1234567891011121314151617181920212223242526272829303132333435 |
- Linux Security Module framework
- -------------------------------
- The Linux Security Module (LSM) framework provides a mechanism for
- various security checks to be hooked by new kernel extensions. The name
- "module" is a bit of a misnomer since these extensions are not actually
- loadable kernel modules. Instead, they are selectable at build-time via
- CONFIG_DEFAULT_SECURITY and can be overridden at boot-time via the
- "security=..." kernel command line argument, in the case where multiple
- LSMs were built into a given kernel.
- The primary users of the LSM interface are Mandatory Access Control
- (MAC) extensions which provide a comprehensive security policy. Examples
- include SELinux, Smack, Tomoyo, and AppArmor. In addition to the larger
- MAC extensions, other extensions can be built using the LSM to provide
- specific changes to system operation when these tweaks are not available
- in the core functionality of Linux itself.
- Without a specific LSM built into the kernel, the default LSM will be the
- Linux capabilities system. Most LSMs choose to extend the capabilities
- system, building their checks on top of the defined capability hooks.
- For more details on capabilities, see capabilities(7) in the Linux
- man-pages project.
- Based on https://lkml.org/lkml/2007/10/26/215,
- a new LSM is accepted into the kernel when its intent (a description of
- what it tries to protect against and in what cases one would expect to
- use it) has been appropriately documented in Documentation/security/.
- This allows an LSM's code to be easily compared to its goals, and so
- that end users and distros can make a more informed decision about which
- LSMs suit their requirements.
- For extensive documentation on the available LSM hook interfaces, please
- see include/linux/security.h.
|