亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? lsm.tmpl

?? Linux Kernel 2.6.9 for OMAP1710
?? TMPL
字號:
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook V3.1//EN"[]><article class="whitepaper" id="LinuxSecurityModule" lang="en"> <artheader> <title>Linux Security Modules:  General Security Hooks for Linux</title> <authorgroup> <author> <firstname>Stephen</firstname>  <surname>Smalley</surname> <affiliation> <orgname>NAI Labs</orgname> <address><email>ssmalley@nai.com</email></address> </affiliation> </author> <author> <firstname>Timothy</firstname>  <surname>Fraser</surname> <affiliation> <orgname>NAI Labs</orgname> <address><email>tfraser@nai.com</email></address> </affiliation> </author> <author> <firstname>Chris</firstname>  <surname>Vance</surname> <affiliation> <orgname>NAI Labs</orgname> <address><email>cvance@nai.com</email></address> </affiliation> </author> </authorgroup> </artheader><sect1><title>Introduction</title><para>In March 2001, the National Security Agency (NSA) gave a presentationabout Security-Enhanced Linux (SELinux) at the 2.5 Linux KernelSummit.  SELinux is an implementation of flexible and fine-grainednondiscretionary access controls in the Linux kernel, originallyimplemented as its own particular kernel patch.  Several othersecurity projects (e.g. RSBAC, Medusa) have also developed flexibleaccess control architectures for the Linux kernel, and variousprojects have developed particular access control models for Linux(e.g. LIDS, DTE, SubDomain).  Each project has developed andmaintained its own kernel patch to support its security needs.</para><para>In response to the NSA presentation, Linus Torvalds made a set ofremarks that described a security framework he would be willing toconsider for inclusion in the mainstream Linux kernel.  He described ageneral framework that would provide a set of security hooks tocontrol operations on kernel objects and a set of opaque securityfields in kernel data structures for maintaining security attributes.This framework could then be used by loadable kernel modules toimplement any desired model of security.  Linus also suggested thepossibility of migrating the Linux capabilities code into such amodule.</para><para>The Linux Security Modules (LSM) project was started by WireX todevelop such a framework.  LSM is a joint development effort byseveral security projects, including Immunix, SELinux, SGI and Janus,and several individuals, including Greg Kroah-Hartman and JamesMorris, to develop a Linux kernel patch that implements thisframework.  The patch is currently tracking the 2.4 series and istargeted for integration into the 2.5 development series.  Thistechnical report provides an overview of the framework and the examplecapabilities security module provided by the LSM kernel patch.</para></sect1><sect1 id="framework"><title>LSM Framework</title><para>The LSM kernel patch provides a general kernel framework to supportsecurity modules.  In particular, the LSM framework is primarilyfocused on supporting access control modules, although futuredevelopment is likely to address other security needs such asauditing.  By itself, the framework does not provide any additionalsecurity; it merely provides the infrastructure to support securitymodules.  The LSM kernel patch also moves most of the capabilitieslogic into an optional security module, with the system defaultingto the traditional superuser logic.  This capabilities moduleis discussed further in <XRef LinkEnd="cap">.</para><para>The LSM kernel patch adds security fields to kernel data structuresand inserts calls to hook functions at critical points in the kernelcode to manage the security fields and to perform access control.  