diff options
author | Kees Cook <keescook@chromium.org> | 2020-10-02 10:38:22 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2020-10-05 13:37:03 +0200 |
commit | 38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d (patch) | |
tree | b954c4124cb99c7ff1309dfd5f5d2db411373209 /security/selinux/hooks.c | |
parent | 4f2d99b06b73800a5fb5b33e1899272e87ed7093 (diff) | |
download | linux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.tar.gz linux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.tar.bz2 linux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.zip |
module: Call security_kernel_post_load_data()
Now that there is an API for checking loaded contents for modules
loaded without a file, call into the LSM hooks.
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: KP Singh <kpsingh@google.com>
Acked-by: Jessica Yu <jeyu@kernel.org>
Link: https://lore.kernel.org/r/20201002173828.2099543-11-keescook@chromium.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions