Merge tag 'drm-intel-next-fixes-2019-03-12' of git://anongit.freedesktop.org/drm...
[linux-2.6-block.git] / net / sunrpc / auth_null.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/net/sunrpc/auth_null.c
4 *
5 * AUTH_NULL authentication. Really :-)
6 *
7 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
8 */
9
10#include <linux/types.h>
1da177e4 11#include <linux/module.h>
1da177e4 12#include <linux/sunrpc/clnt.h>
1da177e4 13
f895b252 14#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
1da177e4
LT
15# define RPCDBG_FACILITY RPCDBG_AUTH
16#endif
17
18static struct rpc_auth null_auth;
19static struct rpc_cred null_cred;
20
21static struct rpc_auth *
82b98ca5 22nul_create(const struct rpc_auth_create_args *args, struct rpc_clnt *clnt)
1da177e4 23{
331bc71c 24 refcount_inc(&null_auth.au_count);
1da177e4
LT
25 return &null_auth;
26}
27
28static void
29nul_destroy(struct rpc_auth *auth)
30{
31}
32
33/*
34 * Lookup NULL creds for current process
35 */
36static struct rpc_cred *
37nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
38{
39 return get_rpccred(&null_cred);
40}
41
42/*
43 * Destroy cred handle.
44 */
45static void
46nul_destroy_cred(struct rpc_cred *cred)
47{
48}
49
50/*
51 * Match cred handle against current process
52 */
53static int
54nul_match(struct auth_cred *acred, struct rpc_cred *cred, int taskflags)
55{
56 return 1;
57}
58
59/*
60 * Marshal credential.
61 */
d8ed029d
AD
62static __be32 *
63nul_marshal(struct rpc_task *task, __be32 *p)
1da177e4
LT
64{
65 *p++ = htonl(RPC_AUTH_NULL);
66 *p++ = 0;
67 *p++ = htonl(RPC_AUTH_NULL);
68 *p++ = 0;
69
70 return p;
71}
72
73/*
74 * Refresh credential. This is a no-op for AUTH_NULL
75 */
76static int
77nul_refresh(struct rpc_task *task)
78{
a17c2153 79 set_bit(RPCAUTH_CRED_UPTODATE, &task->tk_rqstp->rq_cred->cr_flags);
1da177e4
LT
80 return 0;
81}
82
d8ed029d
AD
83static __be32 *
84nul_validate(struct rpc_task *task, __be32 *p)
1da177e4
LT
85{
86 rpc_authflavor_t flavor;
87 u32 size;
88
89 flavor = ntohl(*p++);
90 if (flavor != RPC_AUTH_NULL) {
91 printk("RPC: bad verf flavor: %u\n", flavor);
35fa5f7b 92 return ERR_PTR(-EIO);
1da177e4
LT
93 }
94
95 size = ntohl(*p++);
96 if (size != 0) {
97 printk("RPC: bad verf size: %u\n", size);
35fa5f7b 98 return ERR_PTR(-EIO);
1da177e4
LT
99 }
100
101 return p;
102}
103
f1c0a861 104const struct rpc_authops authnull_ops = {
1da177e4
LT
105 .owner = THIS_MODULE,
106 .au_flavor = RPC_AUTH_NULL,
1da177e4 107 .au_name = "NULL",
1da177e4
LT
108 .create = nul_create,
109 .destroy = nul_destroy,
110 .lookup_cred = nul_lookup_cred,
111};
112
113static
114struct rpc_auth null_auth = {
4500632f
CL
115 .au_cslack = NUL_CALLSLACK,
116 .au_rslack = NUL_REPLYSLACK,
1da177e4 117 .au_ops = &authnull_ops,
81039f1f 118 .au_flavor = RPC_AUTH_NULL,
331bc71c 119 .au_count = REFCOUNT_INIT(1),
1da177e4
LT
120};
121
122static
f1c0a861 123const struct rpc_credops null_credops = {
1da177e4
LT
124 .cr_name = "AUTH_NULL",
125 .crdestroy = nul_destroy_cred,
126 .crmatch = nul_match,
127 .crmarshal = nul_marshal,
128 .crrefresh = nul_refresh,
129 .crvalidate = nul_validate,
130};
131
132static
133struct rpc_cred null_cred = {
e092bdcd 134 .cr_lru = LIST_HEAD_INIT(null_cred.cr_lru),
4a8c1344 135 .cr_auth = &null_auth,
1da177e4 136 .cr_ops = &null_credops,
79b18181 137 .cr_count = REFCOUNT_INIT(2),
fc432dd9 138 .cr_flags = 1UL << RPCAUTH_CRED_UPTODATE,
1da177e4 139};