diff options
| author | Christian Brauner <brauner@kernel.org> | 2025-11-03 17:57:31 +0300 |
|---|---|---|
| committer | Christian Brauner <brauner@kernel.org> | 2025-11-06 01:11:51 +0300 |
| commit | eb937201bad03bf2f25ac630979e521fbb5e2a07 (patch) | |
| tree | 400c1db1904d288c40649b679478b4307393be67 | |
| parent | b7b4f7554bcc6b9ee0ec0404999bf080adad1f3c (diff) | |
| download | linux-eb937201bad03bf2f25ac630979e521fbb5e2a07.tar.xz | |
coredump: move revert_cred() before coredump_cleanup()
There's no need to pin the credentials across the coredump_cleanup()
call. Nothing in there depends on elevated credentials.
Link: https://patch.msgid.link/20251103-work-creds-guards-prepare_creds-v1-5-b447b82f2c9b@kernel.org
Signed-off-by: Christian Brauner <brauner@kernel.org>
| -rw-r--r-- | fs/coredump.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/coredump.c b/fs/coredump.c index 5c1c381ee380..4fce2a2f279c 100644 --- a/fs/coredump.c +++ b/fs/coredump.c @@ -1197,8 +1197,8 @@ void vfs_coredump(const kernel_siginfo_t *siginfo) } close_fail: - coredump_cleanup(&cn, &cprm); revert_creds(old_cred); + coredump_cleanup(&cn, &cprm); return; } |
