![IBM Novell 10 SP1 EAL4 Скачать руководство пользователя страница 41](http://html1.mh-extra.com/html/ibm/novell-10-sp1-eal4/novell-10-sp1-eal4_design-manual_4190246041.webp)
This section briefly describes the functional subsystems that implement the required security functionalities
and the logical subsystems that are part of each of the functional subsystems.
The subsystems are structured into those implemented within the SLES kernel, and those implemented as
trusted processes.
4.4.1 Hardware
The hardware consists of the physical resources such as CPU, main memory, registers, caches, and devices
that effectively make up the computer system. Chapter 3 details the various hardware architectures supported
in this evaluation.
4.4.2 Firmware
The firmware consists of the software residing in the hardware that is started when the system goes through a
power-on reset. In addition to initializing the hardware and starting the operating system, on the partitioning-
capable platforms the firmware provides LPAR support as well.
4.4.3 Kernel subsystems
This section describes the subsystems implemented as part of the SLES kernel.
•
File and I/O: This subsystem includes only the file and I/O management kernel subsystem.
•
Process control: This subsystem includes the process control and management kernel subsystem.
•
Inter-process communication: This subsystem includes the IPC kernel subsystem.
•
Networking: This subsystem contains the kernel networking subsystem.
•
Memory management: This subsystem contains the kernel memory management subsystem.
•
Kernel modules: This subsystem contains routines in the kernel that create an infrastructure to
support loadable modules.
•
Device drivers: This subsystem contains the kernel device driver subsystem.
•
Audit: This subsystem contains the kernel auditing subsystem.
4.4.4 Trusted process subsystems
This section describes the subsystems implemented as trusted processes.
•
System initialization: This subsystem consists of the boot loader (GRUB, LILO, Yaboot, or z/IPL)
and the
init
program.
•
Identification and authentication: This subsystem contains the
su
,
passwd
, and
login
trusted
commands, as well as the
agetty
trusted process. This subsystem also includes PAM shared library
modules.
•
Network applications: This subsystem contains
vsftpd
and
sshd
trusted processes, which interact
with PAM modules to perform authentication. It also includes the
ping
program.
•
Batch processing: This subsystem contains the trusted programs used for the processing of batch
jobs. They are
crontab
and
cron and at
and
atd
.
•
System management: This subsystem contains the trusted programs used for system management
activities. Those include the following programs:
29
Содержание Novell 10 SP1 EAL4
Страница 1: ...SUSE Linux Enterprise Server 10 SP1 EAL4 High Level Design Version 1 2 1...
Страница 23: ...11...
Страница 29: ...17...
Страница 43: ...31...
Страница 54: ...42 Figure 5 8 New data blocks are allocated and initialized for an ext3 field...
Страница 117: ...105 Figure 5 48 Page Address Translation and access control...
Страница 125: ...113 Figure 5 54 31 bit Dynamic Address Translation with page table protection...
Страница 126: ...114 Figure 5 55 64 bit Dynamic Address Translation with page table protection...
Страница 172: ...160 Figure 5 79 System x SLES boot sequence...
Страница 214: ...202...