4d3beaa06d
The following files belong to security: Documentation/security/LSM.rst -> Documentation/security/lsm-development.rst Documentation/lsm.txt -> Documentation/security/lsm.rst Documentation/SAK.txt -> Documentation/security/sak.rst Documentation/siphash.txt -> Documentation/security/siphash.rst Signed-off-by: Mauro Carvalho Chehab <mchehab+samsung@kernel.org>
18 lines
738 B
ReStructuredText
18 lines
738 B
ReStructuredText
=================================
|
|
Linux Security Module Development
|
|
=================================
|
|
|
|
Based on https://lkml.org/lkml/2007/10/26/215,
|
|
a new LSM is accepted into the kernel when its intent (a description of
|
|
what it tries to protect against and in what cases one would expect to
|
|
use it) has been appropriately documented in ``Documentation/admin-guide/LSM/``.
|
|
This allows an LSM's code to be easily compared to its goals, and so
|
|
that end users and distros can make a more informed decision about which
|
|
LSMs suit their requirements.
|
|
|
|
For extensive documentation on the available LSM hook interfaces, please
|
|
see ``include/linux/lsm_hooks.h`` and associated structures:
|
|
|
|
.. kernel-doc:: include/linux/lsm_hooks.h
|
|
:internal:
|