<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/Documentation/security, branch v4.17.4</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.17.4</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.17.4'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2018-03-20T20:26:15Z</updated>
<entry>
<title>selinux: Update SELinux SCTP documentation</title>
<updated>2018-03-20T20:26:15Z</updated>
<author>
<name>Richard Haines</name>
<email>richard_c_haines@btinternet.com</email>
</author>
<published>2018-03-19T17:33:36Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d3cc2cd7c8d7adfb43075036878e319d5893280d'/>
<id>urn:sha1:d3cc2cd7c8d7adfb43075036878e319d5893280d</id>
<content type='text'>
Update SELinux-sctp.rst "SCTP Peer Labeling" section to reflect
how the association permission is validated.

Reported-by: Dominick Grift &lt;dac.override@gmail.com&gt;
Signed-off-by: Richard Haines &lt;richard_c_haines@btinternet.com&gt;
Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;
</content>
</entry>
<entry>
<title>selinux: Add SCTP support</title>
<updated>2018-02-26T22:45:25Z</updated>
<author>
<name>Richard Haines</name>
<email>richard_c_haines@btinternet.com</email>
</author>
<published>2018-02-13T20:57:18Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d452930fd3b9031e59abfeddb2fa383f1403d61a'/>
<id>urn:sha1:d452930fd3b9031e59abfeddb2fa383f1403d61a</id>
<content type='text'>
The SELinux SCTP implementation is explained in:
Documentation/security/SELinux-sctp.rst

Signed-off-by: Richard Haines &lt;richard_c_haines@btinternet.com&gt;
Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;
</content>
</entry>
<entry>
<title>security: Add support for SCTP security hooks</title>
<updated>2018-02-22T20:01:32Z</updated>
<author>
<name>Richard Haines</name>
<email>richard_c_haines@btinternet.com</email>
</author>
<published>2018-02-13T20:53:21Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=72e89f50084c6dbc58a00aeedf92c450dc1a8b1c'/>
<id>urn:sha1:72e89f50084c6dbc58a00aeedf92c450dc1a8b1c</id>
<content type='text'>
The SCTP security hooks are explained in:
Documentation/security/LSM-sctp.rst

Signed-off-by: Richard Haines &lt;richard_c_haines@btinternet.com&gt;
Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;
</content>
</entry>
<entry>
<title>Documentation: security/credentials.rst: explain need to sort group_list</title>
<updated>2018-01-08T21:20:31Z</updated>
<author>
<name>NeilBrown</name>
<email>neilb@suse.com</email>
</author>
<published>2018-01-02T21:01:15Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=0b345d722e07d77866edffcf350449a4607026b6'/>
<id>urn:sha1:0b345d722e07d77866edffcf350449a4607026b6</id>
<content type='text'>
This patch updates the documentation with the observations that led
to commit bdcf0a423ea1 ("kernel: make groups_sort calling a
responsibility group_info allocators") and the new behaviour required.
Specifically that groups_sort() should be called on a new group_list
before set_groups() or set_current_groups() is called.

Signed-off-by: NeilBrown &lt;neilb@suse.com&gt;
[jc: use proper :c:func: references]
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>doc: add documentation on printing kernel addresses</title>
<updated>2017-12-21T20:39:27Z</updated>
<author>
<name>Tobin C. Harding</name>
<email>me@tobin.cc</email>
</author>
<published>2017-12-19T21:17:17Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=227d1a61ed87033285d187214f305c27895176f9'/>
<id>urn:sha1:227d1a61ed87033285d187214f305c27895176f9</id>
<content type='text'>
Hashing addresses printed with printk specifier %p was implemented
recently. During development a number of issues were raised regarding
leaking kernel addresses to userspace. Other documentation was updated but
security/self-protection missed out.

Add self-protection documentation regarding printing kernel addresses.

Signed-off-by: Tobin C. Harding &lt;me@tobin.cc&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>KEYS: fix in-kernel documentation for keyctl_read()</title>
<updated>2017-11-15T16:38:44Z</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2017-11-15T16:38:44Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=be543dd626c0a23829e9cc1a28e1e3af4cd9ced6'/>
<id>urn:sha1:be543dd626c0a23829e9cc1a28e1e3af4cd9ced6</id>
<content type='text'>
When keyctl_read() is passed a buffer that is too small, the behavior is
inconsistent.  Some key types will fill as much of the buffer as
possible, while others won't copy anything.  Moreover, the in-kernel
documentation contradicted the man page on this point.

Update the in-kernel documentation to say that this point is
unspecified.

Signed-off-by: Eric Biggers &lt;ebiggers@google.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
</content>
</entry>
<entry>
<title>Documentation: fix security related doc refs</title>
<updated>2017-10-12T17:14:40Z</updated>
<author>
<name>Tom Saeger</name>
<email>tom.saeger@oracle.com</email>
</author>
<published>2017-10-10T17:36:30Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=c7f66400f504fd54bda6ec644853c07333e8cb87'/>
<id>urn:sha1:c7f66400f504fd54bda6ec644853c07333e8cb87</id>
<content type='text'>
Make security document refs valid.

Signed-off-by: Tom Saeger &lt;tom.saeger@oracle.com&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>docs: ReSTify table of contents in core.rst</title>
<updated>2017-08-30T21:27:58Z</updated>
<author>
<name>Josh Holland</name>
<email>anowlcalledjosh@gmail.com</email>
</author>
<published>2017-08-23T20:42:32Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=33c2f4ec984d8a78f15b9d989968733606512bb2'/>
<id>urn:sha1:33c2f4ec984d8a78f15b9d989968733606512bb2</id>
<content type='text'>
Sphinx will now generate the table of contents automatically, which
avoids having the ToC getting out of sync with the rest of the document.

Signed-off-by: Josh Holland &lt;anowlcalledjosh@gmail.com&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>docs: Fix paths in security/keys</title>
<updated>2017-08-24T19:10:58Z</updated>
<author>
<name>Josh Holland</name>
<email>anowlcalledjosh@gmail.com</email>
</author>
<published>2017-08-19T15:21:06Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=adf31eebd75e9e7c2eda222695637398b3872a68'/>
<id>urn:sha1:adf31eebd75e9e7c2eda222695637398b3872a68</id>
<content type='text'>
Several paths in the security/keys documentation were incorrect.

Signed-off-by: Josh Holland &lt;anowlcalledjosh@gmail.com&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>KEYS: Add documentation for asymmetric keyring restrictions</title>
<updated>2017-07-14T01:01:38Z</updated>
<author>
<name>Mat Martineau</name>
<email>mathew.j.martineau@linux.intel.com</email>
</author>
<published>2017-07-13T12:17:03Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=7228b66aaf723a623e578aa4db7d083bb39546c9'/>
<id>urn:sha1:7228b66aaf723a623e578aa4db7d083bb39546c9</id>
<content type='text'>
Provide more specific examples of keyring restrictions as applied to
X.509 signature chain verification.

Signed-off-by: Mat Martineau &lt;mathew.j.martineau@linux.intel.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: James Morris &lt;james.l.morris@oracle.com&gt;
</content>
</entry>
</feed>
