diff options
Diffstat (limited to 'fs/exec.c')
| -rw-r--r-- | fs/exec.c | 10 | 
1 files changed, 3 insertions, 7 deletions
diff --git a/fs/exec.c b/fs/exec.c index a3d33fe592d6..a2b42a98c743 100644 --- a/fs/exec.c +++ b/fs/exec.c @@ -368,10 +368,6 @@ static int bprm_mm_init(struct linux_binprm *bprm)  	if (!mm)  		goto err; -	err = init_new_context(current, mm); -	if (err) -		goto err; -  	err = __bprm_mm_init(bprm);  	if (err)  		goto err; @@ -1216,7 +1212,7 @@ EXPORT_SYMBOL(install_exec_creds);  /*   * determine how safe it is to execute the proposed program   * - the caller must hold ->cred_guard_mutex to protect against - *   PTRACE_ATTACH + *   PTRACE_ATTACH or seccomp thread-sync   */  static void check_unsafe_exec(struct linux_binprm *bprm)  { @@ -1234,7 +1230,7 @@ static void check_unsafe_exec(struct linux_binprm *bprm)  	 * This isn't strictly necessary, but it makes it harder for LSMs to  	 * mess up.  	 */ -	if (current->no_new_privs) +	if (task_no_new_privs(current))  		bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS;  	t = p; @@ -1272,7 +1268,7 @@ int prepare_binprm(struct linux_binprm *bprm)  	bprm->cred->egid = current_egid();  	if (!(bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID) && -	    !current->no_new_privs && +	    !task_no_new_privs(current) &&  	    kuid_has_mapping(bprm->cred->user_ns, inode->i_uid) &&  	    kgid_has_mapping(bprm->cred->user_ns, inode->i_gid)) {  		/* Set-uid? */  |