Skip to content

Commit

Permalink
---
Browse files Browse the repository at this point in the history
yaml
---
r: 306021
b: refs/heads/master
c: b38a86e
h: refs/heads/master
i:
  306019: 6ee3650
v: v3
  • Loading branch information
Eric W. Biederman committed May 15, 2012
1 parent 3d0388a commit 7bd810e
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 7 deletions.
2 changes: 1 addition & 1 deletion [refs]
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
---
refs/heads/master: 14a590c3f987977d7b09ec926481ee0238c08eee
refs/heads/master: b38a86eb196d9402299919456fe3f28e490c76fa
2 changes: 0 additions & 2 deletions trunk/init/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -865,8 +865,6 @@ config UIDGID_CONVERTED

# List of kernel pieces that need user namespace work
# Features
depends on MIGRATION = n
depends on NUMA = n
depends on SYSVIPC = n
depends on IMA = n
depends on EVM = n
Expand Down
4 changes: 2 additions & 2 deletions trunk/mm/mempolicy.c
Original file line number Diff line number Diff line change
Expand Up @@ -1334,8 +1334,8 @@ SYSCALL_DEFINE4(migrate_pages, pid_t, pid, unsigned long, maxnode,
* userid as the target process.
*/
tcred = __task_cred(task);
if (cred->euid != tcred->suid && cred->euid != tcred->uid &&
cred->uid != tcred->suid && cred->uid != tcred->uid &&
if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) &&
!uid_eq(cred->uid, tcred->suid) && !uid_eq(cred->uid, tcred->uid) &&
!capable(CAP_SYS_NICE)) {
rcu_read_unlock();
err = -EPERM;
Expand Down
4 changes: 2 additions & 2 deletions trunk/mm/migrate.c
Original file line number Diff line number Diff line change
Expand Up @@ -1371,8 +1371,8 @@ SYSCALL_DEFINE6(move_pages, pid_t, pid, unsigned long, nr_pages,
* userid as the target process.
*/
tcred = __task_cred(task);
if (cred->euid != tcred->suid && cred->euid != tcred->uid &&
cred->uid != tcred->suid && cred->uid != tcred->uid &&
if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) &&
!uid_eq(cred->uid, tcred->suid) && !uid_eq(cred->uid, tcred->uid) &&
!capable(CAP_SYS_NICE)) {
rcu_read_unlock();
err = -EPERM;
Expand Down

0 comments on commit 7bd810e

Please sign in to comment.