[RFC 0/3] Safe, dynamically (un)loadable LSMs
James Morris
james.l.morris at oracle.com
Thu Dec 7 00:00:31 UTC 2017
On Wed, 6 Dec 2017, Sargun Dhillon wrote:
> Should I respin this patch sans module unloading? Still a set of dynamic
> hooks that are independent to allow for sealable memory support.
Yes, please.
> I'm also wondering what people think of the fs change? I don't think
> that it makes a lot of sense just having one giant list. I was thinking
> it might make more sense using the module_name instead.
I don't know how useful this will be in practice. Who/what will be
looking at these entries and why?
--
James Morris
<james.l.morris at oracle.com>
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list