Lines Matching full:new
175 struct cred *new; in cred_alloc_blank() local
177 new = kmem_cache_zalloc(cred_jar, GFP_KERNEL); in cred_alloc_blank()
178 if (!new) in cred_alloc_blank()
181 atomic_long_set(&new->usage, 1); in cred_alloc_blank()
182 if (security_cred_alloc_blank(new, GFP_KERNEL_ACCOUNT) < 0) in cred_alloc_blank()
185 return new; in cred_alloc_blank()
188 abort_creds(new); in cred_alloc_blank()
193 * prepare_creds - Prepare a new set of credentials for modification
195 * Prepare a new set of task credentials for modification. A task's creds
197 * prepare a new copy, which the caller then modifies and then commits by
202 * Returns a pointer to the new creds-to-be if successful, NULL otherwise.
210 struct cred *new; in prepare_creds() local
212 new = kmem_cache_alloc(cred_jar, GFP_KERNEL); in prepare_creds()
213 if (!new) in prepare_creds()
216 kdebug("prepare_creds() alloc %p", new); in prepare_creds()
219 memcpy(new, old, sizeof(struct cred)); in prepare_creds()
221 new->non_rcu = 0; in prepare_creds()
222 atomic_long_set(&new->usage, 1); in prepare_creds()
223 get_group_info(new->group_info); in prepare_creds()
224 get_uid(new->user); in prepare_creds()
225 get_user_ns(new->user_ns); in prepare_creds()
228 key_get(new->session_keyring); in prepare_creds()
229 key_get(new->process_keyring); in prepare_creds()
230 key_get(new->thread_keyring); in prepare_creds()
231 key_get(new->request_key_auth); in prepare_creds()
235 new->security = NULL; in prepare_creds()
238 new->ucounts = get_ucounts(new->ucounts); in prepare_creds()
239 if (!new->ucounts) in prepare_creds()
242 if (security_prepare_creds(new, old, GFP_KERNEL_ACCOUNT) < 0) in prepare_creds()
245 return new; in prepare_creds()
248 abort_creds(new); in prepare_creds()
259 struct cred *new; in prepare_exec_creds() local
261 new = prepare_creds(); in prepare_exec_creds()
262 if (!new) in prepare_exec_creds()
263 return new; in prepare_exec_creds()
267 key_put(new->thread_keyring); in prepare_exec_creds()
268 new->thread_keyring = NULL; in prepare_exec_creds()
270 /* inherit the session keyring; new process keyring */ in prepare_exec_creds()
271 key_put(new->process_keyring); in prepare_exec_creds()
272 new->process_keyring = NULL; in prepare_exec_creds()
275 new->suid = new->fsuid = new->euid; in prepare_exec_creds()
276 new->sgid = new->fsgid = new->egid; in prepare_exec_creds()
278 return new; in prepare_exec_creds()
282 * Copy credentials for the new process created by fork()
284 * We share if we can, but under some circumstances we have to generate a new
287 * The new process gets the current process's subjective credentials as its
292 struct cred *new; in copy_creds() local
312 new = prepare_creds(); in copy_creds()
313 if (!new) in copy_creds()
317 ret = create_user_ns(new); in copy_creds()
320 ret = set_cred_ucounts(new); in copy_creds()
326 /* new threads get their own thread keyrings if their parent already in copy_creds()
328 if (new->thread_keyring) { in copy_creds()
329 key_put(new->thread_keyring); in copy_creds()
330 new->thread_keyring = NULL; in copy_creds()
332 install_thread_keyring_to_cred(new); in copy_creds()
339 key_put(new->process_keyring); in copy_creds()
340 new->process_keyring = NULL; in copy_creds()
344 p->cred = p->real_cred = get_cred(new); in copy_creds()
349 put_cred(new); in copy_creds()
379 * commit_creds - Install new credentials upon the current task
380 * @new: The credentials to be assigned
382 * Install a new set of credentials to the current task, using RCU to replace
387 * This function eats the caller's reference to the new credentials.
392 int commit_creds(struct cred *new) in commit_creds() argument
397 kdebug("commit_creds(%p{%ld})", new, in commit_creds()
398 atomic_long_read(&new->usage)); in commit_creds()
401 BUG_ON(atomic_long_read(&new->usage) < 1); in commit_creds()
403 get_cred(new); /* we will require a ref for the subj creds too */ in commit_creds()
406 if (!uid_eq(old->euid, new->euid) || in commit_creds()
407 !gid_eq(old->egid, new->egid) || in commit_creds()
408 !uid_eq(old->fsuid, new->fsuid) || in commit_creds()
409 !gid_eq(old->fsgid, new->fsgid) || in commit_creds()
410 !cred_cap_issubset(old, new)) { in commit_creds()
427 if (!uid_eq(new->fsuid, old->fsuid)) in commit_creds()
428 key_fsuid_changed(new); in commit_creds()
429 if (!gid_eq(new->fsgid, old->fsgid)) in commit_creds()
430 key_fsgid_changed(new); in commit_creds()
436 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds()
437 inc_rlimit_ucounts(new->ucounts, UCOUNT_RLIMIT_NPROC, 1); in commit_creds()
438 rcu_assign_pointer(task->real_cred, new); in commit_creds()
439 rcu_assign_pointer(task->cred, new); in commit_creds()
440 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds()
444 if (!uid_eq(new->uid, old->uid) || in commit_creds()
445 !uid_eq(new->euid, old->euid) || in commit_creds()
446 !uid_eq(new->suid, old->suid) || in commit_creds()
447 !uid_eq(new->fsuid, old->fsuid)) in commit_creds()
450 if (!gid_eq(new->gid, old->gid) || in commit_creds()
451 !gid_eq(new->egid, old->egid) || in commit_creds()
452 !gid_eq(new->sgid, old->sgid) || in commit_creds()
453 !gid_eq(new->fsgid, old->fsgid)) in commit_creds()
464 * @new: The credentials that were going to be applied
469 void abort_creds(struct cred *new) in abort_creds() argument
471 kdebug("abort_creds(%p{%ld})", new, in abort_creds()
472 atomic_long_read(&new->usage)); in abort_creds()
474 BUG_ON(atomic_long_read(&new->usage) < 1); in abort_creds()
475 put_cred(new); in abort_creds()
533 int set_cred_ucounts(struct cred *new) in set_cred_ucounts() argument
535 struct ucounts *new_ucounts, *old_ucounts = new->ucounts; in set_cred_ucounts()
541 if (old_ucounts->ns == new->user_ns && uid_eq(old_ucounts->uid, new->uid)) in set_cred_ucounts()
544 if (!(new_ucounts = alloc_ucounts(new->user_ns, new->uid))) in set_cred_ucounts()
547 new->ucounts = new_ucounts; in set_cred_ucounts()
577 * Returns the new credentials or NULL if out of memory.
582 struct cred *new; in prepare_kernel_cred() local
587 new = kmem_cache_alloc(cred_jar, GFP_KERNEL); in prepare_kernel_cred()
588 if (!new) in prepare_kernel_cred()
591 kdebug("prepare_kernel_cred() alloc %p", new); in prepare_kernel_cred()
595 *new = *old; in prepare_kernel_cred()
596 new->non_rcu = 0; in prepare_kernel_cred()
597 atomic_long_set(&new->usage, 1); in prepare_kernel_cred()
598 get_uid(new->user); in prepare_kernel_cred()
599 get_user_ns(new->user_ns); in prepare_kernel_cred()
600 get_group_info(new->group_info); in prepare_kernel_cred()
603 new->session_keyring = NULL; in prepare_kernel_cred()
604 new->process_keyring = NULL; in prepare_kernel_cred()
605 new->thread_keyring = NULL; in prepare_kernel_cred()
606 new->request_key_auth = NULL; in prepare_kernel_cred()
607 new->jit_keyring = KEY_REQKEY_DEFL_THREAD_KEYRING; in prepare_kernel_cred()
611 new->security = NULL; in prepare_kernel_cred()
613 new->ucounts = get_ucounts(new->ucounts); in prepare_kernel_cred()
614 if (!new->ucounts) in prepare_kernel_cred()
617 if (security_prepare_creds(new, old, GFP_KERNEL_ACCOUNT) < 0) in prepare_kernel_cred()
621 return new; in prepare_kernel_cred()
624 put_cred(new); in prepare_kernel_cred()
632 * @new: The credentials to alter
638 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
640 return security_kernel_act_as(new, secid); in set_security_override()
646 * @new: The credentials to alter
654 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument
663 return set_security_override(new, secid); in set_security_override_from_ctx()
669 * @new: The credentials to alter
673 * as the object context of the specified inode, so that the new inodes have
676 int set_create_files_as(struct cred *new, struct inode *inode) in set_create_files_as() argument
680 new->fsuid = inode->i_uid; in set_create_files_as()
681 new->fsgid = inode->i_gid; in set_create_files_as()
682 return security_kernel_create_files_as(new, inode); in set_create_files_as()