if (task_no_new_privs(current))
                bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS;
 
+       /*
+        * If another task is sharing our fs, we cannot safely
+        * suid exec because the differently privileged task
+        * will be able to manipulate the current directory, etc.
+        * It would be nice to force an unshare instead...
+        */
        t = p;
        n_fs = 1;
        spin_lock(&p->fs->lock);
        return retval;
 }
 
+/* binfmt handlers will call back into begin_new_exec() on success. */
 static int exec_binprm(struct linux_binprm *bprm)
 {
        pid_t old_pid, old_vpid;
        if (retval)
                return retval;
 
+       /*
+        * Check for unsafe execution states before exec_binprm(), which
+        * will call back into begin_new_exec(), into bprm_creds_from_file(),
+        * where setuid-ness is evaluated.
+        */
        check_unsafe_exec(bprm);
        current->in_execve = 1;