5/15/2023 0 Comments Zip xpress tracking numberSubsystem event matching functions with IMA specificįunctions. Replace the integrity sub-system reuse of the audit Incorporate feedback from Paul Moore on the audit Incorporate additional feedback from v30. The resulting code is considerably simpler and fits This time taking pseudo-code provided by Paul Moore as aīasis. Rework the supplimental audit record generation once more, Incorporate feedback on the audit generation. Returns -EINVAL, resulting in a failed setting of the Address the case in interface_lsm where the BPF module The resulting cid instances, although never No security modules that use secid slots are included. Address the case where CONFIG_SECURITY is enabled but Secids haveīeen replaced with lsmblob structures in all cases, including In the end no LSM interface scaffolding remains. Timestamp is managed allows auxiliary records to be generated Yet another rework of the audit changes. Address indexing an empty array for the case where noīuilt in security modules require data in struct lsmblob. Audit changes should be complete, all comments have been The format of data provided by lsm_self_attr() and the Add a user interface header uapi/linux/lsm.h which contains Patch set in support of the new system calls. ![]() Make more of the infrastructure data changes early in the That provides the values in /proc/./attr entries. Implement a pair of prctl() options PR_LSM_ATTR_SETĪnd PR_LSM_ATTR_GET. Implement a system call lsm_module_list() which providesĪ list of the security modules active on the system. Implement a system call lsm_self_attr() which providesĪ complete list of LSM process attributes. Discard the implementation of /proc/self/attr/display_lsm ![]() Discard the implementation of /proc/self/attr/context Will be addressed after these changes are upstream. These are primarily in the networking code and There are additional changes required for SELinux and Smack The AppArmor security module to stack safely with any other. This patchset provides the changes required for To: casey.schaufler, paul, linux-security-moduleĬc: casey, linux-audit, jmorris, selinux, keescook, john.johansen, ` (38 more replies) 0 siblings, 39 replies 68+ messages in threadįrom: Casey Schaufler 19:53 UTC ( / raw) 19:53 ` LSM: Identify modules by more than name Casey Schaufler LSM: Module stacking for AppArmor archive mirror help / color / mirror / Atom feed * LSM: Module stacking for AppArmor
0 Comments
Leave a Reply. |