From patchwork Tue Sep 25 00:18:04 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kees Cook X-Patchwork-Id: 10613083 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 961FB15A6 for ; Tue, 25 Sep 2018 00:18:40 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7F2DF29E9D for ; Tue, 25 Sep 2018 00:18:40 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 6EAE729EE6; Tue, 25 Sep 2018 00:18:40 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 0E88329E9D for ; Tue, 25 Sep 2018 00:18:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726922AbeIYGXY (ORCPT ); Tue, 25 Sep 2018 02:23:24 -0400 Received: from mail-pg1-f196.google.com ([209.85.215.196]:42583 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726464AbeIYGXY (ORCPT ); Tue, 25 Sep 2018 02:23:24 -0400 Received: by mail-pg1-f196.google.com with SMTP id y4-v6so10107797pgp.9 for ; Mon, 24 Sep 2018 17:18:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=qTlAiVyKmDi3nh8j1vnhRyGyfYh9dCrYAglaiQr2kEE=; b=Q4TLlttf9SWn5R1kA4WKpqdKlAuU/moC7pj+yvqlTzhZ9TjtdSCLF5usqIPtccSGoi OZy0pj6ErE+sjgLo47Aab7JIt8McPZewwEjok1ZFsQKb8RuaobSqi5WmzDB4ZMNZNU3u kOTs9NQ4HosS561qozeDshv+3XH966lxETk+Q= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=qTlAiVyKmDi3nh8j1vnhRyGyfYh9dCrYAglaiQr2kEE=; b=HlwU0xXJUMEaBsBe6ySkCY/98FtnuW0Z/Jya7hyStWy/CYRoyCMPnAkLrDEs5zq3+9 sl3Vw3FM8PVeu8SIKBJcDYZKjYVKZHBO2hXyGq4qM3F1PuMWKe7aXFJPRoLEsyelPcrp OcF3E69Nk52N7r10DFT+McahT8pkPHYujjAaZGo/DKwfxraSLHVbId4UcTZFfRzcEE+u CCUoSukxthVOe02x3Zte0QUJsNQ44STcZv+OnBL8rN7reRec3wR26PbkVzmyx8s0gexU oYuebZeeUj8353opve0af8umR9tJX9pSEw7juVFxh90wkjvvjKEyODT4YZ0o2QGCqnOx GbQg== X-Gm-Message-State: ABuFfogh1k9gROOzVW0V92ab15uPlZomYhV72xZKWyPxwbexOqCzSc/R csXaSworhw61ARcIJkBeks5M5Q== X-Google-Smtp-Source: ACcGV61BbY+qRvMi0uguvVPD4XNfbPTK2hiuRCRimHQGsL2x+DlosRZLJnDT4FbWIxBqTfLYeiTjLg== X-Received: by 2002:a17:902:509:: with SMTP id 9-v6mr286688plf.155.1537834718469; Mon, 24 Sep 2018 17:18:38 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id f184-v6sm594491pfc.88.2018.09.24.17.18.36 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 24 Sep 2018 17:18:37 -0700 (PDT) From: Kees Cook To: James Morris Cc: Kees Cook , Casey Schaufler , John Johansen , Tetsuo Handa , Paul Moore , Stephen Smalley , "Schaufler, Casey" , LSM , Jonathan Corbet , linux-doc@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization Date: Mon, 24 Sep 2018 17:18:04 -0700 Message-Id: <20180925001832.18322-2-keescook@chromium.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180925001832.18322-1-keescook@chromium.org> References: <20180925001832.18322-1-keescook@chromium.org> Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: X-Virus-Scanned: ClamAV using ClamSMTP For a while now, the LSM core has said it was "initializED", rather than "initializING". This adjust the report to be more accurate (i.e. before this was reported before any LSMs had been initialized.) Signed-off-by: Kees Cook Reviewed-by: Casey Schaufler Reviewed-by: James Morris Reviewed-by: John Johansen --- security/security.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/security/security.c b/security/security.c index 736e78da1ab9..4cbcf244a965 100644 --- a/security/security.c +++ b/security/security.c @@ -72,10 +72,11 @@ int __init security_init(void) int i; struct hlist_head *list = (struct hlist_head *) &security_hook_heads; + pr_info("Security Framework initializing\n"); + for (i = 0; i < sizeof(security_hook_heads) / sizeof(struct hlist_head); i++) INIT_HLIST_HEAD(&list[i]); - pr_info("Security Framework initialized\n"); /* * Load minor LSMs, with the capability module always first.