<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/Documentation/security, branch linux-4.16.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-4.16.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-4.16.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2018-01-08T21:20:31Z</updated>
<entry>
<title>Documentation: security/credentials.rst: explain need to sort group_list</title>
<updated>2018-01-08T21:20:31Z</updated>
<author>
<name>NeilBrown</name>
<email>neilb@suse.com</email>
</author>
<published>2018-01-02T21:01:15Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=0b345d722e07d77866edffcf350449a4607026b6'/>
<id>urn:sha1:0b345d722e07d77866edffcf350449a4607026b6</id>
<content type='text'>
This patch updates the documentation with the observations that led
to commit bdcf0a423ea1 ("kernel: make groups_sort calling a
responsibility group_info allocators") and the new behaviour required.
Specifically that groups_sort() should be called on a new group_list
before set_groups() or set_current_groups() is called.

Signed-off-by: NeilBrown &lt;neilb@suse.com&gt;
[jc: use proper :c:func: references]
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>doc: add documentation on printing kernel addresses</title>
<updated>2017-12-21T20:39:27Z</updated>
<author>
<name>Tobin C. Harding</name>
<email>me@tobin.cc</email>
</author>
<published>2017-12-19T21:17:17Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=227d1a61ed87033285d187214f305c27895176f9'/>
<id>urn:sha1:227d1a61ed87033285d187214f305c27895176f9</id>
<content type='text'>
Hashing addresses printed with printk specifier %p was implemented
recently. During development a number of issues were raised regarding
leaking kernel addresses to userspace. Other documentation was updated but
security/self-protection missed out.

Add self-protection documentation regarding printing kernel addresses.

Signed-off-by: Tobin C. Harding &lt;me@tobin.cc&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>KEYS: fix in-kernel documentation for keyctl_read()</title>
<updated>2017-11-15T16:38:44Z</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2017-11-15T16:38:44Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=be543dd626c0a23829e9cc1a28e1e3af4cd9ced6'/>
<id>urn:sha1:be543dd626c0a23829e9cc1a28e1e3af4cd9ced6</id>
<content type='text'>
When keyctl_read() is passed a buffer that is too small, the behavior is
inconsistent.  Some key types will fill as much of the buffer as
possible, while others won't copy anything.  Moreover, the in-kernel
documentation contradicted the man page on this point.

Update the in-kernel documentation to say that this point is
unspecified.

Signed-off-by: Eric Biggers &lt;ebiggers@google.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
</content>
</entry>
<entry>
<title>Documentation: fix security related doc refs</title>
<updated>2017-10-12T17:14:40Z</updated>
<author>
<name>Tom Saeger</name>
<email>tom.saeger@oracle.com</email>
</author>
<published>2017-10-10T17:36:30Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=c7f66400f504fd54bda6ec644853c07333e8cb87'/>
<id>urn:sha1:c7f66400f504fd54bda6ec644853c07333e8cb87</id>
<content type='text'>
Make security document refs valid.

Signed-off-by: Tom Saeger &lt;tom.saeger@oracle.com&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>docs: ReSTify table of contents in core.rst</title>
<updated>2017-08-30T21:27:58Z</updated>
<author>
<name>Josh Holland</name>
<email>anowlcalledjosh@gmail.com</email>
</author>
<published>2017-08-23T20:42:32Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=33c2f4ec984d8a78f15b9d989968733606512bb2'/>
<id>urn:sha1:33c2f4ec984d8a78f15b9d989968733606512bb2</id>
<content type='text'>
Sphinx will now generate the table of contents automatically, which
avoids having the ToC getting out of sync with the rest of the document.

Signed-off-by: Josh Holland &lt;anowlcalledjosh@gmail.com&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>docs: Fix paths in security/keys</title>
<updated>2017-08-24T19:10:58Z</updated>
<author>
<name>Josh Holland</name>
<email>anowlcalledjosh@gmail.com</email>
</author>
<published>2017-08-19T15:21:06Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=adf31eebd75e9e7c2eda222695637398b3872a68'/>
<id>urn:sha1:adf31eebd75e9e7c2eda222695637398b3872a68</id>
<content type='text'>
Several paths in the security/keys documentation were incorrect.

Signed-off-by: Josh Holland &lt;anowlcalledjosh@gmail.com&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>KEYS: Add documentation for asymmetric keyring restrictions</title>
<updated>2017-07-14T01:01:38Z</updated>
<author>
<name>Mat Martineau</name>
<email>mathew.j.martineau@linux.intel.com</email>
</author>
<published>2017-07-13T12:17:03Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=7228b66aaf723a623e578aa4db7d083bb39546c9'/>
<id>urn:sha1:7228b66aaf723a623e578aa4db7d083bb39546c9</id>
<content type='text'>
Provide more specific examples of keyring restrictions as applied to
X.509 signature chain verification.

Signed-off-by: Mat Martineau &lt;mathew.j.martineau@linux.intel.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: James Morris &lt;james.l.morris@oracle.com&gt;
</content>
</entry>
<entry>
<title>docs: Fix some formatting issues in request-key.rst</title>
<updated>2017-05-18T16:46:25Z</updated>
<author>
<name>Jonathan Corbet</name>
<email>corbet@lwn.net</email>
</author>
<published>2017-05-18T16:46:25Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=5ea787a7ec6c11240168e92a677f4f2a78dc6586'/>
<id>urn:sha1:5ea787a7ec6c11240168e92a677f4f2a78dc6586</id>
<content type='text'>
The white space in the big enumerated list was inconsistent, leading to
some strange formatting artifacts.

Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>doc: ReSTify keys-trusted-encrypted.txt</title>
<updated>2017-05-18T16:33:56Z</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2017-05-13T11:51:53Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=5395d312dff00d9e94702d28fe1e08dacd1cbe31'/>
<id>urn:sha1:5395d312dff00d9e94702d28fe1e08dacd1cbe31</id>
<content type='text'>
Adjusts for ReST markup and moves under keys security devel index.

Cc: David Howells &lt;dhowells@redhat.com&gt;
Cc: Mimi Zohar &lt;zohar@linux.vnet.ibm.com&gt;
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>doc: ReSTify keys-request-key.txt</title>
<updated>2017-05-18T16:33:51Z</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2017-05-13T11:51:52Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=3db38ed76890565772fcca3279cc8d454ea6176b'/>
<id>urn:sha1:3db38ed76890565772fcca3279cc8d454ea6176b</id>
<content type='text'>
Adjusts for ReST markup and moves under keys security devel index.

Cc: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
</feed>
