blob: cdb05b48de4498b59bebab11c812cb88f64e158c [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/net/sunrpc/auth.c
4 *
5 * Generic RPC client authentication API.
6 *
7 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
8 */
9
10#include <linux/types.h>
11#include <linux/sched.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010012#include <linux/cred.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/module.h>
14#include <linux/slab.h>
15#include <linux/errno.h>
Trond Myklebust25337fd2008-03-12 14:40:14 -040016#include <linux/hash.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/sunrpc/clnt.h>
Chuck Lever6a1a1e32012-07-11 16:31:08 -040018#include <linux/sunrpc/gss_api.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <linux/spinlock.h>
20
Chuck Levera0584ee2019-02-11 11:24:58 -050021#include <trace/events/sunrpc.h>
22
Trond Myklebust241269b2010-07-31 14:29:08 -040023#define RPC_CREDCACHE_DEFAULT_HASHBITS (4)
24struct rpc_cred_cache {
25 struct hlist_head *hashtable;
26 unsigned int hashbits;
27 spinlock_t lock;
28};
29
30static unsigned int auth_hashbits = RPC_CREDCACHE_DEFAULT_HASHBITS;
31
Trond Myklebust4e4c3be2018-09-27 13:12:44 -040032static const struct rpc_authops __rcu *auth_flavors[RPC_AUTH_MAXFLAVOR] = {
33 [RPC_AUTH_NULL] = (const struct rpc_authops __force __rcu *)&authnull_ops,
34 [RPC_AUTH_UNIX] = (const struct rpc_authops __force __rcu *)&authunix_ops,
Linus Torvalds1da177e2005-04-16 15:20:36 -070035 NULL, /* others can be loadable modules */
36};
37
Trond Myklebuste092bdc2007-06-23 19:45:36 -040038static LIST_HEAD(cred_unused);
Trond Myklebustf5c21872007-06-25 17:11:20 -040039static unsigned long number_cred_unused;
Trond Myklebuste092bdc2007-06-23 19:45:36 -040040
NeilBrowna52458b2018-12-03 11:30:31 +110041static struct cred machine_cred = {
42 .usage = ATOMIC_INIT(1),
Santosh kumar pradhane7f45092019-01-09 22:08:26 +053043#ifdef CONFIG_DEBUG_CREDENTIALS
44 .magic = CRED_MAGIC,
45#endif
NeilBrown5e169232018-12-03 11:30:30 +110046};
47
48/*
49 * Return the machine_cred pointer to be used whenever
50 * the a generic machine credential is needed.
51 */
NeilBrowna52458b2018-12-03 11:30:31 +110052const struct cred *rpc_machine_cred(void)
NeilBrown5e169232018-12-03 11:30:30 +110053{
54 return &machine_cred;
55}
56EXPORT_SYMBOL_GPL(rpc_machine_cred);
57
Miquel van Smoorenburgdb5fe262010-09-12 19:55:26 -040058#define MAX_HASHTABLE_BITS (14)
Stephen Rothwell8e4e15d2010-08-04 12:11:22 +100059static int param_set_hashtbl_sz(const char *val, const struct kernel_param *kp)
Trond Myklebust241269b2010-07-31 14:29:08 -040060{
61 unsigned long num;
62 unsigned int nbits;
63 int ret;
64
65 if (!val)
66 goto out_inval;
Daniel Walter00cfaa92014-06-21 13:06:38 +010067 ret = kstrtoul(val, 0, &num);
Dan Carpenter1a54c0c2018-07-12 15:30:08 +030068 if (ret)
Trond Myklebust241269b2010-07-31 14:29:08 -040069 goto out_inval;
Frank Sorenson34ae6852016-06-27 15:17:19 -040070 nbits = fls(num - 1);
Trond Myklebust241269b2010-07-31 14:29:08 -040071 if (nbits > MAX_HASHTABLE_BITS || nbits < 2)
72 goto out_inval;
73 *(unsigned int *)kp->arg = nbits;
74 return 0;
75out_inval:
76 return -EINVAL;
77}
78
Stephen Rothwell8e4e15d2010-08-04 12:11:22 +100079static int param_get_hashtbl_sz(char *buffer, const struct kernel_param *kp)
Trond Myklebust241269b2010-07-31 14:29:08 -040080{
81 unsigned int nbits;
82
83 nbits = *(unsigned int *)kp->arg;
84 return sprintf(buffer, "%u", 1U << nbits);
85}
86
87#define param_check_hashtbl_sz(name, p) __param_check(name, p, unsigned int);
88
Luis R. Rodriguez9c278472015-05-27 11:09:38 +093089static const struct kernel_param_ops param_ops_hashtbl_sz = {
Stephen Rothwell8e4e15d2010-08-04 12:11:22 +100090 .set = param_set_hashtbl_sz,
91 .get = param_get_hashtbl_sz,
92};
93
Trond Myklebust241269b2010-07-31 14:29:08 -040094module_param_named(auth_hashtable_size, auth_hashbits, hashtbl_sz, 0644);
95MODULE_PARM_DESC(auth_hashtable_size, "RPC credential cache hashtable size");
96
Trond Myklebustbae67462014-07-21 13:32:42 -040097static unsigned long auth_max_cred_cachesize = ULONG_MAX;
98module_param(auth_max_cred_cachesize, ulong, 0644);
99MODULE_PARM_DESC(auth_max_cred_cachesize, "RPC credential maximum total cache size");
100
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101static u32
102pseudoflavor_to_flavor(u32 flavor) {
Chuck Lever1c74a242013-03-22 12:53:08 -0400103 if (flavor > RPC_AUTH_MAXFLAVOR)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 return RPC_AUTH_GSS;
105 return flavor;
106}
107
108int
Trond Myklebustf1c0a862007-06-23 20:17:58 -0400109rpcauth_register(const struct rpc_authops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110{
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400111 const struct rpc_authops *old;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112 rpc_authflavor_t flavor;
113
114 if ((flavor = ops->au_flavor) >= RPC_AUTH_MAXFLAVOR)
115 return -EINVAL;
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400116 old = cmpxchg((const struct rpc_authops ** __force)&auth_flavors[flavor], NULL, ops);
117 if (old == NULL || old == ops)
118 return 0;
119 return -EPERM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400121EXPORT_SYMBOL_GPL(rpcauth_register);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122
123int
Trond Myklebustf1c0a862007-06-23 20:17:58 -0400124rpcauth_unregister(const struct rpc_authops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125{
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400126 const struct rpc_authops *old;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127 rpc_authflavor_t flavor;
128
129 if ((flavor = ops->au_flavor) >= RPC_AUTH_MAXFLAVOR)
130 return -EINVAL;
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400131
132 old = cmpxchg((const struct rpc_authops ** __force)&auth_flavors[flavor], ops, NULL);
133 if (old == ops || old == NULL)
134 return 0;
135 return -EPERM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400137EXPORT_SYMBOL_GPL(rpcauth_unregister);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400139static const struct rpc_authops *
140rpcauth_get_authops(rpc_authflavor_t flavor)
141{
142 const struct rpc_authops *ops;
143
144 if (flavor >= RPC_AUTH_MAXFLAVOR)
145 return NULL;
146
147 rcu_read_lock();
148 ops = rcu_dereference(auth_flavors[flavor]);
149 if (ops == NULL) {
150 rcu_read_unlock();
151 request_module("rpc-auth-%u", flavor);
152 rcu_read_lock();
153 ops = rcu_dereference(auth_flavors[flavor]);
154 if (ops == NULL)
155 goto out;
156 }
157 if (!try_module_get(ops->owner))
158 ops = NULL;
159out:
160 rcu_read_unlock();
161 return ops;
162}
163
164static void
165rpcauth_put_authops(const struct rpc_authops *ops)
166{
167 module_put(ops->owner);
168}
169
Chuck Lever6a1a1e32012-07-11 16:31:08 -0400170/**
Chuck Lever9568c5e2013-03-16 15:54:43 -0400171 * rpcauth_get_pseudoflavor - check if security flavor is supported
172 * @flavor: a security flavor
173 * @info: a GSS mech OID, quality of protection, and service value
174 *
175 * Verifies that an appropriate kernel module is available or already loaded.
176 * Returns an equivalent pseudoflavor, or RPC_AUTH_MAXFLAVOR if "flavor" is
177 * not supported locally.
178 */
179rpc_authflavor_t
180rpcauth_get_pseudoflavor(rpc_authflavor_t flavor, struct rpcsec_gss_info *info)
181{
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400182 const struct rpc_authops *ops = rpcauth_get_authops(flavor);
Chuck Lever9568c5e2013-03-16 15:54:43 -0400183 rpc_authflavor_t pseudoflavor;
184
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400185 if (!ops)
Chuck Lever9568c5e2013-03-16 15:54:43 -0400186 return RPC_AUTH_MAXFLAVOR;
Chuck Lever9568c5e2013-03-16 15:54:43 -0400187 pseudoflavor = flavor;
188 if (ops->info2flavor != NULL)
189 pseudoflavor = ops->info2flavor(info);
190
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400191 rpcauth_put_authops(ops);
Chuck Lever9568c5e2013-03-16 15:54:43 -0400192 return pseudoflavor;
193}
194EXPORT_SYMBOL_GPL(rpcauth_get_pseudoflavor);
195
196/**
Chuck Levera77c8062013-03-16 15:55:10 -0400197 * rpcauth_get_gssinfo - find GSS tuple matching a GSS pseudoflavor
198 * @pseudoflavor: GSS pseudoflavor to match
199 * @info: rpcsec_gss_info structure to fill in
200 *
201 * Returns zero and fills in "info" if pseudoflavor matches a
202 * supported mechanism.
203 */
204int
205rpcauth_get_gssinfo(rpc_authflavor_t pseudoflavor, struct rpcsec_gss_info *info)
206{
207 rpc_authflavor_t flavor = pseudoflavor_to_flavor(pseudoflavor);
208 const struct rpc_authops *ops;
209 int result;
210
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400211 ops = rpcauth_get_authops(flavor);
Chuck Levera77c8062013-03-16 15:55:10 -0400212 if (ops == NULL)
Chuck Levera77c8062013-03-16 15:55:10 -0400213 return -ENOENT;
Chuck Levera77c8062013-03-16 15:55:10 -0400214
215 result = -ENOENT;
216 if (ops->flavor2info != NULL)
217 result = ops->flavor2info(pseudoflavor, info);
218
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400219 rpcauth_put_authops(ops);
Chuck Levera77c8062013-03-16 15:55:10 -0400220 return result;
221}
222EXPORT_SYMBOL_GPL(rpcauth_get_gssinfo);
223
224/**
Chuck Lever6a1a1e32012-07-11 16:31:08 -0400225 * rpcauth_list_flavors - discover registered flavors and pseudoflavors
226 * @array: array to fill in
227 * @size: size of "array"
228 *
229 * Returns the number of array items filled in, or a negative errno.
230 *
231 * The returned array is not sorted by any policy. Callers should not
232 * rely on the order of the items in the returned array.
233 */
234int
235rpcauth_list_flavors(rpc_authflavor_t *array, int size)
236{
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400237 const struct rpc_authops *ops;
238 rpc_authflavor_t flavor, pseudos[4];
239 int i, len, result = 0;
Chuck Lever6a1a1e32012-07-11 16:31:08 -0400240
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400241 rcu_read_lock();
Chuck Lever6a1a1e32012-07-11 16:31:08 -0400242 for (flavor = 0; flavor < RPC_AUTH_MAXFLAVOR; flavor++) {
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400243 ops = rcu_dereference(auth_flavors[flavor]);
Chuck Lever6a1a1e32012-07-11 16:31:08 -0400244 if (result >= size) {
245 result = -ENOMEM;
246 break;
247 }
248
249 if (ops == NULL)
250 continue;
251 if (ops->list_pseudoflavors == NULL) {
252 array[result++] = ops->au_flavor;
253 continue;
254 }
255 len = ops->list_pseudoflavors(pseudos, ARRAY_SIZE(pseudos));
256 if (len < 0) {
257 result = len;
258 break;
259 }
260 for (i = 0; i < len; i++) {
261 if (result >= size) {
262 result = -ENOMEM;
263 break;
264 }
265 array[result++] = pseudos[i];
266 }
267 }
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400268 rcu_read_unlock();
Chuck Lever6a1a1e32012-07-11 16:31:08 -0400269 return result;
270}
271EXPORT_SYMBOL_GPL(rpcauth_list_flavors);
272
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273struct rpc_auth *
Sargun Dhillon82b98ca2018-07-05 16:48:50 +0000274rpcauth_create(const struct rpc_auth_create_args *args, struct rpc_clnt *clnt)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275{
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400276 struct rpc_auth *auth = ERR_PTR(-EINVAL);
Trond Myklebustf1c0a862007-06-23 20:17:58 -0400277 const struct rpc_authops *ops;
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400278 u32 flavor = pseudoflavor_to_flavor(args->pseudoflavor);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400280 ops = rpcauth_get_authops(flavor);
281 if (ops == NULL)
Olaf Kirchf344f6d2006-03-20 13:44:08 -0500282 goto out;
283
Trond Myklebustc2190662013-08-26 19:23:04 -0400284 auth = ops->create(args, clnt);
Trond Myklebust4e4c3be2018-09-27 13:12:44 -0400285
286 rpcauth_put_authops(ops);
J. Bruce Fields6a192752005-06-22 17:16:23 +0000287 if (IS_ERR(auth))
288 return auth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700289 if (clnt->cl_auth)
Trond Myklebustde7a8ce2007-06-23 10:46:47 -0400290 rpcauth_release(clnt->cl_auth);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291 clnt->cl_auth = auth;
Olaf Kirchf344f6d2006-03-20 13:44:08 -0500292
293out:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700294 return auth;
295}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400296EXPORT_SYMBOL_GPL(rpcauth_create);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700297
298void
Trond Myklebustde7a8ce2007-06-23 10:46:47 -0400299rpcauth_release(struct rpc_auth *auth)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700300{
Trond Myklebust331bc712018-10-14 10:40:29 -0400301 if (!refcount_dec_and_test(&auth->au_count))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700302 return;
303 auth->au_ops->destroy(auth);
304}
305
306static DEFINE_SPINLOCK(rpc_credcache_lock);
307
Trond Myklebust95cd6232018-10-11 16:11:09 -0400308/*
309 * On success, the caller is responsible for freeing the reference
310 * held by the hashtable
311 */
312static bool
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400313rpcauth_unhash_cred_locked(struct rpc_cred *cred)
314{
Trond Myklebust95cd6232018-10-11 16:11:09 -0400315 if (!test_and_clear_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags))
316 return false;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400317 hlist_del_rcu(&cred->cr_hash);
Trond Myklebust95cd6232018-10-11 16:11:09 -0400318 return true;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400319}
320
Trond Myklebust95cd6232018-10-11 16:11:09 -0400321static bool
Trond Myklebust9499b432007-06-24 15:57:57 -0400322rpcauth_unhash_cred(struct rpc_cred *cred)
323{
324 spinlock_t *cache_lock;
Trond Myklebust95cd6232018-10-11 16:11:09 -0400325 bool ret;
Trond Myklebust9499b432007-06-24 15:57:57 -0400326
Trond Myklebust95cd6232018-10-11 16:11:09 -0400327 if (!test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags))
328 return false;
Trond Myklebust9499b432007-06-24 15:57:57 -0400329 cache_lock = &cred->cr_auth->au_credcache->lock;
330 spin_lock(cache_lock);
Trond Myklebust95cd6232018-10-11 16:11:09 -0400331 ret = rpcauth_unhash_cred_locked(cred);
Trond Myklebust9499b432007-06-24 15:57:57 -0400332 spin_unlock(cache_lock);
Trond Myklebustf0380f32009-12-03 08:10:17 -0500333 return ret;
Trond Myklebust9499b432007-06-24 15:57:57 -0400334}
335
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336/*
337 * Initialize RPC credential cache
338 */
339int
Trond Myklebustf5c21872007-06-25 17:11:20 -0400340rpcauth_init_credcache(struct rpc_auth *auth)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700341{
342 struct rpc_cred_cache *new;
Trond Myklebust988664a2010-07-31 14:29:07 -0400343 unsigned int hashsize;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344
Kris Katterjohn8b3a7002006-01-11 15:56:43 -0800345 new = kmalloc(sizeof(*new), GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346 if (!new)
Trond Myklebust241269b2010-07-31 14:29:08 -0400347 goto out_nocache;
348 new->hashbits = auth_hashbits;
Trond Myklebust988664a2010-07-31 14:29:07 -0400349 hashsize = 1U << new->hashbits;
Trond Myklebust241269b2010-07-31 14:29:08 -0400350 new->hashtable = kcalloc(hashsize, sizeof(new->hashtable[0]), GFP_KERNEL);
351 if (!new->hashtable)
352 goto out_nohashtbl;
Trond Myklebust9499b432007-06-24 15:57:57 -0400353 spin_lock_init(&new->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700354 auth->au_credcache = new;
355 return 0;
Trond Myklebust241269b2010-07-31 14:29:08 -0400356out_nohashtbl:
357 kfree(new);
358out_nocache:
359 return -ENOMEM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700360}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400361EXPORT_SYMBOL_GPL(rpcauth_init_credcache);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700362
Jeff Laytona0337d12014-06-21 20:52:16 -0400363char *
364rpcauth_stringify_acceptor(struct rpc_cred *cred)
365{
366 if (!cred->cr_ops->crstringify_acceptor)
367 return NULL;
368 return cred->cr_ops->crstringify_acceptor(cred);
369}
370EXPORT_SYMBOL_GPL(rpcauth_stringify_acceptor);
371
Andy Adamson4de6caa2013-08-14 11:59:15 -0400372/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373 * Destroy a list of credentials
374 */
375static inline
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400376void rpcauth_destroy_credlist(struct list_head *head)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700377{
378 struct rpc_cred *cred;
379
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400380 while (!list_empty(head)) {
381 cred = list_entry(head->next, struct rpc_cred, cr_lru);
382 list_del_init(&cred->cr_lru);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700383 put_rpccred(cred);
384 }
385}
386
Trond Myklebust95cd6232018-10-11 16:11:09 -0400387static void
388rpcauth_lru_add_locked(struct rpc_cred *cred)
389{
390 if (!list_empty(&cred->cr_lru))
391 return;
392 number_cred_unused++;
393 list_add_tail(&cred->cr_lru, &cred_unused);
394}
395
396static void
397rpcauth_lru_add(struct rpc_cred *cred)
398{
399 if (!list_empty(&cred->cr_lru))
400 return;
401 spin_lock(&rpc_credcache_lock);
402 rpcauth_lru_add_locked(cred);
403 spin_unlock(&rpc_credcache_lock);
404}
405
406static void
407rpcauth_lru_remove_locked(struct rpc_cred *cred)
408{
409 if (list_empty(&cred->cr_lru))
410 return;
411 number_cred_unused--;
412 list_del_init(&cred->cr_lru);
413}
414
415static void
416rpcauth_lru_remove(struct rpc_cred *cred)
417{
418 if (list_empty(&cred->cr_lru))
419 return;
420 spin_lock(&rpc_credcache_lock);
421 rpcauth_lru_remove_locked(cred);
422 spin_unlock(&rpc_credcache_lock);
423}
424
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425/*
426 * Clear the RPC credential cache, and delete those credentials
427 * that are not referenced.
