aboutsummaryrefslogtreecommitdiffstats
path: root/net/netlink
diff options
context:
space:
mode:
authorNicolas Dichtel <nicolas.dichtel@6wind.com>2013-04-24 04:36:23 -0400
committerDavid S. Miller <davem@davemloft.net>2013-04-24 14:26:55 -0400
commit1bf9310a1336c26873dc3eb5fa188d4263897929 (patch)
tree3e9e3815e8a7becbe26ce0cd9e46440d2ddceef7 /net/netlink
parent3dec2246c2ff11beb24ca1950f074b2bcbc85953 (diff)
netlink: fix compilation after memory mapped patches
Depending of the kernel configuration (CONFIG_UIDGID_STRICT_TYPE_CHECKS), we can get the following errors: net/netlink/af_netlink.c: In function ‘netlink_queue_mmaped_skb’: net/netlink/af_netlink.c:663:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kuid_t’ net/netlink/af_netlink.c:664:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kgid_t’ net/netlink/af_netlink.c: In function ‘netlink_ring_set_copied’: net/netlink/af_netlink.c:693:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kuid_t’ net/netlink/af_netlink.c:694:14: error: incompatible types when assigning to type ‘__u32’ from type ‘kgid_t’ We must use the helpers to get the uid and gid, and also take care of user_ns. Fix suggested by Eric W. Biederman <ebiederm@xmission.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/netlink')
-rw-r--r--net/netlink/af_netlink.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index da5601d13a7f..d9c7869312c1 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -660,8 +660,8 @@ static void netlink_queue_mmaped_skb(struct sock *sk, struct sk_buff *skb)
660 hdr->nm_len = skb->len; 660 hdr->nm_len = skb->len;
661 hdr->nm_group = NETLINK_CB(skb).dst_group; 661 hdr->nm_group = NETLINK_CB(skb).dst_group;
662 hdr->nm_pid = NETLINK_CB(skb).creds.pid; 662 hdr->nm_pid = NETLINK_CB(skb).creds.pid;
663 hdr->nm_uid = NETLINK_CB(skb).creds.uid; 663 hdr->nm_uid = from_kuid(sk_user_ns(sk), NETLINK_CB(skb).creds.uid);
664 hdr->nm_gid = NETLINK_CB(skb).creds.gid; 664 hdr->nm_gid = from_kgid(sk_user_ns(sk), NETLINK_CB(skb).creds.gid);
665 netlink_frame_flush_dcache(hdr); 665 netlink_frame_flush_dcache(hdr);
666 netlink_set_status(hdr, NL_MMAP_STATUS_VALID); 666 netlink_set_status(hdr, NL_MMAP_STATUS_VALID);
667 667
@@ -690,8 +690,8 @@ static void netlink_ring_set_copied(struct sock *sk, struct sk_buff *skb)
690 hdr->nm_len = skb->len; 690 hdr->nm_len = skb->len;
691 hdr->nm_group = NETLINK_CB(skb).dst_group; 691 hdr->nm_group = NETLINK_CB(skb).dst_group;
692 hdr->nm_pid = NETLINK_CB(skb).creds.pid; 692 hdr->nm_pid = NETLINK_CB(skb).creds.pid;
693 hdr->nm_uid = NETLINK_CB(skb).creds.uid; 693 hdr->nm_uid = from_kuid(sk_user_ns(sk), NETLINK_CB(skb).creds.uid);
694 hdr->nm_gid = NETLINK_CB(skb).creds.gid; 694 hdr->nm_gid = from_kgid(sk_user_ns(sk), NETLINK_CB(skb).creds.gid);
695 netlink_set_status(hdr, NL_MMAP_STATUS_COPY); 695 netlink_set_status(hdr, NL_MMAP_STATUS_COPY);
696} 696}
697 697