A small oops crept into the patch as released earlier today that Stephen picked up on. We hadn't implemented his comment regarding the relocation of the free_security hook that he'd made against our first ever patch (aka bumper-3), in that we'd moved the free call to a position more suitable for us, this broke SELinux's assumptions. These few lines correct that error, returning the code back to how Stephen wanted it. This patch should be applied after this mornings patch. Sorry for missing this. richard. ===== kernel/exit.c 1.8 vs edited ===== --- 1.8/kernel/exit.c Tue Jul 17 16:39:12 2001 +++ edited/kernel/exit.c Tue Jul 17 16:39:56 2001 @@ -44,6 +44,7 @@ task_unlock(p); #endif atomic_dec(&p->user->processes); + security_ops->task_ops->free_security(p); free_uid(p->user); unhash_process(p); @@ -438,7 +439,6 @@ #ifdef CONFIG_BSD_PROCESS_ACCT acct_process(code); #endif - security_ops->task_ops->free_security(tsk); __exit_mm(tsk); lock_kernel(); _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Tue Jul 17 2001 - 16:47:28 PDT