|
@@ -1083,14 +1083,14 @@ EXPORT_SYMBOL(setup_new_exec);
|
|
|
*/
|
|
|
int prepare_bprm_creds(struct linux_binprm *bprm)
|
|
|
{
|
|
|
- if (mutex_lock_interruptible(¤t->cred_guard_mutex))
|
|
|
+ if (mutex_lock_interruptible(¤t->signal->cred_guard_mutex))
|
|
|
return -ERESTARTNOINTR;
|
|
|
|
|
|
bprm->cred = prepare_exec_creds();
|
|
|
if (likely(bprm->cred))
|
|
|
return 0;
|
|
|
|
|
|
- mutex_unlock(¤t->cred_guard_mutex);
|
|
|
+ mutex_unlock(¤t->signal->cred_guard_mutex);
|
|
|
return -ENOMEM;
|
|
|
}
|
|
|
|
|
@@ -1098,7 +1098,7 @@ void free_bprm(struct linux_binprm *bprm)
|
|
|
{
|
|
|
free_arg_pages(bprm);
|
|
|
if (bprm->cred) {
|
|
|
- mutex_unlock(¤t->cred_guard_mutex);
|
|
|
+ mutex_unlock(¤t->signal->cred_guard_mutex);
|
|
|
abort_creds(bprm->cred);
|
|
|
}
|
|
|
kfree(bprm);
|
|
@@ -1119,13 +1119,13 @@ void install_exec_creds(struct linux_binprm *bprm)
|
|
|
* credentials; any time after this it may be unlocked.
|
|
|
*/
|
|
|
security_bprm_committed_creds(bprm);
|
|
|
- mutex_unlock(¤t->cred_guard_mutex);
|
|
|
+ mutex_unlock(¤t->signal->cred_guard_mutex);
|
|
|
}
|
|
|
EXPORT_SYMBOL(install_exec_creds);
|
|
|
|
|
|
/*
|
|
|
* determine how safe it is to execute the proposed program
|
|
|
- * - the caller must hold current->cred_guard_mutex to protect against
|
|
|
+ * - the caller must hold ->cred_guard_mutex to protect against
|
|
|
* PTRACE_ATTACH
|
|
|
*/
|
|
|
int check_unsafe_exec(struct linux_binprm *bprm)
|