428 */
429void
Trond Myklebust3ab9bb72007-06-09 15:41:42 -0400430rpcauth_clear_credcache(struct rpc_cred_cache *cache)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431{
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400432 LIST_HEAD(free);
433 struct hlist_head *head;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434 struct rpc_cred *cred;
Trond Myklebust988664a2010-07-31 14:29:07 -0400435 unsigned int hashsize = 1U << cache->hashbits;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700436 int i;
437
438 spin_lock(&rpc_credcache_lock);
Trond Myklebust9499b432007-06-24 15:57:57 -0400439 spin_lock(&cache->lock);
Trond Myklebust988664a2010-07-31 14:29:07 -0400440 for (i = 0; i < hashsize; i++) {
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400441 head = &cache->hashtable[i];
442 while (!hlist_empty(head)) {
443 cred = hlist_entry(head->first, struct rpc_cred, cr_hash);
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400444 rpcauth_unhash_cred_locked(cred);
Trond Myklebust95cd6232018-10-11 16:11:09 -0400445 /* Note: We now hold a reference to cred */
446 rpcauth_lru_remove_locked(cred);
447 list_add_tail(&cred->cr_lru, &free);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700448 }
449 }
Trond Myklebust9499b432007-06-24 15:57:57 -0400450 spin_unlock(&cache->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700451 spin_unlock(&rpc_credcache_lock);
452 rpcauth_destroy_credlist(&free);
453}
454
Trond Myklebust3ab9bb72007-06-09 15:41:42 -0400455/*
456 * Destroy the RPC credential cache
457 */
458void
459rpcauth_destroy_credcache(struct rpc_auth *auth)
460{
461 struct rpc_cred_cache *cache = auth->au_credcache;
462
463 if (cache) {
464 auth->au_credcache = NULL;
465 rpcauth_clear_credcache(cache);
Trond Myklebust241269b2010-07-31 14:29:08 -0400466 kfree(cache->hashtable);
Trond Myklebust3ab9bb72007-06-09 15:41:42 -0400467 kfree(cache);
468 }
469}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400470EXPORT_SYMBOL_GPL(rpcauth_destroy_credcache);
Trond Myklebust3ab9bb72007-06-09 15:41:42 -0400471
Trond Myklebustd2b83142008-04-14 18:13:37 -0400472
473#define RPC_AUTH_EXPIRY_MORATORIUM (60 * HZ)
474
Linus Torvalds1da177e2005-04-16 15:20:36 -0700475/*
476 * Remove stale credentials. Avoid sleeping inside the loop.
477 */
Dave Chinner70534a72013-08-28 10:18:14 +1000478static long
Trond Myklebustf5c21872007-06-25 17:11:20 -0400479rpcauth_prune_expired(struct list_head *free, int nr_to_scan)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700480{
Trond Myklebusteac0d182008-10-28 15:21:41 -0400481 struct rpc_cred *cred, *next;
Trond Myklebustd2b83142008-04-14 18:13:37 -0400482 unsigned long expired = jiffies - RPC_AUTH_EXPIRY_MORATORIUM;
Dave Chinner70534a72013-08-28 10:18:14 +1000483 long freed = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700484
Trond Myklebusteac0d182008-10-28 15:21:41 -0400485 list_for_each_entry_safe(cred, next, &cred_unused, cr_lru) {
486
Trond Myklebust20673402010-05-13 12:51:06 -0400487 if (nr_to_scan-- == 0)
488 break;
Trond Myklebust79b18182018-10-14 10:34:31 -0400489 if (refcount_read(&cred->cr_count) > 1) {
Trond Myklebust95cd6232018-10-11 16:11:09 -0400490 rpcauth_lru_remove_locked(cred);
491 continue;
492 }
Trond Myklebust93a05e62010-05-13 12:51:06 -0400493 /*
494 * Enforce a 60 second garbage collection moratorium
495 * Note that the cred_unused list must be time-ordered.
496 */
Trond Myklebust95cd6232018-10-11 16:11:09 -0400497 if (!time_in_range(cred->cr_expire, expired, jiffies))
498 continue;
499 if (!rpcauth_unhash_cred(cred))
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400500 continue;
Trond Myklebusteac0d182008-10-28 15:21:41 -0400501
Trond Myklebust95cd6232018-10-11 16:11:09 -0400502 rpcauth_lru_remove_locked(cred);
503 freed++;
504 list_add_tail(&cred->cr_lru, free);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700505 }
Trond Myklebust95cd6232018-10-11 16:11:09 -0400506 return freed ? freed : SHRINK_STOP;
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400507}
508
Trond Myklebustbae67462014-07-21 13:32:42 -0400509static unsigned long
510rpcauth_cache_do_shrink(int nr_to_scan)
511{
512 LIST_HEAD(free);
513 unsigned long freed;
514
515 spin_lock(&rpc_credcache_lock);
516 freed = rpcauth_prune_expired(&free, nr_to_scan);
517 spin_unlock(&rpc_credcache_lock);
518 rpcauth_destroy_credlist(&free);
519
520 return freed;
521}
522
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400523/*
Trond Myklebustf5c21872007-06-25 17:11:20 -0400524 * Run memory cache shrinker.
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400525 */
Dave Chinner70534a72013-08-28 10:18:14 +1000526static unsigned long
527rpcauth_cache_shrink_scan(struct shrinker *shrink, struct shrink_control *sc)
528
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400529{
Dave Chinner70534a72013-08-28 10:18:14 +1000530 if ((sc->gfp_mask & GFP_KERNEL) != GFP_KERNEL)
531 return SHRINK_STOP;
532
533 /* nothing left, don't come back */
Trond Myklebustf5c21872007-06-25 17:11:20 -0400534 if (list_empty(&cred_unused))
Dave Chinner70534a72013-08-28 10:18:14 +1000535 return SHRINK_STOP;
536
Trond Myklebustbae67462014-07-21 13:32:42 -0400537 return rpcauth_cache_do_shrink(sc->nr_to_scan);
Dave Chinner70534a72013-08-28 10:18:14 +1000538}
539
540static unsigned long
541rpcauth_cache_shrink_count(struct shrinker *shrink, struct shrink_control *sc)
542
543{
NeilBrown4c3ffd02017-01-06 14:19:58 +1100544 return number_cred_unused * sysctl_vfs_cache_pressure / 100;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545}
546
Trond Myklebustbae67462014-07-21 13:32:42 -0400547static void
548rpcauth_cache_enforce_limit(void)
549{
550 unsigned long diff;
551 unsigned int nr_to_scan;
552
553 if (number_cred_unused <= auth_max_cred_cachesize)
554 return;
555 diff = number_cred_unused - auth_max_cred_cachesize;
556 nr_to_scan = 100;
557 if (diff < nr_to_scan)
558 nr_to_scan = diff;
559 rpcauth_cache_do_shrink(nr_to_scan);
560}
561
Linus Torvalds1da177e2005-04-16 15:20:36 -0700562/*
563 * Look up a process' credentials in the authentication cache
564 */
565struct rpc_cred *
566rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred,
Jeff Layton3c6e0bc2016-04-21 20:51:54 -0400567 int flags, gfp_t gfp)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700568{
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400569 LIST_HEAD(free);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700570 struct rpc_cred_cache *cache = auth->au_credcache;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400571 struct rpc_cred *cred = NULL,
572 *entry, *new;
Trond Myklebust25337fd2008-03-12 14:40:14 -0400573 unsigned int nr;
574
Frank Sorenson66cbd4b2016-09-29 10:44:41 -0500575 nr = auth->au_ops->hash_cred(acred, cache->hashbits);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700576
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400577 rcu_read_lock();
Sasha Levinb67bfe02013-02-27 17:06:00 -0800578 hlist_for_each_entry_rcu(entry, &cache->hashtable[nr], cr_hash) {
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400579 if (!entry->cr_ops->crmatch(acred, entry, flags))
580 continue;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400581 cred = get_rpccred(entry);
Trond Myklebust07d02a62018-10-12 13:28:26 -0400582 if (cred)
583 break;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400584 }
585 rcu_read_unlock();
586
Trond Myklebust9499b432007-06-24 15:57:57 -0400587 if (cred != NULL)
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400588 goto found;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400589
Jeff Layton3c6e0bc2016-04-21 20:51:54 -0400590 new = auth->au_ops->crcreate(auth, acred, flags, gfp);
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400591 if (IS_ERR(new)) {
592 cred = new;
593 goto out;
594 }
595
Trond Myklebust9499b432007-06-24 15:57:57 -0400596 spin_lock(&cache->lock);
Sasha Levinb67bfe02013-02-27 17:06:00 -0800597 hlist_for_each_entry(entry, &cache->hashtable[nr], cr_hash) {
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400598 if (!entry->cr_ops->crmatch(acred, entry, flags))
599 continue;
600 cred = get_rpccred(entry);
Trond Myklebust07d02a62018-10-12 13:28:26 -0400601 if (cred)
602 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700603 }
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400604 if (cred == NULL) {
Trond Myklebust5fe47552007-06-23 19:55:31 -0400605 cred = new;
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400606 set_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags);
Trond Myklebust79b18182018-10-14 10:34:31 -0400607 refcount_inc(&cred->cr_count);
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400608 hlist_add_head_rcu(&cred->cr_hash, &cache->hashtable[nr]);
609 } else
610 list_add_tail(&new->cr_lru, &free);
Trond Myklebust9499b432007-06-24 15:57:57 -0400611 spin_unlock(&cache->lock);
Trond Myklebustbae67462014-07-21 13:32:42 -0400612 rpcauth_cache_enforce_limit();
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400613found:
Joe Perchesf64f9e72009-11-29 16:55:45 -0800614 if (test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags) &&
615 cred->cr_ops->cr_init != NULL &&
616 !(flags & RPCAUTH_LOOKUP_NEW)) {
Trond Myklebustfba3bad2006-02-01 12:19:27 -0500617 int res = cred->cr_ops->cr_init(auth, cred);
618 if (res < 0) {
619 put_rpccred(cred);
620 cred = ERR_PTR(res);
621 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700622 }
Trond Myklebust31be5bf2007-06-24 15:55:26 -0400623 rpcauth_destroy_credlist(&free);
624out:
625 return cred;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700626}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400627EXPORT_SYMBOL_GPL(rpcauth_lookup_credcache);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700628
629struct rpc_cred *
Trond Myklebust8a317762006-02-01 12:18:36 -0500630rpcauth_lookupcred(struct rpc_auth *auth, int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631{
David Howells86a264a2008-11-14 10:39:18 +1100632 struct auth_cred acred;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700633 struct rpc_cred *ret;
David Howells86a264a2008-11-14 10:39:18 +1100634 const struct cred *cred = current_cred();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700635
David Howells86a264a2008-11-14 10:39:18 +1100636 memset(&acred, 0, sizeof(acred));
NeilBrown97f68c6b2018-12-03 11:30:30 +1100637 acred.cred = cred;
Trond Myklebust8a317762006-02-01 12:18:36 -0500638 ret = auth->au_ops->lookup_cred(auth, &acred, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700639 return ret;
640}
Andy Adamson66b06862014-06-12 15:02:32 -0400641EXPORT_SYMBOL_GPL(rpcauth_lookupcred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700642
Trond Myklebust5fe47552007-06-23 19:55:31 -0400643void
644rpcauth_init_cred(struct rpc_cred *cred, const struct auth_cred *acred,
645 struct rpc_auth *auth, const struct rpc_credops *ops)
646{
647 INIT_HLIST_NODE(&cred->cr_hash);
Trond Myklebuste092bdc2007-06-23 19:45:36 -0400648 INIT_LIST_HEAD(&cred->cr_lru);
Trond Myklebust79b18182018-10-14 10:34:31 -0400649 refcount_set(&cred->cr_count, 1);
Trond Myklebust5fe47552007-06-23 19:55:31 -0400650 cred->cr_auth = auth;
NeilBrown2edd8d72018-12-03 11:30:31 +1100651 cred->cr_flags = 0;
Trond Myklebust5fe47552007-06-23 19:55:31 -0400652 cred->cr_ops = ops;
653 cred->cr_expire = jiffies;
NeilBrown97f68c6b2018-12-03 11:30:30 +1100654 cred->cr_cred = get_cred(acred->cred);
Trond Myklebust5fe47552007-06-23 19:55:31 -0400655}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400656EXPORT_SYMBOL_GPL(rpcauth_init_cred);
Trond Myklebust5fe47552007-06-23 19:55:31 -0400657
Trond Myklebust8572b8e2010-07-31 14:29:08 -0400658static struct rpc_cred *
Trond Myklebust5d351752009-09-15 13:32:13 -0400659rpcauth_bind_root_cred(struct rpc_task *task, int lookupflags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700660{
Trond Myklebust1be27f32007-06-27 14:29:04 -0400661 struct rpc_auth *auth = task->tk_client->cl_auth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700662 struct auth_cred acred = {
NeilBrown97f68c6b2018-12-03 11:30:30 +1100663 .cred = get_task_cred(&init_task),
Linus Torvalds1da177e2005-04-16 15:20:36 -0700664 };
NeilBrown97f68c6b2018-12-03 11:30:30 +1100665 struct rpc_cred *ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700666
NeilBrown97f68c6b2018-12-03 11:30:30 +1100667 ret = auth->au_ops->lookup_cred(auth, &acred, lookupflags);
668 put_cred(acred.cred);
669 return ret;
Trond Myklebustaf093832008-03-12 12:12:16 -0400670}
671
Trond Myklebust8572b8e2010-07-31 14:29:08 -0400672static struct rpc_cred *
NeilBrown5e169232018-12-03 11:30:30 +1100673rpcauth_bind_machine_cred(struct rpc_task *task, int lookupflags)
674{
675 struct rpc_auth *auth = task->tk_client->cl_auth;
676 struct auth_cred acred = {
677 .principal = task->tk_client->cl_principal,
678 .cred = init_task.cred,
679 };
680
681 if (!acred.principal)
682 return NULL;
NeilBrown5e169232018-12-03 11:30:30 +1100683 return auth->au_ops->lookup_cred(auth, &acred, lookupflags);
684}
685
686static struct rpc_cred *
Trond Myklebust5d351752009-09-15 13:32:13 -0400687rpcauth_bind_new_cred(struct rpc_task *task, int lookupflags)
Trond Myklebustaf093832008-03-12 12:12:16 -0400688{
689 struct rpc_auth *auth = task->tk_client->cl_auth;
Trond Myklebustaf093832008-03-12 12:12:16 -0400690
Trond Myklebust8572b8e2010-07-31 14:29:08 -0400691 return rpcauth_lookupcred(auth, lookupflags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700692}
693
Trond Myklebusta17c2152010-07-31 14:29:08 -0400694static int
NeilBrowna52458b2018-12-03 11:30:31 +1100695rpcauth_bindcred(struct rpc_task *task, const struct cred *cred, int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700696{
Trond Myklebusta17c2152010-07-31 14:29:08 -0400697 struct rpc_rqst *req = task->tk_rqstp;
NeilBrown5e169232018-12-03 11:30:30 +1100698 struct rpc_cred *new = NULL;
Trond Myklebust5d351752009-09-15 13:32:13 -0400699 int lookupflags = 0;
NeilBrowna52458b2018-12-03 11:30:31 +1100700 struct rpc_auth *auth = task->tk_client->cl_auth;
701 struct auth_cred acred = {
702 .cred = cred,
703 };
Trond Myklebust5d351752009-09-15 13:32:13 -0400704
705 if (flags & RPC_TASK_ASYNC)
706 lookupflags |= RPCAUTH_LOOKUP_NEW;
NeilBrown1de7eea2018-12-03 11:30:30 +1100707 if (task->tk_op_cred)
708 /* Task must use exactly this rpc_cred */
NeilBrownd6efccd2018-12-03 11:30:31 +1100709 new = get_rpccred(task->tk_op_cred);
NeilBrown1de7eea2018-12-03 11:30:30 +1100710 else if (cred != NULL && cred != &machine_cred)
NeilBrowna52458b2018-12-03 11:30:31 +1100711 new = auth->au_ops->lookup_cred(auth, &acred, lookupflags);
NeilBrown5e169232018-12-03 11:30:30 +1100712 else if (cred == &machine_cred)
713 new = rpcauth_bind_machine_cred(task, lookupflags);
714
715 /* If machine cred couldn't be bound, try a root cred */
