4 * UID and GID to name mapping for clients.
6 * Copyright (c) 2002 The Regents of the University of Michigan.
9 * Marius Aamodt Eriksen <marius@umich.edu>
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. Neither the name of the University nor the names of its
21 * contributors may be used to endorse or promote products derived
22 * from this software without specific prior written permission.
24 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
25 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
26 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
31 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 #include <linux/types.h>
37 #include <linux/parser.h>
39 #include <linux/nfs_idmap.h>
40 #include <net/net_namespace.h>
41 #include <linux/sunrpc/rpc_pipe_fs.h>
42 #include <linux/nfs_fs.h>
43 #include <linux/nfs_fs_sb.h>
44 #include <linux/key.h>
45 #include <linux/keyctl.h>
46 #include <linux/key-type.h>
47 #include <keys/user-type.h>
48 #include <linux/module.h>
53 #define NFS_UINT_MAXLEN 11
55 static const struct cred
*id_resolver_cache
;
56 static struct key_type key_type_id_resolver_legacy
;
58 struct idmap_legacy_upcalldata
{
59 struct rpc_pipe_msg pipe_msg
;
60 struct idmap_msg idmap_msg
;
61 struct key_construction
*key_cons
;
66 struct rpc_pipe
*idmap_pipe
;
67 struct idmap_legacy_upcalldata
*idmap_upcall_data
;
68 struct mutex idmap_mutex
;
72 * nfs_fattr_init_names - initialise the nfs_fattr owner_name/group_name fields
73 * @fattr: fully initialised struct nfs_fattr
74 * @owner_name: owner name string cache
75 * @group_name: group name string cache
77 void nfs_fattr_init_names(struct nfs_fattr
*fattr
,
78 struct nfs4_string
*owner_name
,
79 struct nfs4_string
*group_name
)
81 fattr
->owner_name
= owner_name
;
82 fattr
->group_name
= group_name
;
85 static void nfs_fattr_free_owner_name(struct nfs_fattr
*fattr
)
87 fattr
->valid
&= ~NFS_ATTR_FATTR_OWNER_NAME
;
88 kfree(fattr
->owner_name
->data
);
91 static void nfs_fattr_free_group_name(struct nfs_fattr
*fattr
)
93 fattr
->valid
&= ~NFS_ATTR_FATTR_GROUP_NAME
;
94 kfree(fattr
->group_name
->data
);
97 static bool nfs_fattr_map_owner_name(struct nfs_server
*server
, struct nfs_fattr
*fattr
)
99 struct nfs4_string
*owner
= fattr
->owner_name
;
102 if (!(fattr
->valid
& NFS_ATTR_FATTR_OWNER_NAME
))
104 if (nfs_map_name_to_uid(server
, owner
->data
, owner
->len
, &uid
) == 0) {
106 fattr
->valid
|= NFS_ATTR_FATTR_OWNER
;
111 static bool nfs_fattr_map_group_name(struct nfs_server
*server
, struct nfs_fattr
*fattr
)
113 struct nfs4_string
*group
= fattr
->group_name
;
116 if (!(fattr
->valid
& NFS_ATTR_FATTR_GROUP_NAME
))
118 if (nfs_map_group_to_gid(server
, group
->data
, group
->len
, &gid
) == 0) {
120 fattr
->valid
|= NFS_ATTR_FATTR_GROUP
;
126 * nfs_fattr_free_names - free up the NFSv4 owner and group strings
127 * @fattr: a fully initialised nfs_fattr structure
129 void nfs_fattr_free_names(struct nfs_fattr
*fattr
)
131 if (fattr
->valid
& NFS_ATTR_FATTR_OWNER_NAME
)
132 nfs_fattr_free_owner_name(fattr
);
133 if (fattr
->valid
& NFS_ATTR_FATTR_GROUP_NAME
)
134 nfs_fattr_free_group_name(fattr
);
138 * nfs_fattr_map_and_free_names - map owner/group strings into uid/gid and free
139 * @server: pointer to the filesystem nfs_server structure
140 * @fattr: a fully initialised nfs_fattr structure
142 * This helper maps the cached NFSv4 owner/group strings in fattr into
143 * their numeric uid/gid equivalents, and then frees the cached strings.
145 void nfs_fattr_map_and_free_names(struct nfs_server
*server
, struct nfs_fattr
*fattr
)
147 if (nfs_fattr_map_owner_name(server
, fattr
))
148 nfs_fattr_free_owner_name(fattr
);
149 if (nfs_fattr_map_group_name(server
, fattr
))
150 nfs_fattr_free_group_name(fattr
);
153 static int nfs_map_string_to_numeric(const char *name
, size_t namelen
, __u32
*res
)
158 if (memchr(name
, '@', namelen
) != NULL
|| namelen
>= sizeof(buf
))
160 memcpy(buf
, name
, namelen
);
162 if (kstrtoul(buf
, 0, &val
) != 0)
168 static int nfs_map_numeric_to_string(__u32 id
, char *buf
, size_t buflen
)
170 return snprintf(buf
, buflen
, "%u", id
);
173 static struct key_type key_type_id_resolver
= {
174 .name
= "id_resolver",
175 .instantiate
= user_instantiate
,
177 .revoke
= user_revoke
,
178 .destroy
= user_destroy
,
179 .describe
= user_describe
,
183 static int nfs_idmap_init_keyring(void)
189 printk(KERN_NOTICE
"NFS: Registering the %s key type\n",
190 key_type_id_resolver
.name
);
192 cred
= prepare_kernel_cred(NULL
);
196 keyring
= key_alloc(&key_type_keyring
, ".id_resolver", 0, 0, cred
,
197 (KEY_POS_ALL
& ~KEY_POS_SETATTR
) |
198 KEY_USR_VIEW
| KEY_USR_READ
,
199 KEY_ALLOC_NOT_IN_QUOTA
);
200 if (IS_ERR(keyring
)) {
201 ret
= PTR_ERR(keyring
);
202 goto failed_put_cred
;
205 ret
= key_instantiate_and_link(keyring
, NULL
, 0, NULL
, NULL
);
209 ret
= register_key_type(&key_type_id_resolver
);
213 ret
= register_key_type(&key_type_id_resolver_legacy
);
215 goto failed_reg_legacy
;
217 set_bit(KEY_FLAG_ROOT_CAN_CLEAR
, &keyring
->flags
);
218 cred
->thread_keyring
= keyring
;
219 cred
->jit_keyring
= KEY_REQKEY_DEFL_THREAD_KEYRING
;
220 id_resolver_cache
= cred
;
224 unregister_key_type(&key_type_id_resolver
);
232 static void nfs_idmap_quit_keyring(void)
234 key_revoke(id_resolver_cache
->thread_keyring
);
235 unregister_key_type(&key_type_id_resolver
);
236 unregister_key_type(&key_type_id_resolver_legacy
);
237 put_cred(id_resolver_cache
);
241 * Assemble the description to pass to request_key()
242 * This function will allocate a new string and update dest to point
243 * at it. The caller is responsible for freeing dest.
245 * On error 0 is returned. Otherwise, the length of dest is returned.
