| .. | .. |
|---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-only |
|---|
| 1 | 2 | /* |
|---|
| 2 | 3 | * linux/net/sunrpc/svcauth.c |
|---|
| 3 | 4 | * |
|---|
| .. | .. |
|---|
| 18 | 19 | #include <linux/err.h> |
|---|
| 19 | 20 | #include <linux/hash.h> |
|---|
| 20 | 21 | |
|---|
| 22 | +#include <trace/events/sunrpc.h> |
|---|
| 23 | + |
|---|
| 24 | +#include "sunrpc.h" |
|---|
| 25 | + |
|---|
| 21 | 26 | #define RPCDBG_FACILITY RPCDBG_AUTH |
|---|
| 22 | 27 | |
|---|
| 23 | 28 | |
|---|
| .. | .. |
|---|
| 27 | 32 | extern struct auth_ops svcauth_null; |
|---|
| 28 | 33 | extern struct auth_ops svcauth_unix; |
|---|
| 29 | 34 | |
|---|
| 30 | | -static DEFINE_SPINLOCK(authtab_lock); |
|---|
| 31 | | -static struct auth_ops *authtab[RPC_AUTH_MAXFLAVOR] = { |
|---|
| 32 | | - [0] = &svcauth_null, |
|---|
| 33 | | - [1] = &svcauth_unix, |
|---|
| 35 | +static struct auth_ops __rcu *authtab[RPC_AUTH_MAXFLAVOR] = { |
|---|
| 36 | + [RPC_AUTH_NULL] = (struct auth_ops __force __rcu *)&svcauth_null, |
|---|
| 37 | + [RPC_AUTH_UNIX] = (struct auth_ops __force __rcu *)&svcauth_unix, |
|---|
| 34 | 38 | }; |
|---|
| 39 | + |
|---|
| 40 | +static struct auth_ops * |
|---|
| 41 | +svc_get_auth_ops(rpc_authflavor_t flavor) |
|---|
| 42 | +{ |
|---|
| 43 | + struct auth_ops *aops; |
|---|
| 44 | + |
|---|
| 45 | + if (flavor >= RPC_AUTH_MAXFLAVOR) |
|---|
| 46 | + return NULL; |
|---|
| 47 | + rcu_read_lock(); |
|---|
| 48 | + aops = rcu_dereference(authtab[flavor]); |
|---|
| 49 | + if (aops != NULL && !try_module_get(aops->owner)) |
|---|
| 50 | + aops = NULL; |
|---|
| 51 | + rcu_read_unlock(); |
|---|
| 52 | + return aops; |
|---|
| 53 | +} |
|---|
| 54 | + |
|---|
| 55 | +static void |
|---|
| 56 | +svc_put_auth_ops(struct auth_ops *aops) |
|---|
| 57 | +{ |
|---|
| 58 | + module_put(aops->owner); |
|---|
| 59 | +} |
|---|
| 35 | 60 | |
|---|
| 36 | 61 | int |
|---|
| 37 | 62 | svc_authenticate(struct svc_rqst *rqstp, __be32 *authp) |
|---|
| .. | .. |
|---|
| 45 | 70 | |
|---|
| 46 | 71 | dprintk("svc: svc_authenticate (%d)\n", flavor); |
|---|
| 47 | 72 | |
|---|
| 48 | | - spin_lock(&authtab_lock); |
|---|
| 49 | | - if (flavor >= RPC_AUTH_MAXFLAVOR || !(aops = authtab[flavor]) || |
|---|
| 50 | | - !try_module_get(aops->owner)) { |
|---|
| 51 | | - spin_unlock(&authtab_lock); |
|---|
| 73 | + aops = svc_get_auth_ops(flavor); |
|---|
| 74 | + if (aops == NULL) { |
|---|
| 52 | 75 | *authp = rpc_autherr_badcred; |
|---|
| 53 | 76 | return SVC_DENIED; |
|---|
| 54 | 77 | } |
|---|
| 55 | | - spin_unlock(&authtab_lock); |
|---|
| 56 | 78 | |
|---|
| 57 | 79 | rqstp->rq_auth_slack = 0; |
|---|
| 58 | 80 | init_svc_cred(&rqstp->rq_cred); |
|---|
| .. | .. |
|---|
| 82 | 104 | |
|---|
| 83 | 105 | if (aops) { |
|---|
| 84 | 106 | rv = aops->release(rqstp); |
|---|
| 85 | | - module_put(aops->owner); |
|---|
| 107 | + svc_put_auth_ops(aops); |
|---|
| 86 | 108 | } |
|---|
| 87 | 109 | return rv; |
|---|
| 88 | 110 | } |
|---|
| .. | .. |
|---|
| 90 | 112 | int |
|---|
| 91 | 113 | svc_auth_register(rpc_authflavor_t flavor, struct auth_ops *aops) |
|---|
| 92 | 114 | { |
|---|
| 115 | + struct auth_ops *old; |
|---|
| 93 | 116 | int rv = -EINVAL; |
|---|
| 94 | | - spin_lock(&authtab_lock); |
|---|
| 95 | | - if (flavor < RPC_AUTH_MAXFLAVOR && authtab[flavor] == NULL) { |
|---|
| 96 | | - authtab[flavor] = aops; |
|---|
| 97 | | - rv = 0; |
|---|
| 117 | + |
|---|
| 118 | + if (flavor < RPC_AUTH_MAXFLAVOR) { |
|---|
| 119 | + old = cmpxchg((struct auth_ops ** __force)&authtab[flavor], NULL, aops); |
|---|