716 if (new)
717 ;
718 else if (cred == &machine_cred || (flags & RPC_TASK_ROOTCREDS))
Trond Myklebust8572b8e2010-07-31 14:29:08 -0400719 new = rpcauth_bind_root_cred(task, lookupflags);
NeilBrowna68a72e2018-12-03 11:30:30 +1100720 else if (flags & RPC_TASK_NULLCREDS)
721 new = authnull_ops.lookup_cred(NULL, NULL, 0);
Trond Myklebust4ccda2c2008-03-12 16:20:55 -0400722 else
Trond Myklebust8572b8e2010-07-31 14:29:08 -0400723 new = rpcauth_bind_new_cred(task, lookupflags);
724 if (IS_ERR(new))
725 return PTR_ERR(new);
Trond Myklebust9a8f6b52016-05-16 17:42:42 -0400726 put_rpccred(req->rq_cred);
Trond Myklebusta17c2152010-07-31 14:29:08 -0400727 req->rq_cred = new;
Trond Myklebust8572b8e2010-07-31 14:29:08 -0400728 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700729}
730
731void
732put_rpccred(struct rpc_cred *cred)
733{
Trond Myklebust9a8f6b52016-05-16 17:42:42 -0400734 if (cred == NULL)
735 return;
Trond Myklebust95cd6232018-10-11 16:11:09 -0400736 rcu_read_lock();
Trond Myklebust79b18182018-10-14 10:34:31 -0400737 if (refcount_dec_and_test(&cred->cr_count))
Trond Myklebust95cd6232018-10-11 16:11:09 -0400738 goto destroy;
Trond Myklebust79b18182018-10-14 10:34:31 -0400739 if (refcount_read(&cred->cr_count) != 1 ||
Trond Myklebust95cd6232018-10-11 16:11:09 -0400740 !test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags))
741 goto out;
742 if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) != 0) {
743 cred->cr_expire = jiffies;
744 rpcauth_lru_add(cred);
745 /* Race breaker */
746 if (unlikely(!test_bit(RPCAUTH_CRED_HASHED, &cred->cr_flags)))
747 rpcauth_lru_remove(cred);
748 } else if (rpcauth_unhash_cred(cred)) {
749 rpcauth_lru_remove(cred);
Trond Myklebust79b18182018-10-14 10:34:31 -0400750 if (refcount_dec_and_test(&cred->cr_count))
Trond Myklebust95cd6232018-10-11 16:11:09 -0400751 goto destroy;
Trond Myklebustf0380f32009-12-03 08:10:17 -0500752 }
Trond Myklebust95cd6232018-10-11 16:11:09 -0400753out:
754 rcu_read_unlock();
Trond Myklebustf0380f32009-12-03 08:10:17 -0500755 return;
Trond Myklebust95cd6232018-10-11 16:11:09 -0400756destroy:
757 rcu_read_unlock();
758 cred->cr_ops->crdestroy(cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759}
Trond Myklebuste8914c62007-07-14 15:39:59 -0400760EXPORT_SYMBOL_GPL(put_rpccred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700761
Chuck Levere8680a22019-02-11 11:24:48 -0500762/**
763 * rpcauth_marshcred - Append RPC credential to end of @xdr
764 * @task: controlling RPC task
765 * @xdr: xdr_stream containing initial portion of RPC Call header
766 *
767 * On success, an appropriate verifier is added to @xdr, @xdr is
768 * updated to point past the verifier, and zero is returned.
769 * Otherwise, @xdr is in an undefined state and a negative errno
770 * is returned.
771 */
772int rpcauth_marshcred(struct rpc_task *task, struct xdr_stream *xdr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773{
Chuck Levere8680a22019-02-11 11:24:48 -0500774 const struct rpc_credops *ops = task->tk_rqstp->rq_cred->cr_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700775
Chuck Levere8680a22019-02-11 11:24:48 -0500776 return ops->crmarshal(task, xdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700777}
778
Chuck Levere8680a22019-02-11 11:24:48 -0500779/**
780 * rpcauth_wrap_req_encode - XDR encode the RPC procedure
781 * @task: controlling RPC task
782 * @xdr: stream where on-the-wire bytes are to be marshalled
783 *
784 * On success, @xdr contains the encoded and wrapped message.
785 * Otherwise, @xdr is in an undefined state.
786 */
787int rpcauth_wrap_req_encode(struct rpc_task *task, struct xdr_stream *xdr)
Chuck Lever9f06c712010-12-14 14:59:18 +0000788{
Chuck Levere8680a22019-02-11 11:24:48 -0500789 kxdreproc_t encode = task->tk_msg.rpc_proc->p_encode;
Chuck Lever9f06c712010-12-14 14:59:18 +0000790
Chuck Levere8680a22019-02-11 11:24:48 -0500791 encode(task->tk_rqstp, xdr, task->tk_msg.rpc_argp);
Chuck Lever9f06c712010-12-14 14:59:18 +0000792 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700793}
Chuck Levere8680a22019-02-11 11:24:48 -0500794EXPORT_SYMBOL_GPL(rpcauth_wrap_req_encode);
795
796/**
797 * rpcauth_wrap_req - XDR encode and wrap the RPC procedure
798 * @task: controlling RPC task
799 * @xdr: stream where on-the-wire bytes are to be marshalled
800 *
801 * On success, @xdr contains the encoded and wrapped message,
802 * and zero is returned. Otherwise, @xdr is in an undefined
803 * state and a negative errno is returned.
804 */
805int rpcauth_wrap_req(struct rpc_task *task, struct xdr_stream *xdr)
806{
807 const struct rpc_credops *ops = task->tk_rqstp->rq_cred->cr_ops;
808
809 return ops->crwrap_req(task, xdr);
810}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700811
Chuck Levera0584ee2019-02-11 11:24:58 -0500812/**
813 * rpcauth_checkverf - Validate verifier in RPC Reply header
814 * @task: controlling RPC task
815 * @xdr: xdr_stream containing RPC Reply header
816 *
817 * On success, @xdr is updated to point past the verifier and
818 * zero is returned. Otherwise, @xdr is in an undefined state
819 * and a negative errno is returned.
