+5
−0
+6
−0
Loading
Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more
Subsequent patches will add RO hardening to LSM hooks, however, SELinux still needs to be able to perform runtime disablement after init to handle architectures where init-time disablement via boot parameters is not feasible. Introduce a new kernel configuration parameter CONFIG_SECURITY_WRITABLE_HOOKS, and a helper macro __lsm_ro_after_init, to handle this case. Change-Id: I95b96f67402ec7eb3a31befdd11af4e6bdc04d9d Signed-off-by:James Morris <james.l.morris@oracle.com> Acked-by:
Stephen Smalley <sds@tycho.nsa.gov> Acked-by:
Casey Schaufler <casey@schaufler-ca.com> Acked-by:
Kees Cook <keescook@chromium.org> Git-commit: dd0859dccbe291cf8179a96390f5c0e45cb9af1d Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git Signed-off-by:
Olav Haugan <ohaugan@codeaurora.org>