diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2010-08-04 13:28:39 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2010-08-04 13:28:39 -0400 |
commit | 7e6880951da86928c7f6cecf26dcb8e8d9f826da (patch) | |
tree | 1ad8af6c52e06710f93847933c2720751100d668 /Documentation | |
parent | 3a09b1be53d23df780a0cd0e4087a05e2ca4a00c (diff) | |
parent | 77c80e6b2fd049848bfd1bdab67899ad3ac407a7 (diff) |
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6: (90 commits)
AppArmor: fix build warnings for non-const use of get_task_cred
selinux: convert the policy type_attr_map to flex_array
AppArmor: Enable configuring and building of the AppArmor security module
TOMOYO: Use pathname specified by policy rather than execve()
AppArmor: update path_truncate method to latest version
AppArmor: core policy routines
AppArmor: policy routines for loading and unpacking policy
AppArmor: mediation of non file objects
AppArmor: LSM interface, and security module initialization
AppArmor: Enable configuring and building of the AppArmor security module
AppArmor: update Maintainer and Documentation
AppArmor: functions for domain transitions
AppArmor: file enforcement routines
AppArmor: userspace interfaces
AppArmor: dfa match engine
AppArmor: contexts used in attaching policy to system objects
AppArmor: basic auditing infrastructure.
AppArmor: misc. base functions and defines
TOMOYO: Update version to 2.3.0
TOMOYO: Fix quota check.
...
Diffstat (limited to 'Documentation')
-rw-r--r-- | Documentation/apparmor.txt | 39 | ||||
-rw-r--r-- | Documentation/kernel-parameters.txt | 8 | ||||
-rw-r--r-- | Documentation/tomoyo.txt | 10 |
3 files changed, 52 insertions, 5 deletions
diff --git a/Documentation/apparmor.txt b/Documentation/apparmor.txt new file mode 100644 index 000000000000..93c1fd7d0635 --- /dev/null +++ b/Documentation/apparmor.txt | |||
@@ -0,0 +1,39 @@ | |||
1 | --- What is AppArmor? --- | ||
2 | |||
3 | AppArmor is MAC style security extension for the Linux kernel. It implements | ||
4 | a task centered policy, with task "profiles" being created and loaded | ||
5 | from user space. Tasks on the system that do not have a profile defined for | ||
6 | them run in an unconfined state which is equivalent to standard Linux DAC | ||
7 | permissions. | ||
8 | |||
9 | --- How to enable/disable --- | ||
10 | |||
11 | set CONFIG_SECURITY_APPARMOR=y | ||
12 | |||
13 | If AppArmor should be selected as the default security module then | ||
14 | set CONFIG_DEFAULT_SECURITY="apparmor" | ||
15 | and CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=1 | ||
16 | |||
17 | Build the kernel | ||
18 | |||
19 | If AppArmor is not the default security module it can be enabled by passing | ||
20 | security=apparmor on the kernel's command line. | ||
21 | |||
22 | If AppArmor is the default security module it can be disabled by passing | ||
23 | apparmor=0, security=XXXX (where XXX is valid security module), on the | ||
24 | kernel's command line | ||
25 | |||
26 | For AppArmor to enforce any restrictions beyond standard Linux DAC permissions | ||
27 | policy must be loaded into the kernel from user space (see the Documentation | ||
28 | and tools links). | ||
29 | |||
30 | --- Documentation --- | ||
31 | |||
32 | Documentation can be found on the wiki. | ||
33 | |||
34 | --- Links --- | ||
35 | |||
36 | Mailing List - apparmor@lists.ubuntu.com | ||
37 | Wiki - http://apparmor.wiki.kernel.org/ | ||
38 | User space tools - https://launchpad.net/apparmor | ||
39 | Kernel module - git://git.kernel.org/pub/scm/linux/kernel/git/jj/apparmor-dev.git | ||
diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 2b2407d9a6d0..b61f89fa01c1 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt | |||
@@ -93,6 +93,7 @@ parameter is applicable: | |||
93 | Documentation/scsi/. | 93 | Documentation/scsi/. |
94 | SECURITY Different security models are enabled. | 94 | SECURITY Different security models are enabled. |
95 | SELINUX SELinux support is enabled. | 95 | SELINUX SELinux support is enabled. |
