提交 5915eb53 编写于 作者: M Miklos Szeredi 提交者: James Morris

security: remove dummy module

Remove the dummy module and make the "capability" module the default.

Compile and boot tested.
Signed-off-by: NMiklos Szeredi <mszeredi@suse.cz>
Acked-by: NSerge Hallyn <serue@us.ibm.com>
Signed-off-by: NJames Morris <jmorris@namei.org>
上级 b478a9f9
...@@ -73,17 +73,9 @@ config SECURITY_NETWORK_XFRM ...@@ -73,17 +73,9 @@ config SECURITY_NETWORK_XFRM
IPSec. IPSec.
If you are unsure how to answer this question, answer N. If you are unsure how to answer this question, answer N.
config SECURITY_CAPABILITIES
bool "Default Linux Capabilities"
depends on SECURITY
default y
help
This enables the "default" Linux capabilities functionality.
If you are unsure how to answer this question, answer Y.
config SECURITY_FILE_CAPABILITIES config SECURITY_FILE_CAPABILITIES
bool "File POSIX Capabilities (EXPERIMENTAL)" bool "File POSIX Capabilities (EXPERIMENTAL)"
depends on (SECURITY=n || SECURITY_CAPABILITIES!=n) && EXPERIMENTAL depends on SECURITY && EXPERIMENTAL
default n default n
help help
This enables filesystem capabilities, allowing you to give This enables filesystem capabilities, allowing you to give
......
...@@ -6,16 +6,13 @@ obj-$(CONFIG_KEYS) += keys/ ...@@ -6,16 +6,13 @@ obj-$(CONFIG_KEYS) += keys/
subdir-$(CONFIG_SECURITY_SELINUX) += selinux subdir-$(CONFIG_SECURITY_SELINUX) += selinux
subdir-$(CONFIG_SECURITY_SMACK) += smack subdir-$(CONFIG_SECURITY_SMACK) += smack
# if we don't select a security model, use the default capabilities # always enable default capabilities
ifneq ($(CONFIG_SECURITY),y)
obj-y += commoncap.o obj-y += commoncap.o
endif
# Object file lists # Object file lists
obj-$(CONFIG_SECURITY) += security.o dummy.o inode.o obj-$(CONFIG_SECURITY) += security.o capability.o inode.o
# Must precede capability.o in order to stack properly. # Must precede capability.o in order to stack properly.
obj-$(CONFIG_SECURITY_SELINUX) += selinux/built-in.o obj-$(CONFIG_SECURITY_SELINUX) += selinux/built-in.o
obj-$(CONFIG_SECURITY_SMACK) += commoncap.o smack/built-in.o obj-$(CONFIG_SECURITY_SMACK) += smack/built-in.o
obj-$(CONFIG_SECURITY_CAPABILITIES) += commoncap.o capability.o obj-$(CONFIG_SECURITY_ROOTPLUG) += root_plug.o
obj-$(CONFIG_SECURITY_ROOTPLUG) += commoncap.o root_plug.o
obj-$(CONFIG_CGROUP_DEVICE) += device_cgroup.o obj-$(CONFIG_CGROUP_DEVICE) += device_cgroup.o
此差异已折叠。
此差异已折叠。
...@@ -20,8 +20,8 @@ ...@@ -20,8 +20,8 @@
/* Boot-time LSM user choice */ /* Boot-time LSM user choice */
static __initdata char chosen_lsm[SECURITY_NAME_MAX + 1]; static __initdata char chosen_lsm[SECURITY_NAME_MAX + 1];
/* things that live in dummy.c */ /* things that live in capability.c */
extern struct security_operations dummy_security_ops; extern struct security_operations default_security_ops;
extern void security_fixup_ops(struct security_operations *ops); extern void security_fixup_ops(struct security_operations *ops);
struct security_operations *security_ops; /* Initialized to NULL */ struct security_operations *security_ops; /* Initialized to NULL */
...@@ -57,13 +57,8 @@ int __init security_init(void) ...@@ -57,13 +57,8 @@ int __init security_init(void)
{ {
printk(KERN_INFO "Security Framework initialized\n"); printk(KERN_INFO "Security Framework initialized\n");
if (verify(&dummy_security_ops)) { security_fixup_ops(&default_security_ops);
printk(KERN_ERR "%s could not verify " security_ops = &default_security_ops;
"dummy_security_ops structure.\n", __func__);
return -EIO;
}
security_ops = &dummy_security_ops;
do_security_initcalls(); do_security_initcalls();
return 0; return 0;
...@@ -122,7 +117,7 @@ int register_security(struct security_operations *ops) ...@@ -122,7 +117,7 @@ int register_security(struct security_operations *ops)
return -EINVAL; return -EINVAL;
} }
if (security_ops != &dummy_security_ops) if (security_ops != &default_security_ops)
return -EAGAIN; return -EAGAIN;
security_ops = ops; security_ops = ops;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册