mirror of
				https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
				synced 2025-10-31 07:02:06 +00:00 
			
		
		
		
	 3b11a1dece
			
		
	
	
		3b11a1dece
		
	
	
	
	
		
			
			Differentiate the objective and real subjective credentials from the effective subjective credentials on a task by introducing a second credentials pointer into the task_struct. task_struct::real_cred then refers to the objective and apparent real subjective credentials of a task, as perceived by the other tasks in the system. task_struct::cred then refers to the effective subjective credentials of a task, as used by that task when it's actually running. These are not visible to the other tasks in the system. __task_cred(task) then refers to the objective/real credentials of the task in question. current_cred() refers to the effective subjective credentials of the current task. prepare_creds() uses the objective creds as a base and commit_creds() changes both pointers in the task_struct (indeed commit_creds() requires them to be the same). override_creds() and revert_creds() change the subjective creds pointer only, and the former returns the old subjective creds. These are used by NFSD, faccessat() and do_coredump(), and will by used by CacheFiles. In SELinux, current_has_perm() is provided as an alternative to task_has_perm(). This uses the effective subjective context of current, whereas task_has_perm() uses the objective/real context of the subject. Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: James Morris <jmorris@namei.org>
		
			
				
	
	
		
			97 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			97 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * linux/fs/nfsd/auth.c
 | |
|  *
 | |
|  * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
 | |
|  */
 | |
| 
 | |
| #include <linux/types.h>
 | |
| #include <linux/sched.h>
 | |
| #include <linux/sunrpc/svc.h>
 | |
| #include <linux/sunrpc/svcauth.h>
 | |
| #include <linux/nfsd/nfsd.h>
 | |
| #include <linux/nfsd/export.h>
 | |
| #include "auth.h"
 | |
| 
 | |
| int nfsexp_flags(struct svc_rqst *rqstp, struct svc_export *exp)
 | |
| {
 | |
| 	struct exp_flavor_info *f;
 | |
| 	struct exp_flavor_info *end = exp->ex_flavors + exp->ex_nflavors;
 | |
| 
 | |
| 	for (f = exp->ex_flavors; f < end; f++) {
 | |
| 		if (f->pseudoflavor == rqstp->rq_flavor)
 | |
| 			return f->flags;
 | |
| 	}
 | |
| 	return exp->ex_flags;
 | |
| 
 | |
| }
 | |
| 
 | |
| int nfsd_setuser(struct svc_rqst *rqstp, struct svc_export *exp)
 | |
| {
 | |
| 	struct group_info *rqgi;
 | |
| 	struct group_info *gi;
 | |
| 	struct cred *new;
 | |
| 	int i;
 | |
| 	int flags = nfsexp_flags(rqstp, exp);
 | |
| 	int ret;
 | |
| 
 | |
| 	/* discard any old override before preparing the new set */
 | |
| 	revert_creds(get_cred(current->real_cred));
 | |
| 	new = prepare_creds();
 | |
| 	if (!new)
 | |
| 		return -ENOMEM;
 | |
| 
 | |
| 	new->fsuid = rqstp->rq_cred.cr_uid;
 | |
| 	new->fsgid = rqstp->rq_cred.cr_gid;
 | |
| 
 | |
| 	rqgi = rqstp->rq_cred.cr_group_info;
 | |
| 
 | |
| 	if (flags & NFSEXP_ALLSQUASH) {
 | |
| 		new->fsuid = exp->ex_anon_uid;
 | |
| 		new->fsgid = exp->ex_anon_gid;
 | |
| 		gi = groups_alloc(0);
 | |
| 	} else if (flags & NFSEXP_ROOTSQUASH) {
 | |
| 		if (!new->fsuid)
 | |
| 			new->fsuid = exp->ex_anon_uid;
 | |
| 		if (!new->fsgid)
 | |
| 			new->fsgid = exp->ex_anon_gid;
 | |
| 
 | |
| 		gi = groups_alloc(rqgi->ngroups);
 | |
| 		if (!gi)
 | |
| 			goto oom;
 | |
| 
 | |
| 		for (i = 0; i < rqgi->ngroups; i++) {
 | |
| 			if (!GROUP_AT(rqgi, i))
 | |
| 				GROUP_AT(gi, i) = exp->ex_anon_gid;
 | |
| 			else
 | |
| 				GROUP_AT(gi, i) = GROUP_AT(rqgi, i);
 | |
| 		}
 | |
| 	} else {
 | |
| 		gi = get_group_info(rqgi);
 | |
| 	}
 | |
| 
 | |
| 	if (new->fsuid == (uid_t) -1)
 | |
| 		new->fsuid = exp->ex_anon_uid;
 | |
| 	if (new->fsgid == (gid_t) -1)
 | |
| 		new->fsgid = exp->ex_anon_gid;
 | |
| 
 | |
| 	ret = set_groups(new, gi);
 | |
| 	put_group_info(gi);
 | |
| 	if (!ret)
 | |
| 		goto error;
 | |
| 
 | |
| 	if (new->uid)
 | |
| 		new->cap_effective = cap_drop_nfsd_set(new->cap_effective);
 | |
| 	else
 | |
| 		new->cap_effective = cap_raise_nfsd_set(new->cap_effective,
 | |
| 							new->cap_permitted);
 | |
| 	put_cred(override_creds(new));
 | |
| 	return 0;
 | |
| 
 | |
| oom:
 | |
| 	ret = -ENOMEM;
 | |
| error:
 | |
| 	abort_creds(new);
 | |
| 	return ret;
 | |
| }
 | |
| 
 |