[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.LRH.2.21.2010070419420.18879@namei.org>
Date: Wed, 7 Oct 2020 04:19:53 +1100 (AEDT)
From: James Morris <jmorris@...ei.org>
To: Kees Cook <keescook@...omium.org>
cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
KP Singh <kpsingh@...gle.com>, Jessica Yu <jeyu@...nel.org>,
Scott Branden <scott.branden@...adcom.com>,
Mimi Zohar <zohar@...ux.ibm.com>,
Luis Chamberlain <mcgrof@...nel.org>,
Takashi Iwai <tiwai@...e.de>, SeongJae Park <sjpark@...zon.de>,
KP Singh <kpsingh@...omium.org>, linux-efi@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-integrity@...r.kernel.org, selinux@...r.kernel.org,
linux-kselftest@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v5 10/16] module: Call security_kernel_post_load_data()
On Fri, 2 Oct 2020, Kees Cook wrote:
> Now that there is an API for checking loaded contents for modules
> loaded without a file, call into the LSM hooks.
>
> Signed-off-by: Kees Cook <keescook@...omium.org>
> Reviewed-by: KP Singh <kpsingh@...gle.com>
> Acked-by: Jessica Yu <jeyu@...nel.org>
Reviewed-by: James Morris <jamorris@...ux.microsoft.com>
--
James Morris
<jmorris@...ei.org>
Powered by blists - more mailing lists