Re: [PATCH 1/8] kernel/exit.c: make sure current's nsproxy != NULL while checking caps

2015-05-25 Thread Lukasz Pawelczyk
On sob, 2015-05-23 at 12:49 -0500, Eric W. Biederman wrote: > Lukasz Pawelczyk writes: > > > There is a rare case where current's nsproxy might be NULL but we are > > required to check for credentials and capabilities. It sometimes happens > > during an exit_group() syscall while destroying user'

Re: [PATCH 1/8] kernel/exit.c: make sure current's nsproxy != NULL while checking caps

2015-05-23 Thread Eric W. Biederman
Lukasz Pawelczyk writes: > There is a rare case where current's nsproxy might be NULL but we are > required to check for credentials and capabilities. It sometimes happens > during an exit_group() syscall while destroying user's session (logging > out). > > My understanding is that while we have

[PATCH 1/8] kernel/exit.c: make sure current's nsproxy != NULL while checking caps

2015-05-21 Thread Lukasz Pawelczyk
There is a rare case where current's nsproxy might be NULL but we are required to check for credentials and capabilities. It sometimes happens during an exit_group() syscall while destroying user's session (logging out). My understanding is that while we have to lock the task to get task's nsproxy