*/
#include <afsconfig.h>
#include "afs/param.h"
+#ifdef LINUX_KEYRING_SUPPORT
+#include <linux/seq_file.h>
+#endif
-RCSID
- ("$Header$");
#include "afs/sysincludes.h"
#include "afsincludes.h"
#include "afs/afs_stats.h" /* statistics */
-#ifdef AFS_LINUX22_ENV
-#include "h/smp_lock.h"
+#include "afs/nfsclient.h"
+#include "osi_compat.h"
+
+#ifdef AFS_LINUX26_ONEGROUP_ENV
+# define NUMPAGGROUPS 1
+
+static afs_uint32
+afs_linux_pag_from_groups(struct group_info *group_info) {
+ afs_uint32 g0 = 0;
+ afs_uint32 i;
+
+ if (group_info->ngroups < NUMPAGGROUPS)
+ return NOPAG;
+
+ for (i = 0; i < group_info->ngroups; i++) {
+ g0 = afs_from_kgid(GROUP_AT(group_info, i));
+ if (((g0 >> 24) & 0xff) == 'A')
+ return g0;
+ }
+ return NOPAG;
+}
+
+static inline void
+afs_linux_pag_to_groups(afs_uint32 newpag,
+ struct group_info *old, struct group_info **new) {
+ int need_space = 0;
+ int i;
+ int j;
+ afs_kgid_t newkgid = afs_make_kgid(newpag);
+
+ if (afs_linux_pag_from_groups(old) == NOPAG)
+ need_space = NUMPAGGROUPS;
+
+ *new = groups_alloc(old->ngroups + need_space);
+
+ for (i = 0, j = 0; i < old->ngroups; ++i) {
+ afs_kgid_t ths = GROUP_AT(old, i);
+ if ((afs_from_kgid(ths) >> 24) == 'A')
+ continue;
+ if ((i == 0 || !gid_lt(newkgid, GROUP_AT(old, i-1))) &&
+ gid_lt(newkgid, ths)) {
+ GROUP_AT(*new, j) = newkgid;
+ j++;
+ }
+ GROUP_AT(*new, j) = ths;
+ j++;
+ }
+ if (j != i + need_space)
+ GROUP_AT(*new, j) = newkgid;
+}
+
+#else
+# define NUMPAGGROUPS 2
+
+static inline afs_uint32
+afs_linux_pag_from_groups(struct group_info *group_info) {
+
+ if (group_info->ngroups < NUMPAGGROUPS)
+ return NOPAG;
+
+ return afs_get_pag_from_groups(GROUP_AT(group_info, 0), GROUP_AT(group_info, 1));
+}
+
+static inline void
+afs_linux_pag_to_groups(afs_uint32 newpag,
+ struct group_info *old, struct group_info **new) {
+ int need_space = 0;
+ int i;
+ gid_t g0;
+ gid_t g1;
+
+ if (afs_linux_pag_from_groups(old) == NOPAG)
+ need_space = NUMPAGGGROUPS;
+
+ *new = groups_alloc(old->ngroups + need_space);
+
+ for (i = 0; i < old->ngroups; ++i)
+ GROUP_AT(new, i + need_space) = GROUP_AT(old, i);
+
+ afs_get_groups_from_pag(newpag, &g0, g1);
+ GROUP_AT(new, 0) = g0;
+ GROUP_AT(new, 1) = g1;
+}
#endif
-#if defined(AFS_LINUX26_ENV)
+afs_int32
+osi_get_group_pag(afs_ucred_t *cred) {
+ return afs_linux_pag_from_groups(afs_cr_group_info(cred));
+}
+
+
static int
afs_setgroups(cred_t **cr, struct group_info *group_info, int change_parent)
{
AFS_STATCNT(afs_setgroups);
- old_info = (*cr)->cr_group_info;
+ old_info = afs_cr_group_info(*cr);
get_group_info(group_info);
- (*cr)->cr_group_info = group_info;
+ afs_set_cr_group_info(*cr, group_info);
put_group_info(old_info);
crset(*cr);
+#if defined(STRUCT_TASK_STRUCT_HAS_PARENT) && !defined(STRUCT_TASK_STRUCT_HAS_CRED)
if (change_parent) {
old_info = current->parent->group_info;
get_group_info(group_info);
current->parent->group_info = group_info;
put_group_info(old_info);
}
+#endif
return (0);
}
-#else
-static int
-afs_setgroups(cred_t **cr, int ngroups, gid_t * gidset, int change_parent)
-{
- int ngrps;
- int i;
- gid_t *gp;
- AFS_STATCNT(afs_setgroups);
+int
+__setpag(cred_t **cr, afs_uint32 pagvalue, afs_uint32 *newpag,
+ int change_parent, struct group_info **old_groups)
+{
+ struct group_info *group_info;
+ struct group_info *tmp;
- if (ngroups > NGROUPS)
- return EINVAL;
+ get_group_info(afs_cr_group_info(*cr));
+ group_info = afs_cr_group_info(*cr);
- gp = (*cr)->cr_groups;
- if (ngroups < NGROUPS)
- gp[ngroups] = (gid_t) NOGROUP;
+ *newpag = (pagvalue == -1 ? genpag() : pagvalue);
+ afs_linux_pag_to_groups(*newpag, group_info, &tmp);
- for (i = ngroups; i > 0; i--) {
- *gp++ = *gidset++;
+ if (old_groups) {
+ *old_groups = group_info;
+ } else {
+ put_group_info(group_info);
+ group_info = NULL;
}
- (*cr)->cr_ngroups = ngroups;
- crset(*cr);
- return (0);
-}
-#endif
+ afs_setgroups(cr, tmp, change_parent);
-#if defined(AFS_LINUX26_ENV)
-static struct group_info *
-afs_getgroups(cred_t * cr)
-{
- AFS_STATCNT(afs_getgroups);
+ put_group_info(tmp);
- get_group_info(cr->cr_group_info);
- return cr->cr_group_info;
+ return 0;
}
-#else
-/* Returns number of groups. And we trust groups to be large enough to
- * hold all the groups.
- */
+
+#ifdef LINUX_KEYRING_SUPPORT
+extern struct key_type key_type_keyring __attribute__((weak));
+static struct key_type *__key_type_keyring = &key_type_keyring;
+
+/* install_session_keyring returns negative error values */
static int
-afs_getgroups(cred_t *cr, gid_t *groups)
+install_session_keyring(struct key *keyring)
{
- int i;
- int n;
- gid_t *gp;
+ struct key *old;
+ char desc[20];
+ int code = -EINVAL;
+ unsigned long flags;
- AFS_STATCNT(afs_getgroups);
+ if (!__key_type_keyring)
+ return code;
- gp = cr->cr_groups;
- n = cr->cr_ngroups;
+ if (!keyring) {
- for (i = 0; (i < n) && (*gp != (gid_t) NOGROUP); i++)
- *groups++ = *gp++;
- return i;
-}
-#endif
+ /* create an empty session keyring */
+ sprintf(desc, "_ses.%u", current->tgid);
-#if !defined(AFS_LINUX26_ENV)
-/* Only propogate the PAG to the parent process. Unix's propogate to
- * all processes sharing the cred.
- */
-int
-set_pag_in_parent(int pag, int g0, int g1)
-{
- int i;
-#ifdef STRUCT_TASK_STRUCT_HAS_PARENT
- gid_t *gp = current->parent->groups;
- int ngroups = current->parent->ngroups;
-#else
- gid_t *gp = current->p_pptr->groups;
- int ngroups = current->p_pptr->ngroups;
-#endif
+ /* if we're root, don't count the keyring against our quota. This
+ * avoids starvation issues when dealing with PAM modules that always
+ * setpag() as root */
+ if (capable(CAP_SYS_ADMIN))
+ flags = KEY_ALLOC_NOT_IN_QUOTA;
+ else
+ flags = KEY_ALLOC_IN_QUOTA;
- if ((ngroups < 2) || (afs_get_pag_from_groups(gp[0], gp[1]) == NOPAG)) {
- /* We will have to shift grouplist to make room for pag */
- if (ngroups + 2 > NGROUPS) {
- return EINVAL;
- }
- for (i = ngroups - 1; i >= 0; i--) {
- gp[i + 2] = gp[i];
+ keyring = afs_linux_key_alloc(
+ __key_type_keyring, desc,
+ current_uid(), current_gid(),
+ (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_ALL,
+ flags);
+
+ if (IS_ERR(keyring)) {
+ code = PTR_ERR(keyring);
+ goto out;
}
- ngroups += 2;
}
- gp[0] = g0;
- gp[1] = g1;
- if (ngroups < NGROUPS)
- gp[ngroups] = NOGROUP;
-#ifdef STRUCT_TASK_STRUCT_HAS_PARENT
- current->parent->ngroups = ngroups;
-#else
- current->p_pptr->ngroups = ngroups;
-#endif
- return 0;
+ code = key_instantiate_and_link(keyring, NULL, 0, NULL, NULL);
+ if (code < 0) {
+ key_put(keyring);
+ goto out;
+ }
+
+ /* install the keyring */
+ old = afs_set_session_keyring(keyring);
+ if (old)
+ key_put(old);
+
+out:
+ return code;
}
-#endif
+#endif /* LINUX_KEYRING_SUPPORT */
+/* Error codes from setpag must be positive, otherwise they don't
+ * make it back into userspace properly. Error codes from the
+ * Linux keyring utilities, and from install_session_keyring()
+ * are negative. So we need to be careful to convert them correctly
+ * here
+ */
int
-setpag(cred_t ** cr, afs_uint32 pagvalue, afs_uint32 * newpag,
+setpag(cred_t **cr, afs_uint32 pagvalue, afs_uint32 *newpag,
int change_parent)
{
-#if defined(AFS_LINUX26_ENV)
- struct group_info *group_info;
- gid_t g0, g1;
+ int code;
+ struct group_info *old_groups = NULL;
AFS_STATCNT(setpag);
- group_info = afs_getgroups(*cr);
- if (group_info->ngroups < 2
- || afs_get_pag_from_groups(GROUP_AT(group_info, 0),
- GROUP_AT(group_info, 1)) == NOPAG) {
- /* We will have to make sure group_info is big enough for pag */
- struct group_info *tmp;
- int i;
-
- tmp = groups_alloc(group_info->ngroups + 2);
- for (i = 0; i < group_info->ngroups; ++i)
- GROUP_AT(tmp, i + 2) = GROUP_AT(group_info, i);
- put_group_info(group_info);
- group_info = tmp;
- }
+ code = __setpag(cr, pagvalue, newpag, change_parent, &old_groups);
- *newpag = (pagvalue == -1 ? genpag() : pagvalue);
- afs_get_groups_from_pag(*newpag, &g0, &g1);
- GROUP_AT(group_info, 0) = g0;
- GROUP_AT(group_info, 1) = g1;
+#ifdef LINUX_KEYRING_SUPPORT
+ if (code == 0 && afs_cr_rgid(*cr) != NFSXLATOR_CRED) {
+ code = install_session_keyring(NULL);
+ if (code == 0 && current_session_keyring()) {
+ struct key *key;
+ key_perm_t perm;
- afs_setgroups(cr, group_info, change_parent);
+ perm = KEY_POS_VIEW | KEY_POS_SEARCH;
+ perm |= KEY_USR_VIEW | KEY_USR_SEARCH;
- put_group_info(group_info);
+ key = afs_linux_key_alloc(&key_type_afs_pag, "_pag", GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, perm, KEY_ALLOC_NOT_IN_QUOTA);
- return 0;
-#else
- gid_t *gidset;
- afs_int32 ngroups, code = 0;
- int j;
-
- AFS_STATCNT(setpag);
-
- gidset = (gid_t *) osi_Alloc(NGROUPS * sizeof(gidset[0]));
- ngroups = afs_getgroups(*cr, gidset);
-
- if (afs_get_pag_from_groups(gidset[0], gidset[1]) == NOPAG) {
- /* We will have to shift grouplist to make room for pag */
- if (ngroups + 2 > NGROUPS) {
- osi_Free((char *)gidset, NGROUPS * sizeof(int));
- return EINVAL;
- }
- for (j = ngroups - 1; j >= 0; j--) {
- gidset[j + 2] = gidset[j];
+ if (!IS_ERR(key)) {
+ code = key_instantiate_and_link(key, (void *) newpag, sizeof(afs_uint32),
+ current_session_keyring(), NULL);
+ key_put(key);
+ } else {
+ code = PTR_ERR(key);
+ }
}
- ngroups += 2;
+ if (code)
+ code = -code;
}
- *newpag = (pagvalue == -1 ? genpag() : pagvalue);
- afs_get_groups_from_pag(*newpag, &gidset[0], &gidset[1]);
- code = afs_setgroups(cr, ngroups, gidset, change_parent);
+#endif /* LINUX_KEYRING_SUPPORT */
- /* If change_parent is set, then we should set the pag in the parent as
- * well.
