From: Andre Luis Pereira dos Santos <[email protected]>
Hi.
I did the reorganization of the boot message security framework so that it is not issued before the start in fact occur:
Signed-off-by: Andre Luis Pereira dos Santos <[email protected]>
---
Signed-off-by: Andre Luis Pereira dos Santos <[email protected]>
--- linux-2.6.37-rc1/security/security.c 2010-11-01 09:54:12.000000000 -0200
+++ linux-2.6.37-rc1-patched/security/security.c 2010-11-04 15:04:04.000000000 -0200
@@ -56,12 +56,12 @@ static void __init do_security_initcalls
*/
int __init security_init(void)
{
- printk(KERN_INFO "Security Framework initialized\n");
-
security_fixup_ops(&default_security_ops);
security_ops = &default_security_ops;
do_security_initcalls();
+ printk(KERN_INFO "Security Framework initialized\n");
+
return 0;
}
On Thu, 4 Nov 2010, Andr? Luis Pereira dos Santos - BSRSoft wrote:
> From: Andre Luis Pereira dos Santos <[email protected]>
>
> Hi.
> I did the reorganization of the boot message security framework so that it is not issued before the start in fact occur:
>
> Signed-off-by: Andre Luis Pereira dos Santos <[email protected]>
Your patch is whitespace damaged, probably by your mailer, and has
converted tabs into spaces. Please fix this.
> ---
>
> Signed-off-by: Andre Luis Pereira dos Santos <[email protected]>
> --- linux-2.6.37-rc1/security/security.c 2010-11-01 09:54:12.000000000 -0200
> +++ linux-2.6.37-rc1-patched/security/security.c 2010-11-04 15:04:04.000000000 -0200
> @@ -56,12 +56,12 @@ static void __init do_security_initcalls
> */
> int __init security_init(void)
> {
> - printk(KERN_INFO "Security Framework initialized\n");
> -
> security_fixup_ops(&default_security_ops);
> security_ops = &default_security_ops;
> do_security_initcalls();
>
> + printk(KERN_INFO "Security Framework initialized\n");
> +
> return 0;
> }
>
>
>
>
>
--
James Morris
<[email protected]>