aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--fs/namespace.c1
-rw-r--r--include/linux/security.h10
-rw-r--r--security/capability.c5
-rw-r--r--security/security.c5
4 files changed, 0 insertions, 21 deletions
diff --git a/fs/namespace.c b/fs/namespace.c
index c1d0d877bab7..8aea78c8e760 100644
--- a/fs/namespace.c
+++ b/fs/namespace.c
@@ -628,7 +628,6 @@ repeat:
628 mnt->mnt_pinned = 0; 628 mnt->mnt_pinned = 0;
629 spin_unlock(&vfsmount_lock); 629 spin_unlock(&vfsmount_lock);
630 acct_auto_close_mnt(mnt); 630 acct_auto_close_mnt(mnt);
631 security_sb_umount_close(mnt);
632 goto repeat; 631 goto repeat;
633 } 632 }
634} 633}
diff --git a/include/linux/security.h b/include/linux/security.h
index 9ebd2e411d2d..354b0ceefc87 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -272,11 +272,6 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
272 * @mnt contains the mounted file system. 272 * @mnt contains the mounted file system.
273 * @flags contains the unmount flags, e.g. MNT_FORCE. 273 * @flags contains the unmount flags, e.g. MNT_FORCE.
274 * Return 0 if permission is granted. 274 * Return 0 if permission is granted.
275 * @sb_umount_close:
276 * Close any files in the @mnt mounted filesystem that are held open by
277 * the security module. This hook is called during an umount operation
278 * prior to checking whether the filesystem is still busy.
279 * @mnt contains the mounted filesystem.
280 * @sb_umount_busy: 275 * @sb_umount_busy:
281 * Handle a failed umount of the @mnt mounted filesystem, e.g. re-opening 276 * Handle a failed umount of the @mnt mounted filesystem, e.g. re-opening
282 * any files that were closed by umount_close. This hook is called during 277 * any files that were closed by umount_close. This hook is called during
@@ -1479,7 +1474,6 @@ struct security_operations {
1479 int (*sb_mount) (char *dev_name, struct path *path, 1474 int (*sb_mount) (char *dev_name, struct path *path,
1480 char *type, unsigned long flags, void *data); 1475 char *type, unsigned long flags, void *data);
1481 int (*sb_umount) (struct vfsmount *mnt, int flags); 1476 int (*sb_umount) (struct vfsmount *mnt, int flags);
1482 void (*sb_umount_close) (struct vfsmount *mnt);
1483 void (*sb_umount_busy) (struct vfsmount *mnt); 1477 void (*sb_umount_busy) (struct vfsmount *mnt);
1484 void (*sb_post_remount) (struct vfsmount *mnt, 1478 void (*sb_post_remount) (struct vfsmount *mnt,
1485 unsigned long flags, void *data); 1479 unsigned long flags, void *data);
@@ -1777,7 +1771,6 @@ int security_sb_statfs(struct dentry *dentry);
1777int security_sb_mount(char *dev_name, struct path *path, 1771int security_sb_mount(char *dev_name, struct path *path,
1778 char *type, unsigned long flags, void *data); 1772 char *type, unsigned long flags, void *data);
1779int security_sb_umount(struct vfsmount *mnt, int flags); 1773int security_sb_umount(struct vfsmount *mnt, int flags);
1780void security_sb_umount_close(struct vfsmount *mnt);
1781void security_sb_umount_busy(struct vfsmount *mnt); 1774void security_sb_umount_busy(struct vfsmount *mnt);
1782void security_sb_post_remount(struct vfsmount *mnt, unsigned long flags, void *data); 1775void security_sb_post_remount(struct vfsmount *mnt, unsigned long flags, void *data);
1783void security_sb_post_addmount(struct vfsmount *mnt, struct path *mountpoint); 1776void security_sb_post_addmount(struct vfsmount *mnt, struct path *mountpoint);
@@ -2096,9 +2089,6 @@ static inline int security_sb_umount(struct vfsmount *mnt, int flags)
2096 return 0; 2089 return 0;
2097} 2090}
2098 2091
2099static inline void security_sb_umount_close(struct vfsmount *mnt)
2100{ }
2101
2102static inline void security_sb_umount_busy(struct vfsmount *mnt) 2092static inline void security_sb_umount_busy(struct vfsmount *mnt)
2103{ } 2093{ }
2104 2094
diff --git a/security/capability.c b/security/capability.c
index a7e905d8f1d3..db72f4f5a9e1 100644
--- a/security/capability.c
+++ b/security/capability.c
@@ -85,10 +85,6 @@ static int cap_sb_umount(struct vfsmount *mnt, int flags)
85 return 0; 85 return 0;
86} 86}
87 87
88static void cap_sb_umount_close(struct vfsmount *mnt)
89{
90}
91
92static void cap_sb_umount_busy(struct vfsmount *mnt) 88static void cap_sb_umount_busy(struct vfsmount *mnt)
93{ 89{
94} 90}
@@ -937,7 +933,6 @@ void security_fixup_ops(struct security_operations *ops)
937 set_to_cap_if_null(ops, sb_statfs); 933 set_to_cap_if_null(ops, sb_statfs);
938 set_to_cap_if_null(ops, sb_mount); 934 set_to_cap_if_null(ops, sb_mount);
939 set_to_cap_if_null(ops, sb_umount); 935 set_to_cap_if_null(ops, sb_umount);
940 set_to_cap_if_null(ops, sb_umount_close);
941 set_to_cap_if_null(ops, sb_umount_busy); 936 set_to_cap_if_null(ops, sb_umount_busy);
942 set_to_cap_if_null(ops, sb_post_remount); 937 set_to_cap_if_null(ops, sb_post_remount);
943 set_to_cap_if_null(ops, sb_post_addmount); 938 set_to_cap_if_null(ops, sb_post_addmount);
diff --git a/security/security.c b/security/security.c
index a0bee70ed4b6..591c25fd430f 100644
--- a/security/security.c
+++ b/security/security.c
@@ -311,11 +311,6 @@ int security_sb_umount(struct vfsmount *mnt, int flags)
311 return security_ops->sb_umount(mnt, flags); 311 return security_ops->sb_umount(mnt, flags);
312} 312}
313 313
314void security_sb_umount_close(struct vfsmount *mnt)
315{
316 security_ops->sb_umount_close(mnt);
317}
318
319void security_sb_umount_busy(struct vfsmount *mnt) 314void security_sb_umount_busy(struct vfsmount *mnt)
320{ 315{
321 security_ops->sb_umount_busy(mnt); 316 security_ops->sb_umount_busy(mnt);