CRED: Wrap task credential accesses in the SMBFS filesystem
authorDavid Howells <dhowells@redhat.com>
Thu, 13 Nov 2008 23:39:01 +0000 (10:39 +1100)
committerJames Morris <jmorris@namei.org>
Thu, 13 Nov 2008 23:39:01 +0000 (10:39 +1100)
Wrap access to task credentials so that they can be separated more easily from
the task_struct during the introduction of COW creds.

Change most current->(|e|s|fs)[ug]id to current_(|e|s|fs)[ug]id().

Change some task->e?[ug]id to task_e?[ug]id().  In some places it makes more
sense to use RCU directly rather than a convenient wrapper; these will be
addressed by later patches.

Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: James Morris <jmorris@namei.org>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Cc: Steven French <sfrench@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
fs/smbfs/dir.c
fs/smbfs/inode.c
fs/smbfs/proc.c

index 48da4fa6b7d4847f67a54627a2d59f053857dcf3..9e9bb0db4f6db9cf9a9dafed3511df9434e7aca0 100644 (file)
@@ -667,8 +667,8 @@ smb_make_node(struct inode *dir, struct dentry *dentry, int mode, dev_t dev)
 
        attr.ia_valid = ATTR_MODE | ATTR_UID | ATTR_GID;
        attr.ia_mode = mode;
-       attr.ia_uid = current->euid;
-       attr.ia_gid = current->egid;
+       attr.ia_uid = current_euid();
+       attr.ia_gid = current_egid();
 
        if (!new_valid_dev(dev))
                return -EINVAL;
index 3528f40ffb0f0c137dfcd32b6e69a928dee5e400..fc27fbfc5397cb4777ce833a229e5cc9f9c13c5d 100644 (file)
@@ -586,7 +586,7 @@ static int smb_fill_super(struct super_block *sb, void *raw_data, int silent)
                if (parse_options(mnt, raw_data))
                        goto out_bad_option;
        }
-       mnt->mounted_uid = current->uid;
+       mnt->mounted_uid = current_uid();
        smb_setcodepage(server, &mnt->codepage);
 
        /*
index ee536e8a649a28710fe89417265fc5bce0a1119d..9468168b9af5e6f22bdbcfb178d91d98d15a75d0 100644 (file)
@@ -864,7 +864,7 @@ smb_newconn(struct smb_sb_info *server, struct smb_conn_opt *opt)
                goto out;
 
        error = -EACCES;
-       if (current->uid != server->mnt->mounted_uid && 
+       if (current_uid() != server->mnt->mounted_uid &&
            !capable(CAP_SYS_ADMIN))
                goto out;