tmp_suning_uos_patched/security
Kees Cook 9b091556a0 LSM: LoadPin for kernel file loading restrictions
This LSM enforces that kernel-loaded files (modules, firmware, etc)
must all come from the same filesystem, with the expectation that
such a filesystem is backed by a read-only device such as dm-verity
or CDROM. This allows systems that have a verified and/or unchangeable
filesystem to enforce module and firmware loading restrictions without
needing to sign the files individually.

Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
2016-04-21 10:47:27 +10:00
..
apparmor
integrity
keys
loadpin LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00
selinux
smack
tomoyo
yama Yama: consolidate error reporting 2016-04-21 10:47:26 +10:00
commoncap.c
device_cgroup.c
inode.c
Kconfig LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00
lsm_audit.c
Makefile LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00
min_addr.c
security.c LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00