summaryrefslogtreecommitdiffstats
path: root/include/linux/security.h
diff options
context:
space:
mode:
authorMatthew Garrett <matthewgarrett@google.com>2019-08-19 20:17:39 -0400
committerJames Morris <jmorris@namei.org>2019-08-20 00:54:15 -0400
commit000d388ed3bbed745f366ce71b2bb7c2ee70f449 (patch)
tree8df5d266713aa79f5009a515ec5db597a61aba30 /include/linux/security.h
parent9e47d31d6a57b5babaca36d42b0d11b6db6019b7 (diff)
security: Add a static lockdown policy LSM
While existing LSMs can be extended to handle lockdown policy, distributions generally want to be able to apply a straightforward static policy. This patch adds a simple LSM that can be configured to reject either integrity or all lockdown queries, and can be configured at runtime (through securityfs), boot time (via a kernel parameter) or build time (via a kconfig option). Based on initial code by David Howells. Signed-off-by: Matthew Garrett <mjg59@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Cc: David Howells <dhowells@redhat.com> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r--include/linux/security.h3
1 files changed, 3 insertions, 0 deletions
diff --git a/include/linux/security.h b/include/linux/security.h
index 04cf48fab15d..74787335d9ce 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -97,6 +97,9 @@ enum lsm_event {
97 * potentially a moving target. It is easy to misuse this information 97 * potentially a moving target. It is easy to misuse this information
98 * in a way that could break userspace. Please be careful not to do 98 * in a way that could break userspace. Please be careful not to do
99 * so. 99 * so.
100 *
101 * If you add to this, remember to extend lockdown_reasons in
102 * security/lockdown/lockdown.c.
100 */ 103 */
101enum lockdown_reason { 104enum lockdown_reason {
102 LOCKDOWN_NONE, 105 LOCKDOWN_NONE,