diff options
author | Kees Cook <keescook@chromium.org> | 2017-05-13 14:51:43 +0300 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2017-05-18 19:31:24 +0300 |
commit | 504f231cda569b5e4e48d81a35376641552a5092 (patch) | |
tree | 13d929f787804f6181b65df225e74d70ff1e9e22 /Documentation/security/LSM.rst | |
parent | f00f85a8b2e0ac344f8dbaa3441b31bc283ce400 (diff) | |
download | linux-504f231cda569b5e4e48d81a35376641552a5092.tar.xz |
doc: ReSTify and split LSM.txt
The existing LSM.txt file covered both usage and development, so split
this into two files, one under admin-guide and one under kernel
development.
Cc: James Morris <james.l.morris@oracle.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation/security/LSM.rst')
-rw-r--r-- | Documentation/security/LSM.rst | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/Documentation/security/LSM.rst b/Documentation/security/LSM.rst new file mode 100644 index 000000000000..d75778b0fa10 --- /dev/null +++ b/Documentation/security/LSM.rst @@ -0,0 +1,14 @@ +================================= +Linux Security Module Development +================================= + +Based on https://lkml.org/lkml/2007/10/26/215, +a new LSM is accepted into the kernel when its intent (a description of +what it tries to protect against and in what cases one would expect to +use it) has been appropriately documented in ``Documentation/security/LSM``. +This allows an LSM's code to be easily compared to its goals, and so +that end users and distros can make a more informed decision about which +LSMs suit their requirements. + +For extensive documentation on the available LSM hook interfaces, please +see ``include/linux/lsm_hooks.h``. |