diff options
author | Tushar Sugandhi <tusharsu@linux.microsoft.com> | 2021-01-08 07:07:03 +0300 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2021-01-15 07:41:26 +0300 |
commit | d6e645012d97164609260ac567b304681734c5e2 (patch) | |
tree | a3407860354577f3af1260aad6f37820c6e8bfea /security/integrity/ima/ima_api.c | |
parent | 291af651b350817f7f1cbe308faaf7fa7af2a92c (diff) | |
download | linux-d6e645012d97164609260ac567b304681734c5e2.tar.xz |
IMA: define a hook to measure kernel integrity critical data
IMA provides capabilities to measure file and buffer data. However,
various data structures, policies, and states stored in kernel memory
also impact the integrity of the system. Several kernel subsystems
contain such integrity critical data. These kernel subsystems help
protect the integrity of the system. Currently, IMA does not provide a
generic function for measuring kernel integrity critical data.
Define ima_measure_critical_data, a new IMA hook, to measure kernel
integrity critical data.
Signed-off-by: Tushar Sugandhi <tusharsu@linux.microsoft.com>
Reviewed-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima_api.c')
-rw-r--r-- | security/integrity/ima/ima_api.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/integrity/ima/ima_api.c b/security/integrity/ima/ima_api.c index e76499b1ce78..1dd70dc68ffd 100644 --- a/security/integrity/ima/ima_api.c +++ b/security/integrity/ima/ima_api.c @@ -176,7 +176,7 @@ err_out: * subj=, obj=, type=, func=, mask=, fsmagic= * subj,obj, and type: are LSM specific. * func: FILE_CHECK | BPRM_CHECK | CREDS_CHECK | MMAP_CHECK | MODULE_CHECK - * | KEXEC_CMDLINE | KEY_CHECK + * | KEXEC_CMDLINE | KEY_CHECK | CRITICAL_DATA * mask: contains the permission mask * fsmagic: hex value * |