Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
linux
Commits
f803e090
Commit
f803e090
authored
Dec 20, 2002
by
Linus Torvalds
Browse files
Options
Browse Files
Download
Plain Diff
Merge
bk://lsm.bkbits.net/linus-2.5
into home.transmeta.com:/home/torvalds/v2.5/linux
parents
cbfe51cb
712adcb4
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
26 additions
and
116 deletions
+26
-116
kernel/capability.c
kernel/capability.c
+9
-7
security/Kconfig
security/Kconfig
+5
-2
security/dummy.c
security/dummy.c
+2
-106
security/root_plug.c
security/root_plug.c
+3
-0
security/security.c
security/security.c
+7
-1
No files found.
kernel/capability.c
View file @
f803e090
...
...
@@ -84,13 +84,15 @@ static inline void cap_set_pg(int pgrp, kernel_cap_t *effective,
kernel_cap_t
*
inheritable
,
kernel_cap_t
*
permitted
)
{
task_t
*
g
,
*
target
;
do_each_thread
(
g
,
target
)
{
if
(
target
->
pgrp
!=
pgrp
)
continue
;
security_capset_set
(
target
,
effective
,
inheritable
,
permitted
);
}
while_each_thread
(
g
,
target
);
task_t
*
g
,
*
target
;
struct
list_head
*
l
;
struct
pid
*
pid
;
for_each_task_pid
(
pgrp
,
PIDTYPE_PGID
,
g
,
l
,
pid
)
{
target
=
g
;
while_each_thread
(
g
,
target
)
security_capset_set
(
target
,
effective
,
inheritable
,
permitted
);
}
}
/*
...
...
security/Kconfig
View file @
f803e090
...
...
@@ -27,8 +27,11 @@ config SECURITY_ROOTPLUG
depends
on
SECURITY
!=n
help
This
is
a
sample
LSM
module
that
should
only
be
used
as
such
.
It
enables
control
over
processes
being
created
by
root
users
if
a
specific
USB
device
is
not
present
in
the
system
.
It
prevents
any
programs
running
with
egid
==
0
if
a
specific
USB
device
is
not
present
in
the
system
.
See
<
http
://
www
.
linuxjournal
.
com
/
article
.
php
?
sid
=
6279
>
for
more
information
about
this
module
.
If
you
are
unsure
how
to
answer
this
question
,
answer
N
.
...
...
security/dummy.c
View file @
f803e090
...
...
@@ -3,7 +3,7 @@
* security model is loaded.
*
* Copyright (C) 2001 WireX Communications, Inc <chris@wirex.com>
* Copyright (C) 2001 Greg Kroah-Hartman <greg@kroah.com>
* Copyright (C) 2001
-2002
Greg Kroah-Hartman <greg@kroah.com>
* Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com>
*
* This program is free software; you can redistribute it and/or modify
...
...
@@ -542,111 +542,7 @@ static int dummy_unregister_security (const char *name, struct security_operatio
return
-
EINVAL
;
}
struct
security_operations
dummy_security_ops
=
{
.
ptrace
=
dummy_ptrace
,
.
capget
=
dummy_capget
,
.
capset_check
=
dummy_capset_check
,
.
capset_set
=
dummy_capset_set
,
.
acct
=
dummy_acct
,
.
capable
=
dummy_capable
,
.
quotactl
=
dummy_quotactl
,
.
quota_on
=
dummy_quota_on
,
.
bprm_alloc_security
=
dummy_bprm_alloc_security
,
.
bprm_free_security
=
dummy_bprm_free_security
,
.
bprm_compute_creds
=
dummy_bprm_compute_creds
,
.
bprm_set_security
=
dummy_bprm_set_security
,
.
bprm_check_security
=
dummy_bprm_check_security
,
.
sb_alloc_security
=
dummy_sb_alloc_security
,
.
sb_free_security
=
dummy_sb_free_security
,
.
sb_statfs
=
dummy_sb_statfs
,
.
sb_mount
=
dummy_sb_mount
,
.
sb_check_sb
=
dummy_sb_check_sb
,
.
sb_umount
=
dummy_sb_umount
,
.
sb_umount_close
=
dummy_sb_umount_close
,
.
sb_umount_busy
=
dummy_sb_umount_busy
,
.
sb_post_remount
=
dummy_sb_post_remount
,
.
sb_post_mountroot
=
dummy_sb_post_mountroot
,
.
sb_post_addmount
=
dummy_sb_post_addmount
,
.
sb_pivotroot
=
dummy_sb_pivotroot
,
.
sb_post_pivotroot
=
dummy_sb_post_pivotroot
,
.
inode_alloc_security
=
dummy_inode_alloc_security
,
.
inode_free_security
=
dummy_inode_free_security
,
.
inode_create
=
dummy_inode_create
,
.
inode_post_create
=
dummy_inode_post_create
,
.
inode_link
=
dummy_inode_link
,
.
inode_post_link
=
dummy_inode_post_link
,
.
inode_unlink
=
dummy_inode_unlink
,
.
inode_symlink
=
dummy_inode_symlink
,
.
inode_post_symlink
=
dummy_inode_post_symlink
,
.
inode_mkdir
=
dummy_inode_mkdir
,
.
inode_post_mkdir
=
dummy_inode_post_mkdir
,
.
inode_rmdir
=
dummy_inode_rmdir
,
.
inode_mknod
=
dummy_inode_mknod
,
.
inode_post_mknod
=
dummy_inode_post_mknod
,
.
inode_rename
=
dummy_inode_rename
,
.
inode_post_rename
=
dummy_inode_post_rename
,
.
inode_readlink
=
dummy_inode_readlink
,
.
inode_follow_link
=
dummy_inode_follow_link
,
.
inode_permission
=
dummy_inode_permission
,
.
inode_permission_lite
=
dummy_inode_permission_lite
,
.
inode_setattr
=
dummy_inode_setattr
,
.
inode_getattr
=
dummy_inode_getattr
,
.
inode_post_lookup
=
dummy_inode_post_lookup
,
.
inode_delete
=
dummy_inode_delete
,
.
inode_setxattr
=
dummy_inode_setxattr
,
.
inode_getxattr
=
dummy_inode_getxattr
,
.
inode_listxattr
=
dummy_inode_listxattr
,
.
inode_removexattr
=
dummy_inode_removexattr
,
.
file_permission
=
dummy_file_permission
,
.
file_alloc_security
=
dummy_file_alloc_security
,
.
file_free_security
=
dummy_file_free_security
,
.
file_ioctl
=
dummy_file_ioctl
,
.
file_mmap
=
dummy_file_mmap
,
.
file_mprotect
=
dummy_file_mprotect
,
.
file_lock
=
dummy_file_lock
,
.
file_fcntl
=
dummy_file_fcntl
,
.
file_set_fowner
=
dummy_file_set_fowner
,
.
file_send_sigiotask
=
dummy_file_send_sigiotask
,
.
file_receive
=
dummy_file_receive
,
.
task_create
=
dummy_task_create
,
.
task_alloc_security
=
dummy_task_alloc_security
,
.
task_free_security
=
dummy_task_free_security
,
.
task_setuid
=
dummy_task_setuid
,
.
task_post_setuid
=
dummy_task_post_setuid
,
.
task_setgid
=
dummy_task_setgid
,
.
task_setpgid
=
dummy_task_setpgid
,
.
task_getpgid
=
dummy_task_getpgid
,
.
task_getsid
=
dummy_task_getsid
,
.
task_setgroups
=
dummy_task_setgroups
,
.
task_setnice
=
dummy_task_setnice
,
.
task_setrlimit
=
dummy_task_setrlimit
,
.
task_setscheduler
=
dummy_task_setscheduler
,
.
task_getscheduler
=
dummy_task_getscheduler
,
.
task_wait
=
dummy_task_wait
,
.
task_kill
=
dummy_task_kill
,
.
task_prctl
=
dummy_task_prctl
,
.
task_kmod_set_label
=
dummy_task_kmod_set_label
,
.
task_reparent_to_init
=
dummy_task_reparent_to_init
,
.
ipc_permission
=
dummy_ipc_permission
,
.
msg_queue_alloc_security
=
dummy_msg_queue_alloc_security
,
.
msg_queue_free_security
=
dummy_msg_queue_free_security
,
.
shm_alloc_security
=
dummy_shm_alloc_security
,
.
shm_free_security
=
dummy_shm_free_security
,
.
sem_alloc_security
=
dummy_sem_alloc_security
,
.
sem_free_security
=
dummy_sem_free_security
,
.
register_security
=
dummy_register_security
,
.
unregister_security
=
dummy_unregister_security
,
};
struct
security_operations
dummy_security_ops
;
#define set_to_dummy_if_null(ops, function) \
do { \
...
...
security/root_plug.c
View file @
f803e090
...
...
@@ -13,6 +13,9 @@
* If you want to turn this into something with a semblance of security,
* you need to hook the task_* functions also.
*
* See http://www.linuxjournal.com/article.php?sid=6279 for more information
* about this code.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation, version 2 of the
...
...
security/security.c
View file @
f803e090
...
...
@@ -2,7 +2,7 @@
* Security plug functions
*
* Copyright (C) 2001 WireX Communications, Inc <chris@wirex.com>
* Copyright (C) 2001 Greg Kroah-Hartman <greg@kroah.com>
* Copyright (C) 2001
-2002
Greg Kroah-Hartman <greg@kroah.com>
* Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com>
*
* This program is free software; you can redistribute it and/or modify
...
...
@@ -48,6 +48,12 @@ int security_scaffolding_startup (void)
printk
(
KERN_INFO
"Security Scaffold v"
SECURITY_SCAFFOLD_VERSION
" initialized
\n
"
);
if
(
verify
(
&
dummy_security_ops
))
{
printk
(
KERN_ERR
"%s could not verify "
"dummy_security_ops structure.
\n
"
,
__FUNCTION__
);
return
-
EIO
;
}
security_ops
=
&
dummy_security_ops
;
return
0
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment