CRED: Separate task security context from task_struct
Separate the task security context from task_struct. At this point, the security data is temporarily embedded in the task_struct with two pointers pointing to it. Note that the Alpha arch is altered as it refers to (E)UID and (E)GID in entry.S via asm-offsets. With comment fixes Signed-off-by: Marc Dionne <marc.c.dionne@gmail.com> Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: James Morris <jmorris@namei.org> Acked-by: Serge Hallyn <serue@us.ibm.com> Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
committed by
James Morris
parent
15a2460ed0
commit
b6dff3ec5e
@@ -164,7 +164,7 @@ int smk_curacc(char *obj_label, u32 mode)
|
||||
{
|
||||
int rc;
|
||||
|
||||
rc = smk_access(current->security, obj_label, mode);
|
||||
rc = smk_access(current->cred->security, obj_label, mode);
|
||||
if (rc == 0)
|
||||
return 0;
|
||||
|
||||
@@ -173,7 +173,7 @@ int smk_curacc(char *obj_label, u32 mode)
|
||||
* only one that gets privilege and current does not
|
||||
* have that label.
|
||||
*/
|
||||
if (smack_onlycap != NULL && smack_onlycap != current->security)
|
||||
if (smack_onlycap != NULL && smack_onlycap != current->cred->security)
|
||||
return rc;
|
||||
|
||||
if (capable(CAP_MAC_OVERRIDE))
|
||||
|
Reference in New Issue
Block a user