247 static ssize_t
nfs_idmap_get_desc(const char *name
, size_t namelen
,
248 const char *type
, size_t typelen
, char **desc
)
251 size_t desclen
= typelen
+ namelen
+ 2;
253 *desc
= kmalloc(desclen
, GFP_KERNEL
);
258 memcpy(cp
, type
, typelen
);
262 memcpy(cp
, name
, namelen
);
268 static ssize_t
nfs_idmap_request_key(struct key_type
*key_type
,
269 const char *name
, size_t namelen
,
270 const char *type
, void *data
,
271 size_t data_size
, struct idmap
*idmap
)
273 const struct cred
*saved_cred
;
276 struct user_key_payload
*payload
;
279 ret
= nfs_idmap_get_desc(name
, namelen
, type
, strlen(type
), &desc
);
283 saved_cred
= override_creds(id_resolver_cache
);
285 rkey
= request_key_with_auxdata(key_type
, desc
, "", 0, idmap
);
287 rkey
= request_key(&key_type_id_resolver
, desc
, "");
288 revert_creds(saved_cred
);
297 rkey
->perm
|= KEY_USR_VIEW
;
299 ret
= key_validate(rkey
);
303 payload
= rcu_dereference(rkey
->payload
.data
);
304 if (IS_ERR_OR_NULL(payload
)) {
305 ret
= PTR_ERR(payload
);
309 ret
= payload
->datalen
;
310 if (ret
> 0 && ret
<= data_size
)
311 memcpy(data
, payload
->data
, ret
);
322 static ssize_t
nfs_idmap_get_key(const char *name
, size_t namelen
,
323 const char *type
, void *data
,
324 size_t data_size
, struct idmap
*idmap
)
326 ssize_t ret
= nfs_idmap_request_key(&key_type_id_resolver
,
327 name
, namelen
, type
, data
,
330 mutex_lock(&idmap
->idmap_mutex
);
331 ret
= nfs_idmap_request_key(&key_type_id_resolver_legacy
,
332 name
, namelen
, type
, data
,
334 mutex_unlock(&idmap
->idmap_mutex
);
340 static ssize_t
nfs_idmap_lookup_name(__u32 id
, const char *type
, char *buf
,
341 size_t buflen
, struct idmap
*idmap
)
343 char id_str
[NFS_UINT_MAXLEN
];
347 id_len
= snprintf(id_str
, sizeof(id_str
), "%u", id
);
348 ret
= nfs_idmap_get_key(id_str
, id_len
, type
, buf
, buflen
, idmap
);
355 static int nfs_idmap_lookup_id(const char *name
, size_t namelen
, const char *type
,
356 __u32
*id
, struct idmap
*idmap
)
358 char id_str
[NFS_UINT_MAXLEN
];
363 data_size
= nfs_idmap_get_key(name
, namelen
, type
, id_str
, NFS_UINT_MAXLEN
, idmap
);
364 if (data_size
<= 0) {
367 ret
= kstrtol(id_str
, 10, &id_long
);
368 *id
= (__u32
)id_long
;
373 /* idmap classic begins here */
376 Opt_find_uid
, Opt_find_gid
, Opt_find_user
, Opt_find_group
, Opt_find_err
379 static const match_table_t nfs_idmap_tokens
= {
380 { Opt_find_uid
, "uid:%s" },
381 { Opt_find_gid
, "gid:%s" },
382 { Opt_find_user
, "user:%s" },
383 { Opt_find_group
, "group:%s" },
384 { Opt_find_err
, NULL
}
387 static int nfs_idmap_legacy_upcall(struct key_construction
*, const char *, void *);
388 static ssize_t
idmap_pipe_downcall(struct file
*, const char __user
*,
390 static void idmap_release_pipe(struct inode
*);
391 static void idmap_pipe_destroy_msg(struct rpc_pipe_msg
*);
393 static const struct rpc_pipe_ops idmap_upcall_ops
= {
394 .upcall
= rpc_pipe_generic_upcall
,
395 .downcall
= idmap_pipe_downcall
,
396 .release_pipe
= idmap_release_pipe
,
397 .destroy_msg
= idmap_pipe_destroy_msg
,
400 static struct key_type key_type_id_resolver_legacy
= {
402 .instantiate
= user_instantiate
,
404 .revoke
= user_revoke
,
405 .destroy
= user_destroy
,
406 .describe
= user_describe
,
408 .request_key
= nfs_idmap_legacy_upcall
,
411 static void __nfs_idmap_unregister(struct rpc_pipe
*pipe
)
414 rpc_unlink(pipe
->dentry
);
417 static int __nfs_idmap_register(struct dentry
*dir
,
419 struct rpc_pipe
*pipe
)
421 struct dentry
*dentry
