|
@@ -1351,6 +1351,9 @@ void setup_new_exec(struct linux_binprm * bprm)
|
|
|
bprm->secureexec |= bprm->cap_elevated;
|
|
|
|
|
|
if (bprm->secureexec) {
|
|
|
+ /* Make sure parent cannot signal privileged process. */
|
|
|
+ current->pdeath_signal = 0;
|
|
|
+
|
|
|
/*
|
|
|
* For secureexec, reset the stack limit to sane default to
|
|
|
* avoid bad behavior from the prior rlimits. This has to
|
|
@@ -1383,10 +1386,6 @@ void setup_new_exec(struct linux_binprm * bprm)
|
|
|
*/
|
|
|
current->mm->task_size = TASK_SIZE;
|
|
|
|
|
|
- if (bprm->secureexec) {
|
|
|
- current->pdeath_signal = 0;
|
|
|
- }
|
|
|
-
|
|
|
/* An exec changes our domain. We are no longer part of the thread
|
|
|
group */
|
|
|
current->self_exec_id++;
|