Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

CacheFiles: Fix the documentation to use the correct credential pointer names

Adjust the CacheFiles documentation to use the correct names of the credential
pointers in task_struct.

The documentation was using names from the old versions of the credentials
patches.

Signed-off-by: Marc Dionne <marc.c.dionne@gmail.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>

authored by

Marc Dionne and committed by
Linus Torvalds
91ac033d e5b89542

+4 -4
+4 -4
Documentation/filesystems/caching/cachefiles.txt
··· 407 407 ================== 408 408 409 409 CacheFiles makes use of the split security in the task_struct. It allocates 410 - its own task_security structure, and redirects current->act_as to point to it 410 + its own task_security structure, and redirects current->cred to point to it 411 411 when it acts on behalf of another process, in that process's context. 412 412 413 413 The reason it does this is that it calls vfs_mkdir() and suchlike rather than ··· 429 429 the process looks like in /proc. 430 430 431 431 So CacheFiles makes use of a logical split in the security between the 432 - objective security (task->sec) and the subjective security (task->act_as). The 433 - objective security holds the intrinsic security properties of a process and is 434 - never overridden. This is what appears in /proc, and is what is used when a 432 + objective security (task->real_cred) and the subjective security (task->cred). 433 + The objective security holds the intrinsic security properties of a process and 434 + is never overridden. This is what appears in /proc, and is what is used when a 435 435 process is the target of an operation by some other process (SIGKILL for 436 436 example). 437 437