diff options
author | 2024-11-25 15:10:14 +0100 | |
---|---|---|
committer | 2024-12-02 11:25:12 +0100 | |
commit | facc239a8c4980e17c832a7d5ee3809a2e2a45bd (patch) | |
tree | 6c17eea0685ddf4f75cc369f34c00c2c361b4d47 | |
parent | open: avoid pointless cred reference count bump (diff) | |
download | wireguard-linux-facc239a8c4980e17c832a7d5ee3809a2e2a45bd.tar.xz wireguard-linux-facc239a8c4980e17c832a7d5ee3809a2e2a45bd.zip |
ovl: avoid pointless cred reference count bump
security_inode_copy_up() allocates a set of new credentials and has
taken a reference count.
Link: https://lore.kernel.org/r/20241125-work-cred-v2-18-68b9d38bb5b2@kernel.org
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Jens Axboe <axboe@kernel.dk>
Signed-off-by: Christian Brauner <brauner@kernel.org>
-rw-r--r-- | fs/overlayfs/copy_up.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c index 439bd9a5ceec..3601ddfeddc2 100644 --- a/fs/overlayfs/copy_up.c +++ b/fs/overlayfs/copy_up.c @@ -741,7 +741,7 @@ static int ovl_prep_cu_creds(struct dentry *dentry, struct ovl_cu_creds *cc) return err; if (cc->new) - cc->old = override_creds(get_new_cred(cc->new)); + cc->old = override_creds(cc->new); return 0; } @@ -749,7 +749,7 @@ static int ovl_prep_cu_creds(struct dentry *dentry, struct ovl_cu_creds *cc) static void ovl_revert_cu_creds(struct ovl_cu_creds *cc) { if (cc->new) { - put_cred(revert_creds(cc->old)); + revert_creds(cc->old); put_cred(cc->new); } } |