diff options
author | Deven Bowers <deven.desai@linux.microsoft.com> | 2024-08-03 09:08:15 +0300 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2024-08-20 05:36:26 +0300 |
commit | 0311507792b54069ac72e0a6c6b35c5d40aadad8 (patch) | |
tree | 6d74be50e686df975fdec73c65ce920826f2ae32 /security/Makefile | |
parent | 9ee6881454345c4bb518e9478415b32731da9858 (diff) | |
download | linux-0311507792b54069ac72e0a6c6b35c5d40aadad8.tar.xz |
lsm: add IPE lsm
Integrity Policy Enforcement (IPE) is an LSM that provides an
complimentary approach to Mandatory Access Control than existing LSMs
today.
Existing LSMs have centered around the concept of access to a resource
should be controlled by the current user's credentials. IPE's approach,
is that access to a resource should be controlled by the system's trust
of a current resource.
The basis of this approach is defining a global policy to specify which
resource can be trusted.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/Makefile')
-rw-r--r-- | security/Makefile | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/Makefile b/security/Makefile index 59f238490665..cc0982214b84 100644 --- a/security/Makefile +++ b/security/Makefile @@ -25,6 +25,7 @@ obj-$(CONFIG_SECURITY_LOCKDOWN_LSM) += lockdown/ obj-$(CONFIG_CGROUPS) += device_cgroup.o obj-$(CONFIG_BPF_LSM) += bpf/ obj-$(CONFIG_SECURITY_LANDLOCK) += landlock/ +obj-$(CONFIG_SECURITY_IPE) += ipe/ # Object integrity file lists obj-$(CONFIG_INTEGRITY) += integrity/ |