linux/tools/testing
Deven Bowers 0311507792 lsm: add IPE lsm
Integrity Policy Enforcement (IPE) is an LSM that provides an
complimentary approach to Mandatory Access Control than existing LSMs
today.

Existing LSMs have centered around the concept of access to a resource
should be controlled by the current user's credentials. IPE's approach,
is that access to a resource should be controlled by the system's trust
of a current resource.

The basis of this approach is defining a global policy to specify which
resource can be trusted.

Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-19 22:36:26 -04:00
..
crypto/chacha20-s390
cxl CXL for v6.11 merge window 2024-07-28 09:33:28 -07:00
fault-injection
ktest ktest: force $buildonly = 1 for 'make_warnings_file' test type 2024-03-15 12:36:19 -04:00
kunit RISC-V SoC Kconfig Updates for v6.10 2024-05-07 11:02:56 +02:00
memblock memblock tests: add memblock_overlaps_region_checks 2024-06-05 10:22:22 +03:00
nvdimm testing: nvdimm: Add MODULE_DESCRIPTION() macros 2024-06-17 18:43:08 -05:00
radix-tree bitmap-6.11-rc1 2024-07-26 09:50:36 -07:00
scatterlist
selftests lsm: add IPE lsm 2024-08-19 22:36:26 -04:00
vsock test/vsock: add install target 2024-07-13 15:17:35 -07:00