From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from e28smtp01.in.ibm.com ([125.16.236.1]:43648 "EHLO e28smtp01.in.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750957AbcBKTgL (ORCPT ); Thu, 11 Feb 2016 14:36:11 -0500 Received: from localhost by e28smtp01.in.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 12 Feb 2016 01:06:07 +0530 Message-ID: <1455219355.2826.1.camel@linux.vnet.ibm.com> Subject: Re: [PATCH v3 14/22] security: define kernel_read_file hook From: Mimi Zohar To: Casey Schaufler Cc: linux-security-module@vger.kernel.org, "Luis R. Rodriguez" , kexec@lists.infradead.org, linux-modules@vger.kernel.org, fsdevel@vger.kernel.org, David Howells , David Woodhouse , Kees Cook , Dmitry Torokhov , Dmitry Kasatkin , Eric Biederman , Rusty Russell Date: Thu, 11 Feb 2016 14:35:55 -0500 In-Reply-To: <56BCBCA9.3040102@schaufler-ca.com> References: <1454526390-19792-1-git-send-email-zohar@linux.vnet.ibm.com> <1454526390-19792-15-git-send-email-zohar@linux.vnet.ibm.com> <56BCBCA9.3040102@schaufler-ca.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Sender: owner-linux-modules@vger.kernel.org List-ID: On Thu, 2016-02-11 at 08:54 -0800, Casey Schaufler wrote: > On 2/3/2016 11:06 AM, Mimi Zohar wrote: > > The kernel_read_file security hook is called prior to reading the file > > into memory. > > > > Signed-off-by: Mimi Zohar > > Acked-by: Casey Schaufler > > Being able to deny the read prior to performing any > real work makes a lot of sense. Thanks, Casey! Mimi