On 07/30/2012 09:58 AM, Kees Cook wrote:
> The core ptrace access checking routine already holds the task lock,
> so there is no need to use get_task_comm() which just tries to take the
> lock again. Drop its use and access current->comm directly.
> 
> Reported-by: Fengguang Wu <[email protected]>
> Suggested-by: Oleg Nesterov <[email protected]>
> Cc: [email protected]
> Signed-off-by: Kees Cook <[email protected]>
yep, looks good

Acked-by: John Johansen <[email protected]>

> ---
>  security/yama/yama_lsm.c |    6 ++----
>  1 files changed, 2 insertions(+), 4 deletions(-)
> 
> diff --git a/security/yama/yama_lsm.c b/security/yama/yama_lsm.c
> index 83554ee..20a68ca 100644
> --- a/security/yama/yama_lsm.c
> +++ b/security/yama/yama_lsm.c
> @@ -279,12 +279,10 @@ static int yama_ptrace_access_check(struct task_struct 
> *child,
>       }
>  
>       if (rc) {
> -             char name[sizeof(current->comm)];
> +             /* task_lock is held by the caller, so use comm directly. */
>               printk_ratelimited(KERN_NOTICE
>                       "ptrace of pid %d was attempted by: %s (pid %d)\n",
> -                     child->pid,
> -                     get_task_comm(name, current),
> -                     current->pid);
> +                     child->pid, current->comm, current->pid);
>       }
>  
>       return rc;
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to