1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 5.7.2 LSM capabilities module , 5.7.3 LSM AppArmor module, 5.8 AppArmor

1 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 246
Download on canonical page 246 pages, 2.94 Mb
LSM adds a general security system call that simply invokes the sys_security hook. This system call
and hook permits security modules to implement new system calls for security-aware applications.
5.7.2 LSM capabilities module
The LSM kernel patch moves most of the existing POSIX.1e capabilities logic into an optional security
module stored in the file security/capability.c. This change allows users who do not want to use
capabilities to omit this code entirely from their kernel, instead using the dummy module for traditional super
user logic or any other module that they desire.
The capabilities logic for computing process capabilities on execve and set*uid, checking capabilities for a
particular process, saving and checking capabilities for netlink messages, and handling the capget and
capset system calls, have been moved into the capabilities module.
5.7.3 LSM AppArmor module
SLES includes AppArmor, which is an add-on security module. AppArmor provides application containment
functionality. AppArmor is described in the next section. For more information about AppArmor, see
http://www.novell.com/linux/security/apparmor/ .
5.8 AppArmor
The AppArmor logical subsystem consists of
The AppArmor access control functions, provided by the AppArmor LSM module. The AppArmor
LSM modules provides security functions that implement additional access control checks when
subjects access objects.
149

Figure 5-76: LSM hook architecture

MENU

Models

Contents