aboutsummaryrefslogtreecommitdiff
path: root/Documentation/security/00-INDEX
AgeCommit message (Collapse)AuthorFilesLines
2017-05-18doc: ReSTify keys-trusted-encrypted.txtKees Cook1-4/+0
Adjusts for ReST markup and moves under keys security devel index. Cc: David Howells <[email protected]> Cc: Mimi Zohar <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify keys-request-key.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under keys security devel index. Cc: David Howells <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify keys-ecryptfs.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under keys security devel index. Cc: David Howells <[email protected]> Cc: Tyler Hicks <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify keys.txtKees Cook1-2/+0
This creates a new section in the security development index for kernel keys, and adjusts for ReST markup. Cc: David Howells <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify Smack.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under LSM admin guide. Acked-by: Casey Schaufler <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify Yama.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under LSM admin guide. Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify tomoyo.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under LSM admin guide. Cc: Tetsuo Handa <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify apparmor.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under LSM admin guide. Acked-by: John Johansen <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify SELinux.txtKees Cook1-2/+0
Adjusts for ReST markup and moves under LSM admin guide. Cc: Paul Moore <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify and split LSM.txtKees Cook1-2/+0
The existing LSM.txt file covered both usage and development, so split this into two files, one under admin-guide and one under kernel development. Cc: James Morris <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify credentials.txtKees Cook1-2/+0
This updates the credentials API documentation to ReST markup and moves it under the security subsection of kernel API documentation. Cc: David Howells <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2017-05-18doc: ReSTify IMA-templates.txtKees Cook1-2/+0
Adjust IMA-templates.txt for ReST markup and add to the index for security/, under the Kernel API Documentation. Cc: Mimi Zohar <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: Jonathan Corbet <[email protected]>
2013-10-25ima: new templates management mechanismRoberto Sassu1-0/+2
The original 'ima' template is fixed length, containing the filedata hash and pathname. The filedata hash is limited to 20 bytes (md5/sha1). The pathname is a null terminated string, limited to 255 characters. To overcome these limitations and to add additional file metadata, it is necessary to extend the current version of IMA by defining additional templates. The main reason to introduce this feature is that, each time a new template is defined, the functions that generate and display the measurement list would include the code for handling a new format and, thus, would significantly grow over time. This patch set solves this problem by separating the template management from the remaining IMA code. The core of this solution is the definition of two new data structures: a template descriptor, to determine which information should be included in the measurement list, and a template field, to generate and display data of a given type. To define a new template field, developers define the field identifier and implement two functions, init() and show(), respectively to generate and display measurement entries. Initially, this patch set defines the following template fields (support for additional data types will be added later):  - 'd': the digest of the event (i.e. the digest of a measured file),         calculated with the SHA1 or MD5 hash algorithm;  - 'n': the name of the event (i.e. the file name), with size up to         255 bytes;  - 'd-ng': the digest of the event, calculated with an arbitrary hash            algorithm (field format: [<hash algo>:]digest, where the digest            prefix is shown only if the hash algorithm is not SHA1 or MD5);  - 'n-ng': the name of the event, without size limitations. Defining a new template descriptor requires specifying the template format, a string of field identifiers separated by the '|' character. This patch set defines the following template descriptors:  - "ima": its format is 'd|n';  - "ima-ng" (default): its format is 'd-ng|n-ng' Further details about the new template architecture can be found in Documentation/security/IMA-templates.txt. Changelog: - don't defer calling ima_init_template() - Mimi - don't define ima_lookup_template_desc() until used - Mimi - squashed with documentation patch - Mimi Signed-off-by: Roberto Sassu <[email protected]> Signed-off-by: Mimi Zohar <[email protected]>
2012-12-17Documentation: fix Documentation/security/00-INDEXJarkko Sakkinen1-0/+2
keys-ecryptfs.txt was missing from 00-INDEX. Signed-off-by: Jarkko Sakkinen <[email protected]> Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
2012-02-10security: Yama LSMKees Cook1-0/+2
This adds the Yama Linux Security Module to collect DAC security improvements (specifically just ptrace restrictions for now) that have existed in various forms over the years and have been carried outside the mainline kernel by other Linux distributions like Openwall and grsecurity. Signed-off-by: Kees Cook <[email protected]> Acked-by: John Johansen <[email protected]> Signed-off-by: James Morris <[email protected]>
2011-11-16Documentation: clarify the purpose of LSMsKees Cook1-0/+2
Clarify the purpose of the LSM interface with some brief examples and pointers to additional documentation. Signed-off-by: Kees Cook <[email protected]> Signed-off-by: James Morris <[email protected]>
2011-05-19Create Documentation/security/,Randy Dunlap1-0/+18
move LSM-, credentials-, and keys-related files from Documentation/ to Documentation/security/, add Documentation/security/00-INDEX, and update all occurrences of Documentation/<moved_file> to Documentation/security/<moved_file>.