diff options
| author | Christian Brauner <brauner@kernel.org> | 2025-11-03 02:12:43 +0300 |
|---|---|---|
| committer | Christian Brauner <brauner@kernel.org> | 2025-11-04 14:36:07 +0300 |
| commit | ae40e6c65791f47c76cc14d0cce2707fe6053f72 (patch) | |
| tree | b26f5d745f6f62fb715b81d78f571f7d1c0f9675 /include/linux | |
| parent | 40314c2818b700da695c9686348be7aef9e156a2 (diff) | |
| download | linux-ae40e6c65791f47c76cc14d0cce2707fe6053f72.tar.xz | |
cred: add scoped_with_kernel_creds()
Add a new cleanup class for override creds. We can make use of this in a
bunch of places going forward.
Based on this scoped_with_kernel_creds() that can be used to temporarily
assume kernel credentials for specific tasks such as firmware loading,
or coredump socket connections. At no point will the caller interact
with the kernel credentials directly.
Link: https://patch.msgid.link/20251103-work-creds-init_cred-v1-4-cb3ec8711a6a@kernel.org
Reviewed-by: Jens Axboe <axboe@kernel.dk>
Signed-off-by: Christian Brauner <brauner@kernel.org>
Diffstat (limited to 'include/linux')
| -rw-r--r-- | include/linux/cred.h | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/include/linux/cred.h b/include/linux/cred.h index 8ab3718184ad..be2cd07b174c 100644 --- a/include/linux/cred.h +++ b/include/linux/cred.h @@ -187,6 +187,14 @@ static inline const struct cred *revert_creds(const struct cred *revert_cred) return rcu_replace_pointer(current->cred, revert_cred, 1); } +DEFINE_CLASS(override_creds, + const struct cred *, + revert_creds(_T), + override_creds(override_cred), const struct cred *override_cred) + +#define scoped_with_kernel_creds() \ + scoped_class(override_creds, __UNIQUE_ID(cred), kernel_cred()) + /** * get_cred_many - Get references on a set of credentials * @cred: The credentials to reference |
