Skip to content
Commit 9e47d31d authored by Matthew Garrett's avatar Matthew Garrett Committed by James Morris
Browse files

security: Add a "locked down" LSM hook



Add a mechanism to allow LSMs to make a policy decision around whether
kernel functionality that would allow tampering with or examining the
runtime state of the kernel should be permitted.

Signed-off-by: default avatarMatthew Garrett <mjg59@google.com>
Acked-by: default avatarKees Cook <keescook@chromium.org>
Acked-by: default avatarCasey Schaufler <casey@schaufler-ca.com>
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent e6b1db98
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment