Add a new cleanup class for override creds. We can make use of this in a bunch of places going forward. Based on this add with_kernel_creds() and scoped_with_kernel_creds() that can be used to temporarily assume kernel credentials for specific tasks such as firmware loading, or coredump socket connections. At no point will the caller interact with the kernel credentials directly. Link: https://patch.msgid.link/20251031-work-creds-init_cred-v1-1-cbf0400d6e0e@kernel.org Signed-off-by: Christian Brauner --- include/linux/cred.h | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/include/linux/cred.h b/include/linux/cred.h index 8ab3718184ad..c4f7630763f4 100644 --- a/include/linux/cred.h +++ b/include/linux/cred.h @@ -187,6 +187,17 @@ static inline const struct cred *revert_creds(const struct cred *revert_cred) return rcu_replace_pointer(current->cred, revert_cred, 1); } +DEFINE_CLASS(override_creds, + const struct cred *, + revert_creds(_T), + override_creds(override_cred), const struct cred *override_cred) + +#define with_kernel_creds() \ + CLASS(override_creds, __UNIQUE_ID(cred))(kernel_cred()) + +#define scoped_with_kernel_creds() \ + scoped_class(override_creds, __UNIQUE_ID(cred), kernel_cred()) + /** * get_cred_many - Get references on a set of credentials * @cred: The credentials to reference -- 2.47.3