Lines Matching full:new

218 	struct cred *new;  in cred_alloc_blank()  local
220 new = kmem_cache_zalloc(cred_jar, GFP_KERNEL); in cred_alloc_blank()
221 if (!new) in cred_alloc_blank()
224 atomic_set(&new->usage, 1); in cred_alloc_blank()
226 new->magic = CRED_MAGIC; in cred_alloc_blank()
228 if (security_cred_alloc_blank(new, GFP_KERNEL_ACCOUNT) < 0) in cred_alloc_blank()
231 return new; in cred_alloc_blank()
234 abort_creds(new); in cred_alloc_blank()
239 * prepare_creds - Prepare a new set of credentials for modification
241 * Prepare a new set of task credentials for modification. A task's creds
243 * prepare a new copy, which the caller then modifies and then commits by
248 * Returns a pointer to the new creds-to-be if successful, NULL otherwise.
256 struct cred *new; in prepare_creds() local
260 new = kmem_cache_alloc(cred_jar, GFP_KERNEL); in prepare_creds()
261 if (!new) in prepare_creds()
264 kdebug("prepare_creds() alloc %p", new); in prepare_creds()
267 memcpy(new, old, sizeof(struct cred)); in prepare_creds()
269 new->non_rcu = 0; in prepare_creds()
270 atomic_set(&new->usage, 1); in prepare_creds()
271 set_cred_subscribers(new, 0); in prepare_creds()
272 get_group_info(new->group_info); in prepare_creds()
273 get_uid(new->user); in prepare_creds()
274 get_user_ns(new->user_ns); in prepare_creds()
277 key_get(new->session_keyring); in prepare_creds()
278 key_get(new->process_keyring); in prepare_creds()
279 key_get(new->thread_keyring); in prepare_creds()
280 key_get(new->request_key_auth); in prepare_creds()
284 new->security = NULL; in prepare_creds()
287 new->ucounts = get_ucounts(new->ucounts); in prepare_creds()
288 if (!new->ucounts) in prepare_creds()
291 if (security_prepare_creds(new, old, GFP_KERNEL_ACCOUNT) < 0) in prepare_creds()
294 validate_creds(new); in prepare_creds()
295 return new; in prepare_creds()
298 abort_creds(new); in prepare_creds()
309 struct cred *new; in prepare_exec_creds() local
311 new = prepare_creds(); in prepare_exec_creds()
312 if (!new) in prepare_exec_creds()
313 return new; in prepare_exec_creds()
317 key_put(new->thread_keyring); in prepare_exec_creds()
318 new->thread_keyring = NULL; in prepare_exec_creds()
320 /* inherit the session keyring; new process keyring */ in prepare_exec_creds()
321 key_put(new->process_keyring); in prepare_exec_creds()
322 new->process_keyring = NULL; in prepare_exec_creds()
325 new->suid = new->fsuid = new->euid; in prepare_exec_creds()
326 new->sgid = new->fsgid = new->egid; in prepare_exec_creds()
328 return new; in prepare_exec_creds()
332 * Copy credentials for the new process created by fork()
334 * We share if we can, but under some circumstances we have to generate a new
337 * The new process gets the current process's subjective credentials as its
342 struct cred *new; in copy_creds() local
365 new = prepare_creds(); in copy_creds()
366 if (!new) in copy_creds()
370 ret = create_user_ns(new); in copy_creds()
373 ret = set_cred_ucounts(new); in copy_creds()
379 /* new threads get their own thread keyrings if their parent already in copy_creds()
381 if (new->thread_keyring) { in copy_creds()
382 key_put(new->thread_keyring); in copy_creds()
383 new->thread_keyring = NULL; in copy_creds()
385 install_thread_keyring_to_cred(new); in copy_creds()
392 key_put(new->process_keyring); in copy_creds()
393 new->process_keyring = NULL; in copy_creds()
397 p->cred = p->real_cred = get_cred(new); in copy_creds()
399 alter_cred_subscribers(new, 2); in copy_creds()
400 validate_creds(new); in copy_creds()
404 put_cred(new); in copy_creds()
434 * commit_creds - Install new credentials upon the current task
435 * @new: The credentials to be assigned
437 * Install a new set of credentials to the current task, using RCU to replace
442 * This function eats the caller's reference to the new credentials.
