aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux/sched.h
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2009-04-29 08:45:05 -0400
committerJames Morris <jmorris@namei.org>2009-04-29 19:07:13 -0400
commit3bcac0263f0b45e67a64034ebcb69eb9abb742f4 (patch)
tree33f4db08edaa12e1c20df348e2fa28c7c2198ebe /include/linux/sched.h
parent88c48db9788862d0290831d081bc3c64e13b592f (diff)
SELinux: Don't flush inherited SIGKILL during execve()
Don't flush inherited SIGKILL during execve() in SELinux's post cred commit hook. This isn't really a security problem: if the SIGKILL came before the credentials were changed, then we were right to receive it at the time, and should honour it; if it came after the creds were changed, then we definitely should honour it; and in any case, all that will happen is that the process will be scrapped before it ever returns to userspace. Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: Oleg Nesterov <oleg@redhat.com> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'include/linux/sched.h')
-rw-r--r--include/linux/sched.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/sched.h b/include/linux/sched.h
index 1d19c025f9d2..d3b787c7aef3 100644
--- a/include/linux/sched.h
+++ b/include/linux/sched.h
@@ -1875,6 +1875,7 @@ extern void sched_dead(struct task_struct *p);
1875 1875
1876extern void proc_caches_init(void); 1876extern void proc_caches_init(void);
1877extern void flush_signals(struct task_struct *); 1877extern void flush_signals(struct task_struct *);
1878extern void __flush_signals(struct task_struct *);
1878extern void ignore_signals(struct task_struct *); 1879extern void ignore_signals(struct task_struct *);
1879extern void flush_signal_handlers(struct task_struct *, int force_default); 1880extern void flush_signal_handlers(struct task_struct *, int force_default);
1880extern int dequeue_signal(struct task_struct *tsk, sigset_t *mask, siginfo_t *info); 1881extern int dequeue_signal(struct task_struct *tsk, sigset_t *mask, siginfo_t *info);