- */
- if (change_parent && !code) {
- code = set_pag_in_parent(*newpag, gidset[0], gidset[1]);
+ if (code) {
+ if (old_groups) {
+ afs_setgroups(cr, old_groups, change_parent);
+ put_group_info(old_groups);
+ old_groups = NULL;
+ }
+ if (*newpag > -1) {
+ afs_MarkUserExpired(*newpag);
+ *newpag = -1;
+ }
}
- osi_Free((char *)gidset, NGROUPS * sizeof(int));
return code;
-#endif
}
/* Intercept the standard system call. */
-extern long (*sys_setgroupsp) (int gidsetsize, gid_t * grouplist);
+extern asmlinkage long (*sys_setgroupsp) (int gidsetsize, gid_t * grouplist);
asmlinkage long
afs_xsetgroups(int gidsetsize, gid_t * grouplist)
{
afs_uint32 junk;
int old_pag;
- lock_kernel();
old_pag = PagInCred(cr);
crfree(cr);
- unlock_kernel();
code = (*sys_setgroupsp) (gidsetsize, grouplist);
if (code) {
return code;
}
- lock_kernel();
cr = crref();
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
/* re-install old pag if there's room. */
- code = setpag(&cr, old_pag, &junk, 0);
+ code = __setpag(&cr, old_pag, &junk, 0, NULL);
}
crfree(cr);
- unlock_kernel();
/* Linux syscall ABI returns errno as negative */
return (-code);
}
-#if defined(AFS_LINUX24_ENV)
/* Intercept the standard uid32 system call. */
-extern long (*sys_setgroups32p) (int gidsetsize, gid_t * grouplist);
+extern asmlinkage int (*sys_setgroups32p) (int gidsetsize,
+ __kernel_gid32_t * grouplist);
asmlinkage long
afs_xsetgroups32(int gidsetsize, gid_t * grouplist)
{
afs_uint32 junk;
int old_pag;
- lock_kernel();
old_pag = PagInCred(cr);
crfree(cr);
- unlock_kernel();
code = (*sys_setgroups32p) (gidsetsize, grouplist);
return code;
}
- lock_kernel();
cr = crref();
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
/* re-install old pag if there's room. */
- code = setpag(&cr, old_pag, &junk, 0);
+ code = __setpag(&cr, old_pag, &junk, 0, NULL);
}
crfree(cr);
- unlock_kernel();
/* Linux syscall ABI returns errno as negative */
return (-code);
}
-#endif
#if defined(AFS_PPC64_LINUX20_ENV)
/* Intercept the uid16 system call as used by 32bit programs. */
-extern long (*sys32_setgroupsp)(int gidsetsize, gid_t *grouplist);
+extern asmlinkage long (*sys32_setgroupsp)(int gidsetsize, gid_t *grouplist);
asmlinkage long afs32_xsetgroups(int gidsetsize, gid_t *grouplist)
{
long code;
afs_uint32 junk;
int old_pag;
- lock_kernel();
old_pag = PagInCred(cr);
crfree(cr);
- unlock_kernel();
code = (*sys32_setgroupsp)(gidsetsize, grouplist);
if (code) {
return code;
}
- lock_kernel();
cr = crref();
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
/* re-install old pag if there's room. */
- code = setpag(&cr, old_pag, &junk, 0);
+ code = __setpag(&cr, old_pag, &junk, 0, NULL);
}
crfree(cr);
- unlock_kernel();
/* Linux syscall ABI returns errno as negative */
return (-code);
#if defined(AFS_SPARC64_LINUX20_ENV) || defined(AFS_AMD64_LINUX20_ENV)
/* Intercept the uid16 system call as used by 32bit programs. */
-extern long (*sys32_setgroupsp) (int gidsetsize, u16 * grouplist);
+#ifdef AFS_AMD64_LINUX20_ENV
+extern asmlinkage long (*sys32_setgroupsp) (int gidsetsize, u16 * grouplist);
+#endif /* AFS_AMD64_LINUX20_ENV */
+#ifdef AFS_SPARC64_LINUX26_ENV
+extern asmlinkage int (*sys32_setgroupsp) (int gidsetsize,
+ __kernel_gid32_t * grouplist);
+#endif /* AFS_SPARC64_LINUX26_ENV */
asmlinkage long
afs32_xsetgroups(int gidsetsize, u16 * grouplist)
{
afs_uint32 junk;
int old_pag;
- lock_kernel();
old_pag = PagInCred(cr);
crfree(cr);
- unlock_kernel();
code = (*sys32_setgroupsp) (gidsetsize, grouplist);
if (code) {
return code;
}
- lock_kernel();
cr = crref();
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
/* re-install old pag if there's room. */
- code = setpag(&cr, old_pag, &junk, 0);
+ code = __setpag(&cr, old_pag, &junk, 0, NULL);
}
crfree(cr);
- unlock_kernel();
/* Linux syscall ABI returns errno as negative */
return (-code);
}
-#ifdef AFS_LINUX24_ENV
/* Intercept the uid32 system call as used by 32bit programs. */
-extern long (*sys32_setgroups32p) (int gidsetsize, gid_t * grouplist);
+#ifdef AFS_AMD64_LINUX20_ENV
+extern asmlinkage long (*sys32_setgroups32p) (int gidsetsize, gid_t * grouplist);
+#endif /* AFS_AMD64_LINUX20_ENV */
+#ifdef AFS_SPARC64_LINUX26_ENV
+extern asmlinkage int (*sys32_setgroups32p) (int gidsetsize,
+ __kernel_gid32_t * grouplist);
+#endif /* AFS_SPARC64_LINUX26_ENV */
asmlinkage long
afs32_xsetgroups32(int gidsetsize, gid_t * grouplist)
{
afs_uint32 junk;
int old_pag;
- lock_kernel();
old_pag = PagInCred(cr);
crfree(cr);
- unlock_kernel();
code = (*sys32_setgroups32p) (gidsetsize, grouplist);
if (code) {
return code;
}
- lock_kernel();
cr = crref();
if (old_pag != NOPAG && PagInCred(cr) == NOPAG) {
/* re-install old pag if there's room. */
- code = setpag(&cr, old_pag, &junk, 0);
+ code = __setpag(&cr, old_pag, &junk, 0, NULL);
}
crfree(cr);
- unlock_kernel();
/* Linux syscall ABI returns errno as negative */
return (-code);
}
#endif
+
+
+#ifdef LINUX_KEYRING_SUPPORT
+static void afs_pag_describe(const struct key *key, struct seq_file *m)
+{
+ seq_puts(m, key->description);
+
+ seq_printf(m, ": %u", key->datalen);
+}
+
+#if defined(STRUCT_KEY_TYPE_HAS_PREPARSE)
+static int afs_pag_instantiate(struct key *key, struct key_preparsed_payload *prep)
+#else
+static int afs_pag_instantiate(struct key *key, const void *data, size_t datalen)
+#endif
+{
+ int code;
+ afs_uint32 *userpag, pag = NOPAG;
+
+ if (!uid_eq(key->uid, GLOBAL_ROOT_UID) || !gid_eq(key->gid, GLOBAL_ROOT_GID))
+ return -EPERM;
+
+ code = -EINVAL;
+ get_group_info(current_group_info());
+
+#if defined(STRUCT_KEY_TYPE_HAS_PREPARSE)
+ if (prep->datalen != sizeof(afs_uint32) || !prep->data)
+#else
+ if (datalen != sizeof(afs_uint32) || !data)
+#endif
+ goto error;
+
+ /* ensure key being set matches current pag */
+ pag = afs_linux_pag_from_groups(current_group_info());
+
+ if (pag == NOPAG)
+ goto error;
+
+#if defined(STRUCT_KEY_TYPE_HAS_PREPARSE)
+ userpag = (afs_uint32 *)prep->data;
+#else
+ userpag = (afs_uint32 *)data;
+#endif
+ if (*userpag != pag)
+ goto error;
+
+ key->payload.value = (unsigned long) *userpag;
+ key->datalen = sizeof(afs_uint32);
+ code = 0;
+
+error:
