diff options
author | John Johansen <john.johansen@canonical.com> | 2010-07-29 17:48:09 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2010-08-02 01:35:15 -0400 |
commit | c1c124e91e7c6d5a600c98f6fb5b443c403a14f4 (patch) | |
tree | 58a4cf515dbd4fc4ea9e132fb2c5427d87408e3d /Documentation | |
parent | 898127c34ec03291c86f4ff3856d79e9e18952bc (diff) |
AppArmor: update Maintainer and Documentation
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'Documentation')
-rw-r--r-- | Documentation/apparmor.txt | 39 | ||||
-rw-r--r-- | Documentation/kernel-parameters.txt | 8 |
2 files changed, 47 insertions, 0 deletions
diff --git a/Documentation/apparmor.txt b/Documentation/apparmor.txt new file mode 100644 index 000000000000..93c1fd7d0635 --- /dev/null +++ b/Documentation/apparmor.txt | |||
@@ -0,0 +1,39 @@ | |||
1 | --- What is AppArmor? --- | ||
2 | |||
3 | AppArmor is MAC style security extension for the Linux kernel. It implements | ||
4 | a task centered policy, with task "profiles" being created and loaded | ||
5 | from user space. Tasks on the system that do not have a profile defined for | ||
6 | them run in an unconfined state which is equivalent to standard Linux DAC | ||
7 | permissions. | ||
8 | |||
9 | --- How to enable/disable --- | ||
10 | |||
11 | set CONFIG_SECURITY_APPARMOR=y | ||
12 | |||
13 | If AppArmor should be selected as the default security module then | ||
14 | set CONFIG_DEFAULT_SECURITY="apparmor" | ||
15 | and CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=1 | ||
16 | |||
17 | Build the kernel | ||
18 | |||
19 | If AppArmor is not the default security module it can be enabled by passing | ||
20 | security=apparmor on the kernel's command line. | ||
21 | |||
22 | If AppArmor is the default security module it can be disabled by passing | ||
23 | apparmor=0, security=XXXX (where XXX is valid security module), on the | ||
24 | kernel's command line | ||
25 | |||
26 | For AppArmor to enforce any restrictions beyond standard Linux DAC permissions | ||
27 | policy must be loaded into the kernel from user space (see the Documentation | ||
28 | and tools links). | ||
29 | |||
30 | --- Documentation --- | ||
31 | |||
32 | Documentation can be found on the wiki. | ||
33 | |||
34 | --- Links --- | ||
35 | |||
36 | Mailing List - apparmor@lists.ubuntu.com | ||
37 | Wiki - http://apparmor.wiki.kernel.org/ | ||
38 | User space tools - https://launchpad.net/apparmor | ||
39 | Kernel module - git://git.kernel.org/pub/scm/linux/kernel/git/jj/apparmor-dev.git | ||
diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 2b2407d9a6d0..b61f89fa01c1 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt | |||
@@ -93,6 +93,7 @@ parameter is applicable: | |||
93 | Documentation/scsi/. | 93 | Documentation/scsi/. |
94 | SECURITY Different security models are enabled. | 94 | SECURITY Different security models are enabled. |
95 | SELINUX SELinux support is enabled. | 95 | SELINUX SELinux support is enabled. |
96 | APPARMOR AppArmor support is enabled. | ||
96 | SERIAL Serial support is enabled. | 97 | SERIAL Serial support is enabled. |
97 | SH SuperH architecture is enabled. | 98 | SH SuperH architecture is enabled. |
98 | SMP The kernel is an SMP kernel. | 99 | SMP The kernel is an SMP kernel. |
@@ -2312,6 +2313,13 @@ and is between 256 and 4096 characters. It is defined in the file | |||
2312 | If enabled at boot time, /selinux/disable can be used | 2313 | If enabled at boot time, /selinux/disable can be used |
2313 | later to disable prior to initial policy load. | 2314 | later to disable prior to initial policy load. |
2314 | 2315 | ||
2316 | apparmor= [APPARMOR] Disable or enable AppArmor at boot time | ||
2317 | Format: { "0" | "1" } | ||
2318 | See security/apparmor/Kconfig help text | ||
2319 | 0 -- disable. | ||
2320 | 1 -- enable. | ||
2321 | Default value is set via kernel config option. | ||
2322 | |||
2315 | serialnumber [BUGS=X86-32] | 2323 | serialnumber [BUGS=X86-32] |
2316 | 2324 | ||
2317 | shapers= [NET] | 2325 | shapers= [NET] |