diff options
author | Matthew Garrett <matthewgarrett@google.com> | 2019-08-19 20:17:39 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2019-08-20 00:54:15 -0400 |
commit | 000d388ed3bbed745f366ce71b2bb7c2ee70f449 (patch) | |
tree | 8df5d266713aa79f5009a515ec5db597a61aba30 /include/linux/security.h | |
parent | 9e47d31d6a57b5babaca36d42b0d11b6db6019b7 (diff) |
security: Add a static lockdown policy LSM
While existing LSMs can be extended to handle lockdown policy,
distributions generally want to be able to apply a straightforward
static policy. This patch adds a simple LSM that can be configured to
reject either integrity or all lockdown queries, and can be configured
at runtime (through securityfs), boot time (via a kernel parameter) or
build time (via a kconfig option). Based on initial code by David
Howells.
Signed-off-by: Matthew Garrett <mjg59@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Cc: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 04cf48fab15d..74787335d9ce 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -97,6 +97,9 @@ enum lsm_event { | |||
97 | * potentially a moving target. It is easy to misuse this information | 97 | * potentially a moving target. It is easy to misuse this information |
98 | * in a way that could break userspace. Please be careful not to do | 98 | * in a way that could break userspace. Please be careful not to do |
99 | * so. | 99 | * so. |
100 | * | ||
101 | * If you add to this, remember to extend lockdown_reasons in | ||
102 | * security/lockdown/lockdown.c. | ||
100 | */ | 103 | */ |
101 | enum lockdown_reason { | 104 | enum lockdown_reason { |
102 | LOCKDOWN_NONE, | 105 | LOCKDOWN_NONE, |