;
423 dentry
= rpc_mkpipe_dentry(dir
, "idmap", idmap
, pipe
);
425 return PTR_ERR(dentry
);
426 pipe
->dentry
= dentry
;
430 static void nfs_idmap_unregister(struct nfs_client
*clp
,
431 struct rpc_pipe
*pipe
)
433 struct net
*net
= clp
->cl_net
;
434 struct super_block
*pipefs_sb
;
436 pipefs_sb
= rpc_get_sb_net(net
);
438 __nfs_idmap_unregister(pipe
);
443 static int nfs_idmap_register(struct nfs_client
*clp
,
445 struct rpc_pipe
*pipe
)
447 struct net
*net
= clp
->cl_net
;
448 struct super_block
*pipefs_sb
;
451 pipefs_sb
= rpc_get_sb_net(net
);
453 if (clp
->cl_rpcclient
->cl_dentry
)
454 err
= __nfs_idmap_register(clp
->cl_rpcclient
->cl_dentry
,
462 nfs_idmap_new(struct nfs_client
*clp
)
465 struct rpc_pipe
*pipe
;
468 idmap
= kzalloc(sizeof(*idmap
), GFP_KERNEL
);
472 pipe
= rpc_mkpipe_data(&idmap_upcall_ops
, 0);
474 error
= PTR_ERR(pipe
);
478 error
= nfs_idmap_register(clp
, idmap
, pipe
);
480 rpc_destroy_pipe_data(pipe
);
484 idmap
->idmap_pipe
= pipe
;
485 mutex_init(&idmap
->idmap_mutex
);
487 clp
->cl_idmap
= idmap
;
492 nfs_idmap_delete(struct nfs_client
*clp
)
494 struct idmap
*idmap
= clp
->cl_idmap
;
498 nfs_idmap_unregister(clp
, idmap
->idmap_pipe
);
499 rpc_destroy_pipe_data(idmap
->idmap_pipe
);
500 clp
->cl_idmap
= NULL
;
504 static int __rpc_pipefs_event(struct nfs_client
*clp
, unsigned long event
,
505 struct super_block
*sb
)
510 case RPC_PIPEFS_MOUNT
:
511 err
= __nfs_idmap_register(clp
->cl_rpcclient
->cl_dentry
,
513 clp
->cl_idmap
->idmap_pipe
);
515 case RPC_PIPEFS_UMOUNT
:
516 if (clp
->cl_idmap
->idmap_pipe
) {
517 struct dentry
*parent
;
519 parent
= clp
->cl_idmap
->idmap_pipe
->dentry
->d_parent
;
520 __nfs_idmap_unregister(clp
->cl_idmap
->idmap_pipe
);
522 * Note: This is a dirty hack. SUNRPC hook has been
523 * called already but simple_rmdir() call for the
524 * directory returned with error because of idmap pipe
525 * inside. Thus now we have to remove this directory
528 if (rpc_rmdir(parent
))
529 printk(KERN_ERR
"NFS: %s: failed to remove "
530 "clnt dir!\n", __func__
);
534 printk(KERN_ERR
"NFS: %s: unknown event: %ld\n", __func__
,
541 static struct nfs_client
*nfs_get_client_for_event(struct net
*net
, int event
)
543 struct nfs_net
*nn
= net_generic(net
, nfs_net_id
);
544 struct dentry
*cl_dentry
;
545 struct nfs_client
*clp
;
549 spin_lock(&nn
->nfs_client_lock
);
550 list_for_each_entry(clp
, &nn
->nfs_client_list
, cl_share_link
) {
551 /* Wait for initialisation to finish */
552 if (clp
->cl_cons_state
== NFS_CS_INITING
) {
553 atomic_inc(&clp
->cl_count
);
554 spin_unlock(&nn
->nfs_client_lock
);
555 err
= nfs_wait_client_init_complete(clp
);
561 /* Skip nfs_clients that failed to initialise */
562 if (clp
->cl_cons_state
< 0)
565 if (clp
->rpc_ops
!= &nfs_v4_clientops
)
567 cl_dentry
= clp
->cl_idmap
->idmap_pipe
->dentry
;
568 if (((event
== RPC_PIPEFS_MOUNT
) && cl_dentry
) ||
569 ((event
== RPC_PIPEFS_UMOUNT
) && !cl_dentry
))
571 atomic_inc(&clp
->cl_count
);
572 spin_unlock(&nn
->nfs_client_lock
);
575 spin_unlock(&nn
->nfs_client_lock
);
579 static int rpc_pipefs_event(struct notifier_block
*nb
, unsigned long event
,
582 struct super_block
*sb
= ptr
;
583 struct nfs_client
*clp
;
586 if (!try_module_get(THIS_MODULE
))
589 while ((clp
= nfs_get_client_for_event(sb
->s_fs_info
, event
))) {
590 error
= __rpc_pipefs_event(clp
, event
, sb
);
595 module_put(THIS_MODULE
);
599 #define PIPEFS_NFS_PRIO 1
601 static struct notifier_block nfs_idmap_block
= {
