On 1/4/21 6:13 PM, Paul Moore wrote:
On Mon, Jan 4, 2021 at 6:30 PM Lakshmi Ramasubramanian
wrote:
On 12/23/20 1:10 PM, Paul Moore wrote:
Hi Paul,
Hello.
diff --git a/security/selinux/measure.c b/security/selinux/measure.c
new file mode 100644
index ..b7e24358e11d
--- /dev/null
On Mon, Jan 4, 2021 at 6:30 PM Lakshmi Ramasubramanian
wrote:
> On 12/23/20 1:10 PM, Paul Moore wrote:
> Hi Paul,
Hello.
> >> diff --git a/security/selinux/measure.c b/security/selinux/measure.c
> >> new file mode 100644
> >> index ..b7e24358e11d
> >> --- /dev/null
> >> +++
On 12/23/20 1:10 PM, Paul Moore wrote:
Hi Paul,
...
diff --git a/security/selinux/Makefile b/security/selinux/Makefile
index 4d8e0e8adf0b..83d512116341 100644
--- a/security/selinux/Makefile
+++ b/security/selinux/Makefile
@@ -16,6 +16,8 @@ selinux-$(CONFIG_NETLABEL) += netlabel.o
On Sat, Dec 12, 2020 at 1:03 PM Tushar Sugandhi
wrote:
> From: Lakshmi Ramasubramanian
>
> SELinux stores the active policy in memory, so the changes to this data
> at runtime would have an impact on the security guarantees provided
> by SELinux. Measuring in-memory SELinux policy through IMA
From: Lakshmi Ramasubramanian
SELinux stores the active policy in memory, so the changes to this data
at runtime would have an impact on the security guarantees provided
by SELinux. Measuring in-memory SELinux policy through IMA subsystem
provides a secure way for the attestation service to
5 matches
Mail list logo