linux_old1/Documentation/security
Kees Cook c9de4a82c8 docs: self-protection: rename "leak" to "exposure"
The meaning of "leak" can be both "untracked resource allocation" and
"memory content disclosure". This document's use was entirely of the
latter meaning, so avoid the confusion by using the Common Weakness
Enumeration name for this: Information Exposure (CWE-200). Additionally
adds a section on structure randomization.

Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
2016-06-09 13:23:27 -06:00
..
00-INDEX ima: new templates management mechanism 2013-10-25 17:17:04 -04:00
IMA-templates.txt ima: added support for new kernel cmdline parameter ima_template_fmt 2014-10-13 08:39:02 -04:00
LSM.txt doc: LSM: update reference, kerneltrap.org no longer works 2014-06-19 15:15:28 +02:00
LoadPin.txt LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00
SELinux.txt
Smack.txt Smack: limited capability for changing process label 2015-10-19 12:06:47 -07:00
Yama.txt Yama: remove needless CONFIG_SECURITY_YAMA_STACKED 2015-07-28 13:18:19 +10:00
apparmor.txt
credentials.txt Documentation: clarify the purpose of LSMs 2011-11-16 12:37:27 +11:00
keys-ecryptfs.txt encrypted-keys: move ecryptfs documentation to proper location 2011-06-30 19:08:14 +10:00
keys-request-key.txt
keys-trusted-encrypted.txt keys, trusted: seal with a TPM2 authorization policy 2015-12-20 15:27:13 +02:00
keys.txt Merge branch 'keys-trust' into keys-next 2016-05-04 17:20:20 +01:00
self-protection.txt docs: self-protection: rename "leak" to "exposure" 2016-06-09 13:23:27 -06:00
tomoyo.txt