|
Message-ID: <alpine.LRH.2.20.1702142324540.29914@namei.org> Date: Tue, 14 Feb 2017 23:34:12 +1100 (AEDT) From: James Morris <jmorris@...ei.org> To: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp> cc: keescook@...omium.org, linux-security-module@...r.kernel.org, kernel-hardening@...ts.openwall.com Subject: Re: Re: [RFC PATCH 1/4] security: mark LSM hooks as __ro_after_init On Tue, 14 Feb 2017, James Morris wrote: > As mentioned above, we are trying to harden the LSM framework against > being an attack vector. We are not trying to harden it against an already > compromised kernel. I should clarify here -- by already compromised, I mean specifically in terms of the attacker being able to bypass/change RO kernel pages. -- James Morris <jmorris@...ei.org>
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.