820 */
821int
822rpcauth_checkverf(struct rpc_task *task, struct xdr_stream *xdr)
Chuck Leverbf269552010-12-14 14:59:29 +0000823{
Chuck Levera0584ee2019-02-11 11:24:58 -0500824 const struct rpc_credops *ops = task->tk_rqstp->rq_cred->cr_ops;
Chuck Leverbf269552010-12-14 14:59:29 +0000825
Chuck Levera0584ee2019-02-11 11:24:58 -0500826 return ops->crvalidate(task, xdr);
Chuck Leverbf269552010-12-14 14:59:29 +0000827}
828
Chuck Levera0584ee2019-02-11 11:24:58 -0500829/**
830 * rpcauth_unwrap_resp_decode - Invoke XDR decode function
831 * @task: controlling RPC task
832 * @xdr: stream where the Reply message resides
833 *
834 * Returns zero on success; otherwise a negative errno is returned.
835 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700836int
Chuck Levera0584ee2019-02-11 11:24:58 -0500837rpcauth_unwrap_resp_decode(struct rpc_task *task, struct xdr_stream *xdr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700838{
Chuck Levera0584ee2019-02-11 11:24:58 -0500839 kxdrdproc_t decode = task->tk_msg.rpc_proc->p_decode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700840
Chuck Levera0584ee2019-02-11 11:24:58 -0500841 return decode(task->tk_rqstp, xdr, task->tk_msg.rpc_resp);
842}
843EXPORT_SYMBOL_GPL(rpcauth_unwrap_resp_decode);
844
845/**
846 * rpcauth_unwrap_resp - Invoke unwrap and decode function for the cred
847 * @task: controlling RPC task
848 * @xdr: stream where the Reply message resides
849 *
850 * Returns zero on success; otherwise a negative errno is returned.
851 */
852int
853rpcauth_unwrap_resp(struct rpc_task *task, struct xdr_stream *xdr)
854{
855 const struct rpc_credops *ops = task->tk_rqstp->rq_cred->cr_ops;
856
857 return ops->crunwrap_resp(task, xdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700858}
859
Trond Myklebust3021a5bb2018-08-14 13:50:21 -0400860bool
861rpcauth_xmit_need_reencode(struct rpc_task *task)
862{
863 struct rpc_cred *cred = task->tk_rqstp->rq_cred;
864
865 if (!cred || !cred->cr_ops->crneed_reencode)
866 return false;
867 return cred->cr_ops->crneed_reencode(task);
868}
869
Linus Torvalds1da177e2005-04-16 15:20:36 -0700870int
871rpcauth_refreshcred(struct rpc_task *task)
872{
Trond Myklebust9a84d382010-10-24 18:00:46 -0400873 struct rpc_cred *cred;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700874 int err;
875
Trond Myklebusta17c2152010-07-31 14:29:08 -0400876 cred = task->tk_rqstp->rq_cred;
877 if (cred == NULL) {
878 err = rpcauth_bindcred(task, task->tk_msg.rpc_cred, task->tk_flags);
879 if (err < 0)
880 goto out;
881 cred = task->tk_rqstp->rq_cred;
Joe Perchesf81c6222011-06-03 11:51:19 +0000882 }
Chuck Lever0bbacc42005-11-01 16:53:32 -0500883
Linus Torvalds1da177e2005-04-16 15:20:36 -0700884 err = cred->cr_ops->crrefresh(task);
Trond Myklebusta17c2152010-07-31 14:29:08 -0400885out:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700886 if (err < 0)
887 task->tk_status = err;
888 return err;
889}
890
891void
892rpcauth_invalcred(struct rpc_task *task)
893{
Trond Myklebusta17c2152010-07-31 14:29:08 -0400894 struct rpc_cred *cred = task->tk_rqstp->rq_cred;
Trond Myklebustfc432dd2007-06-25 10:15:15 -0400895
Trond Myklebustfc432dd2007-06-25 10:15:15 -0400896 if (cred)
897 clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898}
899
900int
901rpcauth_uptodatecred(struct rpc_task *task)
902{
Trond Myklebusta17c2152010-07-31 14:29:08 -0400903 struct rpc_cred *cred = task->tk_rqstp->rq_cred;
Trond Myklebustfc432dd2007-06-25 10:15:15 -0400904
905 return cred == NULL ||
906 test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) != 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700907}
Trond Myklebustf5c21872007-06-25 17:11:20 -0400908
Rusty Russell8e1f9362007-07-17 04:03:17 -0700909static struct shrinker rpc_cred_shrinker = {
Dave Chinner70534a72013-08-28 10:18:14 +1000910 .count_objects = rpcauth_cache_shrink_count,
911 .scan_objects = rpcauth_cache_shrink_scan,
Rusty Russell8e1f9362007-07-17 04:03:17 -0700912 .seeks = DEFAULT_SEEKS,
913};
Trond Myklebustf5c21872007-06-25 17:11:20 -0400914
Trond Myklebust5d8d9a42010-07-31 14:29:07 -0400915int __init rpcauth_init_module(void)
Trond Myklebustf5c21872007-06-25 17:11:20 -0400916{
Trond Myklebust5d8d9a42010-07-31 14:29:07 -0400917 int err;
918
919 err = rpc_init_authunix();
920 if (err < 0)
921 goto out1;
Kinglong Mee28644862017-02-07 21:46:39 +0800922 err = register_shrinker(&rpc_cred_shrinker);
923 if (err < 0)
NeilBrown89a4f752018-12-03 11:30:31 +1100924 goto out2;
Trond Myklebust5d8d9a42010-07-31 14:29:07 -0400925 return 0;
926out2:
927 rpc_destroy_authunix();
928out1:
929 return err;
Trond Myklebustf5c21872007-06-25 17:11:20 -0400930}
931
Stephen Rothwellc135e842010-09-29 14:16:57 +1000932void rpcauth_remove_module(void)
Trond Myklebustf5c21872007-06-25 17:11:20 -0400933{
Trond Myklebust5d8d9a42010-07-31 14:29:07 -0400934 rpc_destroy_authunix();
Rusty Russell8e1f9362007-07-17 04:03:17 -0700935 unregister_shrinker(&rpc_cred_shrinker);
Trond Myklebustf5c21872007-06-25 17:11:20 -0400936}