Add the rt linux 4.1.3-rt3 as base
[kvmfornfv.git] / kernel / fs / nfsd / auth.c
diff --git a/kernel/fs/nfsd/auth.c b/kernel/fs/nfsd/auth.c
new file mode 100644 (file)
index 0000000..9d46a0b
--- /dev/null
@@ -0,0 +1,90 @@
+/* Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de> */
+
+#include <linux/sched.h>
+#include "nfsd.h"
+#include "auth.h"
+
+int nfsexp_flags(struct svc_rqst *rqstp, struct svc_export *exp)
+{
+       struct exp_flavor_info *f;
+       struct exp_flavor_info *end = exp->ex_flavors + exp->ex_nflavors;
+
+       for (f = exp->ex_flavors; f < end; f++) {
+               if (f->pseudoflavor == rqstp->rq_cred.cr_flavor)
+                       return f->flags;
+       }
+       return exp->ex_flags;
+
+}
+
+int nfsd_setuser(struct svc_rqst *rqstp, struct svc_export *exp)
+{
+       struct group_info *rqgi;
+       struct group_info *gi;
+       struct cred *new;
+       int i;
+       int flags = nfsexp_flags(rqstp, exp);
+
+       validate_process_creds();
+
+       /* discard any old override before preparing the new set */
+       revert_creds(get_cred(current_real_cred()));
+       new = prepare_creds();
+       if (!new)
+               return -ENOMEM;
+
+       new->fsuid = rqstp->rq_cred.cr_uid;
+       new->fsgid = rqstp->rq_cred.cr_gid;
+
+       rqgi = rqstp->rq_cred.cr_group_info;
+
+       if (flags & NFSEXP_ALLSQUASH) {
+               new->fsuid = exp->ex_anon_uid;
+               new->fsgid = exp->ex_anon_gid;
+               gi = groups_alloc(0);
+               if (!gi)
+                       goto oom;
+       } else if (flags & NFSEXP_ROOTSQUASH) {
+               if (uid_eq(new->fsuid, GLOBAL_ROOT_UID))
+                       new->fsuid = exp->ex_anon_uid;
+               if (gid_eq(new->fsgid, GLOBAL_ROOT_GID))
+                       new->fsgid = exp->ex_anon_gid;
+
+               gi = groups_alloc(rqgi->ngroups);
+               if (!gi)
+                       goto oom;
+
+               for (i = 0; i < rqgi->ngroups; i++) {
+                       if (gid_eq(GLOBAL_ROOT_GID, GROUP_AT(rqgi, i)))
+                               GROUP_AT(gi, i) = exp->ex_anon_gid;
+                       else
+                               GROUP_AT(gi, i) = GROUP_AT(rqgi, i);
+               }
+       } else {
+               gi = get_group_info(rqgi);
+       }
+
+       if (uid_eq(new->fsuid, INVALID_UID))
+               new->fsuid = exp->ex_anon_uid;
+       if (gid_eq(new->fsgid, INVALID_GID))
+               new->fsgid = exp->ex_anon_gid;
+
+       set_groups(new, gi);
+       put_group_info(gi);
+
+       if (!uid_eq(new->fsuid, GLOBAL_ROOT_UID))
+               new->cap_effective = cap_drop_nfsd_set(new->cap_effective);
+       else
+               new->cap_effective = cap_raise_nfsd_set(new->cap_effective,
+                                                       new->cap_permitted);
+       validate_process_creds();
+       put_cred(override_creds(new));
+       put_cred(new);
+       validate_process_creds();
+       return 0;
+
+oom:
+       abort_creds(new);
+       return -ENOMEM;
+}
+