]>
Commit | Line | Data |
---|---|---|
7663dacd | 1 | /* Copyright (C) 1995, 1996 Olaf Kirch <[email protected]> */ |
1da177e4 | 2 | |
1da177e4 | 3 | #include <linux/sched.h> |
ae2975bc | 4 | #include <linux/user_namespace.h> |
9a74af21 | 5 | #include "nfsd.h" |
a254b246 | 6 | #include "auth.h" |
1da177e4 | 7 | |
c7d51402 | 8 | int nfsexp_flags(struct svc_rqst *rqstp, struct svc_export *exp) |
1269bc69 BF |
9 | { |
10 | struct exp_flavor_info *f; | |
11 | struct exp_flavor_info *end = exp->ex_flavors + exp->ex_nflavors; | |
12 | ||
13 | for (f = exp->ex_flavors; f < end; f++) { | |
d5497fc6 | 14 | if (f->pseudoflavor == rqstp->rq_cred.cr_flavor) |
1269bc69 BF |
15 | return f->flags; |
16 | } | |
17 | return exp->ex_flags; | |
18 | ||
19 | } | |
20 | ||
1da177e4 LT |
21 | int nfsd_setuser(struct svc_rqst *rqstp, struct svc_export *exp) |
22 | { | |
d84f4f99 DH |
23 | struct group_info *rqgi; |
24 | struct group_info *gi; | |
25 | struct cred *new; | |
1da177e4 | 26 | int i; |
1269bc69 | 27 | int flags = nfsexp_flags(rqstp, exp); |
1da177e4 LT |
28 | int ret; |
29 | ||
e0e81739 DH |
30 | validate_process_creds(); |
31 | ||
3b11a1de DH |
32 | /* discard any old override before preparing the new set */ |
33 | revert_creds(get_cred(current->real_cred)); | |
d84f4f99 DH |
34 | new = prepare_creds(); |
35 | if (!new) | |
36 | return -ENOMEM; | |
37 | ||
38 | new->fsuid = rqstp->rq_cred.cr_uid; | |
39 | new->fsgid = rqstp->rq_cred.cr_gid; | |
40 | ||
41 | rqgi = rqstp->rq_cred.cr_group_info; | |
42 | ||
1269bc69 | 43 | if (flags & NFSEXP_ALLSQUASH) { |
d84f4f99 DH |
44 | new->fsuid = exp->ex_anon_uid; |
45 | new->fsgid = exp->ex_anon_gid; | |
46 | gi = groups_alloc(0); | |
bf935a78 BF |
47 | if (!gi) |
48 | goto oom; | |
1269bc69 | 49 | } else if (flags & NFSEXP_ROOTSQUASH) { |
6fab8779 | 50 | if (uid_eq(new->fsuid, GLOBAL_ROOT_UID)) |
d84f4f99 | 51 | new->fsuid = exp->ex_anon_uid; |
6fab8779 | 52 | if (gid_eq(new->fsgid, GLOBAL_ROOT_GID)) |
d84f4f99 | 53 | new->fsgid = exp->ex_anon_gid; |
1da177e4 | 54 | |
d84f4f99 DH |
55 | gi = groups_alloc(rqgi->ngroups); |
56 | if (!gi) | |
57 | goto oom; | |
58 | ||
59 | for (i = 0; i < rqgi->ngroups; i++) { | |
ae2975bc | 60 | if (gid_eq(GLOBAL_ROOT_GID, GROUP_AT(rqgi, i))) |
4c1e1b34 | 61 | GROUP_AT(gi, i) = exp->ex_anon_gid; |
d84f4f99 DH |
62 | else |
63 | GROUP_AT(gi, i) = GROUP_AT(rqgi, i); | |
64 | } | |
1da177e4 | 65 | } else { |
d84f4f99 | 66 | gi = get_group_info(rqgi); |
1da177e4 | 67 | } |
d84f4f99 | 68 | |
6fab8779 | 69 | if (uid_eq(new->fsuid, INVALID_UID)) |
d84f4f99 | 70 | new->fsuid = exp->ex_anon_uid; |
6fab8779 | 71 | if (gid_eq(new->fsgid, INVALID_GID)) |
d84f4f99 DH |
72 | new->fsgid = exp->ex_anon_gid; |
73 | ||
74 | ret = set_groups(new, gi); | |
75 | put_group_info(gi); | |
f05ef8db | 76 | if (ret < 0) |
d84f4f99 DH |
77 | goto error; |
78 | ||
6fab8779 | 79 | if (!uid_eq(new->fsuid, GLOBAL_ROOT_UID)) |
d84f4f99 DH |
80 | new->cap_effective = cap_drop_nfsd_set(new->cap_effective); |
81 | else | |
82 | new->cap_effective = cap_raise_nfsd_set(new->cap_effective, | |
83 | new->cap_permitted); | |
e0e81739 | 84 | validate_process_creds(); |
3b11a1de | 85 | put_cred(override_creds(new)); |
b914152a | 86 | put_cred(new); |
e0e81739 | 87 | validate_process_creds(); |
3b11a1de | 88 | return 0; |
d84f4f99 DH |
89 | |
90 | oom: | |
91 | ret = -ENOMEM; | |
92 | error: | |
93 | abort_creds(new); | |
1da177e4 LT |
94 | return ret; |
95 | } | |
b6dff3ec | 96 |