]> git.karo-electronics.de Git - karo-tx-linux.git/commit
security: introduce kernel_module_from_file hook
authorKees Cook <keescook@chromium.org>
Mon, 15 Oct 2012 21:02:07 +0000 (07:32 +1030)
committerRusty Russell <rusty@rustcorp.com.au>
Wed, 24 Oct 2012 01:51:40 +0000 (12:21 +1030)
commitf45f81c141892d65d197630fbf326845b27d0c09
treee51633a57c991e5ffc55eddec04a44589dfa1a07
parente5cf7ce84b7b06b13ebfdb66422607e4530a33b9
security: introduce kernel_module_from_file hook

Now that kernel module origins can be reasoned about, provide a hook to
the LSMs to make policy decisions about the module file. This will let
Chrome OS enforce that loadable kernel modules can only come from its
read-only hash-verified root filesystem. Other LSMs can, for example,
read extended attributes for signatures, etc.

Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Serge E. Hallyn <serge.hallyn@canonical.com>
Acked-by: Eric Paris <eparis@redhat.com>
Acked-by: Mimi Zohar <zohar@us.ibm.com>
Acked-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
include/linux/security.h
kernel/module.c
security/capability.c
security/security.c