diff options
author | David Howells <dhowells@redhat.com> | 2008-11-14 10:39:05 +1100 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-11-14 10:39:05 +1100 |
commit | da9592edebceeba1b9301beafe80ec8b9c2db0ce (patch) | |
tree | 00c110cd8ff6d211d76ab4868b6175096a38aad5 /fs/namespace.c | |
parent | 82ab8deda7fef36f067ccdeacc3b3caefc970f89 (diff) | |
download | linux-stable-da9592edebceeba1b9301beafe80ec8b9c2db0ce.tar.gz linux-stable-da9592edebceeba1b9301beafe80ec8b9c2db0ce.tar.bz2 linux-stable-da9592edebceeba1b9301beafe80ec8b9c2db0ce.zip |
CRED: Wrap task credential accesses in the filesystem subsystem
Wrap access to task credentials so that they can be separated more easily from
the task_struct during the introduction of COW creds.
Change most current->(|e|s|fs)[ug]id to current_(|e|s|fs)[ug]id().
Change some task->e?[ug]id to task_e?[ug]id(). In some places it makes more
sense to use RCU directly rather than a convenient wrapper; these will be
addressed by later patches.
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: James Morris <jmorris@namei.org>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'fs/namespace.c')
-rw-r--r-- | fs/namespace.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/namespace.c b/fs/namespace.c index cce46702d33c..d8bc2c4704a5 100644 --- a/fs/namespace.c +++ b/fs/namespace.c @@ -1176,7 +1176,7 @@ static int mount_is_safe(struct path *path) if (S_ISLNK(path->dentry->d_inode->i_mode)) return -EPERM; if (path->dentry->d_inode->i_mode & S_ISVTX) { - if (current->uid != path->dentry->d_inode->i_uid) + if (current_uid() != path->dentry->d_inode->i_uid) return -EPERM; } if (inode_permission(path->dentry->d_inode, MAY_WRITE)) |