diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2012-02-07 19:24:33 -0500 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2012-09-21 06:13:09 -0400 |
commit | cdf8c58a3546443073cab77d07a88ee439319c19 (patch) | |
tree | a5490a4cbfcd9241d14795feb74f7b8dee29d0d1 /fs/ecryptfs | |
parent | a7d9cfe97b450b27c82e6e41b2fde6214708560d (diff) |
userns: Convert ecryptfs to use kuid/kgid where appropriate
Cc: Tyler Hicks <tyhicks@canonical.com>
Cc: Dustin Kirkland <dustin.kirkland@gazzang.com>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Diffstat (limited to 'fs/ecryptfs')
-rw-r--r-- | fs/ecryptfs/main.c | 5 | ||||
-rw-r--r-- | fs/ecryptfs/messaging.c | 5 |
2 files changed, 5 insertions, 5 deletions
diff --git a/fs/ecryptfs/main.c b/fs/ecryptfs/main.c index 2768138eefee..1d6ce91b7061 100644 --- a/fs/ecryptfs/main.c +++ b/fs/ecryptfs/main.c | |||
@@ -544,11 +544,12 @@ static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags | |||
544 | goto out_free; | 544 | goto out_free; |
545 | } | 545 | } |
546 | 546 | ||
547 | if (check_ruid && path.dentry->d_inode->i_uid != current_uid()) { | 547 | if (check_ruid && !uid_eq(path.dentry->d_inode->i_uid, current_uid())) { |
548 | rc = -EPERM; | 548 | rc = -EPERM; |
549 | printk(KERN_ERR "Mount of device (uid: %d) not owned by " | 549 | printk(KERN_ERR "Mount of device (uid: %d) not owned by " |
550 | "requested user (uid: %d)\n", | 550 | "requested user (uid: %d)\n", |
551 | path.dentry->d_inode->i_uid, current_uid()); | 551 | i_uid_read(path.dentry->d_inode), |
552 | from_kuid(&init_user_ns, current_uid())); | ||
552 | goto out_free; | 553 | goto out_free; |
553 | } | 554 | } |
554 | 555 | ||
diff --git a/fs/ecryptfs/messaging.c b/fs/ecryptfs/messaging.c index b29bb8bfa8d9..5fa2471796c2 100644 --- a/fs/ecryptfs/messaging.c +++ b/fs/ecryptfs/messaging.c | |||
@@ -33,7 +33,7 @@ static struct hlist_head *ecryptfs_daemon_hash; | |||
33 | struct mutex ecryptfs_daemon_hash_mux; | 33 | struct mutex ecryptfs_daemon_hash_mux; |
34 | static int ecryptfs_hash_bits; | 34 | static int ecryptfs_hash_bits; |
35 | #define ecryptfs_current_euid_hash(uid) \ | 35 | #define ecryptfs_current_euid_hash(uid) \ |
36 | hash_long((unsigned long)current_euid(), ecryptfs_hash_bits) | 36 | hash_long((unsigned long)from_kuid(&init_user_ns, current_euid()), ecryptfs_hash_bits) |
37 | 37 | ||
38 | static u32 ecryptfs_msg_counter; | 38 | static u32 ecryptfs_msg_counter; |
39 | static struct ecryptfs_msg_ctx *ecryptfs_msg_ctx_arr; | 39 | static struct ecryptfs_msg_ctx *ecryptfs_msg_ctx_arr; |
@@ -121,8 +121,7 @@ int ecryptfs_find_daemon_by_euid(struct ecryptfs_daemon **daemon) | |||
121 | hlist_for_each_entry(*daemon, elem, | 121 | hlist_for_each_entry(*daemon, elem, |
122 | &ecryptfs_daemon_hash[ecryptfs_current_euid_hash()], | 122 | &ecryptfs_daemon_hash[ecryptfs_current_euid_hash()], |
123 | euid_chain) { | 123 | euid_chain) { |
124 | if ((*daemon)->file->f_cred->euid == current_euid() && | 124 | if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { |
125 | (*daemon)->file->f_cred->user_ns == current_user_ns()) { | ||
126 | rc = 0; | 125 | rc = 0; |
127 | goto out; | 126 | goto out; |
128 | } | 127 | } |