[kernel] r18006 - dists/squeeze-security/linux-2.6/debian/patches/bugfix/all
Dann Frazier
dannf at alioth.debian.org
Thu Aug 25 05:00:39 UTC 2011
Author: dannf
Date: Thu Aug 25 05:00:38 2011
New Revision: 18006
Log:
cred_guard_mutex was still directly in the task structure in 2.6.32
Modified:
dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-fix-a-race-in-do_io_accounting.patch
dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-syscall-stack-personality-races.patch
Modified: dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-fix-a-race-in-do_io_accounting.patch
==============================================================================
--- dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-fix-a-race-in-do_io_accounting.patch Thu Aug 25 04:57:22 2011 (r18005)
+++ dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-fix-a-race-in-do_io_accounting.patch Thu Aug 25 05:00:38 2011 (r18006)
@@ -40,7 +40,7 @@
- if (!ptrace_may_access(task, PTRACE_MODE_READ))
- return -EACCES;
-+ result = mutex_lock_killable(&task->signal->cred_guard_mutex);
++ result = mutex_lock_killable(&task->cred_guard_mutex);
+ if (result)
+ return result;
+
@@ -65,7 +65,7 @@
(unsigned long long)acct.write_bytes,
(unsigned long long)acct.cancelled_write_bytes);
+out_unlock:
-+ mutex_unlock(&task->signal->cred_guard_mutex);
++ mutex_unlock(&task->cred_guard_mutex);
+ return result;
}
Modified: dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-syscall-stack-personality-races.patch
==============================================================================
--- dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-syscall-stack-personality-races.patch Thu Aug 25 04:57:22 2011 (r18005)
+++ dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/proc-syscall-stack-personality-races.patch Thu Aug 25 05:00:38 2011 (r18006)
@@ -24,11 +24,11 @@
+static int lock_trace(struct task_struct *task)
+{
-+ int err = mutex_lock_killable(&task->signal->cred_guard_mutex);
++ int err = mutex_lock_killable(&task->cred_guard_mutex);
+ if (err)
+ return err;
+ if (!ptrace_may_access(task, PTRACE_MODE_ATTACH)) {
-+ mutex_unlock(&task->signal->cred_guard_mutex);
++ mutex_unlock(&task->cred_guard_mutex);
+ return -EPERM;
+ }
+ return 0;
@@ -36,7 +36,7 @@
+
+static void unlock_trace(struct task_struct *task)
+{
-+ mutex_unlock(&task->signal->cred_guard_mutex);
++ mutex_unlock(&task->cred_guard_mutex);
+}
+
#ifdef CONFIG_STACKTRACE
More information about the Kernel-svn-changes
mailing list