diff options
author | David Howells <dhowells@redhat.com> | 2008-11-14 10:39:10 +1100 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-11-14 10:39:10 +1100 |
commit | 8192b0c482d7078fcdcb4854341b977426f6f09b (patch) | |
tree | 6ab545ac9adff7fdc994c7b120b1c9d0915dd62e /net/core/scm.c | |
parent | 19d65624d38d6296dddf725d1b03baa8a491a553 (diff) | |
download | kernel_goldelico_gta04-8192b0c482d7078fcdcb4854341b977426f6f09b.zip kernel_goldelico_gta04-8192b0c482d7078fcdcb4854341b977426f6f09b.tar.gz kernel_goldelico_gta04-8192b0c482d7078fcdcb4854341b977426f6f09b.tar.bz2 |
CRED: Wrap task credential accesses in the networking subsystem
Wrap access to task credentials so that they can be separated more easily from
the task_struct during the introduction of COW creds.
Change most current->(|e|s|fs)[ug]id to current_(|e|s|fs)[ug]id().
Change some task->e?[ug]id to task_e?[ug]id(). In some places it makes more
sense to use RCU directly rather than a convenient wrapper; these will be
addressed by later patches.
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: James Morris <jmorris@namei.org>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Cc: netdev@vger.kernel.org
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'net/core/scm.c')
-rw-r--r-- | net/core/scm.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/net/core/scm.c b/net/core/scm.c index 10f5c65..4681d8f 100644 --- a/net/core/scm.c +++ b/net/core/scm.c @@ -45,10 +45,10 @@ static __inline__ int scm_check_creds(struct ucred *creds) { if ((creds->pid == task_tgid_vnr(current) || capable(CAP_SYS_ADMIN)) && - ((creds->uid == current->uid || creds->uid == current->euid || - creds->uid == current->suid) || capable(CAP_SETUID)) && - ((creds->gid == current->gid || creds->gid == current->egid || - creds->gid == current->sgid) || capable(CAP_SETGID))) { + ((creds->uid == current_uid() || creds->uid == current_euid() || + creds->uid == current_suid()) || capable(CAP_SETUID)) && + ((creds->gid == current_gid() || creds->gid == current_egid() || + creds->gid == current_sgid()) || capable(CAP_SETGID))) { return 0; } return -EPERM; |