summaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2020-10-02 10:38:22 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2020-10-05 13:37:03 +0200
commit38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d (patch)
treeb954c4124cb99c7ff1309dfd5f5d2db411373209 /security/selinux/hooks.c
parent4f2d99b06b73800a5fb5b33e1899272e87ed7093 (diff)
downloadlinux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.tar.gz
linux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.tar.bz2
linux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.zip
module: Call security_kernel_post_load_data()
Now that there is an API for checking loaded contents for modules loaded without a file, call into the LSM hooks. Signed-off-by: Kees Cook <keescook@chromium.org> Reviewed-by: KP Singh <kpsingh@google.com> Acked-by: Jessica Yu <jeyu@kernel.org> Link: https://lore.kernel.org/r/20201002173828.2099543-11-keescook@chromium.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions