linux-security-module
Thread
Date
Earlier messages
Later messages
Messages by Thread
[PATCH 21/28] NFS: Display local caching state [try #2]
David Howells
[PATCH 13/28] CacheFiles: Add missing copy_page export for ia64 [try #2]
David Howells
[PATCH 23/28] AFS: Add TestSetPageError() [try #2]
David Howells
[PATCH 22/28] fcrypt endianness misannotations [try #2]
David Howells
[PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
David Howells
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
Nick Piggin
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
David Howells
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
Nick Piggin
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
David Howells
Re: [PATCH 24/28] AFS: Add a function to excise a rejected write from the pagecache [try #2]
Nick Piggin
[PATCH 26/28] AF_RXRPC: Save the operation ID for debugging [try #2]
David Howells
[PATCH 25/28] AFS: Improve handling of a rejected writeback [try #2]
David Howells
[PATCH 28/28] FS-Cache: Make kAFS use FS-Cache [try #2]
David Howells
[PATCH 27/28] AFS: Implement shared-writable mmap [try #2]
David Howells
[PATCH 0/7] Permit filesystem local caching
David Howells
[PATCH 2/7] KEYS: Check starting keyring as part of search
David Howells
[PATCH 3/7] KEYS: Allow the callout data to be passed as a blob rather than a string
David Howells
[PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
David Howells
Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
Serge E. Hallyn
Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()
David Howells
[PATCH 4/7] KEYS: Add keyctl function to get a security label
David Howells
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
Casey Schaufler
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
Stephen Smalley
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
David Howells
Re: [PATCH 4/7] KEYS: Add keyctl function to get a security label
Casey Schaufler
[PATCH 1/7] KEYS: Increase the payload size when instantiating a key
David Howells
[PATCH] (2.6.24-rc3-mm2) -mm Smack mutex, capability, pointers, and spelling cleanup
Casey Schaufler
[PATCH] VM/Security: add security hook to do_brk
Eric Paris
Re: [PATCH] VM/Security: add security hook to do_brk
Alan Cox
Re: [PATCH] VM/Security: add security hook to do_brk
James Morris
[PATCH] (2.6.24-rc3-mm2) -mm Smack mutex cleanup
Casey Schaufler
Re: [PATCH] (2.6.24-rc3-mm2) -mm Smack mutex cleanup
Jiri Slaby
Re: [PATCH] (2.6.24-rc3-mm2) -mm Smack mutex cleanup
Casey Schaufler
Re: Out of tree module using LSM
Crispin Cowan
Re: Out of tree module using LSM
James Morris
Re: Out of tree module using LSM
Crispin Cowan
Re: Out of tree module using LSM
James Morris
[PATCH] (2.4.26-rc3-mm2) -mm Update CAP_LAST_CAP to reflect CAP_MAC_ADMIN
Casey Schaufler
Re: [PATCH] (2.4.26-rc3-mm2) -mm Update CAP_LAST_CAP to reflect CAP_MAC_ADMIN
Serge E. Hallyn
[PATCH -mm] capabilities: fix CAP_LAST_CAP to CAP_MAC_ADMIN
Serge E. Hallyn
Path of task via LSM
Andrew Blaich
Re: Path of task via LSM
Tetsuo Handa
Re: Path of task via LSM
Andrew Blaich
Re: Path of task via LSM
Tetsuo Handa
Re: Path of task via LSM
Andrew Blaich
Re: Path of task via LSM
Tetsuo Handa
Re: Path of task via LSM
Stephen Smalley
Re: Path of task via LSM
Rodrigo Rubira Branco (BSDaemon)
Re: [PATCH 2/2] hijack: update task_alloc_security
Rodrigo Rubira Branco (BSDaemon)
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
[PATCH 1/2] namespaces: introduce sys_hijack (v10)
Mark Nelson
[PATCH 2/2] hijack: update task_alloc_security
Mark Nelson
Re: [PATCH 2/2] hijack: update task_alloc_security
Casey Schaufler
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: [PATCH 2/2] hijack: update task_alloc_security
Crispin Cowan
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: [PATCH 2/2] hijack: update task_alloc_security
Joshua Brindle
Re: [PATCH 2/2] hijack: update task_alloc_security
Stephen Smalley
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: [PATCH 2/2] hijack: update task_alloc_security
Crispin Cowan
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: [PATCH 2/2] hijack: update task_alloc_security
Crispin Cowan
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: [PATCH 2/2] hijack: update task_alloc_security
Crispin Cowan
Re: [PATCH 2/2] hijack: update task_alloc_security
Serge E. Hallyn
Re: [PATCH 2/2] hijack: update task_alloc_security
Crispin Cowan
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Crispin Cowan
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Serge E. Hallyn
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Stephen Smalley
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Serge E. Hallyn
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Casey Schaufler
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Serge E. Hallyn
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Stephen Smalley
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Serge E. Hallyn
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Mark Nelson
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Paul Menage
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Serge E. Hallyn
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Eric W. Biederman
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Serge E. Hallyn
Re: [PATCH 1/2] namespaces: introduce sys_hijack (v10)
Eric W. Biederman
Re: [PATCH 2/3 -v2] mmap: round mmap hint address above mmap_min_addr
James Morris
Re: [PATCH 1/3] mmap: protect from stack expantion into low vm addresses
James Morris
Re: [PATCH -mm 2/2] do_wait: cleanup delay_group_leader() usage
James Morris
[PATCH -mm 2/2] do_wait: cleanup delay_group_leader() usage (fwd)
James Morris
[PATCH] -mm (2.4.26-rc3-mm1) v2 Smack using capabilities 32 and 33
Casey Schaufler
Re: [PATCH] -mm (2.4.26-rc3-mm1) v2 Smack using capabilities 32 and 33
Serge E. Hallyn
Re: [PATCH] -mm (2.4.26-rc3-mm1) v2 Smack using capabilities 32 and 33
Andrew Morgan
Re: [PATCH] -mm (2.4.26-rc3-mm1) v2 Smack using capabilities 32 and 33
Andrew Morton
Re: [PATCH] -mm (2.4.26-rc3-mm1) v2 Smack using capabilities 32 and 33
Casey Schaufler
[PATCH] capabilities: introduce per-process capability bounding set (v10)
Serge E. Hallyn
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Serge E. Hallyn
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
serge
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Serge E. Hallyn
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
serge
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
KaiGai Kohei
Re: [PATCH] capabilities: introduce per-process capability bounding set (v10)
Andrew Morgan
[PATCH] file capabilities: don't prevent signaling setuid root programs.
Serge E. Hallyn
Re: [PATCH] file capabilities: don't prevent signaling setuid root programs.
Andrew Morgan
Re: [PATCH] file capabilities: don't prevent signaling setuid root programs.
Serge E. Hallyn
[PATCH] -mm (2.6.24-rc3-mm1) Smack using capabilities 32 and 33
Casey Schaufler
Re: [PATCH] -mm (2.6.24-rc3-mm1) Smack using capabilities 32 and 33
Andrew Morgan
Re: [PATCH] -mm (2.6.24-rc3-mm1) Smack using capabilities 32 and 33
Casey Schaufler
Re: [PATCH] -mm (2.6.24-rc3-mm1) Smack using capabilities 32 and 33
Serge E. Hallyn
Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.
James Morris
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Samir Bellabes
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Samir Bellabes
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Samir Bellabes
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Samir Bellabes
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process'ssecurity context.
Samir Bellabes
Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.
Patrick McHardy
Re: [PATCH net-2.6.25] Add packet filtering based on process's securitycontext.
Tetsuo Handa
[PATCH net-2.6.25] Add packet filtering based on process's security context.
Tetsuo Handa
[PATCH net-2.6.25] Add packet filtering based on process's security context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.
Casey Schaufler
Re: [PATCH net-2.6.25] Add packet filtering based on process\'s security context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.
Tetsuo Handa
Re: [PATCH net-2.6.25] Add packet filtering based on process's security context.
