linux/security
Casey Schaufler ad4aff9ec2 LSM: Create lsm_list_modules system call
Create a system call to report the list of Linux Security Modules
that are active on the system. The list is provided as an array
of LSM ID numbers.

The calling application can use this list determine what LSM
specific actions it might take. That might include choosing an
output format, determining required privilege or bypassing
security module specific behavior.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Reviewed-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Mickaël Salaün <mic@digikod.net>
Signed-off-by: Paul Moore <paul@paul-moore.com>
2023-11-12 22:54:42 -05:00
..
apparmor LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
bpf LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
integrity As usual, lots of singleton and doubleton patches all over the tree and 2023-11-02 20:53:31 -10:00
keys This update includes the following changes: 2023-11-02 16:15:30 -10:00
landlock LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
loadpin LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
lockdown LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
safesetid LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
selinux LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
smack LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
tomoyo LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
yama LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
commoncap.c LSM: Identify modules by more than name 2023-11-12 22:54:42 -05:00
device_cgroup.c device_cgroup: Fix kernel-doc warnings in device_cgroup 2023-06-21 09:30:49 -04:00
inode.c security: convert to new timestamp accessors 2023-10-18 14:08:31 +02:00
Kconfig mm/slab: remove HAVE_HARDENED_USERCOPY_ALLOCATOR 2023-05-24 15:38:17 +02:00
Kconfig.hardening hardening: Move BUG_ON_DATA_CORRUPTION to hardening options 2023-08-15 14:57:25 -07:00
lsm_audit.c lsm: fix a number of misspellings 2023-05-25 17:52:15 -04:00
lsm_syscalls.c LSM: Create lsm_list_modules system call 2023-11-12 22:54:42 -05:00
Makefile LSM: syscalls for current process attributes 2023-11-12 22:54:42 -05:00
min_addr.c sysctl: pass kernel pointers to ->proc_handler 2020-04-27 02:07:40 -04:00
security.c LSM: syscalls for current process attributes 2023-11-12 22:54:42 -05:00