From: Chris Wright <chris@wirex.com>
To: linux-security-module@wirex.com
Cc: linux-kernel@vger.kernel.org
Subject: [ANNOUNCE] 2.5.52-lsm1
Date: Thu, 19 Dec 2002 02:51:23 -0800 [thread overview]
Message-ID: <20021219025123.A23371@figure1.int.wirex.com> (raw)
The Linux Security Modules project provides a lightweight, general
purpose framework for access control. The LSM interface enables
security policies to be developed as loadable kernel modules.
See http://lsm.immunix.org for more information.
2.5.52-lsm1 patch released. This is a rebase up to 2.5.52 as well as
numerous module updates and bugfixes. The interface has changed, and
the hooks are controlled with CONFIG_SECURITY now. Currently LIDS and
DTE will not compile.
Full lsm-2.5 patch (LSM + all modules) is available at:
http://lsm.immunix.org/patches/2.5/2.5.52/patch-2.5.52-lsm1.gz
The whole ChangeLog for this release is at:
http://lsm.immunix.org/patches/2.5/2.5.52/ChangeLog-2.5.52-lsm1
The LSM 2.5 BK tree can be pulled from:
bk://lsm.bkbits.net/lsm-2.5
2.5.52-lsm1
- merge with 2.5.36-52 (GregKH and me)
- Owlsm module updates (GregKH)
- Makefile and Kconfig cleanups (GregKH)
- SELinux: Assign an initial SID to SCMP packets. (Wayne Salamon)
- dummy module cleanups (GregKH)
- convert hooks to new format (GregKH)
(Stephen Smalley)
- add CONFIG_SECURITY (GregKH)
- SELinux: Handles inodes allocated by AFS (Stephen Smalley)
- SELinux: kill uses of i_dev (Stephen Smalley)
- LIDS 2.0.2pre2 update (Huagang Xie)
- Add hook to init_private_file/release_private_file (Stephen Smalley)
- remove sys_security (Christoph Hellwig)
- LIDS fix __FUNCTION__ pasting (me)
- Kconfig updates (me)
- LIDS workqueue conversion and bug fix (Huagang Xie)
- IPC hooks cleanup (Stephen Smalley)
- Selopt __exit fixups (Stephen Smalley)
- remove file_llseek (Christoph Hellwig)
- SELinux: remove inode_preconditions (Stephen Smalley)
- Added gfp_mask param to skb_alloc_security() hook (James Morris)
- SELinux: pivot_root, connect revalidation bug fixes
kbd ioctl fix, signull perm, remove old perm. (Stephen Smalley)
- LIDS update to for_each_process (me)
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
next reply other threads:[~2002-12-19 10:45 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2002-12-19 10:51 Chris Wright [this message]
2002-12-19 11:14 ` [ANNOUNCE] 2.5.52-lsm1 William Lee Irwin III
2002-12-19 11:42 ` William Lee Irwin III
2002-12-19 19:25 ` Chris Wright
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20021219025123.A23371@figure1.int.wirex.com \
--to=chris@wirex.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@wirex.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.