Examine how the LSMs (AppArmor, SELinux, and Smack) connect to security_operations. On a test board, experiment with kernel hardening settings such as stack protector, KASLR, and hardened usercopy. The quickest way to see practical mitigations for embedded Linux is to observe upstream security changes and mailing list conversations.
L
liNda11
@liNda11
Posts
-
Kernel security guidance