From: Kees Cook Date: Mon, 15 Oct 2012 21:02:07 +0000 (+1030) Subject: security: introduce kernel_module_from_file hook X-Git-Tag: v3.8-rc1~51^2~13 X-Git-Url: http://git.openpandora.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=2e72d51b4ac32989496870cd8171b3682fea1839;p=pandora-kernel.git security: introduce kernel_module_from_file hook Now that kernel module origins can be reasoned about, provide a hook to the LSMs to make policy decisions about the module file. This will let Chrome OS enforce that loadable kernel modules can only come from its read-only hash-verified root filesystem. Other LSMs can, for example, read extended attributes for signatures, etc. Signed-off-by: Kees Cook Acked-by: Serge E. Hallyn Acked-by: Eric Paris Acked-by: Mimi Zohar Acked-by: James Morris Signed-off-by: Rusty Russell --- Reading git-diff-tree failed