Skip to content

Commit d410fa4

Browse files
committed
Create Documentation/security/,
move LSM-, credentials-, and keys-related files from Documentation/ to Documentation/security/, add Documentation/security/00-INDEX, and update all occurrences of Documentation/<moved_file> to Documentation/security/<moved_file>.
1 parent 61c4f2c commit d410fa4

23 files changed

+43
-27
lines changed

Documentation/00-INDEX

+2-4
Original file line numberDiff line numberDiff line change
@@ -192,10 +192,6 @@ kernel-docs.txt
192192
- listing of various WWW + books that document kernel internals.
193193
kernel-parameters.txt
194194
- summary listing of command line / boot prompt args for the kernel.
195-
keys-request-key.txt
196-
- description of the kernel key request service.
197-
keys.txt
198-
- description of the kernel key retention service.
199195
kobject.txt
200196
- info of the kobject infrastructure of the Linux kernel.
201197
kprobes.txt
@@ -294,6 +290,8 @@ scheduler/
294290
- directory with info on the scheduler.
295291
scsi/
296292
- directory with info on Linux scsi support.
293+
security/
294+
- directory that contains security-related info
297295
serial/
298296
- directory with info on the low level serial API.
299297
serial-console.txt

Documentation/filesystems/nfs/idmapper.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,8 @@ request-key will find the first matching line and corresponding program. In
4747
this case, /some/other/program will handle all uid lookups and
4848
/usr/sbin/nfs.idmap will handle gid, user, and group lookups.
4949

50-
See <file:Documentation/keys-request-keys.txt> for more information about the
51-
request-key function.
50+
See <file:Documentation/security/keys-request-keys.txt> for more information
51+
about the request-key function.
5252

5353

5454
=========

Documentation/networking/dns_resolver.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -139,8 +139,8 @@ the key will be discarded and recreated when the data it holds has expired.
139139
dns_query() returns a copy of the value attached to the key, or an error if
140140
that is indicated instead.
141141

142-
See <file:Documentation/keys-request-key.txt> for further information about
143-
request-key function.
142+
See <file:Documentation/security/keys-request-key.txt> for further
143+
information about request-key function.
144144

145145

146146
=========

Documentation/security/00-INDEX

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
00-INDEX
2+
- this file.
3+
SELinux.txt
4+
- how to get started with the SELinux security enhancement.
5+
Smack.txt
6+
- documentation on the Smack Linux Security Module.
7+
apparmor.txt
8+
- documentation on the AppArmor security extension.
9+
credentials.txt
10+
- documentation about credentials in Linux.
11+
keys-request-key.txt
12+
- description of the kernel key request service.
13+
keys-trusted-encrypted.txt
14+
- info on the Trusted and Encrypted keys in the kernel key ring service.
15+
keys.txt
16+
- description of the kernel key retention service.
17+
tomoyo.txt
18+
- documentation on the TOMOYO Linux Security Module.
File renamed without changes.
File renamed without changes.
File renamed without changes.

Documentation/credentials.txt Documentation/security/credentials.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ The Linux kernel supports the following types of credentials:
216216
When a process accesses a key, if not already present, it will normally be
217217
cached on one of these keyrings for future accesses to find.
218218

219-
For more information on using keys, see Documentation/keys.txt.
219+
For more information on using keys, see Documentation/security/keys.txt.
220220

221221
(5) LSM
222222

Documentation/keys-request-key.txt Documentation/security/keys-request-key.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
===================
44

55
The key request service is part of the key retention service (refer to
6-
Documentation/keys.txt). This document explains more fully how the requesting
7-
algorithm works.
6+
Documentation/security/keys.txt). This document explains more fully how
7+
the requesting algorithm works.
88

99
The process starts by either the kernel requesting a service by calling
1010
request_key*():

Documentation/keys.txt Documentation/security/keys.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -434,7 +434,7 @@ The main syscalls are:
434434
/sbin/request-key will be invoked in an attempt to obtain a key. The
435435
callout_info string will be passed as an argument to the program.
436436

437-
See also Documentation/keys-request-key.txt.
437+
See also Documentation/security/keys-request-key.txt.
438438

439439

440440
The keyctl syscall functions are:
@@ -864,7 +864,7 @@ payload contents" for more information.
864864
If successful, the key will have been attached to the default keyring for
865865
implicitly obtained request-key keys, as set by KEYCTL_SET_REQKEY_KEYRING.
866866

867-
See also Documentation/keys-request-key.txt.
867+
See also Documentation/security/keys-request-key.txt.
868868

869869

870870
(*) To search for a key, passing auxiliary data to the upcaller, call:
File renamed without changes.

MAINTAINERS

+3-3
Original file line numberDiff line numberDiff line change
@@ -3705,7 +3705,7 @@ KEYS/KEYRINGS:
37053705
M: David Howells <dhowells@redhat.com>
37063706
L: keyrings@linux-nfs.org
37073707
S: Maintained
3708-
F: Documentation/keys.txt
3708+
F: Documentation/security/keys.txt
37093709
F: include/linux/key.h
37103710
F: include/linux/key-type.h
37113711
F: include/keys/
@@ -3717,7 +3717,7 @@ M: Mimi Zohar <zohar@us.ibm.com>
37173717
L: linux-security-module@vger.kernel.org
37183718
L: keyrings@linux-nfs.org
37193719
S: Supported
3720-
F: Documentation/keys-trusted-encrypted.txt
3720+
F: Documentation/security/keys-trusted-encrypted.txt
37213721
F: include/keys/trusted-type.h
37223722
F: security/keys/trusted.c
37233723
F: security/keys/trusted.h
@@ -3728,7 +3728,7 @@ M: David Safford <safford@watson.ibm.com>
37283728
L: linux-security-module@vger.kernel.org
37293729
L: keyrings@linux-nfs.org
37303730
S: Supported
3731-
F: Documentation/keys-trusted-encrypted.txt
3731+
F: Documentation/security/keys-trusted-encrypted.txt
37323732
F: include/keys/encrypted-type.h
37333733
F: security/keys/encrypted.c
37343734
F: security/keys/encrypted.h

include/linux/cred.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* Credentials management - see Documentation/credentials.txt
1+
/* Credentials management - see Documentation/security/credentials.txt
22
*
33
* Copyright (C) 2008 Red Hat, Inc. All Rights Reserved.
44
* Written by David Howells (dhowells@redhat.com)

include/linux/key.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
* 2 of the License, or (at your option) any later version.
1010
*
1111
*
12-
* See Documentation/keys.txt for information on keys/keyrings.
12+
* See Documentation/security/keys.txt for information on keys/keyrings.
1313
*/
1414

1515
#ifndef _LINUX_KEY_H

kernel/cred.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* Task credentials management - see Documentation/credentials.txt
1+
/* Task credentials management - see Documentation/security/credentials.txt
22
*
33
* Copyright (C) 2008 Red Hat, Inc. All Rights Reserved.
44
* Written by David Howells (dhowells@redhat.com)

scripts/selinux/README

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
Please see Documentation/SELinux.txt for information on
1+
Please see Documentation/security/SELinux.txt for information on
22
installing a dummy SELinux policy.

security/apparmor/match.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ void aa_dfa_free_kref(struct kref *kref)
194194
* @flags: flags controlling what type of accept tables are acceptable
195195
*
196196
* Unpack a dfa that has been serialized. To find information on the dfa
197-
* format look in Documentation/apparmor.txt
197+
* format look in Documentation/security/apparmor.txt
198198
* Assumes the dfa @blob stream has been aligned on a 8 byte boundary
199199
*
200200
* Returns: an unpacked dfa ready for matching or ERR_PTR on failure

security/apparmor/policy_unpack.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@
1212
* published by the Free Software Foundation, version 2 of the
1313
* License.
1414
*
15-
* AppArmor uses a serialized binary format for loading policy.
16-
* To find policy format documentation look in Documentation/apparmor.txt
15+
* AppArmor uses a serialized binary format for loading policy. To find
16+
* policy format documentation look in Documentation/security/apparmor.txt
1717
* All policy is validated before it is used.
1818
*/
1919

security/keys/encrypted.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
* it under the terms of the GNU General Public License as published by
99
* the Free Software Foundation, version 2 of the License.
1010
*
11-
* See Documentation/keys-trusted-encrypted.txt
11+
* See Documentation/security/keys-trusted-encrypted.txt
1212
*/
1313

1414
#include <linux/uaccess.h>

security/keys/request_key.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
* as published by the Free Software Foundation; either version
99
* 2 of the License, or (at your option) any later version.
1010
*
11-
* See Documentation/keys-request-key.txt
11+
* See Documentation/security/keys-request-key.txt
1212
*/
1313

1414
#include <linux/module.h>

security/keys/request_key_auth.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
* as published by the Free Software Foundation; either version
99
* 2 of the License, or (at your option) any later version.
1010
*
11-
* See Documentation/keys-request-key.txt
11+
* See Documentation/security/keys-request-key.txt
1212
*/
1313

1414
#include <linux/module.h>

security/keys/trusted.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
* it under the terms of the GNU General Public License as published by
99
* the Free Software Foundation, version 2 of the License.
1010
*
11-
* See Documentation/keys-trusted-encrypted.txt
11+
* See Documentation/security/keys-trusted-encrypted.txt
1212
*/
1313

1414
#include <linux/uaccess.h>

0 commit comments

Comments
 (0)