[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5j+Q0o0N7655+coog=_csHNsdJw38HAq-O8yHxnnr9RSNQ@mail.gmail.com>
Date: Fri, 31 Jul 2015 12:09:40 -0700
From: Kees Cook <keescook@...omium.org>
To: Salvatore Mesoraca <s.mesoraca16@...il.com>
Cc: LKML <linux-kernel@...r.kernel.org>,
linux-security-module <linux-security-module@...r.kernel.org>,
James Morris <james.l.morris@...cle.com>,
Casey Schaufler <casey@...aufler-ca.com>, trivial@...nel.org
Subject: Re: [PATCH] Adding YAMA hooks also when YAMA is not stacked.
On Fri, Jul 31, 2015 at 12:55 AM, Salvatore Mesoraca
<s.mesoraca16@...il.com> wrote:
> Without this patch YAMA will not work at all if it is chosen
> as the primary LSM instead of being "stacked".
Ah! Good catch, thank you! CONFIG based stacking for Yama will be
removed 4.3, but this is appropriate for fixing in 4.2. James, can you
take this and send it to Linus for 4.2-rc5?
Acked-by: Kees Cook <keescook@...omium.org>
-Kees
>
> Signed-off-by: Salvatore Mesoraca <s.mesoraca16@...il.com>
> ---
> security/yama/yama_lsm.c | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/security/yama/yama_lsm.c b/security/yama/yama_lsm.c
> index 9ed3250..5ebb896 100644
> --- a/security/yama/yama_lsm.c
> +++ b/security/yama/yama_lsm.c
> @@ -406,6 +406,7 @@ static __init int yama_init(void)
> */
> if (!security_module_enable("yama"))
> return 0;
> + yama_add_hooks();
> #endif
> pr_info("Yama: becoming mindful.\n");
>
> --
> 2.3.6
--
Kees Cook
Chrome OS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists