From 30da4f77aae99bf9ae5905d0ef89668391eea315 Mon Sep 17 00:00:00 2001 From: Kees Cook Date: Sat, 13 May 2017 04:51:48 -0700 Subject: doc: ReSTify LoadPin.txt Adjusts for ReST markup and moves under LSM admin guide. Signed-off-by: Kees Cook Signed-off-by: Jonathan Corbet --- Documentation/security/LoadPin.txt | 17 ----------------- 1 file changed, 17 deletions(-) delete mode 100644 Documentation/security/LoadPin.txt (limited to 'Documentation/security') diff --git a/Documentation/security/LoadPin.txt b/Documentation/security/LoadPin.txt deleted file mode 100644 index e11877f..0000000 --- a/Documentation/security/LoadPin.txt +++ /dev/null @@ -1,17 +0,0 @@ -LoadPin is a Linux Security Module that ensures all kernel-loaded files -(modules, firmware, etc) all originate from the same filesystem, with -the expectation that such a filesystem is backed by a read-only device -such as dm-verity or CDROM. This allows systems that have a verified -and/or unchangeable filesystem to enforce module and firmware loading -restrictions without needing to sign the files individually. - -The LSM is selectable at build-time with CONFIG_SECURITY_LOADPIN, and -can be controlled at boot-time with the kernel command line option -"loadpin.enabled". By default, it is enabled, but can be disabled at -boot ("loadpin.enabled=0"). - -LoadPin starts pinning when it sees the first file loaded. If the -block device backing the filesystem is not read-only, a sysctl is -created to toggle pinning: /proc/sys/kernel/loadpin/enabled. (Having -a mutable filesystem means pinning is mutable too, but having the -sysctl allows for easy testing on systems with a mutable filesystem.) -- cgit v1.1