| 120 | + if (old == NULL || old == aops) |
|---|
| 121 | + rv = 0; |
|---|
| 98 | 122 | } |
|---|
| 99 | | - spin_unlock(&authtab_lock); |
|---|
| 100 | 123 | return rv; |
|---|
| 101 | 124 | } |
|---|
| 102 | 125 | EXPORT_SYMBOL_GPL(svc_auth_register); |
|---|
| .. | .. |
|---|
| 104 | 127 | void |
|---|
| 105 | 128 | svc_auth_unregister(rpc_authflavor_t flavor) |
|---|
| 106 | 129 | { |
|---|
| 107 | | - spin_lock(&authtab_lock); |
|---|
| 108 | 130 | if (flavor < RPC_AUTH_MAXFLAVOR) |
|---|
| 109 | | - authtab[flavor] = NULL; |
|---|
| 110 | | - spin_unlock(&authtab_lock); |
|---|
| 131 | + rcu_assign_pointer(authtab[flavor], NULL); |
|---|
| 111 | 132 | } |
|---|
| 112 | 133 | EXPORT_SYMBOL_GPL(svc_auth_unregister); |
|---|
| 113 | 134 | |
|---|
| .. | .. |
|---|
| 127 | 148 | static DEFINE_SPINLOCK(auth_domain_lock); |
|---|
| 128 | 149 | |
|---|
| 129 | 150 | static void auth_domain_release(struct kref *kref) |
|---|
| 151 | + __releases(&auth_domain_lock) |
|---|
| 130 | 152 | { |
|---|
| 131 | 153 | struct auth_domain *dom = container_of(kref, struct auth_domain, ref); |
|---|
| 132 | 154 | |
|---|
| 133 | | - hlist_del(&dom->hash); |
|---|
| 155 | + hlist_del_rcu(&dom->hash); |
|---|
| 134 | 156 | dom->flavour->domain_release(dom); |
|---|
| 135 | 157 | spin_unlock(&auth_domain_lock); |
|---|
| 136 | 158 | } |
|---|
| .. | .. |
|---|
| 159 | 181 | } |
|---|
| 160 | 182 | } |
|---|
| 161 | 183 | if (new) |
|---|
| 162 | | - hlist_add_head(&new->hash, head); |
|---|
| 184 | + hlist_add_head_rcu(&new->hash, head); |
|---|
| 163 | 185 | spin_unlock(&auth_domain_lock); |
|---|
| 164 | 186 | return new; |
|---|
| 165 | 187 | } |
|---|
| .. | .. |
|---|
| 167 | 189 | |
|---|
| 168 | 190 | struct auth_domain *auth_domain_find(char *name) |
|---|
| 169 | 191 | { |
|---|
| 170 | | - return auth_domain_lookup(name, NULL); |
|---|
| 192 | + struct auth_domain *hp; |
|---|
| 193 | + struct hlist_head *head; |
|---|
| 194 | + |
|---|
| 195 | + head = &auth_domain_table[hash_str(name, DN_HASHBITS)]; |
|---|
| 196 | + |
|---|
| 197 | + rcu_read_lock(); |
|---|
| 198 | + hlist_for_each_entry_rcu(hp, head, hash) { |
|---|
| 199 | + if (strcmp(hp->name, name)==0) { |
|---|
| 200 | + if (!kref_get_unless_zero(&hp->ref)) |
|---|
| 201 | + hp = NULL; |
|---|
| 202 | + rcu_read_unlock(); |
|---|
| 203 | + return hp; |
|---|
| 204 | + } |
|---|
| 205 | + } |
|---|
| 206 | + rcu_read_unlock(); |
|---|
| 207 | + return NULL; |
|---|
| 171 | 208 | } |
|---|
| 172 | 209 | EXPORT_SYMBOL_GPL(auth_domain_find); |
|---|
| 210 | + |
|---|
| 211 | +/** |
|---|
| 212 | + * auth_domain_cleanup - check that the auth_domain table is empty |
|---|
| 213 | + * |
|---|
| 214 | + * On module unload the auth_domain_table must be empty. To make it |
|---|
| 215 | + * easier to catch bugs which don't clean up domains properly, we |
|---|
| 216 | + * warn if anything remains in the table at cleanup time. |
|---|
| 217 | + * |
|---|
| 218 | + * Note that we cannot proactively remove the domains at this stage. |
|---|
| 219 | + * The ->release() function might be in a module that has already been |
|---|
| 220 | + * unloaded. |
|---|
| 221 | + */ |
|---|
| 222 | + |
|---|
| 223 | +void auth_domain_cleanup(void) |
|---|
| 224 | +{ |
|---|
| 225 | + int h; |
|---|
| 226 | + struct auth_domain *hp; |
|---|
| 227 | + |
|---|
| 228 | + for (h = 0; h < DN_HASHMAX; h++) |
|---|
| 229 | + hlist_for_each_entry(hp, &auth_domain_table[h], hash) |
|---|
| 230 | + pr_warn("svc: domain %s still present at module unload.\n", |
|---|
| 231 | + hp->name); |
|---|
| 232 | +} |
|---|