diff options
author | Nicolas Dichtel <nicolas.dichtel@6wind.com> | 2013-04-24 04:36:23 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-04-24 14:26:55 -0400 |
commit | 1bf9310a1336c26873dc3eb5fa188d4263897929 (patch) | |
tree | 3e9e3815e8a7becbe26ce0cd9e46440d2ddceef7 /net/netlink | |
parent | 3dec2246c2ff11beb24ca1950f074b2bcbc85953 (diff) |
netlink: fix compilation after memory mapped patches
Depending of the kernel configuration (CONFIG_UIDGID_STRICT_TYPE_CHECKS), we can
get the following errors:
net/netlink/af_netlink.c: In function ‘netlink_queue_mmaped_skb’:
net/netlink/af_netlink.c:663:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kuid_t’
net/netlink/af_netlink.c:664:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kgid_t’
net/netlink/af_netlink.c: In function ‘netlink_ring_set_copied’:
net/netlink/af_netlink.c:693:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kuid_t’
net/netlink/af_netlink.c:694:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kgid_t’
We must use the helpers to get the uid and gid, and also take care of user_ns.
Fix suggested by Eric W. Biederman <ebiederm@xmission.com>.
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/netlink')
-rw-r--r-- | net/netlink/af_netlink.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c index da5601d13a7f..d9c7869312c1 100644 --- a/net/netlink/af_netlink.c +++ b/net/netlink/af_netlink.c | |||
@@ -660,8 +660,8 @@ static void netlink_queue_mmaped_skb(struct sock *sk, struct sk_buff *skb) | |||
660 | hdr->nm_len = skb->len; | 660 | hdr->nm_len = skb->len; |
661 | hdr->nm_group = NETLINK_CB(skb).dst_group; | 661 | hdr->nm_group = NETLINK_CB(skb).dst_group; |
662 | hdr->nm_pid = NETLINK_CB(skb).creds.pid; | 662 | hdr->nm_pid = NETLINK_CB(skb).creds.pid; |
663 | hdr->nm_uid = NETLINK_CB(skb).creds.uid; | 663 | hdr->nm_uid = from_kuid(sk_user_ns(sk), NETLINK_CB(skb).creds.uid); |
664 | hdr->nm_gid = NETLINK_CB(skb).creds.gid; | 664 | hdr->nm_gid = from_kgid(sk_user_ns(sk), NETLINK_CB(skb).creds.gid); |
665 | netlink_frame_flush_dcache(hdr); | 665 | netlink_frame_flush_dcache(hdr); |
666 | netlink_set_status(hdr, NL_MMAP_STATUS_VALID); | 666 | netlink_set_status(hdr, NL_MMAP_STATUS_VALID); |
667 | 667 | ||
@@ -690,8 +690,8 @@ static void netlink_ring_set_copied(struct sock *sk, struct sk_buff *skb) | |||
690 | hdr->nm_len = skb->len; | 690 | hdr->nm_len = skb->len; |
691 | hdr->nm_group = NETLINK_CB(skb).dst_group; | 691 | hdr->nm_group = NETLINK_CB(skb).dst_group; |
692 | hdr->nm_pid = NETLINK_CB(skb).creds.pid; | 692 | hdr->nm_pid = NETLINK_CB(skb).creds.pid; |
693 | hdr->nm_uid = NETLINK_CB(skb).creds.uid; | 693 | hdr->nm_uid = from_kuid(sk_user_ns(sk), NETLINK_CB(skb).creds.uid); |
694 | hdr->nm_gid = NETLINK_CB(skb).creds.gid; | 694 | hdr->nm_gid = from_kgid(sk_user_ns(sk), NETLINK_CB(skb).creds.gid); |
695 | netlink_set_status(hdr, NL_MMAP_STATUS_COPY); | 695 | netlink_set_status(hdr, NL_MMAP_STATUS_COPY); |
696 | } | 696 | } |
697 | 697 | ||