Re: [PATCH] CRED: Further fix execve cred_exec_mutex handling [ver#2]

From: James Morris
Date: Fri Aug 22 2008 - 18:45:19 EST


On Fri, 22 Aug 2008, David Howells wrote:

> Further fix the way cred_exec_mutex is handled by [compat_]do_execve(). The
> mutex is now only unlocked by the function that locked it, and is no longer
> unlocked by free_bprm() or install_exec_creds(). This means that PTRACE_ATTACH
> may have to wait a little longer before being allowed to proceed.
>
> This patch cleans up the order in which the mutex is locked and unlocked and
> gets rid of a potential double unlock.
>
> Signed-off-by: David Howells <dhowells@xxxxxxxxxx>
> ---

Applied to:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6#next-creds


--
James Morris
<jmorris@xxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/