patch-2.4.23 linux-2.4.23/kernel/sys.c
Next file: linux-2.4.23/kernel/sysctl.c
Previous file: linux-2.4.23/kernel/sched.c
Back to the patch index
Back to the overall index
- Lines: 31
- Date:
2003-11-28 10:26:21.000000000 -0800
- Orig file:
linux-2.4.22/kernel/sys.c
- Orig date:
2003-08-25 04:44:44.000000000 -0700
diff -urN linux-2.4.22/kernel/sys.c linux-2.4.23/kernel/sys.c
@@ -511,19 +511,12 @@
static int set_user(uid_t new_ruid, int dumpclear)
{
- struct user_struct *new_user, *old_user;
+ struct user_struct *new_user;
- /* What if a process setreuid()'s and this brings the
- * new uid over his NPROC rlimit? We can check this now
- * cheaply with the new uid cache, so if it matters
- * we should be checking for it. -DaveM
- */
new_user = alloc_uid(new_ruid);
if (!new_user)
return -EAGAIN;
- old_user = current->user;
- atomic_dec(&old_user->processes);
- atomic_inc(&new_user->processes);
+ switch_uid(new_user);
if(dumpclear)
{
@@ -531,8 +524,6 @@
wmb();
}
current->uid = new_ruid;
- current->user = new_user;
- free_uid(old_user);
return 0;
}
FUNET's LINUX-ADM group, linux-adm@nic.funet.fi
TCL-scripts by Sam Shen (who was at: slshen@lbl.gov)