[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <31842.1240656853@redhat.com>
Date: Sat, 25 Apr 2009 11:54:13 +0100
From: David Howells <dhowells@...hat.com>
To: Oleg Nesterov <oleg@...hat.com>
Cc: dhowells@...hat.com, Roland McGrath <roland@...hat.com>,
Andrew Morton <akpm@...ux-foundation.org>,
linux-kernel@...r.kernel.org, James Morris <jmorris@...ei.org>,
Hugh Dickins <hugh@...itas.com>
Subject: Re: ptrace && cred_exec_mutex (Was: [PATCH] ptrace: tracehook_unsafe_exec: remove the stale comment)
Oleg Nesterov <oleg@...hat.com> wrote:
> Yes. Except it looks like ->cred_exec_mutex is never used in fact.
I must to be missing something... I see that:
int ptrace_attach(struct task_struct *task)
{
...
/* Protect exec's credential calculations against our interference;
* SUID, SGID and LSM creds get determined differently under ptrace.
*/
retval = mutex_lock_interruptible(¤t->cred_exec_mutex);
...
}
And:
int do_execve(...)
{
...
retval = mutex_lock_interruptible(¤t->cred_exec_mutex);
if (retval < 0)
goto out_free;
...
}
So how is it not used?
David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists