1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de> */ 3 4 #include <linux/sched.h> 5 #include "nfsd.h" 6 #include "auth.h" 7 8 int nfsexp_flags(struct svc_rqst *rqstp, struct svc_export *exp) 9 { 10 struct exp_flavor_info *f; 11 struct exp_flavor_info *end = exp->ex_flavors + exp->ex_nflavors; 12 13 for (f = exp->ex_flavors; f < end; f++) { 14 if (f->pseudoflavor == rqstp->rq_cred.cr_flavor) 15 return f->flags; 16 } 17 return exp->ex_flags; 18 19 } 20 21 int nfsd_setuser(struct svc_rqst *rqstp, struct svc_export *exp) 22 { 23 struct group_info *rqgi; 24 struct group_info *gi; 25 struct cred *new; 26 int i; 27 int flags = nfsexp_flags(rqstp, exp); 28 29 validate_process_creds(); 30 31 /* discard any old override before preparing the new set */ 32 revert_creds(get_cred(current_real_cred())); 33 new = prepare_creds(); 34 if (!new) 35 return -ENOMEM; 36 37 new->fsuid = rqstp->rq_cred.cr_uid; 38 new->fsgid = rqstp->rq_cred.cr_gid; 39 40 rqgi = rqstp->rq_cred.cr_group_info; 41 42 if (flags & NFSEXP_ALLSQUASH) { 43 new->fsuid = exp->ex_anon_uid; 44 new->fsgid = exp->ex_anon_gid; 45 gi = groups_alloc(0); 46 if (!gi) 47 goto oom; 48 } else if (flags & NFSEXP_ROOTSQUASH) { 49 if (uid_eq(new->fsuid, GLOBAL_ROOT_UID)) 50 new->fsuid = exp->ex_anon_uid; 51 if (gid_eq(new->fsgid, GLOBAL_ROOT_GID)) 52 new->fsgid = exp->ex_anon_gid; 53 54 gi = groups_alloc(rqgi->ngroups); 55 if (!gi) 56 goto oom; 57 58 for (i = 0; i < rqgi->ngroups; i++) { 59 if (gid_eq(GLOBAL_ROOT_GID, rqgi->gid[i])) 60 gi->gid[i] = exp->ex_anon_gid; 61 else 62 gi->gid[i] = rqgi->gid[i]; 63 } 64 } else { 65 gi = get_group_info(rqgi); 66 } 67 68 if (uid_eq(new->fsuid, INVALID_UID)) 69 new->fsuid = exp->ex_anon_uid; 70 if (gid_eq(new->fsgid, INVALID_GID)) 71 new->fsgid = exp->ex_anon_gid; 72 73 set_groups(new, gi); 74 put_group_info(gi); 75 76 if (!uid_eq(new->fsuid, GLOBAL_ROOT_UID)) 77 new->cap_effective = cap_drop_nfsd_set(new->cap_effective); 78 else 79 new->cap_effective = cap_raise_nfsd_set(new->cap_effective, 80 new->cap_permitted); 81 validate_process_creds(); 82 put_cred(override_creds(new)); 83 put_cred(new); 84 validate_process_creds(); 85 return 0; 86 87 oom: 88 abort_creds(new); 89 return -ENOMEM; 90 } 91 92