File: securelevel.txt

package info (click to toggle)
linux 4.9.228-1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 814,720 kB
  • sloc: ansic: 14,532,095; asm: 289,032; makefile: 35,316; perl: 27,556; sh: 17,027; python: 13,390; cpp: 6,103; yacc: 4,354; lex: 2,440; awk: 1,212; pascal: 231; lisp: 218; sed: 21
file content (23 lines) | stat: -rw-r--r-- 1,034 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Linux securelevel interface
---------------------------

The Linux securelevel interface (inspired by the BSD securelevel interface)
is a runtime mechanism for configuring coarse-grained kernel-level security
restrictions. It provides a runtime configuration variable at
/sys/kernel/security/securelevel which can be written to by root. The
following values are supported:

-1: Permanently insecure mode. This level is equivalent to level 0, but once
    set cannot be changed.

0:  Insecure mode (default). This level imposes no additional kernel
    restrictions.

1:  Secure mode. If set, userspace will be unable to perform direct access
    to PCI devices, port IO access, access system memory directly via
    /dev/mem and /dev/kmem, perform kexec_load(), use the userspace
    software suspend mechanism, insert new ACPI code at runtime via the
    custom_method interface or modify CPU MSRs (on x86). Certain drivers
    may also limit additional interfaces.

Once the securelevel value is increased, it may not be decreased.