diff options
| author | Christian Brauner <brauner@kernel.org> | 2025-11-03 15:57:29 +0100 |
|---|---|---|
| committer | Christian Brauner <brauner@kernel.org> | 2025-11-04 12:37:01 +0100 |
| commit | 89c545e29ecd6252968611b3ee2599034b911dd8 (patch) | |
| tree | 2bad820fc34a4238da5cd32dc60c642c3a81d6ac | |
| parent | 4c5941ca1104d58a94e59100ebde97a162e72de4 (diff) | |
sev-dev: use prepare credential guard
Use the prepare credential guard for allocating a new set of
credentials.
Link: https://patch.msgid.link/20251103-work-creds-guards-prepare_creds-v1-3-b447b82f2c9b@kernel.org
Signed-off-by: Christian Brauner <brauner@kernel.org>
| -rw-r--r-- | drivers/crypto/ccp/sev-dev.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/drivers/crypto/ccp/sev-dev.c b/drivers/crypto/ccp/sev-dev.c index c5e22af04abb..be3e5454c285 100644 --- a/drivers/crypto/ccp/sev-dev.c +++ b/drivers/crypto/ccp/sev-dev.c @@ -261,22 +261,22 @@ static struct file *open_file_as_root(const char *filename, int flags, umode_t m { struct path root __free(path_put) = {}; struct file *fp; - struct cred *cred; const struct cred *old_cred; task_lock(&init_task); get_fs_root(init_task.fs, &root); task_unlock(&init_task); - cred = prepare_creds(); + CLASS(prepare_creds, cred)(); if (!cred) return ERR_PTR(-ENOMEM); + cred->fsuid = GLOBAL_ROOT_UID; old_cred = override_creds(cred); fp = file_open_root(&root, filename, flags, mode); - put_cred(revert_creds(old_cred)); + revert_creds(old_cred); return fp; } |