[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20251103-work-creds-guards-prepare_creds-v1-2-b447b82f2c9b@kernel.org>
Date: Mon, 03 Nov 2025 15:57:28 +0100
From: Christian Brauner <brauner@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-aio@...ck.org, linux-unionfs@...r.kernel.org,
linux-erofs@...ts.ozlabs.org, linux-nfs@...r.kernel.org,
linux-cifs@...r.kernel.org, samba-technical@...ts.samba.org,
cgroups@...r.kernel.org, netdev@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-trace-kernel@...r.kernel.org,
Christian Brauner <brauner@...nel.org>
Subject: [PATCH 02/12] sev-dev: use guard for path
Just use a guard and also move the path_put() out of the credential
change's scope. There's no need to do this with the overridden
credentials.
Signed-off-by: Christian Brauner <brauner@...nel.org>
---
drivers/crypto/ccp/sev-dev.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/crypto/ccp/sev-dev.c b/drivers/crypto/ccp/sev-dev.c
index 0d13d47c164b..c5e22af04abb 100644
--- a/drivers/crypto/ccp/sev-dev.c
+++ b/drivers/crypto/ccp/sev-dev.c
@@ -259,8 +259,8 @@ static int sev_cmd_buffer_len(int cmd)
static struct file *open_file_as_root(const char *filename, int flags, umode_t mode)
{
+ struct path root __free(path_put) = {};
struct file *fp;
- struct path root;
struct cred *cred;
const struct cred *old_cred;
@@ -275,7 +275,6 @@ static struct file *open_file_as_root(const char *filename, int flags, umode_t m
old_cred = override_creds(cred);
fp = file_open_root(&root, filename, flags, mode);
- path_put(&root);
put_cred(revert_creds(old_cred));
--
2.47.3
Powered by blists - more mailing lists