 39 | EXPORT_SYMBOL_GPL(rpc_lookup_cred); |
| 40 | |
Weston Andros Adamson | c065d22 | 2016-04-21 20:51:55 -0400 | [diff] [blame] | 41 | struct rpc_cred * |
| 42 | rpc_lookup_generic_cred(struct auth_cred *acred, int flags, gfp_t gfp) |
| 43 | { |
| 44 | return rpcauth_lookup_credcache(&generic_auth, acred, flags, gfp); |
| 45 | } |
| 46 | EXPORT_SYMBOL_GPL(rpc_lookup_generic_cred); |
| 47 | |
NeilBrown | bd95608 | 2014-07-14 11:28:20 +1000 | [diff] [blame] | 48 | struct rpc_cred *rpc_lookup_cred_nonblock(void) |
| 49 | { |
| 50 | return rpcauth_lookupcred(&generic_auth, RPCAUTH_LOOKUP_RCU); |
| 51 | } |
| 52 | EXPORT_SYMBOL_GPL(rpc_lookup_cred_nonblock); |
| 53 | |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 54 | /* |
| 55 | * Public call interface for looking up machine creds. |
| 56 | */ |
Trond Myklebust | 68c9715 | 2012-01-03 13:22:46 -0500 | [diff] [blame] | 57 | struct rpc_cred *rpc_lookup_machine_cred(const char *service_name) |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 58 | { |
| 59 | struct auth_cred acred = { |
Trond Myklebust | b452876 | 2008-05-11 12:18:51 -0700 | [diff] [blame] | 60 | .uid = RPC_MACHINE_CRED_USERID, |
| 61 | .gid = RPC_MACHINE_CRED_GROUPID, |
Trond Myklebust | 68c9715 | 2012-01-03 13:22:46 -0500 | [diff] [blame] | 62 | .principal = service_name, |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 63 | .machine_cred = 1, |
| 64 | }; |
| 65 | |
Trond Myklebust | 68c9715 | 2012-01-03 13:22:46 -0500 | [diff] [blame] | 66 | dprintk("RPC: looking up machine cred for service %s\n", |
| 67 | service_name); |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 68 | return generic_auth.au_ops->lookup_cred(&generic_auth, &acred, 0); |
| 69 | } |
| 70 | EXPORT_SYMBOL_GPL(rpc_lookup_machine_cred); |
| 71 | |
Trond Myklebust | 8572b8e | 2010-07-31 14:29:08 -0400 | [diff] [blame] | 72 | static struct rpc_cred *generic_bind_cred(struct rpc_task *task, |
| 73 | struct rpc_cred *cred, int lookupflags) |
Trond Myklebust | 5c69104 | 2008-03-12 16:21:07 -0400 | [diff] [blame] | 74 | { |
| 75 | struct rpc_auth *auth = task->tk_client->cl_auth; |
| 76 | struct auth_cred *acred = &container_of(cred, struct generic_cred, gc_base)->acred; |
Trond Myklebust | 5c69104 | 2008-03-12 16:21:07 -0400 | [diff] [blame] | 77 | |
Trond Myklebust | 8572b8e | 2010-07-31 14:29:08 -0400 | [diff] [blame] | 78 | return auth->au_ops->lookup_cred(auth, acred, lookupflags); |
Trond Myklebust | 5c69104 | 2008-03-12 16:21:07 -0400 | [diff] [blame] | 79 | } |
| 80 | |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 81 | /* |
| 82 | * Lookup generic creds for current process |
| 83 | */ |
| 84 | static struct rpc_cred * |
| 85 | generic_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) |
| 86 | { |
Jeff Layton | 3c6e0bc | 2016-04-21 20:51:54 -0400 | [diff] [blame] | 87 | return rpcauth_lookup_credcache(&generic_auth, acred, flags, GFP_KERNEL); |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 88 | } |
| 89 | |
| 90 | static struct rpc_cred * |
Jeff Layton | 3c6e0bc | 2016-04-21 20:51:54 -0400 | [diff] [blame] | 91 | generic_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags, gfp_t gfp) |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 92 | { |
| 93 | struct generic_cred *gcred; |
| 94 | |
Jeff Layton | 3c6e0bc | 2016-04-21 20:51:54 -0400 | [diff] [blame] | 95 | gcred = kmalloc(sizeof(*gcred), gfp); |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 96 | if (gcred == NULL) |
| 97 | return ERR_PTR(-ENOMEM); |
| 98 | |
| 99 | rpcauth_init_cred(&gcred->gc_base, acred, &generic_auth, &generic_credops); |
| 100 | gcred->gc_base.cr_flags = 1UL << RPCAUTH_CRED_UPTODATE; |
| 101 | |
| 102 | gcred->acred.uid = acred->uid; |
| 103 | gcred->acred.gid = acred->gid; |
| 104 | gcred->acred.group_info = acred->group_info; |
Andy Adamson | 4de6caa | 2013-08-14 11:59:15 -0400 | [diff] [blame] | 105 | gcred->acred.ac_flags = 0; |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 106 | if (gcred->acred.group_info != NULL) |
| 107 | get_group_info(gcred->acred.group_info); |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 108 | gcred->acred.machine_cred = acred->machine_cred; |
Trond Myklebust | 875ad3f | 2012-01-23 12:49:36 -0500 | [diff] [blame] | 109 | gcred->acred.principal = acred->principal; |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 110 | |
Trond Myklebust | 7c67db3 | 2008-04-07 20:50:11 -0400 | [diff] [blame] | 111 | dprintk("RPC: allocated %s cred %p for uid %d gid %d\n", |
| 112 | gcred->acred.machine_cred ? "machine" : "generic", |
Eric W. Biederman | cdba321 | 2013-02-01 17:10:52 -0800 | [diff] [blame] | 113 | gcred, |
| 114 | from_kuid(&init_user_ns, acred->uid), |
| 115 | from_kgid(&init_user_ns, acred->gid)); |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 116 | return &gcred->gc_base; |
| 117 | } |
| 118 | |
| 119 | static void |
| 120 | generic_free_cred(struct rpc_cred *cred) |
| 121 | { |
| 122 | struct generic_cred *gcred = container_of(cred, struct generic_cred, gc_base); |
| 123 | |
| 124 | dprintk("RPC: generic_free_cred %p\n", gcred); |
| 125 | if (gcred->acred.group_info != NULL) |
| 126 | put_group_info(gcred->acred.group_info); |
| 127 | kfree(gcred); |
| 128 | } |
| 129 | |
| 130 | static void |
| 131 | generic_free_cred_callback(struct rcu_head *head) |
| 132 | { |
| 133 | struct rpc_cred *cred = container_of(head, struct rpc_cred, cr_rcu); |
| 134 | generic_free_cred(cred); |
| 135 | } |
| 136 | |
| 137 | static void |
| 138 | generic_destroy_cred(struct rpc_cred *cred) |
| 139 | { |
| 140 | call_rcu(&cred->cr_rcu, generic_free_cred_callback); |
| 141 | } |
| 142 | |
Trond Myklebust | 875ad3f | 2012-01-23 12:49:36 -0500 | [diff] [blame] | 143 | static int |
| 144 | machine_cred_match(struct auth_cred *acred, struct generic_cred *gcred, int flags) |
| 145 | { |
| 146 | if (!gcred->acred.machine_cred || |
| 147 | gcred->acred.principal != acred->principal || |
Eric W. Biederman | 0b4d51b | 2013-02-01 16:39:32 -0800 | [diff] [blame] | 148 | !uid_eq(gcred->acred.uid, acred->uid) || |
| 149 | !gid_eq(gcred->acred.gid, acred->gid)) |
Trond Myklebust | 875ad3f | 2012-01-23 12:49:36 -0500 | [diff] [blame] | 150 | return 0; |
| 151 | return 1; |
| 152 | } |
| 153 | |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 154 | /* |
| 155 | * Match credentials against current process creds. |
| 156 | */ |
| 157 | static int |
| 158 | generic_match(struct auth_cred *acred, struct rpc_cred *cred, int flags) |
| 159 | { |
| 160 | struct generic_cred *gcred = container_of(cred, struct generic_cred, gc_base); |
Trond Myklebust | 23918b0 | 2008-11-20 16:06:21 -0500 | [diff] [blame] | 161 | int i; |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 162 | |
Trond Myklebust | 875ad3f | 2012-01-23 12:49:36 -0500 | [diff] [blame] | 163 | if (acred->machine_cred) |
| 164 | return machine_cred_match(acred, gcred, flags); |
| 165 | |
Eric W. Biederman | 0b4d51b | 2013-02-01 16:39:32 -0800 | [diff] [blame] | 166 | if (!uid_eq(gcred->acred.uid, acred->uid) || |
| 167 | !gid_eq(gcred->acred.gid, acred->gid) || |
Trond Myklebust | 875ad3f | 2012-01-23 12:49:36 -0500 | [diff] [blame] | 168 | gcred->acred.machine_cred != 0) |
Trond Myklebust | 23918b0 | 2008-11-20 16:06:21 -0500 | [diff] [blame] | 169 | goto out_nomatch; |
| 170 | |
| 171 | /* Optimisation in the case where pointers are identical... */ |
| 172 | if (gcred->acred.group_info == acred->group_info) |
| 173 | goto out_match; |
| 174 | |
| 175 | /* Slow path... */ |
| 176 | if (gcred->acred.group_info->ngroups != acred->group_info->ngroups) |
| 177 | goto out_nomatch; |
| 178 | for (i = 0; i < gcred->acred.group_info->ngroups; i++) { |
Eric W. Biederman | ae2975b | 2011-11-14 15:56:38 -0800 | [diff] [blame] | 179 | if (!gid_eq(GROUP_AT(gcred->acred.group_info, i), |
| 180 | GROUP_AT(acred->group_info, i))) |
Trond Myklebust | 23918b0 | 2008-11-20 16:06:21 -0500 | [diff] [blame] | 181 | goto out_nomatch; |
| 182 | } |
| 183 | out_match: |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 184 | return 1; |
Trond Myklebust | 23918b0 | 2008-11-20 16:06:21 -0500 | [diff] [blame] | 185 | out_nomatch: |
| 186 | return 0; |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 187 | } |
| 188 | |
Trond Myklebust | 5d8d9a4 | 2010-07-31 14:29:07 -0400 | [diff] [blame] | 189 | int __init rpc_init_generic_auth(void) |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 190 | { |
Trond Myklebust | 5d8d9a4 | 2010-07-31 14:29:07 -0400 | [diff] [blame] | 191 | return rpcauth_init_credcache(&generic_auth); |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 192 | } |
| 193 | |
Stephen Rothwell | c135e84 | 2010-09-29 14:16:57 +1000 | [diff] [blame] | 194 | void rpc_destroy_generic_auth(void) |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 195 | { |
Trond Myklebust | 5d8d9a4 | 2010-07-31 14:29:07 -0400 | [diff] [blame] | 196 | rpcauth_destroy_credcache(&generic_auth); |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 197 | } |
| 198 | |
Andy Adamson | 4de6caa | 2013-08-14 11:59:15 -0400 | [diff] [blame] | 199 | /* |
| 200 | * Test the the current time (now) against the underlying credential key expiry |
| 201 | * minus a timeout and setup notification. |
| 202 | * |
| 203 | * The normal case: |
| 204 | * If 'now' is before the key expiry minus RPC_KEY_EXPIRE_TIMEO, set |
| 205 | * the RPC_CRED_NOTIFY_TIMEOUT flag to setup the underlying credential |
| 206 | * rpc_credops crmatch routine to notify this generic cred when it's key |
| 207 | * expiration is within RPC_KEY_EXPIRE_TIMEO, and return 0. |
| 208 | * |
| 209 | * The error case: |
| 210 | * If the underlying cred lookup fails, return -EACCES. |
| 211 | * |
| 212 | * The 'almost' error case: |
| 213 | * If 'now' is within key expiry minus RPC_KEY_EXPIRE_TIMEO, but not within |
| 214 | * key expiry minus RPC_KEY_EXPIRE_FAIL, set the RPC_CRED_EXPIRE_SOON bit |
| 215 | * on the acred ac_flags and return 0. |
| 216 | */ |
| 217 | static int |
| 218 | generic_key_timeout(struct rpc_auth *auth, struct rpc_cred *cred) |
| 219 | { |
| 220 | struct auth_cred *acred = &container_of(cred, struct generic_cred, |
| 221 | gc_base)->acred; |
| 222 | struct rpc_cred *tcred; |
| 223 | int ret = 0; |
| 224 | |
| 225 | |
| 226 | /* Fast track for non crkey_timeout (no key) underlying credentials */ |
| 227 | if (test_bit(RPC_CRED_NO_CRKEY_TIMEOUT, &acred->ac_flags)) |
| 228 | return 0; |
| 229 | |
| 230 | /* Fast track for the normal case */ |
| 231 | if (test_bit(RPC_CRED_NOTIFY_TIMEOUT, &acred->ac_flags)) |
| 232 | return 0; |
| 233 | |
| 234 | /* lookup_cred either returns a valid referenced rpc_cred, or PTR_ERR */ |
| 235 | tcred = auth->au_ops->lookup_cred(auth, acred, 0); |
| 236 | if (IS_ERR(tcred)) |
| 237 | return -EACCES; |
| 238 | |
| 239 | if (!tcred->cr_ops->crkey_timeout) { |
| 240 | set_bit(RPC_CRED_NO_CRKEY_TIMEOUT, &acred->ac_flags); |
| 241 | ret = 0; |
| 242 | goto out_put; |
| 243 | } |
| 244 | |
| 245 | /* Test for the almost error case */ |
| 246 | ret = tcred->cr_ops->crkey_timeout(tcred); |
| 247 | if (ret != 0) { |
| 248 | set_bit(RPC_CRED_KEY_EXPIRE_SOON, &acred->ac_flags); |
| 249 | ret = 0; |
| 250 | } else { |
| 251 | /* In case underlying cred key has been reset */ |
| 252 | if (test_and_clear_bit(RPC_CRED_KEY_EXPIRE_SOON, |
| 253 | &acred->ac_flags)) |
| 254 | dprintk("RPC: UID %d Credential key reset\n", |
Geert Uytterhoeven | 1342930 | 2013-09-12 15:09:39 +0200 | [diff] [blame] | 255 | from_kuid(&init_user_ns, tcred->cr_uid)); |
Andy Adamson | 4de6caa | 2013-08-14 11:59:15 -0400 | [diff] [blame] | 256 | /* set up fasttrack for the normal case */ |
| 257 | set_bit(RPC_CRED_NOTIFY_TIMEOUT, &acred->ac_flags); |
| 258 | } |
| 259 | |
| 260 | out_put: |
| 261 | put_rpccred(tcred); |
| 262 | return ret; |
| 263 | } |
| 264 | |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 265 | static const struct rpc_authops generic_auth_ops = { |
| 266 | .owner = THIS_MODULE, |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 267 | .au_name = "Generic", |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 268 | .lookup_cred = generic_lookup_cred, |
| 269 | .crcreate = generic_create_cred, |
Andy Adamson | 4de6caa | 2013-08-14 11:59:15 -0400 | [diff] [blame] | 270 | .key_timeout = generic_key_timeout, |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 271 | }; |
| 272 | |
| 273 | static struct rpc_auth generic_auth = { |
| 274 | .au_ops = &generic_auth_ops, |
| 275 | .au_count = ATOMIC_INIT(0), |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 276 | }; |
| 277 | |
Andy Adamson | 4de6caa | 2013-08-14 11:59:15 -0400 | [diff] [blame] | 278 | static bool generic_key_to_expire(struct rpc_cred *cred) |
| 279 | { |
| 280 | struct auth_cred *acred = &container_of(cred, struct generic_cred, |
| 281 | gc_base)->acred; |
| 282 | bool ret; |
| 283 | |
| 284 | get_rpccred(cred); |
| 285 | ret = test_bit(RPC_CRED_KEY_EXPIRE_SOON, &acred->ac_flags); |
| 286 | put_rpccred(cred); |
| 287 | |
| 288 | return ret; |
| 289 | } |
| 290 | |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 291 | static const struct rpc_credops generic_credops = { |
| 292 | .cr_name = "Generic cred", |
| 293 | .crdestroy = generic_destroy_cred, |
Trond Myklebust | 5c69104 | 2008-03-12 16:21:07 -0400 | [diff] [blame] | 294 | .crbind = generic_bind_cred, |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 295 | .crmatch = generic_match, |
Andy Adamson | 4de6caa | 2013-08-14 11:59:15 -0400 | [diff] [blame] | 296 | .crkey_to_expire = generic_key_to_expire, |
Trond Myklebust | 9a559ef | 2008-03-12 12:24:49 -0400 | [diff] [blame] | 297 | }; |