STABLE14101-linux26-defer-cred-changing-20090511

LICENSE IPL10
FIXES 124737

Newer Linux kernels differentiate between the real and effective
credentials of a process, and prevent a process's credentials from being
change when the effective credentials have been set to a different value.
When AFS notices a keyring PAG exists but no group-based PAG does, the
attempt to rectify this, if done in a VFS call (which changes effective creds)
triggers this issue. We defer the change to the groups to avoid it.


(cherry picked from commit 7d530b9080)
This commit is contained in:
Simon Wilkinson 2009-05-11 16:14:39 +00:00 committed by Derrick Brashear
parent c88e2778d3
commit a6403c0134

View File

@ -104,6 +104,12 @@ crset(cred_t * cr)
#if defined(STRUCT_TASK_HAS_CRED)
struct cred *new_creds;
/* If our current task doesn't have identical real and effective
* credentials, commit_cred won't let us change them, so we just
* bail here.
*/
if (current->cred != current->real_cred)
return;
new_creds = prepare_creds();
new_creds->fsuid = cr->cr_uid;
new_creds->uid = cr->cr_ruid;