Commit b889edc7 authored by Andrew Morton's avatar Andrew Morton Committed by Linus Torvalds

[PATCH] kNFSdv4: Set credentials properly when puutrootfh is used

From: NeilBrown <neilb@cse.unsw.edu.au>

The credentials (uid/gid) of a process are set when a filehandle is
verified.  Nfsv4 allows requests without an explicit filehandle (instead,
an implicit 'root' filehandle) so we much make sure the credentials are set
for these requests too.

From: "J. Bruce Fields" <bfields@fieldses.org>

From: Andros: added a call to nfsd_setuser in nfsd4_putrootfh so that nfsd
runs as the rpc->cred user.
parent 9e13fc5b
...@@ -194,9 +194,14 @@ nfsd4_putfh(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_putf ...@@ -194,9 +194,14 @@ nfsd4_putfh(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_putf
static inline int static inline int
nfsd4_putrootfh(struct svc_rqst *rqstp, struct svc_fh *current_fh) nfsd4_putrootfh(struct svc_rqst *rqstp, struct svc_fh *current_fh)
{ {
int status;
fh_put(current_fh); fh_put(current_fh);
return exp_pseudoroot(rqstp->rq_client, current_fh, status = exp_pseudoroot(rqstp->rq_client, current_fh,
&rqstp->rq_chandle); &rqstp->rq_chandle);
if (!status)
status = nfsd_setuser(rqstp, current_fh->fh_export);
return status;
} }
static inline int static inline int
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment