d69dece5f5
I am still tired of having to find indirect ways to determine what security modules are active on a system. I have added /sys/kernel/security/lsm, which contains a comma separated list of the active security modules. No more groping around in /proc/filesystems or other clever hacks. Unchanged from previous versions except for being updated to the latest security next branch. Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> Acked-by: John Johansen <john.johansen@canonical.com> Acked-by: Paul Moore <paul@paul-moore.com> Acked-by: Kees Cook <keescook@chromium.org> Signed-off-by: James Morris <james.l.morris@oracle.com> |
||
---|---|---|
.. | ||
tpm | ||
00-INDEX | ||
apparmor.txt | ||
conf.py | ||
credentials.txt | ||
IMA-templates.txt | ||
index.rst | ||
keys-ecryptfs.txt | ||
keys-request-key.txt | ||
keys-trusted-encrypted.txt | ||
keys.txt | ||
LoadPin.txt | ||
LSM.txt | ||
self-protection.txt | ||
SELinux.txt | ||
Smack.txt | ||
tomoyo.txt | ||
Yama.txt |