security: remove dead hook sb_umount_close
authorEric Paris <eparis@redhat.com>
Wed, 7 Apr 2010 19:14:21 +0000 (15:14 -0400)
committerJames Morris <jmorris@namei.org>
Mon, 12 Apr 2010 02:18:29 +0000 (12:18 +1000)
Unused hook.  Remove.

Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
fs/namespace.c
include/linux/security.h
security/capability.c
security/security.c

index c1d0d877bab77e181128cd923295181f0d8d19f9..8aea78c8e760c46be82d57d5dfc5fe4e7f751538 100644 (file)
@@ -628,7 +628,6 @@ repeat:
                mnt->mnt_pinned = 0;
                spin_unlock(&vfsmount_lock);
                acct_auto_close_mnt(mnt);
-               security_sb_umount_close(mnt);
                goto repeat;
        }
 }
index 9ebd2e411d2df74319e997663fa9d06499dcba82..354b0ceefc87a6501e28c6be33b247ffe8f54e03 100644 (file)
@@ -272,11 +272,6 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
  *     @mnt contains the mounted file system.
  *     @flags contains the unmount flags, e.g. MNT_FORCE.
  *     Return 0 if permission is granted.
- * @sb_umount_close:
- *     Close any files in the @mnt mounted filesystem that are held open by
- *     the security module.  This hook is called during an umount operation
- *     prior to checking whether the filesystem is still busy.
- *     @mnt contains the mounted filesystem.
  * @sb_umount_busy:
  *     Handle a failed umount of the @mnt mounted filesystem, e.g.  re-opening
  *     any files that were closed by umount_close.  This hook is called during
@@ -1479,7 +1474,6 @@ struct security_operations {
        int (*sb_mount) (char *dev_name, struct path *path,
                         char *type, unsigned long flags, void *data);
        int (*sb_umount) (struct vfsmount *mnt, int flags);
-       void (*sb_umount_close) (struct vfsmount *mnt);
        void (*sb_umount_busy) (struct vfsmount *mnt);
        void (*sb_post_remount) (struct vfsmount *mnt,
                                 unsigned long flags, void *data);
@@ -1777,7 +1771,6 @@ int security_sb_statfs(struct dentry *dentry);
 int security_sb_mount(char *dev_name, struct path *path,
                      char *type, unsigned long flags, void *data);
 int security_sb_umount(struct vfsmount *mnt, int flags);
-void security_sb_umount_close(struct vfsmount *mnt);
 void security_sb_umount_busy(struct vfsmount *mnt);
 void security_sb_post_remount(struct vfsmount *mnt, unsigned long flags, void *data);
 void security_sb_post_addmount(struct vfsmount *mnt, struct path *mountpoint);
@@ -2096,9 +2089,6 @@ static inline int security_sb_umount(struct vfsmount *mnt, int flags)
        return 0;
 }
 
-static inline void security_sb_umount_close(struct vfsmount *mnt)
-{ }
-
 static inline void security_sb_umount_busy(struct vfsmount *mnt)
 { }
 
index a7e905d8f1d322c43bc1f4dbb5f133ff729bccfa..db72f4f5a9e1b98e8c48dbea917a84b6f781d779 100644 (file)
@@ -85,10 +85,6 @@ static int cap_sb_umount(struct vfsmount *mnt, int flags)
        return 0;
 }
 
-static void cap_sb_umount_close(struct vfsmount *mnt)
-{
-}
-
 static void cap_sb_umount_busy(struct vfsmount *mnt)
 {
 }
@@ -937,7 +933,6 @@ void security_fixup_ops(struct security_operations *ops)
        set_to_cap_if_null(ops, sb_statfs);
        set_to_cap_if_null(ops, sb_mount);
        set_to_cap_if_null(ops, sb_umount);
-       set_to_cap_if_null(ops, sb_umount_close);
        set_to_cap_if_null(ops, sb_umount_busy);
        set_to_cap_if_null(ops, sb_post_remount);
        set_to_cap_if_null(ops, sb_post_addmount);
index a0bee70ed4b6cc63008df8bd45858ed9e13b8763..591c25fd430f056426969f6a47b9d661700c3d49 100644 (file)
@@ -311,11 +311,6 @@ int security_sb_umount(struct vfsmount *mnt, int flags)
        return security_ops->sb_umount(mnt, flags);
 }
 
-void security_sb_umount_close(struct vfsmount *mnt)
-{
-       security_ops->sb_umount_close(mnt);
-}
-
 void security_sb_umount_busy(struct vfsmount *mnt)
 {
        security_ops->sb_umount_busy(mnt);