602 .notifier_call
= rpc_pipefs_event
,
603 .priority
= SUNRPC_PIPEFS_NFS_PRIO
,
606 int nfs_idmap_init(void)
609 ret
= nfs_idmap_init_keyring();
612 ret
= rpc_pipefs_notifier_register(&nfs_idmap_block
);
614 nfs_idmap_quit_keyring();
619 void nfs_idmap_quit(void)
621 rpc_pipefs_notifier_unregister(&nfs_idmap_block
);
622 nfs_idmap_quit_keyring();
625 static int nfs_idmap_prepare_message(char *desc
, struct idmap
*idmap
,
626 struct idmap_msg
*im
,
627 struct rpc_pipe_msg
*msg
)
632 im
->im_type
= IDMAP_TYPE_GROUP
;
633 token
= match_token(desc
, nfs_idmap_tokens
, &substr
);
637 im
->im_type
= IDMAP_TYPE_USER
;
639 im
->im_conv
= IDMAP_CONV_NAMETOID
;
640 ret
= match_strlcpy(im
->im_name
, &substr
, IDMAP_NAMESZ
);
644 im
->im_type
= IDMAP_TYPE_USER
;
646 im
->im_conv
= IDMAP_CONV_IDTONAME
;
647 ret
= match_int(&substr
, &im
->im_id
);
656 msg
->len
= sizeof(struct idmap_msg
);
663 nfs_idmap_prepare_pipe_upcall(struct idmap
*idmap
,
664 struct idmap_legacy_upcalldata
*data
)
666 if (idmap
->idmap_upcall_data
!= NULL
) {
670 idmap
->idmap_upcall_data
= data
;
675 nfs_idmap_complete_pipe_upcall_locked(struct idmap
*idmap
, int ret
)
677 struct key_construction
*cons
= idmap
->idmap_upcall_data
->key_cons
;
679 kfree(idmap
->idmap_upcall_data
);
680 idmap
->idmap_upcall_data
= NULL
;
681 complete_request_key(cons
, ret
);
685 nfs_idmap_abort_pipe_upcall(struct idmap
*idmap
, int ret
)
687 if (idmap
->idmap_upcall_data
!= NULL
)
688 nfs_idmap_complete_pipe_upcall_locked(idmap
, ret
);
691 static int nfs_idmap_legacy_upcall(struct key_construction
*cons
,
695 struct idmap_legacy_upcalldata
*data
;
696 struct rpc_pipe_msg
*msg
;
697 struct idmap_msg
*im
;
698 struct idmap
*idmap
= (struct idmap
*)aux
;
699 struct key
*key
= cons
->key
;
702 /* msg and im are freed in idmap_pipe_destroy_msg */
703 data
= kzalloc(sizeof(*data
), GFP_KERNEL
);
707 msg
= &data
->pipe_msg
;
708 im
= &data
->idmap_msg
;
710 data
->key_cons
= cons
;
712 ret
= nfs_idmap_prepare_message(key
->description
, idmap
, im
, msg
);
717 if (!nfs_idmap_prepare_pipe_upcall(idmap
, data
))
720 ret
= rpc_queue_upcall(idmap
->idmap_pipe
, msg
);
722 nfs_idmap_abort_pipe_upcall(idmap
, ret
);
728 complete_request_key(cons
, ret
);
732 static int nfs_idmap_instantiate(struct key
*key
, struct key
*authkey
, char *data
)
734 return key_instantiate_and_link(key
, data
, strlen(data
) + 1,
735 id_resolver_cache
->thread_keyring
,
739 static int nfs_idmap_read_and_verify_message(struct idmap_msg
*im
,
740 struct idmap_msg
*upcall
,
741 struct key
*key
, struct key
*authkey
)
743 char id_str
[NFS_UINT_MAXLEN
];
747 if (upcall
->im_type
!= im
->im_type
|| upcall
->im_conv
!= im
->im_conv
)
749 switch (im
->im_conv
) {
750 case IDMAP_CONV_NAMETOID
:
751 if (strcmp(upcall
->im_name
, im
->im_name
) != 0)
753 sprintf(id_str
, "%d", im
->im_id
);
754 ret
= nfs_idmap_instantiate(key
, authkey
, id_str
);
756 case IDMAP_CONV_IDTONAME
:
757 if (upcall
->im_id
!= im
->im_id
)
759 ret
= nfs_idmap_instantiate(key
, authkey
, im
->im_name
);
769 idmap_pipe_downcall(struct file
*filp
, const char __user
*src
, size_t mlen
)
771 struct rpc_inode
*rpci
= RPC_I(filp
->f_path
.dentry
->d_inode
);
772 struct idmap
*idmap
= (struct idmap
*)rpci
->private;
773 struct key_construction
*cons
;
778 /* If instantiation is successful, anyone waiting for key construction
779 * will have been woken up and someone else may now have used
780 * idmap_key_cons - so after this point we may no longer touch it.
782 if (idmap
->idmap_upcall_data
== NULL
)
785 cons
= idmap
->idmap_upcall_data
->key_cons
;
787 if (mlen
!= sizeof(im
)) {
792 if (copy_from_user(&im
, src
, mlen
) != 0) {
797 if (!(im
.im_status
& IDMAP_STATUS_SUCCESS
)) {
802 namelen_in
= strnlen(im
.im_name
, IDMAP_NAMESZ
);
803 if (namelen_in
== 0 || namelen_in
== IDMAP_NAMESZ
) {
808 ret
= nfs_idmap_read_and_verify_message(&im
,
809 &idmap
->idmap_upcall_data
->idmap_msg
,
810 cons
->key
, cons
->authkey
);
812 key_set_timeout(cons
->key
, nfs_idmap_cache_timeout
);
817 nfs_idmap_complete_pipe_upcall_locked(idmap
, ret
);
823 idmap_pipe_destroy_msg(struct rpc_pipe_msg
*msg
)
825 struct idmap_legacy_upcalldata
*data
= container_of(msg
,
826 struct idmap_legacy_upcalldata
,
828 struct idmap
*idmap
= data
->idmap
;
831 nfs_idmap_abort_pipe_upcall(idmap
, msg
->errno
);
835 idmap_release_pipe(struct inode
*inode
)
837 struct rpc_inode
*rpci
= RPC_I(inode
);
838 struct idmap
*idmap
= (struct idmap
*)rpci
->private;
840 nfs_idmap_abort_pipe_upcall(idmap
, -EPIPE
);
843 int nfs_map_name_to_uid(const struct nfs_server
*server
, const char *name
, size_t namelen
, __u32
*uid
)
845 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
847 if (nfs_map_string_to_numeric(name
, namelen
, uid
))
849 return nfs_idmap_lookup_id(name
, namelen
, "uid", uid
, idmap
);
852 int nfs_map_group_to_gid(const struct nfs_server
*server
, const char *name
, size_t namelen
, __u32
*gid
)
854 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
856 if (nfs_map_string_to_numeric(name
, namelen
, gid
))
858 return nfs_idmap_lookup_id(name
, namelen
, "gid", gid
, idmap
);
861 int nfs_map_uid_to_name(const struct nfs_server
*server
, __u32 uid
, char *buf
, size_t buflen
)
863 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
866 if (!(server
->caps
& NFS_CAP_UIDGID_NOMAP
))
867 ret
= nfs_idmap_lookup_name(uid
, "user", buf
, buflen
, idmap
);
869 ret
= nfs_map_numeric_to_string(uid
, buf
, buflen
);
872 int nfs_map_gid_to_group(const struct nfs_server
*server
, __u32 gid
, char *buf
, size_t buflen
)
874 struct idmap
*idmap
= server
->nfs_client
->cl_idmap
;
877 if (!(server
->caps
& NFS_CAP_UIDGID_NOMAP
))
878 ret
= nfs_idmap_lookup_name(gid
, "group", buf
, buflen
, idmap
);
880 ret
= nfs_map_numeric_to_string(gid
, buf
, buflen
);