[<prev] [next>] [day] [month] [year] [list]
Message-ID:
<SCYP152MB626161A0730BFC8A7AD1CF20B060A@SCYP152MB6261.LAMP152.PROD.OUTLOOK.COM>
Date: Sat, 31 May 2025 17:56:19 +0000
From: ℰ𝓃𝓏ℴ ℱ𝓊𝓀ℯ
<milesonerd@...look.com>
To: "paul@...l-moore.com" <paul@...l-moore.com>, "jmorris@...ei.org"
<jmorris@...ei.org>, "serge@...lyn.com" <serge@...lyn.com>
CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-security-module@...r.kernel.org"
<linux-security-module@...r.kernel.org>, "torvalds@...ux-foundation.org"
<torvalds@...ux-foundation.org>
Subject: [PATCH 0/3] security: add Lilium - Linux Integrity Lock-In User
Module
This patch introduces the Lilium (Linux Integrity Lock-In User Module) security module. Lilium aims to improve system hardening by blocking a set of high-risk operations often targeted by exploits or unwanted runtime behaviour.
Specifically, Lilium restricts:
*
ptrace
*
mmap/mprotect with PROT_EXEC
*
kexec_load
*
clone and unshare
*
open/openat
*
ioctl
Lilium is designed to be modular and configurable via sysfs, allowing users to enable protections individually or in combination, depending on their security needs. By default, Lilium is disabled to avoid interfering with existing workflows.
The goal is to provide a lightweight, flexible LSM focused on user-space integrity lockdowns, useful in hardened environments, containers, or minimalist distros.
Signed-off-by: Enzo Fuke <milesonerd@...look.com>
Content of type "text/html" skipped
Download attachment "0003-MAINTAINERS-Add-my-name-because-I-am-the-creator-of-.patch" of type "application/octet-stream" (859200 bytes)
Download attachment "0002-Documentation-for-Lilium.patch" of type "application/octet-stream" (754 bytes)
Download attachment "0001-Create-Lilium-Patch.patch" of type "application/octet-stream" (1990 bytes)
Powered by blists - more mailing lists