CRED: Differentiate objective and effective subjective credentials on a task
authorDavid Howells <dhowells@redhat.com>
Thu, 13 Nov 2008 23:39:26 +0000 (10:39 +1100)
committerJames Morris <jmorris@namei.org>
Thu, 13 Nov 2008 23:39:26 +0000 (10:39 +1100)
commit3b11a1decef07c19443d24ae926982bc8ec9f4c0
treeb6555f0e5b07f4b2badd332a0a900b974920c49d
parent98870ab0a5a3f1822aee681d2997017e1c87d026
CRED: Differentiate objective and effective subjective credentials on a task

Differentiate the objective and real subjective credentials from the effective
subjective credentials on a task by introducing a second credentials pointer
into the task_struct.

task_struct::real_cred then refers to the objective and apparent real
subjective credentials of a task, as perceived by the other tasks in the
system.

task_struct::cred then refers to the effective subjective credentials of a
task, as used by that task when it's actually running.  These are not visible
to the other tasks in the system.

__task_cred(task) then refers to the objective/real credentials of the task in
question.

current_cred() refers to the effective subjective credentials of the current
task.

prepare_creds() uses the objective creds as a base and commit_creds() changes
both pointers in the task_struct (indeed commit_creds() requires them to be the
same).

override_creds() and revert_creds() change the subjective creds pointer only,
and the former returns the old subjective creds.  These are used by NFSD,
faccessat() and do_coredump(), and will by used by CacheFiles.

In SELinux, current_has_perm() is provided as an alternative to
task_has_perm().  This uses the effective subjective context of current,
whereas task_has_perm() uses the objective/real context of the subject.

Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
fs/nfsd/auth.c
include/linux/cred.h
include/linux/init_task.h
include/linux/sched.h
kernel/cred.c
kernel/fork.c
security/selinux/hooks.c