diff options
author | Casey Schaufler <casey@schaufler-ca.com> | 2017-01-18 20:09:05 -0500 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2017-01-18 21:18:29 -0500 |
commit | d69dece5f5b6bc7a5e39d2b6136ddc69469331fe (patch) | |
tree | b4c23177baf246a1f64b83442fc3359cbc0d8f38 /security/selinux/hooks.c | |
parent | 3ccb76c5dfe0d25c1d0168d5b726d0b43d19a485 (diff) |
LSM: Add /sys/kernel/security/lsm
I am still tired of having to find indirect ways to determine
what security modules are active on a system. I have added
/sys/kernel/security/lsm, which contains a comma separated
list of the active security modules. No more groping around
in /proc/filesystems or other clever hacks.
Unchanged from previous versions except for being updated
to the latest security next branch.
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: John Johansen <john.johansen@canonical.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r-- | security/selinux/hooks.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index c7c6619431d5..fdc24ea65fd0 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -6349,7 +6349,7 @@ static __init int selinux_init(void) | |||
6349 | 0, SLAB_PANIC, NULL); | 6349 | 0, SLAB_PANIC, NULL); |
6350 | avc_init(); | 6350 | avc_init(); |
6351 | 6351 | ||
6352 | security_add_hooks(selinux_hooks, ARRAY_SIZE(selinux_hooks)); | 6352 | security_add_hooks(selinux_hooks, ARRAY_SIZE(selinux_hooks), "selinux"); |
6353 | 6353 | ||
6354 | if (avc_add_callback(selinux_netcache_avc_callback, AVC_CALLBACK_RESET)) | 6354 | if (avc_add_callback(selinux_netcache_avc_callback, AVC_CALLBACK_RESET)) |
6355 | panic("SELinux: Unable to register AVC netcache callback\n"); | 6355 | panic("SELinux: Unable to register AVC netcache callback\n"); |