Instead of an additional secureexec check for pdeath_signal, just move it
up into the initial secureexec test. Neither perf nor arch code touches
pdeath_signal, so the relocation shouldn't change anything.

Signed-off-by: Kees Cook <keesc...@chromium.org>
Acked-by: Serge Hallyn <se...@hallyn.com>
---
 fs/exec.c | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/fs/exec.c b/fs/exec.c
index cddd2a2cbc1f..5a19912a4f53 100644
--- a/fs/exec.c
+++ b/fs/exec.c
@@ -1330,6 +1330,9 @@ void setup_new_exec(struct linux_binprm * bprm)
        bprm->secureexec |= bprm->cap_elevated;
 
        if (bprm->secureexec) {
+               /* Make sure parent cannot signal privileged process. */
+               current->pdeath_signal = 0;
+
                /*
                 * For secureexec, reset the stack limit to sane default to
                 * avoid bad behavior from the prior rlimits. This has to
@@ -1362,10 +1365,6 @@ void setup_new_exec(struct linux_binprm * bprm)
         */
        current->mm->task_size = TASK_SIZE;
 
-       if (bprm->secureexec) {
-               current->pdeath_signal = 0;
-       }
-
        /* An exec changes our domain. We are no longer part of the thread
           group */
        current->self_exec_id++;
-- 
2.7.4

Reply via email to