diff options
author | David Howells <dhowells@redhat.com> | 2008-11-14 10:39:11 +1100 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-11-14 10:39:11 +1100 |
commit | 47d804bfa1857b0edcac972c86499dcd14df3cf2 (patch) | |
tree | 200b2d1190e29be40c771bf6a4e0db0ef9e7d383 /security/keys/key.c | |
parent | 8192b0c482d7078fcdcb4854341b977426f6f09b (diff) | |
download | lwn-47d804bfa1857b0edcac972c86499dcd14df3cf2.tar.gz lwn-47d804bfa1857b0edcac972c86499dcd14df3cf2.zip |
CRED: Wrap task credential accesses in the key management code
Wrap access to task credentials so that they can be separated more easily from
the task_struct during the introduction of COW creds.
Change most current->(|e|s|fs)[ug]id to current_(|e|s|fs)[ug]id().
Change some task->e?[ug]id to task_e?[ug]id(). In some places it makes more
sense to use RCU directly rather than a convenient wrapper; these will be
addressed by later patches.
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: James Morris <jmorris@namei.org>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/keys/key.c')
-rw-r--r-- | security/keys/key.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/keys/key.c b/security/keys/key.c index 14948cf83ef6..a6ca39ed3b0e 100644 --- a/security/keys/key.c +++ b/security/keys/key.c @@ -802,7 +802,7 @@ key_ref_t key_create_or_update(key_ref_t keyring_ref, } /* allocate a new key */ - key = key_alloc(ktype, description, current->fsuid, current->fsgid, + key = key_alloc(ktype, description, current_fsuid(), current_fsgid(), current, perm, flags); if (IS_ERR(key)) { key_ref = ERR_CAST(key); |