diff options
author | Kees Cook <keescook@chromium.org> | 2017-07-18 15:25:29 -0700 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2017-08-01 12:03:10 -0700 |
commit | 2af622802696e1dbe28d81c8ea6355dc30800396 (patch) | |
tree | 2a1ca9ec72acd7b480dbbe34896dfc25986100d8 /fs/exec.c | |
parent | ee67ae7ef6ff499137292ac8a9dfe86096796283 (diff) | |
download | op-kernel-dev-2af622802696e1dbe28d81c8ea6355dc30800396.zip op-kernel-dev-2af622802696e1dbe28d81c8ea6355dc30800396.tar.gz |
LSM: drop bprm_secureexec hook
This removes the bprm_secureexec hook since the logic has been folded into
the bprm_set_creds hook for all LSMs now.
Cc: Eric W. Biederman <ebiederm@xmission.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: John Johansen <john.johansen@canonical.com>
Acked-by: James Morris <james.l.morris@oracle.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
Diffstat (limited to 'fs/exec.c')
-rw-r--r-- | fs/exec.c | 2 |
1 files changed, 0 insertions, 2 deletions
@@ -1343,8 +1343,6 @@ EXPORT_SYMBOL(would_dump); void setup_new_exec(struct linux_binprm * bprm) { - bprm->secureexec |= security_bprm_secureexec(bprm); - /* * Once here, prepare_binrpm() will not be called any more, so * the final state of setuid/setgid/fscaps can be merged into the |