summaryrefslogtreecommitdiffstats
path: root/security/yama/yama_lsm.c
diff options
context:
space:
mode:
authorJames Morris2017-02-14 14:17:24 +0100
committerJames Morris2017-03-06 01:00:12 +0100
commitdd0859dccbe291cf8179a96390f5c0e45cb9af1d (patch)
treee7a2b67dfdb2beaa07d42a314eb142289599d381 /security/yama/yama_lsm.c
parentselinux: fix kernel BUG on prlimit(..., NULL, NULL) (diff)
downloadkernel-qcow2-linux-dd0859dccbe291cf8179a96390f5c0e45cb9af1d.tar.gz
kernel-qcow2-linux-dd0859dccbe291cf8179a96390f5c0e45cb9af1d.tar.xz
kernel-qcow2-linux-dd0859dccbe291cf8179a96390f5c0e45cb9af1d.zip
security: introduce CONFIG_SECURITY_WRITABLE_HOOKS
Subsequent patches will add RO hardening to LSM hooks, however, SELinux still needs to be able to perform runtime disablement after init to handle architectures where init-time disablement via boot parameters is not feasible. Introduce a new kernel configuration parameter CONFIG_SECURITY_WRITABLE_HOOKS, and a helper macro __lsm_ro_after_init, to handle this case. Signed-off-by: James Morris <james.l.morris@oracle.com> Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Casey Schaufler <casey@schaufler-ca.com> Acked-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'security/yama/yama_lsm.c')
0 files changed, 0 insertions, 0 deletions