How to Write a Linux Security Module

How to Write a Linux Security Module

Linux Foundation via YouTube Direct link

What Do You Want To Protect?

8 of 36

8 of 36

What Do You Want To Protect?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Write a Linux Security Module

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why Do You Want To Write A Linux Security Module? We already have terrific security
  3. 3 When Is A Linux Security Module The Right Choice? Add access control Things controlled by
  4. 4 Restrictive Controls
  5. 5 When Is A Linux Security Module The Wrong Choice?
  6. 6 What Are The Alternatives?
  7. 7 Security Module Don'ts
  8. 8 What Do You Want To Protect?
  9. 9 What Do You Want To Protect it From?
  10. 10 The Hooks And Blobs Of A Linux Security Module
  11. 11 Access Control Hooks
  12. 12 Hooks Are Bail On Fail
  13. 13 State Maintenance Hooks
  14. 14 Access Hook Return values
  15. 15 Infrastructure Managed Security Blobs
  16. 16 Module Details
  17. 17 Setting Blob Sizes
  18. 18 The Blob, the Secid and the Secctx
  19. 19 Lifecycle Management Of A secctx
  20. 20 Credentials
  21. 21 Tasks
  22. 22 proc//attr
  23. 23 Object Based Hooks
  24. 24 Inodes
  25. 25 Traditional File Security Attributes
  26. 26 Extended Attributes
  27. 27 IPC objects and Keys
  28. 28 CONFIG_SECURITY_PATH
  29. 29 Aliases
  30. 30 Symlinks
  31. 31 Hardlinks
  32. 32 Mounts
  33. 33 Mount Namespaces
  34. 34 Network Hooks
  35. 35 Network Labels - Secmark
  36. 36 Network Labels - NetLabel

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.