|
@@ -51,7 +51,6 @@
|
|
|
#include <linux/tty.h>
|
|
|
#include <net/icmp.h>
|
|
|
#include <net/ip.h> /* for local_port_range[] */
|
|
|
-#include <net/sock.h>
|
|
|
#include <net/tcp.h> /* struct or_callable used in sock_rcv_skb */
|
|
|
#include <net/inet_connection_sock.h>
|
|
|
#include <net/net_namespace.h>
|
|
@@ -4652,11 +4651,6 @@ static void selinux_inet_conn_established(struct sock *sk, struct sk_buff *skb)
|
|
|
selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid);
|
|
|
}
|
|
|
|
|
|
-static void selinux_skb_owned_by(struct sk_buff *skb, struct sock *sk)
|
|
|
-{
|
|
|
- skb_set_owner_w(skb, sk);
|
|
|
-}
|
|
|
-
|
|
|
static int selinux_secmark_relabel_packet(u32 sid)
|
|
|
{
|
|
|
const struct task_security_struct *__tsec;
|
|
@@ -6041,7 +6035,6 @@ static struct security_operations selinux_ops = {
|
|
|
.tun_dev_attach_queue = selinux_tun_dev_attach_queue,
|
|
|
.tun_dev_attach = selinux_tun_dev_attach,
|
|
|
.tun_dev_open = selinux_tun_dev_open,
|
|
|
- .skb_owned_by = selinux_skb_owned_by,
|
|
|
|
|
|
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
|
|
.xfrm_policy_alloc_security = selinux_xfrm_policy_alloc,
|