aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorStephen Smalley <sds@tycho.nsa.gov>2005-09-09 16:01:45 -0400
committerLinus Torvalds <torvalds@g5.osdl.org>2005-09-09 16:57:28 -0400
commite31e14ec356f36b131576be5bc31d8fef7e95483 (patch)
tree5597419cf186904d77c4b4ecf117287bcc1db986 /security
parenta74574aafea3a63add3251047601611111f44562 (diff)
[PATCH] remove the inode_post_link and inode_post_rename LSM hooks
This patch removes the inode_post_link and inode_post_rename LSM hooks as they are unused (and likely useless). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'security')
-rw-r--r--security/dummy.c17
-rw-r--r--security/selinux/hooks.c13
2 files changed, 0 insertions, 30 deletions
diff --git a/security/dummy.c b/security/dummy.c
index 5083314e14b1..9623a61dfc76 100644
--- a/security/dummy.c
+++ b/security/dummy.c
@@ -276,13 +276,6 @@ static int dummy_inode_link (struct dentry *old_dentry, struct inode *inode,
276 return 0; 276 return 0;
277} 277}
278 278
279static void dummy_inode_post_link (struct dentry *old_dentry,
280 struct inode *inode,
281 struct dentry *new_dentry)
282{
283 return;
284}
285
286static int dummy_inode_unlink (struct inode *inode, struct dentry *dentry) 279static int dummy_inode_unlink (struct inode *inode, struct dentry *dentry)
287{ 280{
288 return 0; 281 return 0;
@@ -319,14 +312,6 @@ static int dummy_inode_rename (struct inode *old_inode,
319 return 0; 312 return 0;
320} 313}
321 314
322static void dummy_inode_post_rename (struct inode *old_inode,
323 struct dentry *old_dentry,
324 struct inode *new_inode,
325 struct dentry *new_dentry)
326{
327 return;
328}
329
330static int dummy_inode_readlink (struct dentry *dentry) 315static int dummy_inode_readlink (struct dentry *dentry)
331{ 316{
332 return 0; 317 return 0;
@@ -871,14 +856,12 @@ void security_fixup_ops (struct security_operations *ops)
871 set_to_dummy_if_null(ops, inode_init_security); 856 set_to_dummy_if_null(ops, inode_init_security);
872 set_to_dummy_if_null(ops, inode_create); 857 set_to_dummy_if_null(ops, inode_create);
873 set_to_dummy_if_null(ops, inode_link); 858 set_to_dummy_if_null(ops, inode_link);
874 set_to_dummy_if_null(ops, inode_post_link);
875 set_to_dummy_if_null(ops, inode_unlink); 859 set_to_dummy_if_null(ops, inode_unlink);
876 set_to_dummy_if_null(ops, inode_symlink); 860 set_to_dummy_if_null(ops, inode_symlink);
877 set_to_dummy_if_null(ops, inode_mkdir); 861 set_to_dummy_if_null(ops, inode_mkdir);
878 set_to_dummy_if_null(ops, inode_rmdir); 862 set_to_dummy_if_null(ops, inode_rmdir);
879 set_to_dummy_if_null(ops, inode_mknod); 863 set_to_dummy_if_null(ops, inode_mknod);
880 set_to_dummy_if_null(ops, inode_rename); 864 set_to_dummy_if_null(ops, inode_rename);
881 set_to_dummy_if_null(ops, inode_post_rename);
882 set_to_dummy_if_null(ops, inode_readlink); 865 set_to_dummy_if_null(ops, inode_readlink);
883 set_to_dummy_if_null(ops, inode_follow_link); 866 set_to_dummy_if_null(ops, inode_follow_link);
884 set_to_dummy_if_null(ops, inode_permission); 867 set_to_dummy_if_null(ops, inode_permission);
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index c9c20828be79..3f0b533be92c 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -2009,11 +2009,6 @@ static int selinux_inode_link(struct dentry *old_dentry, struct inode *dir, stru
2009 return may_link(dir, old_dentry, MAY_LINK); 2009 return may_link(dir, old_dentry, MAY_LINK);
2010} 2010}
2011 2011
2012static void selinux_inode_post_link(struct dentry *old_dentry, struct inode *inode, struct dentry *new_dentry)
2013{
2014 return;
2015}
2016
2017static int selinux_inode_unlink(struct inode *dir, struct dentry *dentry) 2012static int selinux_inode_unlink(struct inode *dir, struct dentry *dentry)
2018{ 2013{
2019 int rc; 2014 int rc;
@@ -2056,12 +2051,6 @@ static int selinux_inode_rename(struct inode *old_inode, struct dentry *old_dent
2056 return may_rename(old_inode, old_dentry, new_inode, new_dentry); 2051 return may_rename(old_inode, old_dentry, new_inode, new_dentry);
2057} 2052}
2058 2053
2059static void selinux_inode_post_rename(struct inode *old_inode, struct dentry *old_dentry,
2060 struct inode *new_inode, struct dentry *new_dentry)
2061{
2062 return;
2063}
2064
2065static int selinux_inode_readlink(struct dentry *dentry) 2054static int selinux_inode_readlink(struct dentry *dentry)
2066{ 2055{
2067 return dentry_has_perm(current, NULL, dentry, FILE__READ); 2056 return dentry_has_perm(current, NULL, dentry, FILE__READ);
@@ -4257,14 +4246,12 @@ static struct security_operations selinux_ops = {
4257 .inode_init_security = selinux_inode_init_security, 4246 .inode_init_security = selinux_inode_init_security,
4258 .inode_create = selinux_inode_create, 4247 .inode_create = selinux_inode_create,
4259 .inode_link = selinux_inode_link, 4248 .inode_link = selinux_inode_link,
4260 .inode_post_link = selinux_inode_post_link,
4261 .inode_unlink = selinux_inode_unlink, 4249 .inode_unlink = selinux_inode_unlink,
4262 .inode_symlink = selinux_inode_symlink, 4250 .inode_symlink = selinux_inode_symlink,
4263 .inode_mkdir = selinux_inode_mkdir, 4251 .inode_mkdir = selinux_inode_mkdir,
4264 .inode_rmdir = selinux_inode_rmdir, 4252 .inode_rmdir = selinux_inode_rmdir,
4265 .inode_mknod = selinux_inode_mknod, 4253 .inode_mknod = selinux_inode_mknod,
4266 .inode_rename = selinux_inode_rename, 4254 .inode_rename = selinux_inode_rename,
4267 .inode_post_rename = selinux_inode_post_rename,
4268 .inode_readlink = selinux_inode_readlink, 4255 .inode_readlink = selinux_inode_readlink,
4269 .inode_follow_link = selinux_inode_follow_link, 4256 .inode_follow_link = selinux_inode_follow_link,
4270 .inode_permission = selinux_inode_permission, 4257 .inode_permission = selinux_inode_permission,