auth_gss.c 35.1 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1
/*
2
 * linux/net/sunrpc/auth_gss/auth_gss.c
Linus Torvalds's avatar
Linus Torvalds committed
3 4
 *
 * RPCSEC_GSS client authentication.
5
 *
Linus Torvalds's avatar
Linus Torvalds committed
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 *  Copyright (c) 2000 The Regents of the University of Michigan.
 *  All rights reserved.
 *
 *  Dug Song       <dugsong@monkey.org>
 *  Andy Adamson   <andros@umich.edu>
 *
 *  Redistribution and use in source and binary forms, with or without
 *  modification, are permitted provided that the following conditions
 *  are met:
 *
 *  1. Redistributions of source code must retain the above copyright
 *     notice, this list of conditions and the following disclaimer.
 *  2. Redistributions in binary form must reproduce the above copyright
 *     notice, this list of conditions and the following disclaimer in the
 *     documentation and/or other materials provided with the distribution.
 *  3. Neither the name of the University nor the names of its
 *     contributors may be used to endorse or promote products derived
 *     from this software without specific prior written permission.
 *
 *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
 *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
 *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
 *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
 *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 *
 * $Id$
 */


#include <linux/module.h>
#include <linux/init.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/sched.h>
46
#include <linux/pagemap.h>
Linus Torvalds's avatar
Linus Torvalds committed
47 48 49 50 51 52 53 54 55 56
#include <linux/sunrpc/clnt.h>
#include <linux/sunrpc/auth.h>
#include <linux/sunrpc/auth_gss.h>
#include <linux/sunrpc/svcauth_gss.h>
#include <linux/sunrpc/gss_err.h>
#include <linux/workqueue.h>
#include <linux/sunrpc/rpc_pipe_fs.h>
#include <linux/sunrpc/gss_api.h>
#include <asm/uaccess.h>

57
static const struct rpc_authops authgss_ops;
Linus Torvalds's avatar
Linus Torvalds committed
58

59
static const struct rpc_credops gss_credops;
60
static const struct rpc_credops gss_nullops;
Linus Torvalds's avatar
Linus Torvalds committed
61 62 63 64 65 66 67 68 69 70

#ifdef RPC_DEBUG
# define RPCDBG_FACILITY	RPCDBG_AUTH
#endif

#define NFS_NGROUPS	16

#define GSS_CRED_SLACK		1024		/* XXX: unused */
/* length of a krb5 verifier (48), plus data added before arguments when
 * using integrity (two 4-byte integers): */
Olga Kornievskaia's avatar
Olga Kornievskaia committed
71
#define GSS_VERF_SLACK		100
Linus Torvalds's avatar
Linus Torvalds committed
72 73 74 75 76

/* XXX this define must match the gssd define
* as it is passed to gssd to signal the use of
* machine creds should be part of the shared rpc interface */

77
#define CA_RUN_AS_MACHINE  0x00000200
Linus Torvalds's avatar
Linus Torvalds committed
78 79 80 81 82

/* dump the buffer in `emacs-hexl' style */
#define isprint(c)      ((c > 0x1f) && (c < 0x7f))

struct gss_auth {
83
	struct kref kref;
Linus Torvalds's avatar
Linus Torvalds committed
84 85 86 87 88 89 90
	struct rpc_auth rpc_auth;
	struct gss_api_mech *mech;
	enum rpc_gss_svc service;
	struct rpc_clnt *client;
	struct dentry *dentry;
};

91
static void gss_free_ctx(struct gss_cl_ctx *);
Linus Torvalds's avatar
Linus Torvalds committed
92 93 94 95 96 97 98 99 100 101 102 103 104
static struct rpc_pipe_ops gss_upcall_ops;

static inline struct gss_cl_ctx *
gss_get_ctx(struct gss_cl_ctx *ctx)
{
	atomic_inc(&ctx->count);
	return ctx;
}

static inline void
gss_put_ctx(struct gss_cl_ctx *ctx)
{
	if (atomic_dec_and_test(&ctx->count))
105
		gss_free_ctx(ctx);
Linus Torvalds's avatar
Linus Torvalds committed
106 107
}

108 109 110 111 112
/* gss_cred_set_ctx:
 * called by gss_upcall_callback and gss_create_upcall in order
 * to set the gss context. The actual exchange of an old context
 * and a new one is protected by the inode->i_lock.
 */
Linus Torvalds's avatar
Linus Torvalds committed
113 114 115 116 117
static void
gss_cred_set_ctx(struct rpc_cred *cred, struct gss_cl_ctx *ctx)
{
	struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
	struct gss_cl_ctx *old;
118

Linus Torvalds's avatar
Linus Torvalds committed
119
	old = gss_cred->gc_ctx;
120
	rcu_assign_pointer(gss_cred->gc_ctx, ctx);
121 122
	set_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
	clear_bit(RPCAUTH_CRED_NEW, &cred->cr_flags);
Linus Torvalds's avatar
Linus Torvalds committed
123 124 125 126 127 128 129 130 131 132
	if (old)
		gss_put_ctx(old);
}

static int
gss_cred_is_uptodate_ctx(struct rpc_cred *cred)
{
	struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
	int res = 0;

133
	rcu_read_lock();
134
	if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) && gss_cred->gc_ctx)
Linus Torvalds's avatar
Linus Torvalds committed
135
		res = 1;
136
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
	return res;
}

static const void *
simple_get_bytes(const void *p, const void *end, void *res, size_t len)
{
	const void *q = (const void *)((const char *)p + len);
	if (unlikely(q > end || q < p))
		return ERR_PTR(-EFAULT);
	memcpy(res, p, len);
	return q;
}

static inline const void *
simple_get_netobj(const void *p, const void *end, struct xdr_netobj *dest)
{
	const void *q;
	unsigned int len;

	p = simple_get_bytes(p, end, &len, sizeof(len));
	if (IS_ERR(p))
		return p;
	q = (const void *)((const char *)p + len);
	if (unlikely(q > end || q < p))
		return ERR_PTR(-EFAULT);
162
	dest->data = kmemdup(p, len, GFP_KERNEL);
Linus Torvalds's avatar
Linus Torvalds committed
163 164 165 166 167 168 169 170 171 172 173 174
	if (unlikely(dest->data == NULL))
		return ERR_PTR(-ENOMEM);
	dest->len = len;
	return q;
}

static struct gss_cl_ctx *
gss_cred_get_ctx(struct rpc_cred *cred)
{
	struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
	struct gss_cl_ctx *ctx = NULL;

175
	rcu_read_lock();
Linus Torvalds's avatar
Linus Torvalds committed
176 177
	if (gss_cred->gc_ctx)
		ctx = gss_get_ctx(gss_cred->gc_ctx);
178
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
179 180 181 182 183 184 185 186
	return ctx;
}

static struct gss_cl_ctx *
gss_alloc_context(void)
{
	struct gss_cl_ctx *ctx;

187
	ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
Linus Torvalds's avatar
Linus Torvalds committed
188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
	if (ctx != NULL) {
		ctx->gc_proc = RPC_GSS_PROC_DATA;
		ctx->gc_seq = 1;	/* NetApp 6.4R1 doesn't accept seq. no. 0 */
		spin_lock_init(&ctx->gc_seq_lock);
		atomic_set(&ctx->count,1);
	}
	return ctx;
}

