-
- Downloads
security: Add a static lockdown policy LSM
While existing LSMs can be extended to handle lockdown policy, distributions generally want to be able to apply a straightforward static policy. This patch adds a simple LSM that can be configured to reject either integrity or all lockdown queries, and can be configured at runtime (through securityfs), boot time (via a kernel parameter) or build time (via a kconfig option). Based on initial code by David Howells. Signed-off-by:Matthew Garrett <mjg59@google.com> Reviewed-by:
Kees Cook <keescook@chromium.org> Cc: David Howells <dhowells@redhat.com> Signed-off-by:
James Morris <jmorris@namei.org>
Showing
- Documentation/admin-guide/kernel-parameters.txt 9 additions, 0 deletionsDocumentation/admin-guide/kernel-parameters.txt
- include/linux/security.h 3 additions, 0 deletionsinclude/linux/security.h
- security/Kconfig 6 additions, 5 deletionssecurity/Kconfig
- security/Makefile 2 additions, 0 deletionssecurity/Makefile
- security/lockdown/Kconfig 46 additions, 0 deletionssecurity/lockdown/Kconfig
- security/lockdown/Makefile 1 addition, 0 deletionssecurity/lockdown/Makefile
- security/lockdown/lockdown.c 169 additions, 0 deletionssecurity/lockdown/lockdown.c
Loading
Please register or sign in to comment