On Wed, Mar 10, 2021 at 3:21 AM Jeffrey Vander Stoep wrote:
> On Fri, Mar 5, 2021 at 12:44 AM Paul Moore wrote:
> >
> > On Thu, Mar 4, 2021 at 5:04 AM Jeffrey Vander Stoep
> > wrote:
> > > On Sat, Feb 20, 2021 at 3:45 PM Paul Moore wrote:
> > > > On Fri, Feb 19, 2021 at 9:57 PM James Morris
On Tue, Mar 9, 2021 at 8:03 PM John Johansen
wrote:
> On 2/19/21 3:29 PM, Paul Moore wrote:
> > Of the three LSMs that implement the security_task_getsecid() LSM
> > hook, all three LSMs provide the task's objective security
> > credentials. This turns out to be unfortunate as most of the hook's
On Fri, Mar 5, 2021 at 12:44 AM Paul Moore wrote:
>
> On Thu, Mar 4, 2021 at 5:04 AM Jeffrey Vander Stoep wrote:
> > On Sat, Feb 20, 2021 at 3:45 PM Paul Moore wrote:
> > > On Fri, Feb 19, 2021 at 9:57 PM James Morris wrote:
> > > > On Fri, 19 Feb 2021, Paul Moore wrote:
> > > > > diff --git
On 2/19/21 3:29 PM, Paul Moore wrote:
> Of the three LSMs that implement the security_task_getsecid() LSM
> hook, all three LSMs provide the task's objective security
> credentials. This turns out to be unfortunate as most of the hook's
> callers seem to expect the task's subjective credentials,
On 3/9/21 4:28 PM, Paul Moore wrote:
> On Wed, Mar 3, 2021 at 7:44 PM Paul Moore wrote:
>> On Sun, Feb 21, 2021 at 7:51 AM John Johansen
>> wrote:
>>> On 2/19/21 3:29 PM, Paul Moore wrote:
Of the three LSMs that implement the security_task_getsecid() LSM
hook, all three LSMs provide
On Wed, Mar 3, 2021 at 7:44 PM Paul Moore wrote:
> On Sun, Feb 21, 2021 at 7:51 AM John Johansen
> wrote:
> > On 2/19/21 3:29 PM, Paul Moore wrote:
> > > Of the three LSMs that implement the security_task_getsecid() LSM
> > > hook, all three LSMs provide the task's objective security
> > >
On Mon, Mar 8, 2021 at 2:25 PM Richard Guy Briggs wrote:
> On 2021-02-19 18:29, Paul Moore wrote:
> > Of the three LSMs that implement the security_task_getsecid() LSM
> > hook, all three LSMs provide the task's objective security
> > credentials. This turns out to be unfortunate as most of the
On 2021-02-19 18:29, Paul Moore wrote:
> Of the three LSMs that implement the security_task_getsecid() LSM
> hook, all three LSMs provide the task's objective security
> credentials. This turns out to be unfortunate as most of the hook's
> callers seem to expect the task's subjective credentials,
On Thu, Mar 4, 2021 at 5:04 AM Jeffrey Vander Stoep wrote:
> On Sat, Feb 20, 2021 at 3:45 PM Paul Moore wrote:
> > On Fri, Feb 19, 2021 at 9:57 PM James Morris wrote:
> > > On Fri, 19 Feb 2021, Paul Moore wrote:
> > > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c
> > > >
On Sat, Feb 20, 2021 at 3:45 PM Paul Moore wrote:
>
> On Fri, Feb 19, 2021 at 9:57 PM James Morris wrote:
> > On Fri, 19 Feb 2021, Paul Moore wrote:
> > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c
> > > index c119736ca56ac..39d501261108d 100644
> > > ---
On Sun, Feb 21, 2021 at 7:51 AM John Johansen
wrote:
> On 2/19/21 3:29 PM, Paul Moore wrote:
> > Of the three LSMs that implement the security_task_getsecid() LSM
> > hook, all three LSMs provide the task's objective security
> > credentials. This turns out to be unfortunate as most of the
On Fri, 2021-02-19 at 18:29 -0500, Paul Moore wrote:
> Of the three LSMs that implement the security_task_getsecid() LSM
> hook, all three LSMs provide the task's objective security
> credentials. This turns out to be unfortunate as most of the hook's
> callers seem to expect the task's
On 2/19/21 3:29 PM, Paul Moore wrote:
> Of the three LSMs that implement the security_task_getsecid() LSM
> hook, all three LSMs provide the task's objective security
> credentials. This turns out to be unfortunate as most of the hook's
> callers seem to expect the task's subjective credentials,
On Sun, Feb 21, 2021 at 7:51 AM John Johansen
wrote:
> On 2/19/21 3:29 PM, Paul Moore wrote:
> > Of the three LSMs that implement the security_task_getsecid() LSM
> > hook, all three LSMs provide the task's objective security
> > credentials. This turns out to be unfortunate as most of the
On Fri, Feb 19, 2021 at 9:57 PM James Morris wrote:
> On Fri, 19 Feb 2021, Paul Moore wrote:
> > diff --git a/drivers/android/binder.c b/drivers/android/binder.c
> > index c119736ca56ac..39d501261108d 100644
> > --- a/drivers/android/binder.c
> > +++ b/drivers/android/binder.c
> > @@ -2700,7
On Fri, 19 Feb 2021, Paul Moore wrote:
> diff --git a/drivers/android/binder.c b/drivers/android/binder.c
> index c119736ca56ac..39d501261108d 100644
> --- a/drivers/android/binder.c
> +++ b/drivers/android/binder.c
> @@ -2700,7 +2700,7 @@ static void binder_transaction(struct binder_proc *proc,
Of the three LSMs that implement the security_task_getsecid() LSM
hook, all three LSMs provide the task's objective security
credentials. This turns out to be unfortunate as most of the hook's
callers seem to expect the task's subjective credentials, although
a small handful of callers do
17 matches
Mail list logo