[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5j+RvX+CKMP5PWjAPmDpvO4N+t1JQ3C5zr3F-y-T-AH_ng@mail.gmail.com>
Date: Sat, 14 Jul 2018 19:30:10 -0700
From: Kees Cook <keescook@...omium.org>
To: Mimi Zohar <zohar@...ux.vnet.ibm.com>
Cc: linux-integrity <linux-integrity@...r.kernel.org>,
linux-security-module <linux-security-module@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
"Luis R . Rodriguez" <mcgrof@...nel.org>,
Eric Biederman <ebiederm@...ssion.com>,
Kexec Mailing List <kexec@...ts.infradead.org>,
Andres Rodriguez <andresx7@...il.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Jeff Vander Stoep <jeffv@...gle.com>,
Casey Schaufler <casey@...aufler-ca.com>
Subject: Re: [PATCH v6 7/8] module: replace the existing LSM hook in init_module
On Fri, Jul 13, 2018 at 11:06 AM, Mimi Zohar <zohar@...ux.vnet.ibm.com> wrote:
> Both the init_module and finit_module syscalls call either directly
> or indirectly the security_kernel_read_file LSM hook. This patch
> replaces the direct call in init_module with a call to the new
> security_kernel_load_data hook and makes the corresponding changes
> in SELinux, LoadPin, and IMA.
>
> Signed-off-by: Mimi Zohar <zohar@...ux.vnet.ibm.com>
> Cc: Jeff Vander Stoep <jeffv@...gle.com>
> Cc: Casey Schaufler <casey@...aufler-ca.com>
> Cc: Kees Cook <keescook@...omium.org>
> Acked-by: Jessica Yu <jeyu@...nel.org>
> Acked-by: Paul Moore <paul@...l-moore.com>
Acked-by: Kees Cook <keescook@...omium.org>
Thanks!
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists