Skip to content

Commit

Permalink
Create Documentation/security/,
Browse files Browse the repository at this point in the history
move LSM-, credentials-, and keys-related files from Documentation/
  to Documentation/security/,
add Documentation/security/00-INDEX, and
update all occurrences of Documentation/<moved_file>
  to Documentation/security/<moved_file>.
  • Loading branch information
rddunlap committed May 19, 2011
1 parent 61c4f2c commit d410fa4
Show file tree
Hide file tree
Showing 23 changed files with 43 additions and 27 deletions.
6 changes: 2 additions & 4 deletions Documentation/00-INDEX
Original file line number Diff line number Diff line change
Expand Up @@ -192,10 +192,6 @@ kernel-docs.txt
- listing of various WWW + books that document kernel internals.
kernel-parameters.txt
- summary listing of command line / boot prompt args for the kernel.
keys-request-key.txt
- description of the kernel key request service.
keys.txt
- description of the kernel key retention service.
kobject.txt
- info of the kobject infrastructure of the Linux kernel.
kprobes.txt
Expand Down Expand Up @@ -294,6 +290,8 @@ scheduler/
- directory with info on the scheduler.
scsi/
- directory with info on Linux scsi support.
security/
- directory that contains security-related info
serial/
- directory with info on the low level serial API.
serial-console.txt
Expand Down
4 changes: 2 additions & 2 deletions Documentation/filesystems/nfs/idmapper.txt
Original file line number Diff line number Diff line change
Expand Up @@ -47,8 +47,8 @@ request-key will find the first matching line and corresponding program. In
this case, /some/other/program will handle all uid lookups and
/usr/sbin/nfs.idmap will handle gid, user, and group lookups.

See <file:Documentation/keys-request-keys.txt> for more information about the
request-key function.
See <file:Documentation/security/keys-request-keys.txt> for more information
about the request-key function.


=========
Expand Down
4 changes: 2 additions & 2 deletions Documentation/networking/dns_resolver.txt
Original file line number Diff line number Diff line change
Expand Up @@ -139,8 +139,8 @@ the key will be discarded and recreated when the data it holds has expired.
dns_query() returns a copy of the value attached to the key, or an error if
that is indicated instead.

See <file:Documentation/keys-request-key.txt> for further information about
request-key function.
See <file:Documentation/security/keys-request-key.txt> for further
information about request-key function.


=========
Expand Down
18 changes: 18 additions & 0 deletions Documentation/security/00-INDEX
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
00-INDEX
- this file.
SELinux.txt
- how to get started with the SELinux security enhancement.
Smack.txt
- documentation on the Smack Linux Security Module.
apparmor.txt
- documentation on the AppArmor security extension.
credentials.txt
- documentation about credentials in Linux.
keys-request-key.txt
- description of the kernel key request service.
keys-trusted-encrypted.txt
- info on the Trusted and Encrypted keys in the kernel key ring service.
keys.txt
- description of the kernel key retention service.
tomoyo.txt
- documentation on the TOMOYO Linux Security Module.
File renamed without changes.
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -216,7 +216,7 @@ The Linux kernel supports the following types of credentials:
When a process accesses a key, if not already present, it will normally be
cached on one of these keyrings for future accesses to find.

For more information on using keys, see Documentation/keys.txt.
For more information on using keys, see Documentation/security/keys.txt.

(5) LSM

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,8 @@
===================

The key request service is part of the key retention service (refer to
Documentation/keys.txt). This document explains more fully how the requesting
algorithm works.
Documentation/security/keys.txt). This document explains more fully how
the requesting algorithm works.

The process starts by either the kernel requesting a service by calling
request_key*():
Expand Down
File renamed without changes.
4 changes: 2 additions & 2 deletions Documentation/keys.txt → Documentation/security/keys.txt
Original file line number Diff line number Diff line change
Expand Up @@ -434,7 +434,7 @@ The main syscalls are:
/sbin/request-key will be invoked in an attempt to obtain a key. The
callout_info string will be passed as an argument to the program.

See also Documentation/keys-request-key.txt.
See also Documentation/security/keys-request-key.txt.


The keyctl syscall functions are:
Expand Down Expand Up @@ -864,7 +864,7 @@ payload contents" for more information.
If successful, the key will have been attached to the default keyring for
implicitly obtained request-key keys, as set by KEYCTL_SET_REQKEY_KEYRING.

See also Documentation/keys-request-key.txt.
See also Documentation/security/keys-request-key.txt.


(*) To search for a key, passing auxiliary data to the upcaller, call:
Expand Down
File renamed without changes.
6 changes: 3 additions & 3 deletions MAINTAINERS
Original file line number Diff line number Diff line change
Expand Up @@ -3705,7 +3705,7 @@ KEYS/KEYRINGS:
M: David Howells <[email protected]>
L: [email protected]
S: Maintained
F: Documentation/keys.txt
F: Documentation/security/keys.txt
F: include/linux/key.h
F: include/linux/key-type.h
F: include/keys/
Expand All @@ -3717,7 +3717,7 @@ M: Mimi Zohar <[email protected]>
L: [email protected]
L: [email protected]
S: Supported
F: Documentation/keys-trusted-encrypted.txt
F: Documentation/security/keys-trusted-encrypted.txt
F: include/keys/trusted-type.h
F: security/keys/trusted.c
F: security/keys/trusted.h
Expand All @@ -3728,7 +3728,7 @@ M: David Safford <[email protected]>
L: [email protected]
L: [email protected]
S: Supported
F: Documentation/keys-trusted-encrypted.txt
F: Documentation/security/keys-trusted-encrypted.txt
F: include/keys/encrypted-type.h
F: security/keys/encrypted.c
F: security/keys/encrypted.h
Expand Down
2 changes: 1 addition & 1 deletion include/linux/cred.h
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
/* Credentials management - see Documentation/credentials.txt
/* Credentials management - see Documentation/security/credentials.txt
*
* Copyright (C) 2008 Red Hat, Inc. All Rights Reserved.
* Written by David Howells ([email protected])
Expand Down
2 changes: 1 addition & 1 deletion include/linux/key.h
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
* 2 of the License, or (at your option) any later version.
*
*
* See Documentation/keys.txt for information on keys/keyrings.
* See Documentation/security/keys.txt for information on keys/keyrings.
*/

#ifndef _LINUX_KEY_H
Expand Down
2 changes: 1 addition & 1 deletion kernel/cred.c
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
/* Task credentials management - see Documentation/credentials.txt
/* Task credentials management - see Documentation/security/credentials.txt
*
* Copyright (C) 2008 Red Hat, Inc. All Rights Reserved.
* Written by David Howells ([email protected])
Expand Down
2 changes: 1 addition & 1 deletion scripts/selinux/README
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
Please see Documentation/SELinux.txt for information on
Please see Documentation/security/SELinux.txt for information on
installing a dummy SELinux policy.
2 changes: 1 addition & 1 deletion security/apparmor/match.c
Original file line number Diff line number Diff line change
Expand Up @@ -194,7 +194,7 @@ void aa_dfa_free_kref(struct kref *kref)
* @flags: flags controlling what type of accept tables are acceptable
*
* Unpack a dfa that has been serialized. To find information on the dfa
* format look in Documentation/apparmor.txt
* format look in Documentation/security/apparmor.txt
* Assumes the dfa @blob stream has been aligned on a 8 byte boundary
*
* Returns: an unpacked dfa ready for matching or ERR_PTR on failure
Expand Down
4 changes: 2 additions & 2 deletions security/apparmor/policy_unpack.c
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,8 @@
* published by the Free Software Foundation, version 2 of the
* License.
*
* AppArmor uses a serialized binary format for loading policy.
* To find policy format documentation look in Documentation/apparmor.txt
* AppArmor uses a serialized binary format for loading policy. To find
* policy format documentation look in Documentation/security/apparmor.txt
* All policy is validated before it is used.
*/

Expand Down
2 changes: 1 addition & 1 deletion security/keys/encrypted.c
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, version 2 of the License.
*
* See Documentation/keys-trusted-encrypted.txt
* See Documentation/security/keys-trusted-encrypted.txt
*/

#include <linux/uaccess.h>
Expand Down
2 changes: 1 addition & 1 deletion security/keys/request_key.c
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
* as published by the Free Software Foundation; either version
* 2 of the License, or (at your option) any later version.
*
* See Documentation/keys-request-key.txt
* See Documentation/security/keys-request-key.txt
*/

#include <linux/module.h>
Expand Down
2 changes: 1 addition & 1 deletion security/keys/request_key_auth.c
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
* as published by the Free Software Foundation; either version
* 2 of the License, or (at your option) any later version.
*
* See Documentation/keys-request-key.txt
* See Documentation/security/keys-request-key.txt
*/

#include <linux/module.h>
Expand Down
2 changes: 1 addition & 1 deletion security/keys/trusted.c
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, version 2 of the License.
*
* See Documentation/keys-trusted-encrypted.txt
* See Documentation/security/keys-trusted-encrypted.txt
*/

#include <linux/uaccess.h>
Expand Down

0 comments on commit d410fa4

Please sign in to comment.