447 int commit_creds(struct cred *new) in commit_creds() argument
452 kdebug("commit_creds(%p{%d,%d})", new, in commit_creds()
453 atomic_read(&new->usage), in commit_creds()
454 read_cred_subscribers(new)); in commit_creds()
460 validate_creds(new); in commit_creds()
462 BUG_ON(atomic_read(&new->usage) < 1); in commit_creds()
464 get_cred(new); /* we will require a ref for the subj creds too */ in commit_creds()
467 if (!uid_eq(old->euid, new->euid) || in commit_creds()
468 !gid_eq(old->egid, new->egid) || in commit_creds()
469 !uid_eq(old->fsuid, new->fsuid) || in commit_creds()
470 !gid_eq(old->fsgid, new->fsgid) || in commit_creds()
471 !cred_cap_issubset(old, new)) { in commit_creds()
488 if (!uid_eq(new->fsuid, old->fsuid)) in commit_creds()
489 key_fsuid_changed(new); in commit_creds()
490 if (!gid_eq(new->fsgid, old->fsgid)) in commit_creds()
491 key_fsgid_changed(new); in commit_creds()
497 alter_cred_subscribers(new, 2); in commit_creds()
498 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds()
499 inc_rlimit_ucounts(new->ucounts, UCOUNT_RLIMIT_NPROC, 1); in commit_creds()
500 rcu_assign_pointer(task->real_cred, new); in commit_creds()
501 rcu_assign_pointer(task->cred, new); in commit_creds()
502 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds()
507 if (!uid_eq(new->uid, old->uid) || in commit_creds()
508 !uid_eq(new->euid, old->euid) || in commit_creds()
509 !uid_eq(new->suid, old->suid) || in commit_creds()
510 !uid_eq(new->fsuid, old->fsuid)) in commit_creds()
513 if (!gid_eq(new->gid, old->gid) || in commit_creds()
514 !gid_eq(new->egid, old->egid) || in commit_creds()
515 !gid_eq(new->sgid, old->sgid) || in commit_creds()
516 !gid_eq(new->fsgid, old->fsgid)) in commit_creds()
528 * @new: The credentials that were going to be applied
533 void abort_creds(struct cred *new) in abort_creds() argument
535 kdebug("abort_creds(%p{%d,%d})", new, in abort_creds()
536 atomic_read(&new->usage), in abort_creds()
537 read_cred_subscribers(new)); in abort_creds()
540 BUG_ON(read_cred_subscribers(new) != 0); in abort_creds()
542 BUG_ON(atomic_read(&new->usage) < 1); in abort_creds()
543 put_cred(new); in abort_creds()
549 * @new: The credentials to be assigned
554 const struct cred *override_creds(const struct cred *new) in override_creds() argument
558 kdebug("override_creds(%p{%d,%d})", new, in override_creds()
559 atomic_read(&new->usage), in override_creds()
560 read_cred_subscribers(new)); in override_creds()
563 validate_creds(new); in override_creds()
576 get_new_cred((struct cred *)new); in override_creds()
577 alter_cred_subscribers(new, 1); in override_creds()
578 rcu_assign_pointer(current->cred, new); in override_creds()
666 int set_cred_ucounts(struct cred *new) in set_cred_ucounts() argument
670 struct ucounts *new_ucounts, *old_ucounts = new->ucounts; in set_cred_ucounts()
672 if (new->user == old->user && new->user_ns == old->user_ns) in set_cred_ucounts()
679 if (old_ucounts && old_ucounts->ns == new->user_ns && uid_eq(old_ucounts->uid, new->euid)) in set_cred_ucounts()
682 if (!(new_ucounts = alloc_ucounts(new->user_ns, new->euid))) in set_cred_ucounts()
685 new->ucounts = new_ucounts; in set_cred_ucounts()
716 * Returns the new credentials or NULL if out of memory.
721 struct cred *new; in prepare_kernel_cred() local
723 new = kmem_cache_alloc(cred_jar, GFP_KERNEL); in prepare_kernel_cred()
724 if (!new) in prepare_kernel_cred()
727 kdebug("prepare_kernel_cred() alloc %p", new); in prepare_kernel_cred()
736 *new = *old; in prepare_kernel_cred()
737 new->non_rcu = 0; in prepare_kernel_cred()
738 atomic_set(&new->usage, 1); in prepare_kernel_cred()
739 set_cred_subscribers(new, 0); in prepare_kernel_cred()
740 get_uid(new->user); in prepare_kernel_cred()
741 get_user_ns(new->user_ns); in prepare_kernel_cred()
742 get_group_info(new->group_info); in prepare_kernel_cred()
745 new->session_keyring = NULL; in prepare_kernel_cred()
746 new->process_keyring = NULL; in prepare_kernel_cred()
747 new->thread_keyring = NULL; in prepare_kernel_cred()
748 new->request_key_auth = NULL; in prepare_kernel_cred()
749 new->jit_keyring = KEY_REQKEY_DEFL_THREAD_KEYRING; in prepare_kernel_cred()
753 new->security = NULL; in prepare_kernel_cred()
755 new->ucounts = get_ucounts(new->ucounts); in prepare_kernel_cred()
756 if (!new->ucounts) in prepare_kernel_cred()
759 if (security_prepare_creds(new, old, GFP_KERNEL_ACCOUNT) < 0) in prepare_kernel_cred()
763 validate_creds(new); in prepare_kernel_cred()
764 return new; in prepare_kernel_cred()
767 put_cred(new); in prepare_kernel_cred()
775 * @new: The credentials to alter
781 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
783 return security_kernel_act_as(new, secid); in set_security_override()
789 * @new: The credentials to alter
797 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument
806 return set_security_override(new, secid); in set_security_override_from_ctx()
812 * @new: The credentials to alter
816 * as the object context of the specified inode, so that the new inodes have
819 int set_create_files_as(struct cred *new, struct inode *inode) in set_create_files_as() argument
823 new->fsuid = inode->i_uid; in set_create_files_as()
824 new->fsgid = inode->i_gid; in set_create_files_as()
825 return security_kernel_create_files_as(new, inode); in set_create_files_as()