linux-security-module July 2008 archive
Main Archive Page > Month Archives  > linux-security-module archives
linux-security-module: By Date

linux-security-module By Date

SubjectAuthorDate
Re: security-testing tree for 2.6.27Mimi Zohar
Re: security-testing tree for 2.6.27James Morris
Re: security-testing tree for 2.6.27Mimi Zohar
Re: security-testing tree for 2.6.27Subrata Modak
Re: security-testing tree for 2.6.27James Morris
Re: security-testing tree for 2.6.27Mimi Zohar
Re: security-testing tree for 2.6.27James Morris
security-testing tree for 2.6.27James Morris
Re: [PATCH 1/7] Fix setting of PF_SUPERPRIV by __capable() [ver #3]Andrew G. Morgan
Re: [PATCH 4/7] CRED: Neuter sys_capset() [ver #3]Andrew G. Morgan
Re: [PATCH 1/7] Fix setting of PF_SUPERPRIV by __capable() [ver #3]Casey Schaufler
[PATCH 7/7] CRED: Wrap most current->e?[ug]id and some task->e?[ug]id [ver #3]David Howells
[PATCH 6/7] CRED: Change current->fs[ug]id to current_fs[ug]id() [ver #3]David Howells
[PATCH 3/7] KEYS: Alter use of key instantiation link-to-keyring argument [ver #3]David Howells
[PATCH 1/7] Fix setting of PF_SUPERPRIV by __capable() [ver #3]David Howells
[PATCH 0/7] Introduce credentials [ver #3]David Howells
[PATCH 5/7] CRED: Constify the kernel_cap_t arguments to the capset LSM hooks [ver #3]David Howells
[PATCH 2/7] KEYS: Disperse linux/key_ui.h [ver #3]David Howells
[PATCH 4/7] CRED: Neuter sys_capset() [ver #3]David Howells
Re: [PATCH 4/7] CRED: Neuter sys_capset() [ver #2]David Howells
Re: [PATCH 4/7] CRED: Neuter sys_capset() [ver #2]James Morris
Re: [PATCH 4/7] CRED: Neuter sys_capset() [ver #2]Andrew G. Morgan
[PATCH 7/7] CRED: Wrap most current->e?[ug]id and some task->e?[ug]id [ver #2]David Howells
[PATCH 6/7] CRED: Change current->fs[ug]id to current_fs[ug]id() [ver #2]David Howells
[PATCH 4/7] CRED: Neuter sys_capset() [ver #2]David Howells
[PATCH 5/7] CRED: Constify the kernel_cap_t arguments to the capset LSM hooks [ver #2]David Howells
[PATCH 3/7] KEYS: Alter use of key instantiation link-to-keyring argument [ver #2]David Howells
[PATCH 1/7] Fix setting of PF_SUPERPRIV by __capable() [ver #2]David Howells
[PATCH 2/7] KEYS: Disperse linux/key_ui.h [ver #2]David Howells
[PATCH 0/7] Introduce credentials [ver #2]David Howells
Re: [PATCH] CRED: Changes additional to neutering sys_capset()David Howells
Re: [PATCH] CRED: Changes additional to neutering sys_capset()Andrew G. Morgan
[PATCH] CRED: Changes additional to neutering sys_capset()David Howells
Re: [PATCH 4/7] CRED: Neuter sys_capset()David Howells
Re: [PATCH 4/7] CRED: Neuter sys_capset()Andrew G. Morgan
Re: [PATCH 5/7] CRED: Constify the kernel_cap_t arguments to the capset LSM hooksAndrew G. Morgan
[PATCH 7/7] CRED: Wrap most current->e?[ug]id and some task->e?[ug]idDavid Howells
[PATCH 6/7] CRED: Change current->fs[ug]id to current_fs[ug]id()David Howells
[PATCH 3/7] KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells
[PATCH 5/7] CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells
[PATCH 4/7] CRED: Neuter sys_capset()David Howells
[PATCH 1/7] Fix setting of PF_SUPERPRIV by __capable()David Howells
[PATCH 2/7] KEYS: Disperse linux/key_ui.hDavid Howells
[PATCH 0/7] Introduce credentialsDavid Howells
Re: [regression][x86-64] "security: remove dummy module" braking boot on my pc.Alexey Fisher
Re: [regression][x86-64] "security: remove dummy module" braking boot on my pc.James Morris
Re: [PATCH 1/2] Security: Add iptables security table for mandatory access control rulesPatrick McHardy
Re: [PATCH 1/2] Security: Add iptables security table for mandatory access control rulesJames Morris
Re: [PATCH 00/27] Introduce credentials [ver #6]Stephen Smalley
Re: Should LSM hooks be called by filesystem's requests?Casey Schaufler
Re: [PATCH 00/27] Introduce credentials [ver #6]James Morris
Re: [PATCH 00/27] Introduce credentials [ver #6]David Howells
Re: [PATCH 00/27] Introduce credentials [ver #6]James Morris
Should LSM hooks be called by filesystem's requests?Tetsuo Handa
Re: [PATCH 24/27] CRED: Documentation [ver #6]Peter Dolding
Re: [PATCH] security: remove register_security hook (was Re: [rfc patch 2/2] security: remove dummy module)Greg KH
Re: [LTP] [PATCH 1/1] ltp: filecaps: several fixupsSubrata Modak
[PATCH 27/27] CRED: Allow kernel services to override LSM settings for task actions [ver #6]David Howells
[PATCH 26/27] CRED: Add a kernel_service object class to SELinux [ver #6]David Howells
[PATCH 24/27] CRED: Documentation [ver #6]David Howells
[PATCH 25/27] CRED: Differentiate objective and effective subjective credentials on a task [ver #6]David Howells
[PATCH 22/27] CRED: Prettify commoncap.c [ver #6]David Howells
[PATCH 21/27] CRED: Make execve() take advantage of copy-on-write credentials [ver #6]David Howells
[PATCH 23/27] CRED: Use creds in file structs [ver #6]David Howells
[PATCH 18/27] CRED: Make inode_has_perm() and file_has_perm() take a cred pointer [ver #6]David Howells
[PATCH 19/27] CRED: Pass credentials through dentry_open() [ver #6]David Howells
[PATCH 17/27] CRED: Rename is_single_threaded() to is_wq_single_threaded() [ver #6]David Howells
[PATCH 14/27] CRED: Use RCU to access another task's creds and to release a task's own creds [ver #6]David Howells
[PATCH 16/27] CRED: Separate per-task-group keyrings from signal_struct [ver #6]David Howells
[PATCH 15/27] CRED: Wrap access to SELinux's task SID [ver #6]David Howells
[PATCH 09/27] CRED: Wrap most current->e?[ug]id and some task->e?[ug]id [ver #6]David Howells
[PATCH 13/27] CRED: Wrap current->cred and a few other accessors [ver #6]David Howells
[PATCH 12/27] CRED: Detach the credentials from task_struct [ver #6]David Howells
[PATCH 07/27] CRED: Constify the kernel_cap_t arguments to the capset LSM hooks [ver #6]David Howells
[PATCH 10/27] Remove Sparc's asm-offsets for sclow.S [ver #6]David Howells
[PATCH 08/27] CRED: Change current->fs[ug]id to current_fs[ug]id() [ver #6]David Howells
[PATCH 06/27] CRED: Neuter sys_capset() [ver #6]David Howells
[PATCH 05/27] KEYS: Alter use of key instantiation link-to-keyring argument [ver #6]David Howells
[PATCH 04/27] KEYS: Disperse linux/key_ui.h [ver #6]David Howells
[PATCH 03/27] Filesystem capabilities have come of age. [ver #6]David Howells
[PATCH 00/27] Introduce credentials [ver #6]David Howells
[PATCH 02/27] Refactor filesystem capability support in main kernel. [ver #6]David Howells
[PATCH 01/27] Fix setting of PF_SUPERPRIV by __capable() [ver #6]David Howells
Re: [PATCH 00/28] Introduce credentials [ver #5]David Howells
Re: [rfc patch 2/2] security: remove dummy moduleSerge E. Hallyn
Re: [rfc patch 2/2] security: remove dummy moduleSerge E. Hallyn
Re: [PATCH 00/28] Introduce credentials [ver #5]Al Viro
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [PATCH] security: remove register_security hook (was Re: [rfc patch 2/2] security: remove dummy module)Stephen Smalley
Re: [rfc patch 2/2] security: remove dummy moduleMiklos Szeredi
[PATCH] security: remove register_security hook (was Re: [rfc patch 2/2] security: remove dummy module)James Morris
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [PATCH 00/28] Introduce credentials [ver #5]David Howells
Re: [PATCH 00/28] Introduce credentials [ver #5]James Morris
Re: [PATCH 00/28] Introduce credentials [ver #5]Serge E. Hallyn
Re: [PATCH 00/28] Introduce credentials [ver #5]David Howells
Re: [PATCH 00/28] Introduce credentials [ver #5]Serge E. Hallyn
Re: [PATCH 25/28] CRED: Documentation [ver #5]Casey Schaufler
Re: [PATCH 25/28] CRED: Documentation [ver #5]Casey Schaufler
Re: [PATCH] security: reinstate extra ptrace security check in pagemap_readJames Morris
[PATCH] security: reinstate extra ptrace security check in pagemap_readJames Morris
Re: [rfc patch 2/2] security: remove dummy moduleSerge E. Hallyn
Re: [rfc patch 2/2] security: remove dummy moduleStephen Smalley
Re: [PATCH 25/28] CRED: Documentation [ver #5]Stephen Smalley
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [PATCH 25/28] CRED: Documentation [ver #5]David Howells
Re: [PATCH 25/28] CRED: Documentation [ver #5]Dave Quigley
Re: [PATCH 25/28] CRED: Documentation [ver #5]David Howells
Re: [PATCH 25/28] CRED: Documentation [ver #5]David Howells
Re: [PATCH 25/28] CRED: Documentation [ver #5]David Howells
Re: Linux Credentials document, first draftDavid Howells
Re: [rfc patch 2/2] security: remove dummy moduleStephen Smalley
Re: [PATCH 25/28] CRED: Documentation [ver #5]Casey Schaufler
[PATCH 28/28] CRED: Allow kernel services to override LSM settings for task actions [ver #5]David Howells
[PATCH 27/28] CRED: Add a kernel_service object class to SELinux [ver #5]David Howells
[PATCH 25/28] CRED: Documentation [ver #5]David Howells
[PATCH 26/28] CRED: Differentiate objective and effective subjective credentials on a task [ver #5]David Howells
[PATCH 24/28] CRED: Use creds in file structs [ver #5]David Howells
[PATCH 22/28] CRED: Make execve() take advantage of copy-on-write credentials [ver #5]David Howells
[PATCH 23/28] CRED: Prettify commoncap.c [ver #5]David Howells
[PATCH 20/28] CRED: Pass credentials through dentry_open() [ver #5]David Howells
[PATCH 19/28] CRED: Make inode_has_perm() and file_has_perm() take a cred pointer [ver #5]David Howells
[PATCH 18/28] CRED: Rename is_single_threaded() to is_wq_single_threaded() [ver #5]David Howells
[PATCH 17/28] CRED: Separate per-task-group keyrings from signal_struct [ver #5]David Howells
[PATCH 16/28] CRED: Wrap access to SELinux's task SID [ver #5]David Howells
[PATCH 15/28] CRED: Use RCU to access another task's creds and to release a task's own creds [ver #5]David Howells
[PATCH 14/28] CRED: Wrap current->cred and a few other accessors [ver #5]David Howells
[PATCH 11/28] CRED: Wrap most current->e?[ug]id and some task->e?[ug]id [ver #5]David Howells
[PATCH 13/28] CRED: Detach the credentials from task_struct [ver #5]David Howells
[PATCH 10/28] CRED: Change current->fs[ug]id to current_fs[ug]id() [ver #5]David Howells
[PATCH 09/28] CRED: Neuter sys_capset() [ver #5]David Howells
[PATCH 08/28] KEYS: Alter use of key instantiation link-to-keyring argument [ver #5]David Howells
[PATCH 07/28] KEYS: Disperse linux/key_ui.h [ver #5]David Howells
[PATCH 05/28] Refactor filesystem capability support in main kernel. [ver #5]David Howells
[PATCH 04/28] ptraced -> straced [ver #5]David Howells
[PATCH 06/28] Filesystem capabilities have come of age. [ver #5]David Howells
[PATCH 00/28] Introduce credentials [ver #5]David Howells
[PATCH 01/28] Fix setting of PF_SUPERPRIV by __capable() [ver #5]David Howells
[PATCH 02/28] Subject: [PATCH] Security fix for experimental filesystem capability code. [ver #5]David Howells
[PATCH 03/28] Blunt CAP_SETPCAP on strace with filesystem capability support [ver #5]David Howells
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [rfc patch 2/2] security: remove dummy moduleMiklos Szeredi
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [rfc patch 2/2] security: remove dummy moduleMiklos Szeredi
Re: [rfc patch 2/2] security: remove dummy moduleMiklos Szeredi
Re: [rfc patch 2/2] security: remove dummy moduleCasey Schaufler
Re: [rfc patch 2/2] security: remove dummy moduleJames Morris
Re: [rfc patch 1/2] security: remove unused sb_get_mnt_opts hookJames Morris
[rfc patch 2/2] security: remove dummy moduleMiklos Szeredi
[rfc patch 1/2] security: remove unused sb_get_mnt_opts hookMiklos Szeredi
[rfc patch 0/2] security: remove dummy moduleMiklos Szeredi
Re: [LTP] [RFC] LTP IMA patchSubrata Modak