diff options
author | Eric Paris <eparis@redhat.com> | 2010-04-07 15:15:19 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2010-04-11 22:19:18 -0400 |
commit | 3011a344cdcda34cdbcb40c3fb3d1a6e89954abb (patch) | |
tree | 43db9abc5f96cd8ec31a4a24f0d52dae76680a1c /security | |
parent | 6307f8fee295b364716d28686df6e69c2fee751a (diff) |
security: remove dead hook key_session_to_parent
Unused hook. Remove.
Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security')
-rw-r--r-- | security/capability.c | 8 | ||||
-rw-r--r-- | security/keys/keyctl.c | 7 | ||||
-rw-r--r-- | security/security.c | 7 |
3 files changed, 0 insertions, 22 deletions
diff --git a/security/capability.c b/security/capability.c index 247c04edd468..8cc2b8f3b166 100644 --- a/security/capability.c +++ b/security/capability.c | |||
@@ -826,13 +826,6 @@ static int cap_key_getsecurity(struct key *key, char **_buffer) | |||
826 | return 0; | 826 | return 0; |
827 | } | 827 | } |
828 | 828 | ||
829 | static int cap_key_session_to_parent(const struct cred *cred, | ||
830 | const struct cred *parent_cred, | ||
831 | struct key *key) | ||
832 | { | ||
833 | return 0; | ||
834 | } | ||
835 | |||
836 | #endif /* CONFIG_KEYS */ | 829 | #endif /* CONFIG_KEYS */ |
837 | 830 | ||
838 | #ifdef CONFIG_AUDIT | 831 | #ifdef CONFIG_AUDIT |
@@ -1053,7 +1046,6 @@ void security_fixup_ops(struct security_operations *ops) | |||
1053 | set_to_cap_if_null(ops, key_free); | 1046 | set_to_cap_if_null(ops, key_free); |
1054 | set_to_cap_if_null(ops, key_permission); | 1047 | set_to_cap_if_null(ops, key_permission); |
1055 | set_to_cap_if_null(ops, key_getsecurity); | 1048 | set_to_cap_if_null(ops, key_getsecurity); |
1056 | set_to_cap_if_null(ops, key_session_to_parent); | ||
1057 | #endif /* CONFIG_KEYS */ | 1049 | #endif /* CONFIG_KEYS */ |
1058 | #ifdef CONFIG_AUDIT | 1050 | #ifdef CONFIG_AUDIT |
1059 | set_to_cap_if_null(ops, audit_rule_init); | 1051 | set_to_cap_if_null(ops, audit_rule_init); |
diff --git a/security/keys/keyctl.c b/security/keys/keyctl.c index e9c2e7c584d9..34b302b40dea 100644 --- a/security/keys/keyctl.c +++ b/security/keys/keyctl.c | |||
@@ -1295,13 +1295,6 @@ long keyctl_session_to_parent(void) | |||
1295 | mycred->tgcred->session_keyring->uid != mycred->euid) | 1295 | mycred->tgcred->session_keyring->uid != mycred->euid) |
1296 | goto not_permitted; | 1296 | goto not_permitted; |
1297 | 1297 | ||
1298 | /* the LSM must permit the replacement of the parent's keyring with the | ||
1299 | * keyring from this process */ | ||
1300 | ret = security_key_session_to_parent(mycred, pcred, | ||
1301 | key_ref_to_ptr(keyring_r)); | ||
1302 | if (ret < 0) | ||
1303 | goto not_permitted; | ||
1304 | |||
1305 | /* if there's an already pending keyring replacement, then we replace | 1298 | /* if there's an already pending keyring replacement, then we replace |
1306 | * that */ | 1299 | * that */ |
1307 | oldcred = parent->replacement_session_keyring; | 1300 | oldcred = parent->replacement_session_keyring; |
diff --git a/security/security.c b/security/security.c index 5cf9ca6890f6..490f77753b2d 100644 --- a/security/security.c +++ b/security/security.c | |||
@@ -1262,13 +1262,6 @@ int security_key_getsecurity(struct key *key, char **_buffer) | |||
1262 | return security_ops->key_getsecurity(key, _buffer); | 1262 | return security_ops->key_getsecurity(key, _buffer); |
1263 | } | 1263 | } |
1264 | 1264 | ||
1265 | int security_key_session_to_parent(const struct cred *cred, | ||
1266 | const struct cred *parent_cred, | ||
1267 | struct key *key) | ||
1268 | { | ||
1269 | return security_ops->key_session_to_parent(cred, parent_cred, key); | ||
1270 | } | ||
1271 | |||
1272 | #endif /* CONFIG_KEYS */ | 1265 | #endif /* CONFIG_KEYS */ |
1273 | 1266 | ||
1274 | #ifdef CONFIG_AUDIT | 1267 | #ifdef CONFIG_AUDIT |