> This change allows us to take advantage of access_remote_vm(), which in turn > enables a secure mem_write() implementation. > > The previous implementation of mem_write() was insecure since the target task > could exec a setuid-root binary between the permission check and the actual > write. Holding a reference to the target mm_struct eliminates this > vulnerability. > > Signed-off-by: Stephen Wilson <wilsons@xxxxxxxx> OK, I like this idea. So, I suppose you will resend newer version as applied Al's comment and I'll be able to ack this. Thanks. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxxx For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/ Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>