This is the eighth in a series of eight patches to the BSD Secure
Levels LSM.  It removes the ptrace check because it is redundant with
the check made in kernel/ptrace.c.  Thanks for Brad Spengler for this
suggestion.

Signed off by: Michael Halcrow <[EMAIL PROTECTED]>
Index: linux-2.6.11-rc2-mm1-modules/security/seclvl.c
===================================================================
--- linux-2.6.11-rc2-mm1-modules.orig/security/seclvl.c 2005-02-03 
15:54:35.055846936 -0600
+++ linux-2.6.11-rc2-mm1-modules/security/seclvl.c      2005-02-03 
15:55:29.109629512 -0600
@@ -397,24 +397,6 @@
        seclvl_write_passwd);
 
 /**
- * Explicitely disallow ptrace'ing the init process.
- */
-static int
-seclvl_ptrace(struct task_struct * parent, struct task_struct * child)
-{
-       if (seclvl >= 0) {
-               if (child->pid == 1) {
-                       seclvl_printk(1, KERN_WARNING "%s: Attempt to ptrace "
-                                     "the init process dissallowed in "
-                                     "secure level %d\n", __FUNCTION__,
-                                     seclvl);
-                       return -EPERM;
-               }
-       }
-       return 0;
-}
-
-/**
  * Capability checks for seclvl.  The majority of the policy
  * enforcement for seclvl takes place here.
  */
@@ -634,7 +616,6 @@
 }
 
 static struct security_operations seclvl_ops = {
-       .ptrace = seclvl_ptrace,
        .capable = seclvl_capable,
        .file_permission = seclvl_file_permission,
        .inode_setattr = seclvl_inode_setattr,

Reply via email to