Paul Moore
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Casey Schaufler
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Stephen Smalley
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Casey Schaufler
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Andrew Morgan
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Casey Schaufler
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Andrew Morgan
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Crispin Cowan
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Casey Schaufler
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Kyle Moffett
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Crispin Cowan
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Kyle Moffett
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Joshua Brindle
Re: + smack-version-11c-simplified-mandatory-access-control-kernel.patch added to -mm tree
Crispin Cowan
Re: [PATCH] (2.6.24-rc3 -mm only) Smack Version 11c Simplified Mandatory Access Control Kernel
Casey Schaufler
Re: [PATCH] (2.6.24-rc3 -mm only) Smack Version 11c Simplified Mandatory Access Control Kernel
Andrew Morton
Re: [PATCH] (2.6.24-rc3 -mm only) Smack Version 11c Simplified Mandatory Access Control Kernel
Casey Schaufler
Re: [PATCH] (2.6.24-rc3 -mm only) Smack Version 11c Simplified Mandatory Access Control Kernel
Ingo Molnar
Re: [PATCH] (2.6.24-rc3 -mm only) Smack Version 11c Simplified Mandatory Access Control Kernel
Andrew Morton
file capabilities ("ltp") tests
Serge E. Hallyn
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Serge E. Hallyn
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Chris Friedhoff
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Serge E. Hallyn
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Chris Friedhoff
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Serge E. Hallyn
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Chris Friedhoff
Re: Posix file capabilities in 2.6.24rc2; now 2.6.24-rc3
Andrew Morgan
[PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Serge E. Hallyn
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Andrew Morgan
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Andrew Morgan
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Serge E. Hallyn
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Serge E. Hallyn
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Andrew Morgan
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Serge E. Hallyn
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Serge E. Hallyn
Re: [PATCH 1/1] capabilities: introduce per-process capability bounding set (v8)
Andrew Morgan
Re: [Apparmor-dev] Object Capabilities for AppArmor
Rob Meijer
[PATCH] 64bit capability support (legacy support fix)
Andrew Morgan
Re: [PATCH] 64bit capability support (legacy support fix)
Kevin Winchester
Re: [PATCH] 64bit capability support (legacy support fix)
Serge E. Hallyn
Re: [PATCH] 64bit capability support (legacy support fix)
Andrew Morton
Re: [PATCH] 64bit capability support (legacy support fix)
Andrew Morton
Re: [PATCH] 64bit capability support (legacy support fix)
Serge E. Hallyn
Re: [PATCH] 64bit capability support (legacy support fix)
Andrew Morton
Re: [PATCH] 64bit capability support (legacy support fix)
Kevin Winchester
[PATCH] Modify 'old libcap' warning message
Andrew Morgan
Object Capabilities for AppArmor
Crispin Cowan
[TOMOYO #5 00/18] TOMOYO Linux - MAC based on process invocation history.
penguin-kernel
[TOMOYO #5 10/18] argv0 check functions.
penguin-kernel
[TOMOYO #5 07/18] Domain transition functions.
penguin-kernel
[TOMOYO #5 09/18] File access control functions.
penguin-kernel
[TOMOYO #5 01/18] Add struct vfsmount to struct task_struct.
penguin-kernel
[TOMOYO #5 02/18] Add wrapper functions for VFS helper functions.
penguin-kernel
Re: [TOMOYO #5 02/18] Add wrapper functions for VFS helper functions.
Trond Myklebust
Re: [TOMOYO #5 02/18] Add wrapper functions for VFS helperfunctions.
Tetsuo Handa
Re: [TOMOYO #5 02/18] Add wrapper functions for VFS helperfunctions.
Trond Myklebust
Re: [TOMOYO #5 02/18] Add wrapper functions for VFShelperfunctions.
Tetsuo Handa
Re: [TOMOYO #5 02/18] Add wrapper functions for VFShelperfunctions.
Trond Myklebust
Re: [TOMOYO #5 02/18] Add wrapper functions for VFShelperfunctions.
Tetsuo Handa
Re: [TOMOYO #5 02/18] Add wrapper functions for VFS helper functions.
Christoph Hellwig
Re: [TOMOYO #5 02/18] Add wrapper functions for VFS helper functions.
Tetsuo Handa
[TOMOYO #5 03/18] Replace VFS with wrapper functions.
penguin-kernel
[TOMOYO #5 04/18] Data structures and prototype defitions.
penguin-kernel
Earlier messages
Later messages