summaryrefslogtreecommitdiff
path: root/include/linux/lsm_hooks.h
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2020-10-02 20:38:22 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2020-10-05 14:37:03 +0300
commit38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d (patch)
treeb954c4124cb99c7ff1309dfd5f5d2db411373209 /include/linux/lsm_hooks.h
parent4f2d99b06b73800a5fb5b33e1899272e87ed7093 (diff)
downloadlinux-38f901735a9e2b3d182fc04a1dfcdb0d3325ea5d.tar.xz
module: Call security_kernel_post_load_data()
Now that there is an API for checking loaded contents for modules loaded without a file, call into the LSM hooks. Signed-off-by: Kees Cook <keescook@chromium.org> Reviewed-by: KP Singh <kpsingh@google.com> Acked-by: Jessica Yu <jeyu@kernel.org> Link: https://lore.kernel.org/r/20201002173828.2099543-11-keescook@chromium.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'include/linux/lsm_hooks.h')
0 files changed, 0 insertions, 0 deletions