diff options
author | Kees Cook <keescook@chromium.org> | 2017-07-19 01:25:29 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2017-08-01 22:03:10 +0300 |
commit | 2af622802696e1dbe28d81c8ea6355dc30800396 (patch) | |
tree | 2a1ca9ec72acd7b480dbbe34896dfc25986100d8 /security | |
parent | ee67ae7ef6ff499137292ac8a9dfe86096796283 (diff) | |
download | linux-2af622802696e1dbe28d81c8ea6355dc30800396.tar.xz |
LSM: drop bprm_secureexec hook
This removes the bprm_secureexec hook since the logic has been folded into
the bprm_set_creds hook for all LSMs now.
Cc: Eric W. Biederman <ebiederm@xmission.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: John Johansen <john.johansen@canonical.com>
Acked-by: James Morris <james.l.morris@oracle.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/security.c | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/security/security.c b/security/security.c index 30132378d103..afc34f46c6c5 100644 --- a/security/security.c +++ b/security/security.c @@ -351,11 +351,6 @@ void security_bprm_committed_creds(struct linux_binprm *bprm) call_void_hook(bprm_committed_creds, bprm); } -int security_bprm_secureexec(struct linux_binprm *bprm) -{ - return call_int_hook(bprm_secureexec, 0, bprm); -} - int security_sb_alloc(struct super_block *sb) { return call_int_hook(sb_alloc_security, 0, sb); |