linux/fs/proc
Oleg Nesterov 704b836cbf mm_for_maps: take ->cred_guard_mutex to fix the race with exec
The problem is minor, but without ->cred_guard_mutex held we can race
with exec() and get the new ->mm but check old creds.

Now we do not need to re-check task->mm after ptrace_may_access(), it
can't be changed to the new mm under us.

Strictly speaking, this also fixes another very minor problem. Unless
security check fails or the task exits mm_for_maps() should never
return NULL, the caller should get either old or new ->mm.

Signed-off-by: Oleg Nesterov <oleg@redhat.com>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
2009-08-10 20:49:26 +10:00
..
array.c
base.c mm_for_maps: take ->cred_guard_mutex to fix the race with exec 2009-08-10 20:49:26 +10:00
cmdline.c
cpuinfo.c
devices.c
generic.c
inode.c
internal.h
interrupts.c
Kconfig
kcore.c
kmsg.c
loadavg.c
Makefile
meminfo.c
mmu.c
nommu.c
page.c
proc_devtree.c
proc_net.c
proc_sysctl.c
proc_tty.c
root.c
softirqs.c
stat.c
task_mmu.c mm_for_maps: shift down_read(mmap_sem) to the caller 2009-08-10 20:48:32 +10:00
task_nommu.c mm_for_maps: shift down_read(mmap_sem) to the caller 2009-08-10 20:48:32 +10:00
uptime.c
version.c
vmcore.c proc: vmcore - use kzalloc in get_new_element() 2009-06-18 13:03:41 -07:00