summaryrefslogtreecommitdiff
path: root/init/do_mounts.c
diff options
context:
space:
mode:
authorH. Peter Anvin <hpa@zytor.com>2007-12-30 03:20:25 +0300
committerJames Morris <jmorris@namei.org>2008-01-25 03:29:50 +0300
commitbced95283e9434611cbad8f2ff903cd396eaea72 (patch)
tree5d56afc7a5f239ebc53a1800a508f16b8d8701b0 /init/do_mounts.c
parent42d7896ebc5f7268b1fe6bbd20f2282e20ae7895 (diff)
downloadlinux-bced95283e9434611cbad8f2ff903cd396eaea72.tar.xz
security: remove security_sb_post_mountroot hook
The security_sb_post_mountroot() hook is long-since obsolete, and is fundamentally broken: it is never invoked if someone uses initramfs. This is particularly damaging, because the existence of this hook has been used as motivation for not using initramfs. Stephen Smalley confirmed on 2007-07-19 that this hook was originally used by SELinux but can now be safely removed: http://marc.info/?l=linux-kernel&m=118485683612916&w=2 Cc: Stephen Smalley <sds@tycho.nsa.gov> Cc: James Morris <jmorris@namei.org> Cc: Eric Paris <eparis@parisplace.org> Cc: Chris Wright <chrisw@sous-sol.org> Signed-off-by: H. Peter Anvin <hpa@zytor.com> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'init/do_mounts.c')
-rw-r--r--init/do_mounts.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/init/do_mounts.c b/init/do_mounts.c
index 4efa1e5385e3..31b2185ce304 100644
--- a/init/do_mounts.c
+++ b/init/do_mounts.c
@@ -470,6 +470,5 @@ void __init prepare_namespace(void)
out:
sys_mount(".", "/", NULL, MS_MOVE, NULL);
sys_chroot(".");
- security_sb_post_mountroot();
}