From: Greg KH <greg@kroah.com>
To: torvalds@transmeta.com
Cc: linux-kernel@vger.kernel.org, linux-security-module@wirex.com
Subject: [BK PATCH] LSM task control for 2.5.26
Date: Fri, 19 Jul 2002 16:09:36 -0700 [thread overview]
Message-ID: <20020719230936.GA24044@kroah.com> (raw)
Hi,
These changesets contain the initial LSM framework, offering hooks for
task control. It includes the default capabilities module, which should
be selected in the kernel configuration if you want to keep the existing
"normal Linux" capabilities mode.
Please pull from: bk://lsm.bkbits.net/linus-2.5
These patches were created by Stephen Smalley <sds@tislabs.com> from the
main LSM tree.
If anyone has any questions about these changes, please let us know.
thanks,
greg k-h
arch/arm/kernel/isa.c | 2
arch/i386/config.in | 1
arch/i386/kernel/entry.S | 2
arch/i386/kernel/ptrace.c | 4
fs/exec.c | 71 ++----
include/linux/binfmts.h | 1
include/linux/sched.h | 10
include/linux/security.h | 383 +++++++++++++++++++++++++++++++++++++
include/linux/sysctl.h | 2
init/main.c | 2
kernel/capability.c | 19 -
kernel/exit.c | 11 -
kernel/fork.c | 13 +
kernel/kmod.c | 2
kernel/ptrace.c | 8
kernel/sched.c | 41 +++-
kernel/signal.c | 3
kernel/sys.c | 178 ++++++++---------
kernel/uid16.c | 8
Makefile | 5
security/capability.c | 471 ++++++++++++++++++++++++++++++++++++++++++++++
security/Config.help | 4
security/Config.in | 7
security/dummy.c | 236 +++++++++++++++++++++++
security/Makefile | 13 +
security/security.c | 249 ++++++++++++++++++++++++
26 files changed, 1575 insertions(+), 171 deletions(-)
------
ChangeSet@1.663, 2002-07-19 16:01:00-07:00, greg@kroah.com
LSM: Enable the security framework. This includes basic task control hooks.
Makefile | 5 -
arch/i386/config.in | 1
arch/i386/kernel/entry.S | 2
arch/i386/kernel/ptrace.c | 4 +
fs/exec.c | 71 +++++-------------
include/linux/binfmts.h | 1
include/linux/sched.h | 10 +-
init/main.c | 2
kernel/capability.c | 19 ++--
kernel/exit.c | 11 +-
kernel/fork.c | 13 ++-
kernel/kmod.c | 2
kernel/ptrace.c | 8 +-
kernel/sched.c | 41 ++++++++--
kernel/signal.c | 3
kernel/sys.c | 178 +++++++++++++++++++++++-----------------------
kernel/uid16.c | 8 +-
17 files changed, 210 insertions(+), 169 deletions(-)
------
ChangeSet@1.662, 2002-07-19 15:55:59-07:00, greg@kroah.com
LSM: Add all of the new security/* files for basic task control
This includes the security_* functions, and the default and capability
modules.
include/linux/security.h | 383 ++++++++++++++++++++++++++++++++++++++
security/Config.help | 4
security/Config.in | 7
security/Makefile | 13 +
security/capability.c | 471 +++++++++++++++++++++++++++++++++++++++++++++++
security/dummy.c | 236 +++++++++++++++++++++++
security/security.c | 249 ++++++++++++++++++++++++
7 files changed, 1363 insertions(+)
------
ChangeSet@1.661, 2002-07-19 15:07:35-07:00, greg@kroah.com
LSM: change BUS_ISA to CTL_BUS_ISA to prevent namespace collision with the input subsystem.
This is needed due to the next header file changes.
arch/arm/kernel/isa.c | 2 +-
include/linux/sysctl.h | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
------
next reply other threads:[~2002-07-19 23:08 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2002-07-19 23:09 Greg KH [this message]
2002-07-19 23:10 ` [BK PATCH] LSM task control for 2.5.26 Greg KH
2002-07-19 23:10 ` Greg KH
2002-07-19 23:10 ` Greg KH
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20020719230936.GA24044@kroah.com \
--to=greg@kroah.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@wirex.com \
--cc=torvalds@transmeta.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox