path: root/security
diff options
authorLucian Adrian Grijincu <lucian.grijincu@gmail.com>2011-02-01 18:44:56 +0200
committerEric Paris <eparis@redhat.com>2011-02-01 11:54:02 -0500
commit4916ca401e3051dad326ddd69765bd0e3f32fb9b (patch)
tree593778babcd691a498a909a5eaf462f29d241cf6 /security
parent8e6c96935fcc1ed3dbebc96fddfef3f2f2395afc (diff)
security: remove unused security_sysctl hook
The only user for this hook was selinux. sysctl routes every call through /proc/sys/. Selinux and other security modules use the file system checks for sysctl too, so no need for this hook any more. Signed-off-by: Lucian Adrian Grijincu <lucian.grijincu@gmail.com> Signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'security')
2 files changed, 0 insertions, 11 deletions
diff --git a/security/capability.c b/security/capability.c
index 383d14dc12ef..85b67c8632df 100644
--- a/security/capability.c
+++ b/security/capability.c
@@ -12,11 +12,6 @@
#include <linux/security.h>
-static int cap_sysctl(ctl_table *table, int op)
- return 0;
static int cap_syslog(int type)
return 0;
@@ -881,7 +876,6 @@ void __init security_fixup_ops(struct security_operations *ops)
set_to_cap_if_null(ops, capable);
set_to_cap_if_null(ops, quotactl);
set_to_cap_if_null(ops, quota_on);
- set_to_cap_if_null(ops, sysctl);
set_to_cap_if_null(ops, syslog);
set_to_cap_if_null(ops, settime);
set_to_cap_if_null(ops, vm_enough_memory);
diff --git a/security/security.c b/security/security.c
index 4830f36e1ab5..8f28685ee0d9 100644
--- a/security/security.c
+++ b/security/security.c
@@ -182,11 +182,6 @@ int security_real_capable_noaudit(struct task_struct *tsk, int cap)
return ret;
-int security_sysctl(struct ctl_table *table, int op)
- return security_ops->sysctl(table, op);
int security_quotactl(int cmds, int type, int id, struct super_block *sb)
return security_ops->quotactl(cmds, type, id, sb);

Privacy Policy