Italso adds functions for registering and unregistering securitymodules, and adds a general <function>security</function> system callto support new system calls for security-aware applications.</para><para>The LSM security fields are simply <type>void*</type> pointers.  Forprocess and program execution security information, security fieldswere added to <structname>struct task_struct</structname> and <structname>struct linux_binprm</structname>.  For filesystem securityinformation, a security field was added to <structname>struct super_block</structname>.  For pipe, file, and socketsecurity information, security fields were added to <structname>struct inode</structname> and <structname>struct file</structname>.  For packet and network device securityinformation, security fields were added to<structname>struct sk_buff</structname> and<structname>struct net_device</structname>.  For System V IPC securityinformation, security fields were added to<structname>struct kern_ipc_perm</structname> and<structname>struct msg_msg</structname>; additionally, the definitionsfor <structname>struct msg_msg</structname>, <structname>struct msg_queue</structname>, and <structname>struct shmid_kernel</structname> were moved to header files(<filename>include/linux/msg.h</filename> and<filename>include/linux/shm.h</filename> as appropriate) to allowthe security modules to use these definitions.</para><para>Each LSM hook is a function pointer in a global table,security_ops. This table is a<structname>security_operations</structname> structure as defined by<filename>include/linux/security.h</filename>.  Detailed documentationfor each hook is included in this header file.  At present, thisstructure consists of a collection of substructures that group relatedhooks based on the kernel object (e.g. task, inode, file, sk_buff,etc) as well as some top-level hook function pointers for systemoperations.  This structure is likely to be flattened in the futurefor performance.  The placement of the hook calls in the kernel codeis described by the "called:" lines in the per-hook documentation inthe header file.  The hook calls can also be easily found in thekernel code by looking for the string "security_ops->".</para><para>Linus mentioned per-process security hooks in his original remarks as apossible alternative to global security hooks.  However, if LSM wereto start from the perspective of per-process hooks, then the baseframework would have to deal with how to handle operations thatinvolve multiple processes (e.g. kill), since each process might haveits own hook for controlling the operation.  This would require ageneral mechanism for composing hooks in the base framework.Additionally, LSM would still need global hooks for operations thathave no process context (e.g. network input operations).Consequently, LSM provides global security hooks, but a securitymodule is free to implement per-process hooks (where that makes sense)by storing a security_ops table in each process' security field andthen invoking these per-process hooks from the global hooks.The problem of composition is thus deferred to the module.</para><para>The global security_ops table is initialized to a set of hookfunctions provided by a dummy security module that providestraditional superuser logic.  A <function>register_security</function>function (in <filename>security/security.c</filename>) is provided toallow a security module to set security_ops to refer to its own hookfunctions, and an <function>unregister_security</function> function isprovided to revert security_ops to the dummy module hooks.  Thismechanism is used to set the primary security module, which isresponsible for making the final decision for each hook.</para><para>LSM also provides a simple mechanism for stacking additional securitymodules with the primary security module.  It defines<function>register_security</function> and<function>unregister_security</function> hooks in the<structname>security_operations</structname> structure and provides<function>mod_reg_security</function> and<function>mod_unreg_security</function> functions that invoke thesehooks after performing some sanity checking.  A security module cancall these functions in order to stack with other modules.  However,the actual details of how this stacking is handled are deferred to themodule, which can implement these hooks in any way it wishes(including always returning an error if it does not wish to supportstacking).  In this manner, LSM again defers the problem ofcomposition to the module.</para><para>Although the LSM hooks are organized into substructures based onkernel object, all of the hooks can be viewed as falling into twomajor categories: hooks that are used to manage the security fieldsand hooks that are used to perform access control.  Examples of thefirst category of hooks include the<function>alloc_security</function> and<function>free_security</function> hooks defined for each kernel datastructure that has a security field.  These hooks are used to allocateand free security structures for kernel objects.  The first categoryof hooks also includes hooks that set information in the securityfield after allocation, such as the <function>post_lookup</function>hook in <structname>struct inode_security_ops</structname>.  This hookis used to set security information for inodes after successful lookupoperations.  An example of the second category of hooks is the<function>permission</function> hook in <structname>struct inode_security_ops</structname>.  This hook checkspermission when accessing an inode.</para></sect1><sect1 id="cap"><title>LSM Capabilities Module</title><para>The LSM kernel patch moves most of the existing POSIX.1e capabilitieslogic into an optional security module stored in the file<filename>security/capability.c</filename>.  This change allowsusers who do not want to use capabilities to omit this code entirelyfrom their kernel, instead using the dummy module for traditionalsuperuser logic or any other module that they desire.  This changealso allows the developers of the capabilities logic to maintain andenhance their code more freely, without needing to integrate patchesback into the base kernel.</para><para>In addition to moving the capabilities logic, the LSM kernel patchcould move the capability-related fields from the kernel datastructures into the new security fields managed by the securitymodules.  However, at present, the LSM kernel patch leaves thecapability fields in the kernel data structures.  In his originalremarks, Linus suggested that this might be preferable so that othersecurity modules can be easily stacked with the capabilities modulewithout needing to chain multiple security structures on the security field.It also avoids imposing extra overhead on the capabilities moduleto manage the security fields.  However, the LSM framework couldcertainly support such a move if it is determined to be desirable,with only a few additional changes described below.</para><para>At present, the capabilities logic for computing process capabilitieson <function>execve</function> and <function>set*uid</function>,checking capabilities for a particular process, saving and checkingcapabilities for netlink messages, and handling the<function>capget</function> and <function>capset</function> systemcalls have been moved into the capabilities module.  There are still afew locations in the base kernel where capability-related fields aredirectly examined or modified, but the current version of the LSMpatch does allow a security module to completely replace theassignment and testing of capabilities.  These few locations wouldneed to be changed if the capability-related fields were moved intothe security field.  The following is a list of known locations thatstill perform such direct examination or modification ofcapability-related fields:<itemizedlist><listitem><para><filename>fs/open.c</filename>:<function>sys_access</function></para></listitem><listitem><para><filename>fs/lockd/host.c</filename>:<function>nlm_bind_host</function></para></listitem><listitem><para><filename>fs/nfsd/auth.c</filename>:<function>nfsd_setuser</function></para></listitem><listitem><para><filename>fs/proc/array.c</filename>:<function>task_cap</function></para></listitem></itemizedlist></para></sect1></article>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产黑丝在线一区二区三区| 国产99久久久久| 亚洲美女淫视频| 久久久精品日韩欧美| 精品噜噜噜噜久久久久久久久试看| 88在线观看91蜜桃国自产| 在线电影院国产精品| 欧美一区二区三区四区视频| 在线不卡a资源高清| 欧美一级一级性生活免费录像| 日韩三级精品电影久久久| 精品欧美黑人一区二区三区| 久久久久一区二区三区四区| 国产欧美一区二区三区鸳鸯浴| 久久精品人人做人人综合| 亚洲成人7777| 91片在线免费观看| 亚洲乱码国产乱码精品精98午夜 | 国产麻豆一精品一av一免费| 裸体歌舞表演一区二区| 国产福利不卡视频| 色噜噜狠狠色综合欧洲selulu| 欧美午夜不卡在线观看免费| 日韩久久精品一区| 国产精品五月天| 日日夜夜免费精品| 国产成人99久久亚洲综合精品| 99热99精品| 欧美不卡在线视频| 亚洲欧美欧美一区二区三区| 日韩av网站免费在线| 成人免费毛片aaaaa**| 激情图区综合网| 久久久久久久久久久久久夜| 奇米影视一区二区三区| 91麻豆精东视频| 91丨porny丨蝌蚪视频| 一本色道久久综合亚洲aⅴ蜜桃| 欧美日韩国产美| 欧美国产一区二区| 日韩在线一区二区| a在线播放不卡| 精品国产青草久久久久福利| 亚洲精品自拍动漫在线| 国产尤物一区二区在线| 91精品91久久久中77777| 国产视频一区在线播放| 日韩精品色哟哟| 色综合天天性综合| 国产午夜三级一区二区三| 亚洲一二三四区不卡| 国产农村妇女毛片精品久久麻豆| 洋洋成人永久网站入口| 国产综合久久久久久久久久久久 | 欧美日韩第一区日日骚| 国产精品久久久久影院亚瑟| 另类小说综合欧美亚洲| 在线视频中文字幕一区二区| 中文一区二区在线观看| 国产真实精品久久二三区| 欧美乱妇15p| 亚洲成国产人片在线观看| 成人av第一页| 国产精品久久久久三级| 国产91精品一区二区| 久久综合999| 国产美女在线观看一区| 欧美精品一区二| 国产一区二区成人久久免费影院| 欧美一二区视频| 免费成人小视频| 日韩欧美国产系列| 美女尤物国产一区| 欧美变态tickle挠乳网站| 久久精品国产免费| 欧美成人免费网站| 国产精品一区二区你懂的| 久久精品网站免费观看| 懂色av一区二区夜夜嗨| 国产精品色婷婷| 91免费国产在线| 一区二区三区精品| 制服丝袜亚洲精品中文字幕| 奇米四色…亚洲| 国产亚洲精品超碰| 成人的网站免费观看| 一区二区三区在线播| 欧美日韩不卡一区| 看电视剧不卡顿的网站| 国产亚洲一二三区| 91美女视频网站| 日韩成人一级大片| 久久综合一区二区| 99精品国产一区二区三区不卡| 亚洲老妇xxxxxx| 欧美一区二区三区四区久久| 国产一区二区不卡老阿姨| 亚洲少妇30p| 欧美美女直播网站| 国产福利精品一区| 亚洲国产日韩a在线播放性色| av电影在线观看一区| 亚洲女与黑人做爰| 国产成人在线色| 欧美日韩高清不卡| 精久久久久久久久久久| 日韩一级视频免费观看在线| 国产精品综合视频| 亚洲一级不卡视频| 国产女人18毛片水真多成人如厕 | 色哟哟日韩精品| 日本vs亚洲vs韩国一区三区二区| 久久久久久综合| 欧美色涩在线第一页| 国产一区二区三区不卡在线观看 | 精品国内片67194| 日本电影欧美片| 国产一区激情在线| 精品美女一区二区| 日本精品一区二区三区高清 | 日韩理论片一区二区| 91精品国产入口| 99精品国产视频| 国产乱码一区二区三区| 亚洲网友自拍偷拍| 中文一区在线播放| www国产成人| 欧美日韩国产大片| 91无套直看片红桃| 国产高清亚洲一区| 捆绑调教一区二区三区| 午夜视频在线观看一区二区三区| 国产精品久久午夜夜伦鲁鲁| 日韩一区二区在线观看视频| 欧美在线观看视频在线| 成人教育av在线| 国产精品亚洲第一区在线暖暖韩国| 亚洲国产三级在线| 亚洲中国最大av网站| **欧美大码日韩| 国产精品久久久久三级| 国产欧美日韩综合| 国产亚洲精品aa| 国产日韩av一区二区| 久久综合九色综合久久久精品综合| 欧美一区二区三区影视| 欧美精品电影在线播放| 欧美亚洲免费在线一区| 在线精品亚洲一区二区不卡| 91在线精品秘密一区二区| 国产成人av影院| 成人久久久精品乱码一区二区三区| 国产一区二区视频在线| 国产精品自拍毛片| 国产成人h网站| 不卡视频免费播放| 97精品久久久午夜一区二区三区| 高清国产午夜精品久久久久久| 国产91丝袜在线播放0| www.成人在线| 在线影院国内精品| 欧美精品在线一区二区三区| 欧美喷潮久久久xxxxx| 欧美一级免费大片| 欧美精品一区二区三区蜜桃视频| 久久久亚洲国产美女国产盗摄| 中文子幕无线码一区tr| 亚洲欧美成aⅴ人在线观看| 亚洲成人午夜影院| 蜜桃视频在线观看一区| 国产米奇在线777精品观看| 99视频精品全部免费在线| 欧美色中文字幕| 欧美v亚洲v综合ⅴ国产v| 欧美经典一区二区| 亚洲综合免费观看高清在线观看| 午夜视频一区二区| 国产乱子伦视频一区二区三区| 豆国产96在线|亚洲| 91国偷自产一区二区三区观看| 欧美电影在哪看比较好| 国产日产欧美一区| 亚洲网友自拍偷拍| 国产精品一区二区久久不卡| 色悠悠亚洲一区二区| 日韩精品一区二区三区视频 | 精品福利在线导航| 亚洲视频一二三| 精品亚洲porn| 91电影在线观看| 久久久无码精品亚洲日韩按摩| 亚洲综合一区二区三区| 精品系列免费在线观看| 欧美在线看片a免费观看| 久久精品一区四区| 丝袜美腿亚洲一区| 99久久99久久免费精品蜜臀| 精品久久久久久久久久久院品网| 久草这里只有精品视频| 久久女同互慰一区二区三区|