mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-03-16 12:14:06 +00:00
selinux: clean up dead code after removing runtime disable
Commit f22f9aaf6c
("selinux: remove the runtime disable functionality")
removes the config SECURITY_SELINUX_DISABLE. This results in some dead code
in lsm_hooks.h.
Remove this dead code.
Signed-off-by: Lukas Bulwahn <lukas.bulwahn@gmail.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
79781fe466
commit
3401333188
1 changed files with 0 additions and 23 deletions
|
@ -1740,29 +1740,6 @@ extern struct lsm_info __start_early_lsm_info[], __end_early_lsm_info[];
|
|||
__used __section(".early_lsm_info.init") \
|
||||
__aligned(sizeof(unsigned long))
|
||||
|
||||
#ifdef CONFIG_SECURITY_SELINUX_DISABLE
|
||||
/*
|
||||
* Assuring the safety of deleting a security module is up to
|
||||
* the security module involved. This may entail ordering the
|
||||
* module's hook list in a particular way, refusing to disable
|
||||
* the module once a policy is loaded or any number of other
|
||||
* actions better imagined than described.
|
||||
*
|
||||
* The name of the configuration option reflects the only module
|
||||
* that currently uses the mechanism. Any developer who thinks
|
||||
* disabling their module is a good idea needs to be at least as
|
||||
* careful as the SELinux team.
|
||||
*/
|
||||
static inline void security_delete_hooks(struct security_hook_list *hooks,
|
||||
int count)
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i = 0; i < count; i++)
|
||||
hlist_del_rcu(&hooks[i].list);
|
||||
}
|
||||
#endif /* CONFIG_SECURITY_SELINUX_DISABLE */
|
||||
|
||||
extern int lsm_inode_alloc(struct inode *inode);
|
||||
|
||||
#endif /* ! __LINUX_LSM_HOOKS_H */
|
||||
|
|
Loading…
Add table
Reference in a new issue