From mboxrd@z Thu Jan 1 00:00:00 1970 From: Casey Schaufler Subject: Re: [PATCH 12/12] security: fix up documentation for security_module_enable Date: Thu, 17 Apr 2008 08:30:47 -0700 (PDT) Message-ID: <109225.87914.qm@web36607.mail.mud.yahoo.com> References: <2fc4d0d4427f622c2f9a2c119f9de0241464ef44.1208428766.git.jmorris@namei.org> Reply-To: casey@schaufler-ca.com Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7BIT Return-path: In-Reply-To: <2fc4d0d4427f622c2f9a2c119f9de0241464ef44.1208428766.git.jmorris@namei.org> Sender: linux-kernel-owner@vger.kernel.org To: linux-security-module@vger.kernel.org Cc: linux-audit@redhat.com, linux-kernel@vger.kernel.org, James Morris List-Id: linux-audit@redhat.com --- James Morris wrote: > security_module_enable() can only be called during kernel init. > > Signed-off-by: James Morris Acked-by: Casey Schaufler > --- > security/security.c | 2 +- > 1 files changed, 1 insertions(+), 1 deletions(-) > > diff --git a/security/security.c b/security/security.c > index 2ed153c..7787c59 100644 > --- a/security/security.c > +++ b/security/security.c > @@ -83,7 +83,7 @@ __setup("security=", choose_lsm); > * > * Each LSM must pass this method before registering its own operations > * to avoid security registration races. This method may also be used > - * to check if your LSM is currently loaded. > + * to check if your LSM is currently loaded during kernel initialization. > * > * Return true if: > * -The passed LSM is the one chosen by user at boot time, > -- > 1.5.4.2 > > -- > To unsubscribe from this list: send the line "unsubscribe > linux-security-module" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > > > Casey Schaufler casey@schaufler-ca.com