security: introducing security_request_module
authorEric Paris <eparis@redhat.com>
Thu, 13 Aug 2009 13:44:57 +0000 (09:44 -0400)
committerJames Morris <jmorris@namei.org>
Fri, 14 Aug 2009 01:18:37 +0000 (11:18 +1000)
commit9188499cdb117d86a1ea6b04374095b098d56936
tree7c0dd23f2c98630c426cbd0bfbf5e46cc689091e
parenta8f80e8ff94ecba629542d9b4b5f5a8ee3eb565c
security: introducing security_request_module

Calling request_module() will trigger a userspace upcall which will load a
new module into the kernel.  This can be a dangerous event if the process
able to trigger request_module() is able to control either the modprobe
binary or the module binary.  This patch adds a new security hook to
request_module() which can be used by an LSM to control a processes ability
to call request_module().

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
include/linux/security.h
kernel/kmod.c
security/capability.c
security/security.c