* as we're past the point of no return and are dealing with shared
         * libraries.
         */
-       bprm.cred_prepared = 1;
+       bprm.called_set_creds = 1;
 
        res = prepare_binprm(&bprm);
 
 
        retval = security_bprm_set_creds(bprm);
        if (retval)
                return retval;
-       bprm->cred_prepared = 1;
+       bprm->called_set_creds = 1;
 
        memset(bprm->buf, 0, BINPRM_BUF_SIZE);
        return kernel_read(bprm->file, 0, bprm->buf, BINPRM_BUF_SIZE);
 
        struct mm_struct *mm;
        unsigned long p; /* current top of mem */
        unsigned int
-               cred_prepared:1,/* true if creds already prepared (multiple
-                                * preps happen for interpreters) */
+               /*
+                * True after the bprm_set_creds hook has been called once
+                * (multiple calls can be made via prepare_binprm() for
+                * binfmt_script/misc).
+                */
+               called_set_creds:1,
                cap_effective:1;/* true if has elevated effective capabilities,
                                 * false if not; except for init which inherits
                                 * its parent's caps anyway */
 
                file_inode(bprm->file)->i_mode
        };
 
-       if (bprm->cred_prepared)
+       if (bprm->called_set_creds)
                return 0;
 
        ctx = cred_ctx(bprm->cred);
 
 
        /* SELinux context only depends on initial program or script and not
         * the script interpreter */
-       if (bprm->cred_prepared)
+       if (bprm->called_set_creds)
                return 0;
 
        old_tsec = current_security();
 
        struct superblock_smack *sbsp;
        int rc;
 
-       if (bprm->cred_prepared)
+       if (bprm->called_set_creds)
                return 0;
 
        isp = inode->i_security;
 
         * Do only if this function is called for the first time of an execve
         * operation.
         */
-       if (bprm->cred_prepared)
+       if (bprm->called_set_creds)
                return 0;
 #ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
        /*