original_kernel/security
Alan Cox 34b4e4aa3c fix NULL pointer dereference in __vm_enough_memory()
The new exec code inserts an accounted vma into an mm struct which is not
current->mm.  The existing memory check code has a hard coded assumption
that this does not happen as does the security code.

As the correct mm is known we pass the mm to the security method and the
helper function.  A new security test is added for the case where we need
to pass the mm and the existing one is modified to pass current->mm to
avoid the need to change large amounts of code.

(Thanks to Tobias for fixing rejects and testing)

Signed-off-by: Alan Cox <alan@redhat.com>
Cc: WU Fengguang <wfg@mail.ustc.edu.cn>
Cc: James Morris <jmorris@redhat.com>
Cc: Tobias Diedrich <ranma+kernel@tdiedrich.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-08-22 19:52:45 -07:00
..
keys mm: Remove slab destructors from kmem_cache_create(). 2007-07-20 10:11:58 +09:00
selinux fix NULL pointer dereference in __vm_enough_memory() 2007-08-22 19:52:45 -07:00
Kconfig
Makefile
capability.c
commoncap.c fix NULL pointer dereference in __vm_enough_memory() 2007-08-22 19:52:45 -07:00
dummy.c fix NULL pointer dereference in __vm_enough_memory() 2007-08-22 19:52:45 -07:00
inode.c
root_plug.c
security.c