diff options
author | Deven Bowers <[email protected]> | 2024-08-02 23:08:18 -0700 |
---|---|---|
committer | Paul Moore <[email protected]> | 2024-08-20 14:01:33 -0400 |
commit | 52443cb60c356707df494910fa134bbb0a8b1a66 (patch) | |
tree | b53fe558511f276f891ecce8da6aa34b0d5e3ae1 /scripts/generate_rust_analyzer.py | |
parent | 05a351630b7463ce58668095f5683669c1295f65 (diff) |
ipe: add LSM hooks on execution and kernel read
IPE's initial goal is to control both execution and the loading of
kernel modules based on the system's definition of trust. It
accomplishes this by plugging into the security hooks for
bprm_check_security, file_mprotect, mmap_file, kernel_load_data,
and kernel_read_data.
Signed-off-by: Deven Bowers <[email protected]>
Signed-off-by: Fan Wu <[email protected]>
Signed-off-by: Paul Moore <[email protected]>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions