|
@@ -1045,7 +1045,7 @@ void install_exec_creds(struct linux_binprm *bprm)
|
|
|
commit_creds(bprm->cred);
|
|
|
bprm->cred = NULL;
|
|
|
|
|
|
- /* cred_exec_mutex must be held at least to this point to prevent
|
|
|
+ /* cred_guard_mutex must be held at least to this point to prevent
|
|
|
* ptrace_attach() from altering our determination of the task's
|
|
|
* credentials; any time after this it may be unlocked */
|
|
|
|
|
@@ -1055,7 +1055,7 @@ EXPORT_SYMBOL(install_exec_creds);
|
|
|
|
|
|
/*
|
|
|
* determine how safe it is to execute the proposed program
|
|
|
- * - the caller must hold current->cred_exec_mutex to protect against
|
|
|
+ * - the caller must hold current->cred_guard_mutex to protect against
|
|
|
* PTRACE_ATTACH
|
|
|
*/
|
|
|
int check_unsafe_exec(struct linux_binprm *bprm)
|
|
@@ -1297,7 +1297,7 @@ int do_execve(char * filename,
|
|
|
if (!bprm)
|
|
|
goto out_files;
|
|
|
|
|
|
- retval = mutex_lock_interruptible(¤t->cred_exec_mutex);
|
|
|
+ retval = mutex_lock_interruptible(¤t->cred_guard_mutex);
|
|
|
if (retval < 0)
|
|
|
goto out_free;
|
|
|
current->in_execve = 1;
|
|
@@ -1360,7 +1360,7 @@ int do_execve(char * filename,
|
|
|
/* execve succeeded */
|
|
|
current->fs->in_exec = 0;
|
|
|
current->in_execve = 0;
|
|
|
- mutex_unlock(¤t->cred_exec_mutex);
|
|
|
+ mutex_unlock(¤t->cred_guard_mutex);
|
|
|
acct_update_integrals(current);
|
|
|
free_bprm(bprm);
|
|
|
if (displaced)
|
|
@@ -1383,7 +1383,7 @@ out_unmark:
|
|
|
|
|
|
out_unlock:
|
|
|
current->in_execve = 0;
|
|
|
- mutex_unlock(¤t->cred_exec_mutex);
|
|
|
+ mutex_unlock(¤t->cred_guard_mutex);
|
|
|
|
|
|
out_free:
|
|
|
free_bprm(bprm);
|