We currently access current->comm directly. As we have prctl(PR_SET_NAME), we need the access be protected by task_lock. This is exactly what get_task_comm does, so use it. I'm not 100% convinced prctl(PR_SET_NAME) may be called at the time of core dump, but the locking won't hurt. Note that siglock is not held in format_corename. Signed-off-by: Jiri Slaby <jslaby@xxxxxxx> Cc: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Cc: Andi Kleen <andi@xxxxxxxxxxxxxx> Cc: Oleg Nesterov <oleg@xxxxxxxxxx> --- fs/exec.c | 7 +++++-- 1 files changed, 5 insertions(+), 2 deletions(-) diff --git a/fs/exec.c b/fs/exec.c index 5ee7562..155c6d4 100644 --- a/fs/exec.c +++ b/fs/exec.c @@ -1656,9 +1656,12 @@ static int format_corename(struct core_name *cn, long signr) up_read(&uts_sem); break; /* executable */ - case 'e': - err = cn_printf(cn, "%s", current->comm); + case 'e': { + char comm[TASK_COMM_LEN]; + err = cn_printf(cn, "%s", + get_task_comm(comm, current)); break; + } case 'E': err = cn_print_exe_file(cn); break; -- 1.7.4.2 -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxxx For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/ Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>