* XXX: move entire copyup code to SIOQ.
*/
if (err == -EPERM && !capable(CAP_FOWNER)) {
- cap_raise(current->cap_effective, CAP_FOWNER);
+ const struct cred *old_creds;
+ struct cred *new_creds;
+
+ new_creds = prepare_creds();
+ if (unlikely(!new_creds)) {
+ err = -ENOMEM;
+ goto out;
+ }
+ cap_raise(new_creds->cap_effective, CAP_FOWNER);
+ old_creds = override_creds(new_creds);
err = vfs_setxattr(new_lower_dentry, name_list,
attr_value, size, 0);
- cap_lower(current->cap_effective, CAP_FOWNER);
+ revert_creds(old_creds);
}
if (err < 0)
goto out;
struct dentry *lower_dentry, *diropq;
struct inode *lower_dir;
struct nameidata nd;
- kernel_cap_t orig_cap;
+ const struct cred *old_creds;
+ struct cred *new_creds;
/*
* Opaque directory whiteout markers are special files (like regular
* creation of the .wh.__dir_opaque: file. Note, this does not
* circumvent normal ->permission).
*/
- orig_cap = current->cap_effective;
- cap_raise(current->cap_effective, CAP_DAC_READ_SEARCH);
- cap_raise(current->cap_effective, CAP_DAC_OVERRIDE);
+ new_creds = prepare_creds();
+ if (unlikely(!new_creds)) {
+ err = -ENOMEM;
+ goto out_err;
+ }
+ cap_raise(new_creds->cap_effective, CAP_DAC_READ_SEARCH);
+ cap_raise(new_creds->cap_effective, CAP_DAC_OVERRIDE);
+ old_creds = override_creds(new_creds);
lower_dentry = unionfs_lower_dentry_idx(dentry, bindex);
lower_dir = lower_dentry->d_inode;
out:
mutex_unlock(&lower_dir->i_mutex);
- current->cap_effective = orig_cap;
+ revert_creds(old_creds);
+out_err:
return err;
}