#define GSSD_MIN_TIMEOUT (60 * 60)
static const void *
gss_fill_context(const void *p, const void *end, struct gss_cl_ctx *ctx, struct gss_api_mech *gm)
{
	const void *q;
	unsigned int seclen;
	unsigned int timeout;
	u32 window_size;
	int ret;

	/* First unsigned int gives the lifetime (in seconds) of the cred */
	p = simple_get_bytes(p, end, &timeout, sizeof(timeout));
	if (IS_ERR(p))
		goto err;
	if (timeout == 0)
		timeout = GSSD_MIN_TIMEOUT;
	ctx->gc_expiry = jiffies + (unsigned long)timeout * HZ * 3 / 4;
	/* Sequence number window. Determines the maximum number of simultaneous requests */
	p = simple_get_bytes(p, end, &window_size, sizeof(window_size));
	if (IS_ERR(p))
		goto err;
	ctx->gc_win = window_size;
	/* gssd signals an error by passing ctx->gc_win = 0: */
	if (ctx->gc_win == 0) {
		/* in which case, p points to  an error code which we ignore */
		p = ERR_PTR(-EACCES);
		goto err;
	}
	/* copy the opaque wire context */
	p = simple_get_netobj(p, end, &ctx->gc_wire_ctx);
	if (IS_ERR(p))
		goto err;
	/* import the opaque security context */
	p  = simple_get_bytes(p, end, &seclen, sizeof(seclen));
	if (IS_ERR(p))
		goto err;
	q = (const void *)((const char *)p + seclen);
	if (unlikely(q > end || q < p)) {
		p = ERR_PTR(-EFAULT);
		goto err;
	}
	ret = gss_import_sec_context(p, seclen, gm, &ctx->gc_gss_ctx);
	if (ret < 0) {
		p = ERR_PTR(ret);
		goto err;
	}
	return q;
err:
245
	dprintk("RPC:       gss_fill_context returning %ld\n", -PTR_ERR(p));
Linus Torvalds's avatar
Linus Torvalds committed
246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272
	return p;
}


struct gss_upcall_msg {
	atomic_t count;
	uid_t	uid;
	struct rpc_pipe_msg msg;
	struct list_head list;
	struct gss_auth *auth;
	struct rpc_wait_queue rpc_waitqueue;
	wait_queue_head_t waitqueue;
	struct gss_cl_ctx *ctx;
};

static void
gss_release_msg(struct gss_upcall_msg *gss_msg)
{
	if (!atomic_dec_and_test(&gss_msg->count))
		return;
	BUG_ON(!list_empty(&gss_msg->list));
	if (gss_msg->ctx != NULL)
		gss_put_ctx(gss_msg->ctx);
	kfree(gss_msg);
}

static struct gss_upcall_msg *
273
__gss_find_upcall(struct rpc_inode *rpci, uid_t uid)
Linus Torvalds's avatar
Linus Torvalds committed
274 275
{
	struct gss_upcall_msg *pos;
276
	list_for_each_entry(pos, &rpci->in_downcall, list) {
Linus Torvalds's avatar
Linus Torvalds committed
277 278 279
		if (pos->uid != uid)
			continue;
		atomic_inc(&pos->count);
280
		dprintk("RPC:       gss_find_upcall found msg %p\n", pos);
Linus Torvalds's avatar
Linus Torvalds committed
281 282
		return pos;
	}
283
	dprintk("RPC:       gss_find_upcall found nothing\n");
Linus Torvalds's avatar
Linus Torvalds committed
284 285 286 287 288 289 290 291 292 293
	return NULL;
}

/* Try to add a upcall to the pipefs queue.
 * If an upcall owned by our uid already exists, then we return a reference
 * to that upcall instead of adding the new upcall.
 */
static inline struct gss_upcall_msg *
gss_add_msg(struct gss_auth *gss_auth, struct gss_upcall_msg *gss_msg)
{
294
	struct inode *inode = gss_auth->dentry->d_inode;
295
	struct rpc_inode *rpci = RPC_I(inode);
Linus Torvalds's avatar
Linus Torvalds committed
296 297
	struct gss_upcall_msg *old;

298
	spin_lock(&inode->i_lock);
299
	old = __gss_find_upcall(rpci, gss_msg->uid);
Linus Torvalds's avatar
Linus Torvalds committed
300 301
	if (old == NULL) {
		atomic_inc(&gss_msg->count);
302
		list_add(&gss_msg->list, &rpci->in_downcall);
Linus Torvalds's avatar
Linus Torvalds committed
303 304
	} else
		gss_msg = old;
305
	spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321
	return gss_msg;
}

static void
__gss_unhash_msg(struct gss_upcall_msg *gss_msg)
{
	list_del_init(&gss_msg->list);
	rpc_wake_up_status(&gss_msg->rpc_waitqueue, gss_msg->msg.errno);
	wake_up_all(&gss_msg->waitqueue);
	atomic_dec(&gss_msg->count);
}

static void
gss_unhash_msg(struct gss_upcall_msg *gss_msg)
{
	struct gss_auth *gss_auth = gss_msg->auth;
322
	struct inode *inode = gss_auth->dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
323

324 325
	if (list_empty(&gss_msg->list))
		return;
326
	spin_lock(&inode->i_lock);
327 328
	if (!list_empty(&gss_msg->list))
		__gss_unhash_msg(gss_msg);
329
	spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
330 331 332 333 334 335 336 337
}

static void
gss_upcall_callback(struct rpc_task *task)
{
	struct gss_cred *gss_cred = container_of(task->tk_msg.rpc_cred,
			struct gss_cred, gc_base);
	struct gss_upcall_msg *gss_msg = gss_cred->gc_upcall;
338
	struct inode *inode = gss_msg->auth->dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
339

340
	spin_lock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
341 342 343 344 345 346
	if (gss_msg->ctx)
		gss_cred_set_ctx(task->tk_msg.rpc_cred, gss_get_ctx(gss_msg->ctx));
	else
		task->tk_status = gss_msg->msg.errno;
	gss_cred->gc_upcall = NULL;
	rpc_wake_up_status(&gss_msg->rpc_waitqueue, gss_msg->msg.errno);
347
	spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
348 349 350 351 352 353 354 355
	gss_release_msg(gss_msg);
}

static inline struct gss_upcall_msg *
gss_alloc_msg(struct gss_auth *gss_auth, uid_t uid)
{
	struct gss_upcall_msg *gss_msg;

356
	gss_msg = kzalloc(sizeof(*gss_msg), GFP_KERNEL);
Linus Torvalds's avatar
Linus Torvalds committed
357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393
	if (gss_msg != NULL) {
		INIT_LIST_HEAD(&gss_msg->list);
		rpc_init_wait_queue(&gss_msg->rpc_waitqueue, "RPCSEC_GSS upcall waitq");
		init_waitqueue_head(&gss_msg->waitqueue);
		atomic_set(&gss_msg->count, 1);
		gss_msg->msg.data = &gss_msg->uid;
		gss_msg->msg.len = sizeof(gss_msg->uid);
		gss_msg->uid = uid;
		gss_msg->auth = gss_auth;
	}
	return gss_msg;
}

static struct gss_upcall_msg *
gss_setup_upcall(struct rpc_clnt *clnt, struct gss_auth *gss_auth, struct rpc_cred *cred)
{
	struct gss_upcall_msg *gss_new, *gss_msg;

	gss_new = gss_alloc_msg(gss_auth, cred->cr_uid);
	if (gss_new == NULL)
		return ERR_PTR(-ENOMEM);
	gss_msg = gss_add_msg(gss_auth, gss_new);
	if (gss_msg == gss_new) {
		int res = rpc_queue_upcall(gss_auth->dentry->d_inode, &gss_new->msg);
		if (res) {
			gss_unhash_msg(gss_new);
			gss_msg = ERR_PTR(res);
		}
	} else
		gss_release_msg(gss_new);
	return gss_msg;
}

static inline int
gss_refresh_upcall(struct rpc_task *task)
{
	struct rpc_cred *cred = task->tk_msg.rpc_cred;
394
	struct gss_auth *gss_auth = container_of(cred->cr_auth,
Linus Torvalds's avatar
Linus Torvalds committed
395 396 397 398
			struct gss_auth, rpc_auth);
	struct gss_cred *gss_cred = container_of(cred,
			struct gss_cred, gc_base);
	struct gss_upcall_msg *gss_msg;
399
	struct inode *inode = gss_auth->dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
400 401
	int err = 0;

402 403
	dprintk("RPC: %5u gss_refresh_upcall for uid %u\n", task->tk_pid,
								cred->cr_uid);
Linus Torvalds's avatar
Linus Torvalds committed
404 405 406 407 408
	gss_msg = gss_setup_upcall(task->tk_client, gss_auth, cred);
	if (IS_ERR(gss_msg)) {
		err = PTR_ERR(gss_msg);
		goto out;
	}
409
	spin_lock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
410 411 412 413 414 415 416 417 418 419
	if (gss_cred->gc_upcall != NULL)
		rpc_sleep_on(&gss_cred->gc_upcall->rpc_waitqueue, task, NULL, NULL);
	else if (gss_msg->ctx == NULL && gss_msg->msg.errno >= 0) {
		task->tk_timeout = 0;
		gss_cred->gc_upcall = gss_msg;
		/* gss_upcall_callback will release the reference to gss_upcall_msg */
		atomic_inc(&gss_msg->count);
		rpc_sleep_on(&gss_msg->rpc_waitqueue, task, gss_upcall_callback, NULL);
	} else
		err = gss_msg->msg.errno;
420
	spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
421 422
	gss_release_msg(gss_msg);
out:
423 424
	dprintk("RPC: %5u gss_refresh_upcall for uid %u result %d\n",
			task->tk_pid, cred->cr_uid, err);
Linus Torvalds's avatar
Linus Torvalds committed
425 426 427 428 429 430
	return err;
}

static inline int
gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred)
{
431
	struct inode *inode = gss_auth->dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
432 433 434 435 436
	struct rpc_cred *cred = &gss_cred->gc_base;
	struct gss_upcall_msg *gss_msg;
	DEFINE_WAIT(wait);
	int err = 0;

437
	dprintk("RPC:       gss_upcall for uid %u\n", cred->cr_uid);
Linus Torvalds's avatar
Linus Torvalds committed
438 439 440 441 442 443 444
	gss_msg = gss_setup_upcall(gss_auth->client, gss_auth, cred);
	if (IS_ERR(gss_msg)) {
		err = PTR_ERR(gss_msg);
		goto out;
	}
	for (;;) {
		prepare_to_wait(&gss_msg->waitqueue, &wait, TASK_INTERRUPTIBLE);
445
		spin_lock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
446 447 448
		if (gss_msg->ctx != NULL || gss_msg->msg.errno < 0) {
			break;
		}
449
		spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
450 451 452 453 454 455 456 457 458 459
		if (signalled()) {
			err = -ERESTARTSYS;
			goto out_intr;
		}
		schedule();
	}
	if (gss_msg->ctx)
		gss_cred_set_ctx(cred, gss_get_ctx(gss_msg->ctx));
	else
		err = gss_msg->msg.errno;
460
	spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
461 462 463 464
out_intr:
	finish_wait(&gss_msg->waitqueue, &wait);
	gss_release_msg(gss_msg);
out:
465 466
	dprintk("RPC:       gss_create_upcall for uid %u result %d\n",
			cred->cr_uid, err);
Linus Torvalds's avatar
Linus Torvalds committed
467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499
	return err;
}

static ssize_t
gss_pipe_upcall(struct file *filp, struct rpc_pipe_msg *msg,
		char __user *dst, size_t buflen)
{
	char *data = (char *)msg->data + msg->copied;
	ssize_t mlen = msg->len;
	ssize_t left;

	if (mlen > buflen)
		mlen = buflen;
	left = copy_to_user(dst, data, mlen);
	if (left < 0) {
		msg->errno = left;
		return left;
	}
	mlen -= left;
	msg->copied += mlen;
	msg->errno = 0;
	return mlen;
}

#define MSG_BUF_MAXSIZE 1024

static ssize_t
gss_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
{
	const void *p, *end;
	void *buf;
	struct rpc_clnt *clnt;
	struct gss_upcall_msg *gss_msg;
500
	struct inode *inode = filp->f_path.dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
501 502
	struct gss_cl_ctx *ctx;
	uid_t uid;
503
	ssize_t err = -EFBIG;
Linus Torvalds's avatar
Linus Torvalds committed
504 505 506 507 508 509 510 511

	if (mlen > MSG_BUF_MAXSIZE)
		goto out;
	err = -ENOMEM;
	buf = kmalloc(mlen, GFP_KERNEL);
	if (!buf)
		goto out;

512
	clnt = RPC_I(inode)->private;
Linus Torvalds's avatar
Linus Torvalds committed
513 514 515 516 517 518 519 520 521 522 523 524 525 526 527
	err = -EFAULT;
	if (copy_from_user(buf, src, mlen))
		goto err;

	end = (const void *)((char *)buf + mlen);
	p = simple_get_bytes(buf, end, &uid, sizeof(uid));
	if (IS_ERR(p)) {
		err = PTR_ERR(p);
		goto err;
	}

	err = -ENOMEM;
	ctx = gss_alloc_context();
	if (ctx == NULL)
		goto err;
528 529 530 531

	err = -ENOENT;
	/* Find a matching upcall */
	spin_lock(&inode->i_lock);
532
	gss_msg = __gss_find_upcall(RPC_I(inode), uid);
533 534 535 536 537 538 539
	if (gss_msg == NULL) {
		spin_unlock(&inode->i_lock);
		goto err_put_ctx;
	}
	list_del_init(&gss_msg->list);
	spin_unlock(&inode->i_lock);

540
	p = gss_fill_context(p, end, ctx, gss_msg->auth->mech);
Linus Torvalds's avatar
Linus Torvalds committed
541 542
	if (IS_ERR(p)) {
		err = PTR_ERR(p);
543 544
		gss_msg->msg.errno = (err == -EACCES) ? -EACCES : -EAGAIN;
		goto err_release_msg;
Linus Torvalds's avatar
Linus Torvalds committed
545
	}
546 547 548 549
	gss_msg->ctx = gss_get_ctx(ctx);
	err = mlen;

err_release_msg:
550
	spin_lock(&inode->i_lock);
551 552 553
	__gss_unhash_msg(gss_msg);
	spin_unlock(&inode->i_lock);
	gss_release_msg(gss_msg);
Linus Torvalds's avatar
Linus Torvalds committed
554 555 556 557 558
err_put_ctx:
	gss_put_ctx(ctx);
err:
	kfree(buf);
out:
559
	dprintk("RPC:       gss_pipe_downcall returning %Zd\n", err);
Linus Torvalds's avatar
Linus Torvalds committed
560 561 562 563 564 565 566
	return err;
}

static void
gss_pipe_release(struct inode *inode)
{
	struct rpc_inode *rpci = RPC_I(inode);
567
	struct gss_upcall_msg *gss_msg;
Linus Torvalds's avatar
Linus Torvalds committed
568

569
	spin_lock(&inode->i_lock);
570
	while (!list_empty(&rpci->in_downcall)) {
Linus Torvalds's avatar
Linus Torvalds committed
571

572
		gss_msg = list_entry(rpci->in_downcall.next,
Linus Torvalds's avatar
Linus Torvalds committed
573 574 575 576
				struct gss_upcall_msg, list);
		gss_msg->msg.errno = -EPIPE;
		atomic_inc(&gss_msg->count);
		__gss_unhash_msg(gss_msg);
577
		spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
578
		gss_release_msg(gss_msg);
579
		spin_lock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
580
	}
581
	spin_unlock(&inode->i_lock);
Linus Torvalds's avatar
Linus Torvalds committed
582 583 584 585 586 587 588 589 590
}

static void
gss_pipe_destroy_msg(struct rpc_pipe_msg *msg)
{
	struct gss_upcall_msg *gss_msg = container_of(msg, struct gss_upcall_msg, msg);
	static unsigned long ratelimit;

	if (msg->errno < 0) {
591
		dprintk("RPC:       gss_pipe_destroy_msg releasing msg %p\n",
Linus Torvalds's avatar
Linus Torvalds committed
592 593 594
				gss_msg);
		atomic_inc(&gss_msg->count);
		gss_unhash_msg(gss_msg);
595
		if (msg->errno == -ETIMEDOUT) {
Linus Torvalds's avatar
Linus Torvalds committed
596 597 598 599 600 601 602 603 604 605 606
			unsigned long now = jiffies;
			if (time_after(now, ratelimit)) {
				printk(KERN_WARNING "RPC: AUTH_GSS upcall timed out.\n"
						    "Please check user daemon is running!\n");
				ratelimit = now + 15*HZ;
			}
		}
		gss_release_msg(gss_msg);
	}
}

607 608
/*
 * NOTE: we have the opportunity to use different
Linus Torvalds's avatar
Linus Torvalds committed
609 610 611 612 613 614 615
 * parameters based on the input flavor (which must be a pseudoflavor)
 */
static struct rpc_auth *
gss_create(struct rpc_clnt *clnt, rpc_authflavor_t flavor)
{
	struct gss_auth *gss_auth;
	struct rpc_auth * auth;
616
	int err = -ENOMEM; /* XXX? */
Linus Torvalds's avatar
Linus Torvalds committed
617

618
	dprintk("RPC:       creating GSS authenticator for client %p\n", clnt);
Linus Torvalds's avatar
Linus Torvalds committed
619 620

	if (!try_module_get(THIS_MODULE))
621
		return ERR_PTR(err);
Linus Torvalds's avatar
Linus Torvalds committed
622 623 624
	if (!(gss_auth = kmalloc(sizeof(*gss_auth), GFP_KERNEL)))
		goto out_dec;
	gss_auth->client = clnt;
625
	err = -EINVAL;
Linus Torvalds's avatar
Linus Torvalds committed
626 627 628 629 630 631 632
	gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor);
	if (!gss_auth->mech) {
		printk(KERN_WARNING "%s: Pseudoflavor %d not found!",
				__FUNCTION__, flavor);
		goto err_free;
	}
	gss_auth->service = gss_pseudoflavor_to_service(gss_auth->mech, flavor);
633 634
	if (gss_auth->service == 0)
		goto err_put_mech;
Linus Torvalds's avatar
Linus Torvalds committed
635 636 637 638 639 640
	auth = &gss_auth->rpc_auth;
	auth->au_cslack = GSS_CRED_SLACK >> 2;
	auth->au_rslack = GSS_VERF_SLACK >> 2;
	auth->au_ops = &authgss_ops;
	auth->au_flavor = flavor;
	atomic_set(&auth->au_count, 1);
641
	kref_init(&gss_auth->kref);
Linus Torvalds's avatar
Linus Torvalds committed
642

643 644
	gss_auth->dentry = rpc_mkpipe(clnt->cl_dentry, gss_auth->mech->gm_name,
			clnt, &gss_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
645 646
	if (IS_ERR(gss_auth->dentry)) {
		err = PTR_ERR(gss_auth->dentry);
Linus Torvalds's avatar
Linus Torvalds committed
647
		goto err_put_mech;
648
	}
Linus Torvalds's avatar
Linus Torvalds committed
649

650
	err = rpcauth_init_credcache(auth);
651 652 653
	if (err)
		goto err_unlink_pipe;

Linus Torvalds's avatar
Linus Torvalds committed
654
	return auth;
655 656
err_unlink_pipe:
	rpc_unlink(gss_auth->dentry);
Linus Torvalds's avatar
Linus Torvalds committed
657 658 659 660 661 662
err_put_mech:
	gss_mech_put(gss_auth->mech);
err_free:
	kfree(gss_auth);
out_dec:
	module_put(THIS_MODULE);
663
	return ERR_PTR(err);
Linus Torvalds's avatar
Linus Torvalds committed
664 665
}

666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684
static void
gss_free(struct gss_auth *gss_auth)
{
	rpc_unlink(gss_auth->dentry);
	gss_auth->dentry = NULL;
	gss_mech_put(gss_auth->mech);

	kfree(gss_auth);
	module_put(THIS_MODULE);
}

static void
gss_free_callback(struct kref *kref)
{
	struct gss_auth *gss_auth = container_of(kref, struct gss_auth, kref);

	gss_free(gss_auth);
}

Linus Torvalds's avatar
Linus Torvalds committed
685 686 687 688 689
static void
gss_destroy(struct rpc_auth *auth)
{
	struct gss_auth *gss_auth;

690 691
	dprintk("RPC:       destroying GSS authenticator %p flavor %d\n",
			auth, auth->au_flavor);
Linus Torvalds's avatar
Linus Torvalds committed
692

693 694
	rpcauth_destroy_credcache(auth);

Linus Torvalds's avatar
Linus Torvalds committed
695
	gss_auth = container_of(auth, struct gss_auth, rpc_auth);
696
	kref_put(&gss_auth->kref, gss_free_callback);
Linus Torvalds's avatar
Linus Torvalds committed
697 698
}

699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731
/*
 * gss_destroying_context will cause the RPCSEC_GSS to send a NULL RPC call
 * to the server with the GSS control procedure field set to
 * RPC_GSS_PROC_DESTROY. This should normally cause the server to release
 * all RPCSEC_GSS state associated with that context.
 */
static int
gss_destroying_context(struct rpc_cred *cred)
{
	struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
	struct gss_auth *gss_auth = container_of(cred->cr_auth, struct gss_auth, rpc_auth);
	struct rpc_task *task;

	if (gss_cred->gc_ctx == NULL ||
			gss_cred->gc_ctx->gc_proc == RPC_GSS_PROC_DESTROY)
		return 0;

	gss_cred->gc_ctx->gc_proc = RPC_GSS_PROC_DESTROY;
	cred->cr_ops = &gss_nullops;

	/* Take a reference to ensure the cred will be destroyed either
	 * by the RPC call or by the put_rpccred() below */
	get_rpccred(cred);

	task = rpc_call_null(gss_auth->client, cred, RPC_TASK_ASYNC);
	if (!IS_ERR(task))
		rpc_put_task(task);

	put_rpccred(cred);
	return 1;
}

/* gss_destroy_cred (and gss_free_ctx) are used to clean up after failure
Linus Torvalds's avatar
Linus Torvalds committed
732 733 734
 * to create a new cred or context, so they check that things have been
 * allocated before freeing them. */
static void
735
gss_do_free_ctx(struct gss_cl_ctx *ctx)
Linus Torvalds's avatar
Linus Torvalds committed
736
{
737
	dprintk("RPC:       gss_free_ctx\n");
Linus Torvalds's avatar
Linus Torvalds committed
738 739 740 741 742 743 744 745

	if (ctx->gc_gss_ctx)
		gss_delete_sec_context(&ctx->gc_gss_ctx);

	kfree(ctx->gc_wire_ctx.data);
	kfree(ctx);
}

746 747 748 749 750 751 752 753 754 755 756 757 758
static void
gss_free_ctx_callback(struct rcu_head *head)
{
	struct gss_cl_ctx *ctx = container_of(head, struct gss_cl_ctx, gc_rcu);
	gss_do_free_ctx(ctx);
}

static void
gss_free_ctx(struct gss_cl_ctx *ctx)
{
	call_rcu(&ctx->gc_rcu, gss_free_ctx_callback);
}

Linus Torvalds's avatar
Linus Torvalds committed
759
static void
760
gss_free_cred(struct gss_cred *gss_cred)
Linus Torvalds's avatar
Linus Torvalds committed
761
{
762 763 764
	dprintk("RPC:       gss_free_cred %p\n", gss_cred);
	kfree(gss_cred);
}
Linus Torvalds's avatar
Linus Torvalds committed
765

766 767 768 769 770 771
static void
gss_free_cred_callback(struct rcu_head *head)
{
	struct gss_cred *gss_cred = container_of(head, struct gss_cred, gc_base.cr_rcu);
	gss_free_cred(gss_cred);
}
Linus Torvalds's avatar
Linus Torvalds committed
772

773 774 775
static void
gss_destroy_cred(struct rpc_cred *cred)
{
776
	struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
777
	struct gss_auth *gss_auth = container_of(cred->cr_auth, struct gss_auth, rpc_auth);
778 779
	struct gss_cl_ctx *ctx = gss_cred->gc_ctx;

780 781
	if (gss_destroying_context(cred))
		return;
782
	rcu_assign_pointer(gss_cred->gc_ctx, NULL);
783
	call_rcu(&cred->cr_rcu, gss_free_cred_callback);
784 785
	if (ctx)
		gss_put_ctx(ctx);
786
	kref_put(&gss_auth->kref, gss_free_callback);
Linus Torvalds's avatar
Linus Torvalds committed
787 788 789 790 791 792
}

/*
 * Lookup RPCSEC_GSS cred for the current process
 */
static struct rpc_cred *
793
gss_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
794
{
795
	return rpcauth_lookup_credcache(auth, acred, flags);
Linus Torvalds's avatar
Linus Torvalds committed
796 797 798
}

static struct rpc_cred *
799
gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
800 801 802 803 804
{
	struct gss_auth *gss_auth = container_of(auth, struct gss_auth, rpc_auth);
	struct gss_cred	*cred = NULL;
	int err = -ENOMEM;

805
	dprintk("RPC:       gss_create_cred for uid %d, flavor %d\n",
Linus Torvalds's avatar
Linus Torvalds committed
806 807
		acred->uid, auth->au_flavor);

808
	if (!(cred = kzalloc(sizeof(*cred), GFP_KERNEL)))
Linus Torvalds's avatar
Linus Torvalds committed
809 810
		goto out_err;

811
	rpcauth_init_cred(&cred->gc_base, acred, auth, &gss_credops);
Linus Torvalds's avatar
Linus Torvalds committed
812 813 814 815
	/*
	 * Note: in order to force a call to call_refresh(), we deliberately
	 * fail to flag the credential as RPCAUTH_CRED_UPTODATE.
	 */
816
	cred->gc_base.cr_flags = 1UL << RPCAUTH_CRED_NEW;
Linus Torvalds's avatar
Linus Torvalds committed
817
	cred->gc_service = gss_auth->service;
818
	kref_get(&gss_auth->kref);
Linus Torvalds's avatar
Linus Torvalds committed
819 820 821
	return &cred->gc_base;

out_err:
822
	dprintk("RPC:       gss_create_cred failed with error %d\n", err);
Linus Torvalds's avatar
Linus Torvalds committed
823 824 825
	return ERR_PTR(err);
}

826 827 828 829 830 831 832 833 834 835 836 837 838
static int
gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred)
{
	struct gss_auth *gss_auth = container_of(auth, struct gss_auth, rpc_auth);
	struct gss_cred *gss_cred = container_of(cred,struct gss_cred, gc_base);
	int err;

	do {
		err = gss_create_upcall(gss_auth, gss_cred);
	} while (err == -EAGAIN);
	return err;
}

Linus Torvalds's avatar
Linus Torvalds committed
839
static int
840
gss_match(struct auth_cred *acred, struct rpc_cred *rc, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
841 842 843
{
	struct gss_cred *gss_cred = container_of(rc, struct gss_cred, gc_base);

844 845 846 847 848
	/*
	 * If the searchflags have set RPCAUTH_LOOKUP_NEW, then
	 * we don't really care if the credential has expired or not,
	 * since the caller should be prepared to reinitialise it.
	 */
849
	if ((flags & RPCAUTH_LOOKUP_NEW) && test_bit(RPCAUTH_CRED_NEW, &rc->cr_flags))
850
		goto out;
Linus Torvalds's avatar
Linus Torvalds committed
851 852 853
	/* Don't match with creds that have expired. */
	if (gss_cred->gc_ctx && time_after(jiffies, gss_cred->gc_ctx->gc_expiry))
		return 0;
854
out:
Linus Torvalds's avatar
Linus Torvalds committed
855 856 857 858 859 860 861
	return (rc->cr_uid == acred->uid);
}

/*
* Marshal credentials.
* Maybe we should keep a cached credential for performance reasons.
*/
862 863
static __be32 *
gss_marshal(struct rpc_task *task, __be32 *p)
Linus Torvalds's avatar
Linus Torvalds committed
864 865 866 867 868
{
	struct rpc_cred *cred = task->tk_msg.rpc_cred;
	struct gss_cred	*gss_cred = container_of(cred, struct gss_cred,
						 gc_base);
	struct gss_cl_ctx	*ctx = gss_cred_get_ctx(cred);
869
	__be32		*cred_len;
Linus Torvalds's avatar
Linus Torvalds committed
870 871 872 873 874 875
	struct rpc_rqst *req = task->tk_rqstp;
	u32             maj_stat = 0;
	struct xdr_netobj mic;
	struct kvec	iov;
	struct xdr_buf	verf_buf;

876
	dprintk("RPC: %5u gss_marshal\n", task->tk_pid);
Linus Torvalds's avatar
Linus Torvalds committed
877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893

	*p++ = htonl(RPC_AUTH_GSS);
	cred_len = p++;

	spin_lock(&ctx->gc_seq_lock);
	req->rq_seqno = ctx->gc_seq++;
	spin_unlock(&ctx->gc_seq_lock);

	*p++ = htonl((u32) RPC_GSS_VERSION);
	*p++ = htonl((u32) ctx->gc_proc);
	*p++ = htonl((u32) req->rq_seqno);
	*p++ = htonl((u32) gss_cred->gc_service);
	p = xdr_encode_netobj(p, &ctx->gc_wire_ctx);
	*cred_len = htonl((p - (cred_len + 1)) << 2);

	/* We compute the checksum for the verifier over the xdr-encoded bytes
	 * starting with the xid and ending at the end of the credential: */
894 895
	iov.iov_base = xprt_skip_transport_header(task->tk_xprt,
					req->rq_snd_buf.head[0].iov_base);
Linus Torvalds's avatar
Linus Torvalds committed
896 897 898 899 900 901 902
	iov.iov_len = (u8 *)p - (u8 *)iov.iov_base;
	xdr_buf_from_iov(&iov, &verf_buf);

	/* set verifier flavor*/
	*p++ = htonl(RPC_AUTH_GSS);

	mic.data = (u8 *)(p + 1);
903
	maj_stat = gss_get_mic(ctx->gc_gss_ctx, &verf_buf, &mic);
Linus Torvalds's avatar
Linus Torvalds committed
904
	if (maj_stat == GSS_S_CONTEXT_EXPIRED) {
905
		clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
Linus Torvalds's avatar
Linus Torvalds committed
906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929
	} else if (maj_stat != 0) {
		printk("gss_marshal: gss_get_mic FAILED (%d)\n", maj_stat);
		goto out_put_ctx;
	}
	p = xdr_encode_opaque(p, NULL, mic.len);
	gss_put_ctx(ctx);
	return p;
out_put_ctx:
	gss_put_ctx(ctx);
	return NULL;
}

/*
* Refresh credentials. XXX - finish
*/
static int
gss_refresh(struct rpc_task *task)
{

	if (!gss_cred_is_uptodate_ctx(task->tk_msg.rpc_cred))
		return gss_refresh_upcall(task);
	return 0;
}

930 931 932 933 934 935 936
/* Dummy refresh routine: used only when destroying the context */
static int
gss_refresh_null(struct rpc_task *task)
{
	return -EACCES;
}

937 938
static __be32 *
gss_validate(struct rpc_task *task, __be32 *p)
Linus Torvalds's avatar
Linus Torvalds committed
939 940 941
{
	struct rpc_cred *cred = task->tk_msg.rpc_cred;
	struct gss_cl_ctx *ctx = gss_cred_get_ctx(cred);
942
	__be32		seq;
Linus Torvalds's avatar
Linus Torvalds committed
943 944 945 946 947 948
	struct kvec	iov;
	struct xdr_buf	verf_buf;
	struct xdr_netobj mic;
	u32		flav,len;
	u32		maj_stat;

949
	dprintk("RPC: %5u gss_validate\n", task->tk_pid);
Linus Torvalds's avatar
Linus Torvalds committed
950 951 952

	flav = ntohl(*p++);
	if ((len = ntohl(*p++)) > RPC_MAX_AUTH_SIZE)
953
		goto out_bad;
Linus Torvalds's avatar
Linus Torvalds committed
954 955 956 957 958 959 960 961 962
	if (flav != RPC_AUTH_GSS)
		goto out_bad;
	seq = htonl(task->tk_rqstp->rq_seqno);
	iov.iov_base = &seq;
	iov.iov_len = sizeof(seq);
	xdr_buf_from_iov(&iov, &verf_buf);
	mic.data = (u8 *)p;
	mic.len = len;

963
	maj_stat = gss_verify_mic(ctx->gc_gss_ctx, &verf_buf, &mic);
Linus Torvalds's avatar
Linus Torvalds committed
964
	if (maj_stat == GSS_S_CONTEXT_EXPIRED)
965
		clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
966 967 968
	if (maj_stat) {
		dprintk("RPC: %5u gss_validate: gss_verify_mic returned"
				"error 0x%08x\n", task->tk_pid, maj_stat);
Linus Torvalds's avatar
Linus Torvalds committed
969
		goto out_bad;
970
	}
971 972
	/* We leave it to unwrap to calculate au_rslack. For now we just
	 * calculate the length of the verifier: */
973
	cred->cr_auth->au_verfsize = XDR_QUADLEN(len) + 2;
Linus Torvalds's avatar
Linus Torvalds committed
974
	gss_put_ctx(ctx);
975
	dprintk("RPC: %5u gss_validate: gss_verify_mic succeeded.\n",
Linus Torvalds's avatar
Linus Torvalds committed
976 977 978 979
			task->tk_pid);
	return p + XDR_QUADLEN(len);
out_bad:
	gss_put_ctx(ctx);
980
	dprintk("RPC: %5u gss_validate failed.\n", task->tk_pid);
Linus Torvalds's avatar
Linus Torvalds committed
981 982 983 984 985
	return NULL;
}

static inline int
gss_wrap_req_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx,
986
		kxdrproc_t encode, struct rpc_rqst *rqstp, __be32 *p, void *obj)
Linus Torvalds's avatar
Linus Torvalds committed
987 988 989
{
	struct xdr_buf	*snd_buf = &rqstp->rq_snd_buf;
	struct xdr_buf	integ_buf;
990
	__be32          *integ_len = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
991
	struct xdr_netobj mic;
992 993
	u32		offset;
	__be32		*q;
Linus Torvalds's avatar
Linus Torvalds committed
994 995 996 997 998 999 1000 1001
	struct kvec	*iov;
	u32             maj_stat = 0;
	int		status = -EIO;

	integ_len = p++;
	offset = (u8 *)p - (u8 *)snd_buf->head[0].iov_base;
	*p++ = htonl(rqstp->rq_seqno);

1002
	lock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1003
	status = encode(rqstp, p, obj);
1004
	unlock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1005 1006 1007 1008 1009 1010 1011 1012 1013
	if (status)
		return status;

	if (xdr_buf_subsegment(snd_buf, &integ_buf,
				offset, snd_buf->len - offset))
		return status;
	*integ_len = htonl(integ_buf.len);

	/* guess whether we're in the head or the tail: */
1014
	if (snd_buf->page_len || snd_buf->tail[0].iov_len)
Linus Torvalds's avatar
Linus Torvalds committed
1015 1016 1017 1018 1019 1020
		iov = snd_buf->tail;
	else
		iov = snd_buf->head;
	p = iov->iov_base + iov->iov_len;
	mic.data = (u8 *)(p + 1);

1021
	maj_stat = gss_get_mic(ctx->gc_gss_ctx, &integ_buf, &mic);
Linus Torvalds's avatar
Linus Torvalds committed
1022 1023
	status = -EIO; /* XXX? */
	if (maj_stat == GSS_S_CONTEXT_EXPIRED)
1024
		clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
Linus Torvalds's avatar
Linus Torvalds committed
1025 1026 1027 1028 1029 1030 1031 1032 1033 1034
	else if (maj_stat)
		return status;
	q = xdr_encode_opaque(p, NULL, mic.len);

	offset = (u8 *)q - (u8 *)p;
	iov->iov_len += offset;
	snd_buf->len += offset;
	return 0;
}

1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080
static void
priv_release_snd_buf(struct rpc_rqst *rqstp)
{
	int i;

	for (i=0; i < rqstp->rq_enc_pages_num; i++)
		__free_page(rqstp->rq_enc_pages[i]);
	kfree(rqstp->rq_enc_pages);
}

static int
alloc_enc_pages(struct rpc_rqst *rqstp)
{
	struct xdr_buf *snd_buf = &rqstp->rq_snd_buf;
	int first, last, i;

	if (snd_buf->page_len == 0) {
		rqstp->rq_enc_pages_num = 0;
		return 0;
	}

	first = snd_buf->page_base >> PAGE_CACHE_SHIFT;
	last = (snd_buf->page_base + snd_buf->page_len - 1) >> PAGE_CACHE_SHIFT;
	rqstp->rq_enc_pages_num = last - first + 1 + 1;
	rqstp->rq_enc_pages
		= kmalloc(rqstp->rq_enc_pages_num * sizeof(struct page *),
				GFP_NOFS);
	if (!rqstp->rq_enc_pages)
		goto out;
	for (i=0; i < rqstp->rq_enc_pages_num; i++) {
		rqstp->rq_enc_pages[i] = alloc_page(GFP_NOFS);
		if (rqstp->rq_enc_pages[i] == NULL)
			goto out_free;
	}
	rqstp->rq_release_snd_buf = priv_release_snd_buf;
	return 0;
out_free:
	for (i--; i >= 0; i--) {
		__free_page(rqstp->rq_enc_pages[i]);
	}
out:
	return -EAGAIN;
}

static inline int
gss_wrap_req_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx,
1081
		kxdrproc_t encode, struct rpc_rqst *rqstp, __be32 *p, void *obj)
1082 1083 1084 1085 1086
{
	struct xdr_buf	*snd_buf = &rqstp->rq_snd_buf;
	u32		offset;
	u32             maj_stat;
	int		status;
1087
	__be32		*opaque_len;
1088 1089 1090 1091 1092 1093 1094 1095 1096 1097
	struct page	**inpages;
	int		first;
	int		pad;
	struct kvec	*iov;
	char		*tmp;

	opaque_len = p++;
	offset = (u8 *)p - (u8 *)snd_buf->head[0].iov_base;
	*p++ = htonl(rqstp->rq_seqno);

1098
	lock_kernel();
1099
	status = encode(rqstp, p, obj);
1100
	unlock_kernel();
1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117
	if (status)
		return status;

	status = alloc_enc_pages(rqstp);
	if (status)
		return status;
	first = snd_buf->page_base >> PAGE_CACHE_SHIFT;
	inpages = snd_buf->pages + first;
	snd_buf->pages = rqstp->rq_enc_pages;
	snd_buf->page_base -= first << PAGE_CACHE_SHIFT;
	/* Give the tail its own page, in case we need extra space in the
	 * head when wrapping: */
	if (snd_buf->page_len || snd_buf->tail[0].iov_len) {
		tmp = page_address(rqstp->rq_enc_pages[rqstp->rq_enc_pages_num - 1]);
		memcpy(tmp, snd_buf->tail[0].iov_base, snd_buf->tail[0].iov_len);
		snd_buf->tail[0].iov_base = tmp;
	}
1118
	maj_stat = gss_wrap(ctx->gc_gss_ctx, offset, snd_buf, inpages);
1119 1120
	/* RPC_SLACK_SPACE should prevent this ever happening: */
	BUG_ON(snd_buf->len > snd_buf->buflen);
1121
	status = -EIO;
1122 1123 1124
	/* We're assuming that when GSS_S_CONTEXT_EXPIRED, the encryption was
	 * done anyway, so it's safe to put the request on the wire: */
	if (maj_stat == GSS_S_CONTEXT_EXPIRED)
1125
		clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143
	else if (maj_stat)
		return status;

	*opaque_len = htonl(snd_buf->len - offset);
	/* guess whether we're in the head or the tail: */
	if (snd_buf->page_len || snd_buf->tail[0].iov_len)
		iov = snd_buf->tail;
	else
		iov = snd_buf->head;
	p = iov->iov_base + iov->iov_len;
	pad = 3 - ((snd_buf->len - offset - 1) & 3);
	memset(p, 0, pad);
	iov->iov_len += pad;
	snd_buf->len += pad;

	return 0;
}

Linus Torvalds's avatar
Linus Torvalds committed
1144 1145
static int
gss_wrap_req(struct rpc_task *task,
1146
	     kxdrproc_t encode, void *rqstp, __be32 *p, void *obj)
Linus Torvalds's avatar
Linus Torvalds committed
1147 1148 1149 1150 1151 1152 1153
{
	struct rpc_cred *cred = task->tk_msg.rpc_cred;
	struct gss_cred	*gss_cred = container_of(cred, struct gss_cred,
			gc_base);
	struct gss_cl_ctx *ctx = gss_cred_get_ctx(cred);
	int             status = -EIO;

1154
	dprintk("RPC: %5u gss_wrap_req\n", task->tk_pid);
Linus Torvalds's avatar
Linus Torvalds committed
1155 1156 1157 1158
	if (ctx->gc_proc != RPC_GSS_PROC_DATA) {
		/* The spec seems a little ambiguous here, but I think that not
		 * wrapping context destruction requests makes the most sense.
		 */
1159
		lock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1160
		status = encode(rqstp, p, obj);
1161
		unlock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1162 1163 1164 1165
		goto out;
	}
	switch (gss_cred->gc_service) {
		case RPC_GSS_SVC_NONE:
1166
			lock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1167
			status = encode(rqstp, p, obj);
1168
			unlock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1169 1170 1171 1172 1173
			break;
		case RPC_GSS_SVC_INTEGRITY:
			status = gss_wrap_req_integ(cred, ctx, encode,
								rqstp, p, obj);
			break;
1174
		case RPC_GSS_SVC_PRIVACY:
1175 1176
			status = gss_wrap_req_priv(cred, ctx, encode,
					rqstp, p, obj);
Linus Torvalds's avatar
Linus Torvalds committed
1177 1178 1179 1180
			break;
	}
out:
	gss_put_ctx(ctx);
1181
	dprintk("RPC: %5u gss_wrap_req returning %d\n", task->tk_pid, status);
Linus Torvalds's avatar
Linus Torvalds committed
1182 1183 1184 1185 1186
	return status;
}

static inline int
gss_unwrap_resp_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx,
1187
		struct rpc_rqst *rqstp, __be32 **p)
Linus Torvalds's avatar
Linus Torvalds committed
1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213
{
	struct xdr_buf	*rcv_buf = &rqstp->rq_rcv_buf;
	struct xdr_buf integ_buf;
	struct xdr_netobj mic;
	u32 data_offset, mic_offset;
	u32 integ_len;
	u32 maj_stat;
	int status = -EIO;

	integ_len = ntohl(*(*p)++);
	if (integ_len & 3)
		return status;
	data_offset = (u8 *)(*p) - (u8 *)rcv_buf->head[0].iov_base;
	mic_offset = integ_len + data_offset;
	if (mic_offset > rcv_buf->len)
		return status;
	if (ntohl(*(*p)++) != rqstp->rq_seqno)
		return status;

	if (xdr_buf_subsegment(rcv_buf, &integ_buf, data_offset,
				mic_offset - data_offset))
		return status;

	if (xdr_buf_read_netobj(rcv_buf, &mic, mic_offset))
		return status;

1214
	maj_stat = gss_verify_mic(ctx->gc_gss_ctx, &integ_buf, &mic);
Linus Torvalds's avatar
Linus Torvalds committed
1215
	if (maj_stat == GSS_S_CONTEXT_EXPIRED)
1216
		clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
Linus Torvalds's avatar
Linus Torvalds committed
1217 1218 1219 1220 1221
	if (maj_stat != GSS_S_COMPLETE)
		return status;
	return 0;
}

1222 1223
static inline int
gss_unwrap_resp_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx,
1224
		struct rpc_rqst *rqstp, __be32 **p)
1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238
{
	struct xdr_buf  *rcv_buf = &rqstp->rq_rcv_buf;
	u32 offset;
	u32 opaque_len;
	u32 maj_stat;
	int status = -EIO;

	opaque_len = ntohl(*(*p)++);
	offset = (u8 *)(*p) - (u8 *)rcv_buf->head[0].iov_base;
	if (offset + opaque_len > rcv_buf->len)
		return status;
	/* remove padding: */
	rcv_buf->len = offset + opaque_len;

1239
	maj_stat = gss_unwrap(ctx->gc_gss_ctx, offset, rcv_buf);
1240
	if (maj_stat == GSS_S_CONTEXT_EXPIRED)
1241
		clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
1242 1243 1244 1245 1246 1247 1248 1249 1250
	if (maj_stat != GSS_S_COMPLETE)
		return status;
	if (ntohl(*(*p)++) != rqstp->rq_seqno)
		return status;

	return 0;
}


Linus Torvalds's avatar
Linus Torvalds committed
1251 1252
static int
gss_unwrap_resp(struct rpc_task *task,
1253
		kxdrproc_t decode, void *rqstp, __be32 *p, void *obj)
Linus Torvalds's avatar
Linus Torvalds committed
1254 1255 1256 1257 1258
{
	struct rpc_cred *cred = task->tk_msg.rpc_cred;
	struct gss_cred *gss_cred = container_of(cred, struct gss_cred,
			gc_base);
	struct gss_cl_ctx *ctx = gss_cred_get_ctx(cred);
1259
	__be32		*savedp = p;
1260 1261
	struct kvec	*head = ((struct rpc_rqst *)rqstp)->rq_rcv_buf.head;
	int		savedlen = head->iov_len;
Linus Torvalds's avatar
Linus Torvalds committed
1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273
	int             status = -EIO;

	if (ctx->gc_proc != RPC_GSS_PROC_DATA)
		goto out_decode;
	switch (gss_cred->gc_service) {
		case RPC_GSS_SVC_NONE:
			break;
		case RPC_GSS_SVC_INTEGRITY:
			status = gss_unwrap_resp_integ(cred, ctx, rqstp, &p);
			if (status)
				goto out;
			break;
1274
		case RPC_GSS_SVC_PRIVACY:
1275 1276 1277
			status = gss_unwrap_resp_priv(cred, ctx, rqstp, &p);
			if (status)
				goto out;
Linus Torvalds's avatar
Linus Torvalds committed
1278 1279
			break;
	}
1280
	/* take into account extra slack for integrity and privacy cases: */
1281
	cred->cr_auth->au_rslack = cred->cr_auth->au_verfsize + (p - savedp)
1282
						+ (savedlen - head->iov_len);
Linus Torvalds's avatar
Linus Torvalds committed
1283
out_decode:
1284
	lock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1285
	status = decode(rqstp, p, obj);
1286
	unlock_kernel();
Linus Torvalds's avatar
Linus Torvalds committed
1287 1288
out:
	gss_put_ctx(ctx);
1289
	dprintk("RPC: %5u gss_unwrap_resp returning %d\n", task->tk_pid,
Linus Torvalds's avatar
Linus Torvalds committed
1290 1291 1292
			status);
	return status;
}
1293

1294
static const struct rpc_authops authgss_ops = {
Linus Torvalds's avatar
Linus Torvalds committed
1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305
	.owner		= THIS_MODULE,
	.au_flavor	= RPC_AUTH_GSS,
#ifdef RPC_DEBUG
	.au_name	= "RPCSEC_GSS",
#endif
	.create		= gss_create,
	.destroy	= gss_destroy,
	.lookup_cred	= gss_lookup_cred,
	.crcreate	= gss_create_cred
};

1306
static const struct rpc_credops gss_credops = {
Linus Torvalds's avatar
Linus Torvalds committed
1307 1308
	.cr_name	= "AUTH_GSS",
	.crdestroy	= gss_destroy_cred,
1309
	.cr_init	= gss_cred_init,
Linus Torvalds's avatar
Linus Torvalds committed
1310 1311 1312 1313 1314 1315 1316 1317
	.crmatch	= gss_match,
	.crmarshal	= gss_marshal,
	.crrefresh	= gss_refresh,
	.crvalidate	= gss_validate,
	.crwrap_req	= gss_wrap_req,
	.crunwrap_resp	= gss_unwrap_resp,
};

1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328
static const struct rpc_credops gss_nullops = {
	.cr_name	= "AUTH_GSS",
	.crdestroy	= gss_destroy_cred,
	.crmatch	= gss_match,
	.crmarshal	= gss_marshal,
	.crrefresh	= gss_refresh_null,
	.crvalidate	= gss_validate,
	.crwrap_req	= gss_wrap_req,
	.crunwrap_resp	= gss_unwrap_resp,
};

Linus Torvalds's avatar
Linus Torvalds committed
1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364
static struct rpc_pipe_ops gss_upcall_ops = {
	.upcall		= gss_pipe_upcall,
	.downcall	= gss_pipe_downcall,
	.destroy_msg	= gss_pipe_destroy_msg,
	.release_pipe	= gss_pipe_release,
};

/*
 * Initialize RPCSEC_GSS module
 */
static int __init init_rpcsec_gss(void)
{
	int err = 0;

	err = rpcauth_register(&authgss_ops);
	if (err)
		goto out;
	err = gss_svc_init();
	if (err)
		goto out_unregister;
	return 0;
out_unregister:
	rpcauth_unregister(&authgss_ops);
out:
	return err;
}

static void __exit exit_rpcsec_gss(void)
{
	gss_svc_shutdown();
	rpcauth_unregister(&authgss_ops);
}

MODULE_LICENSE("GPL");
module_init(init_rpcsec_gss)
module_exit(exit_rpcsec_gss)