+ put_group_info(current_group_info());
+ return code;
+}
+
+static int afs_pag_match(const struct key *key, const void *description)
+{
+ return strcmp(key->description, description) == 0;
+}
+
+static void afs_pag_destroy(struct key *key)
+{
+ afs_uint32 pag = key->payload.value;
+ int locked = ISAFS_GLOCK();
+
+ if (!locked)
+ AFS_GLOCK();
+
+ afs_MarkUserExpired(pag);
+
+ if (!locked)
+ AFS_GUNLOCK();
+}
+
+struct key_type key_type_afs_pag =
+{
+ .name = "afs_pag",
+ .describe = afs_pag_describe,
+#if defined(STRUCT_KEY_TYPE_HAS_INSTANTIATE_PREP)
+ .instantiate_prep = afs_pag_instantiate,
+ .instantiate = NULL,
+#else
+ .instantiate = afs_pag_instantiate,
+#endif
+ .match = afs_pag_match,
+ .destroy = afs_pag_destroy,
+};
+
+#ifdef EXPORTED_TASKLIST_LOCK
+extern rwlock_t tasklist_lock __attribute__((weak));
#endif
+void osi_keyring_init(void)
+{
+#if !defined(EXPORTED_KEY_TYPE_KEYRING)
+ struct task_struct *p;
+
+ /* If we can't lock the tasklist, either with its explicit lock,
+ * or by using the RCU lock, then we can't safely work out the
+ * type of a keyring. So, we have to rely on the weak reference.
+ * If that's not available, then keyring based PAGs won't work.
+ */
+
+#if defined(EXPORTED_TASKLIST_LOCK) || (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
+ if (__key_type_keyring == NULL) {
+# ifdef EXPORTED_TASKLIST_LOCK
+ if (&tasklist_lock)
+ read_lock(&tasklist_lock);
+# endif
+# if (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
+# ifdef EXPORTED_TASKLIST_LOCK
+ else
+# endif
+ rcu_read_lock();
+# endif
+#if defined(HAVE_LINUX_FIND_TASK_BY_PID)
+ p = find_task_by_pid(1);
+#else
+ p = find_task_by_vpid(1);
+#endif
+ if (p && task_user(p)->session_keyring)
+ __key_type_keyring = task_user(p)->session_keyring->type;
+# ifdef EXPORTED_TASKLIST_LOCK
+ if (&tasklist_lock)
+ read_unlock(&tasklist_lock);
+# endif
+# if (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16) && defined(HAVE_LINUX_RCU_READ_LOCK))
+# ifdef EXPORTED_TASKLIST_LOCK
+ else
+# endif
+ rcu_read_unlock();
+# endif
+ }
+#endif
+#endif
+
+ register_key_type(&key_type_afs_pag);
+}
+
+void osi_keyring_shutdown(void)
+{
+ unregister_key_type(&key_type_afs_pag);
+}
+
+afs_int32
+osi_get_keyring_pag(afs_ucred_t *cred)
+{
+ struct key *key;
+ afs_uint32 newpag;
+ afs_int32 keyring_pag = NOPAG;
+
+ if (afs_cr_rgid(cred) != NFSXLATOR_CRED) {
+ key = afs_linux_search_keyring(cred, &key_type_afs_pag);
+
+ if (!IS_ERR(key)) {
+ if (key_validate(key) == 0 && uid_eq(key->uid, GLOBAL_ROOT_UID)) { /* also verify in the session keyring? */
+ keyring_pag = key->payload.value;
+ /* Only set PAG in groups if needed,
+ * and the creds are from the current process */
+ if (afs_linux_cred_is_current(cred) &&
+ ((keyring_pag >> 24) & 0xff) == 'A' &&
+ keyring_pag != afs_linux_pag_from_groups(current_group_info())) {
+ __setpag(&cred, keyring_pag, &newpag, 0, NULL);
+ }
+ }
+ key_put(key);
+ }
+ }
+ return keyring_pag;
+}
+
+#else
+void osi_keyring_init(void)
+{
+ return;
+}
+
+void osi_keyring_shutdown(void)
+{
+ return;
+}
+#endif