path: root/security/capability.c
diff options
authorPaul Moore <paul.moore@hp.com>2009-03-27 17:10:48 -0400
committerJames Morris <jmorris@namei.org>2009-03-28 15:01:37 +1100
commit8651d5c0b1f874c5b8307ae2b858bc40f9f02482 (patch)
treec09bee8fdc4c659d155b47911dc87ce4c09b6676 /security/capability.c
parent58bfbb51ff2b0fdc6c732ff3d72f50aa632b67a2 (diff)
lsm: Remove the socket_post_accept() hook
The socket_post_accept() hook is not currently used by any in-tree modules and its existence continues to cause problems by confusing people about what can be safely accomplished using this hook. If a legitimate need for this hook arises in the future it can always be reintroduced. Signed-off-by: Paul Moore <paul.moore@hp.com> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/capability.c')
1 files changed, 0 insertions, 5 deletions
diff --git a/security/capability.c b/security/capability.c
index c545bd1300b..21b6cead6a8 100644
--- a/security/capability.c
+++ b/security/capability.c
@@ -620,10 +620,6 @@ static int cap_socket_accept(struct socket *sock, struct socket *newsock)
return 0;
-static void cap_socket_post_accept(struct socket *sock, struct socket *newsock)
static int cap_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size)
return 0;
@@ -1014,7 +1010,6 @@ void security_fixup_ops(struct security_operations *ops)
set_to_cap_if_null(ops, socket_connect);
set_to_cap_if_null(ops, socket_listen);
set_to_cap_if_null(ops, socket_accept);
- set_to_cap_if_null(ops, socket_post_accept);
set_to_cap_if_null(ops, socket_sendmsg);
set_to_cap_if_null(ops, socket_recvmsg);
set_to_cap_if_null(ops, socket_getsockname);