diff options
author | Kees Cook <keescook@chromium.org> | 2017-07-19 01:25:29 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2017-08-01 22:03:10 +0300 |
commit | 2af622802696e1dbe28d81c8ea6355dc30800396 (patch) | |
tree | 2a1ca9ec72acd7b480dbbe34896dfc25986100d8 /fs/exec.c | |
parent | ee67ae7ef6ff499137292ac8a9dfe86096796283 (diff) | |
download | linux-2af622802696e1dbe28d81c8ea6355dc30800396.tar.xz |
LSM: drop bprm_secureexec hook
This removes the bprm_secureexec hook since the logic has been folded into
the bprm_set_creds hook for all LSMs now.
Cc: Eric W. Biederman <ebiederm@xmission.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: John Johansen <john.johansen@canonical.com>
Acked-by: James Morris <james.l.morris@oracle.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
Diffstat (limited to 'fs/exec.c')
-rw-r--r-- | fs/exec.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/fs/exec.c b/fs/exec.c index 1536bc4502cc..eca0cb550a06 100644 --- a/fs/exec.c +++ b/fs/exec.c @@ -1343,8 +1343,6 @@ EXPORT_SYMBOL(would_dump); void setup_new_exec(struct linux_binprm * bprm) { - bprm->secureexec |= security_bprm_secureexec(bprm); - /* * Once here, prepare_binrpm() will not be called any more, so * the final state of setuid/setgid/fscaps can be merged into the |