Skip to content

Commit

Permalink
[PATCH] LSM: remove BSD secure level security module
Browse files Browse the repository at this point in the history
This code has suffered from broken core design and lack of developer
attention.  Broken security modules are too dangerous to leave around.  It
is time to remove this one.

Signed-off-by: Chris Wright <chrisw@sous-sol.org>
Acked-by: Michael Halcrow <mhalcrow@us.ibm.com>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Cc: Davi Arnaut <davi.arnaut@gmail.com>
Acked-by: Greg Kroah-Hartman <gregkh@suse.de>
Acked-by: James Morris <jmorris@namei.org>
Acked-by: Alan Cox <alan@redhat.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
  • Loading branch information
chriswright authored and Linus Torvalds committed Sep 29, 2006
1 parent cd1c6a4 commit 3bc1fa8
Show file tree
Hide file tree
Showing 4 changed files with 0 additions and 781 deletions.
97 changes: 0 additions & 97 deletions Documentation/seclvl.txt

This file was deleted.

12 changes: 0 additions & 12 deletions security/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -93,18 +93,6 @@ config SECURITY_ROOTPLUG

If you are unsure how to answer this question, answer N.

config SECURITY_SECLVL
tristate "BSD Secure Levels"
depends on SECURITY
select CRYPTO
select CRYPTO_SHA1
help
Implements BSD Secure Levels as an LSM. See
<file:Documentation/seclvl.txt> for instructions on how to use this
module.

If you are unsure how to answer this question, answer N.

source security/selinux/Kconfig

endmenu
Expand Down
1 change: 0 additions & 1 deletion security/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,3 @@ obj-$(CONFIG_SECURITY) += security.o dummy.o inode.o
obj-$(CONFIG_SECURITY_SELINUX) += selinux/built-in.o
obj-$(CONFIG_SECURITY_CAPABILITIES) += commoncap.o capability.o
obj-$(CONFIG_SECURITY_ROOTPLUG) += commoncap.o root_plug.o
obj-$(CONFIG_SECURITY_SECLVL) += seclvl.o
Loading

0 comments on commit 3bc1fa8

Please sign in to comment.