DescriptionCHROMIUM: Pull in Yama LSM
Until we integrate a more complete LSM or an out of tree framework like
GRsecurity, pull in the baseline protections from Yama:
https://patchwork.kernel.org/patch/108412/raw/
It provides a tangible enhancement to the baseline security of a Linux
kernel-based operating system.
(Notably, ptrace scoping is useful since we can't just kill ptrace.)
Signed-off-by: Will Drewry <wad@chromium.org>
R=olofj@chromium.org,ups@chromium.org
BUG=chromium-os:13131
TEST=As follows:
- boot and run x86 basic usage => PASS
- boot and run x86 in dev mode:
sleep 3600 &
gdb -p sleep_pid
[access denied]
sudo gdb -p sleep_pid
[success] => PASS
- boot and run x86 and cause chrome SEGV
kill -SEGV chrome_pid
/home/chronos/user/crash has crash data => PASS
- boot and run the various autotest testsuites [in progress]
All tests imply a configuration change which will be mailed separately.
Patch Set 1 #
Messages
Total messages: 3 (0 generated)
|