96 | APPARMOR AppArmor support is enabled. | ||
96 | SERIAL Serial support is enabled. | 97 | SERIAL Serial support is enabled. |
97 | SH SuperH architecture is enabled. | 98 | SH SuperH architecture is enabled. |
98 | SMP The kernel is an SMP kernel. | 99 | SMP The kernel is an SMP kernel. |
@@ -2312,6 +2313,13 @@ and is between 256 and 4096 characters. It is defined in the file | |||
2312 | If enabled at boot time, /selinux/disable can be used | 2313 | If enabled at boot time, /selinux/disable can be used |
2313 | later to disable prior to initial policy load. | 2314 | later to disable prior to initial policy load. |
2314 | 2315 | ||
2316 | apparmor= [APPARMOR] Disable or enable AppArmor at boot time | ||
2317 | Format: { "0" | "1" } | ||
2318 | See security/apparmor/Kconfig help text | ||
2319 | 0 -- disable. | ||
2320 | 1 -- enable. | ||
2321 | Default value is set via kernel config option. | ||
2322 | |||
2315 | serialnumber [BUGS=X86-32] | 2323 | serialnumber [BUGS=X86-32] |
2316 | 2324 | ||
2317 | shapers= [NET] | 2325 | shapers= [NET] |
diff --git a/Documentation/tomoyo.txt b/Documentation/tomoyo.txt index b3a232cae7f8..200a2d37cbc8 100644 --- a/Documentation/tomoyo.txt +++ b/Documentation/tomoyo.txt | |||
@@ -3,8 +3,8 @@ | |||
3 | TOMOYO is a name-based MAC extension (LSM module) for the Linux kernel. | 3 | TOMOYO is a name-based MAC extension (LSM module) for the Linux kernel. |
4 | 4 | ||
5 | LiveCD-based tutorials are available at | 5 | LiveCD-based tutorials are available at |
6 | http://tomoyo.sourceforge.jp/en/1.6.x/1st-step/ubuntu8.04-live/ | 6 | http://tomoyo.sourceforge.jp/1.7/1st-step/ubuntu10.04-live/ |
7 | http://tomoyo.sourceforge.jp/en/1.6.x/1st-step/centos5-live/ . | 7 | http://tomoyo.sourceforge.jp/1.7/1st-step/centos5-live/ . |
8 | Though these tutorials use non-LSM version of TOMOYO, they are useful for you | 8 | Though these tutorials use non-LSM version of TOMOYO, they are useful for you |
9 | to know what TOMOYO is. | 9 | to know what TOMOYO is. |
10 | 10 | ||
@@ -13,12 +13,12 @@ to know what TOMOYO is. | |||
13 | Build the kernel with CONFIG_SECURITY_TOMOYO=y and pass "security=tomoyo" on | 13 | Build the kernel with CONFIG_SECURITY_TOMOYO=y and pass "security=tomoyo" on |
14 | kernel's command line. | 14 | kernel's command line. |
15 | 15 | ||
16 | Please see http://tomoyo.sourceforge.jp/en/2.2.x/ for details. | 16 | Please see http://tomoyo.sourceforge.jp/2.3/ for details. |
17 | 17 | ||
18 | --- Where is documentation? --- | 18 | --- Where is documentation? --- |
19 | 19 | ||
20 | User <-> Kernel interface documentation is available at | 20 | User <-> Kernel interface documentation is available at |
21 | http://tomoyo.sourceforge.jp/en/2.2.x/policy-reference.html . | 21 | http://tomoyo.sourceforge.jp/2.3/policy-reference.html . |
22 | 22 | ||
23 | Materials we prepared for seminars and symposiums are available at | 23 | Materials we prepared for seminars and symposiums are available at |
24 | http://sourceforge.jp/projects/tomoyo/docs/?category_id=532&language_id=1 . | 24 | http://sourceforge.jp/projects/tomoyo/docs/?category_id=532&language_id=1 . |
@@ -50,6 +50,6 @@ multiple LSM modules at the same time. We feel sorry that you have to give up | |||
50 | SELinux/SMACK/AppArmor etc. when you want to use TOMOYO. | 50 | SELinux/SMACK/AppArmor etc. when you want to use TOMOYO. |
51 | 51 | ||
52 | We hope that LSM becomes stackable in future. Meanwhile, you can use non-LSM | 52 | We hope that LSM becomes stackable in future. Meanwhile, you can use non-LSM |
53 | version of TOMOYO, available at http://tomoyo.sourceforge.jp/en/1.6.x/ . | 53 | version of TOMOYO, available at http://tomoyo.sourceforge.jp/1.7/ . |
54 | LSM version of TOMOYO is a subset of non-LSM version of TOMOYO. We are planning | 54 | LSM version of TOMOYO is a subset of non-LSM version of TOMOYO. We are planning |
55 | to port non-LSM version's functionalities to LSM versions. | 55 | to port non-LSM version's functionalities to LSM versions. |