On Tue, Aug 31, 2021 at 2:58 PM Dan Williams wrote:
> On Tue, Aug 31, 2021 at 6:53 AM Paul Moore wrote:
> > On Tue, Aug 31, 2021 at 5:09 AM Ondrej Mosnacek wrote:
> > > On Sat, Jun 19, 2021 at 12:18 AM Dan Williams
> > > wrote:
> > > > On Wed, Jun 16, 2021 at 1:51 AM Ondrej Mosnacek
> > > >
On Tue, Aug 31, 2021 at 6:53 AM Paul Moore wrote:
>
> On Tue, Aug 31, 2021 at 5:09 AM Ondrej Mosnacek wrote:
> > On Sat, Jun 19, 2021 at 12:18 AM Dan Williams
> > wrote:
> > > On Wed, Jun 16, 2021 at 1:51 AM Ondrej Mosnacek
> > > wrote:
>
> ...
>
> > > > diff --git a/drivers/cxl/mem.c
On Tue, Aug 31, 2021 at 5:09 AM Ondrej Mosnacek wrote:
> On Sat, Jun 19, 2021 at 12:18 AM Dan Williams
> wrote:
> > On Wed, Jun 16, 2021 at 1:51 AM Ondrej Mosnacek wrote:
...
> > > diff --git a/drivers/cxl/mem.c b/drivers/cxl/mem.c
> > > index 2acc6173da36..c1747b6555c7 100644
> > > ---
On Tue, Aug 31, 2021 at 5:08 AM Ondrej Mosnacek wrote:
> Can we move this forward somehow, please?
As mentioned previously, I can merge this via the SELinux tree but I
need to see some ACKs from the other subsystems first, not to mention
some resolution to the outstanding questions.
--
paul
On Sat, Jun 19, 2021 at 12:18 AM Dan Williams wrote:
> On Wed, Jun 16, 2021 at 1:51 AM Ondrej Mosnacek wrote:
> >
> > Commit 59438b46471a ("security,lockdown,selinux: implement SELinux
> > lockdown") added an implementation of the locked_down LSM hook to
> > SELinux, with the aim to restrict
On Fri, Jun 18, 2021 at 5:40 AM Paul Moore wrote:
> On Wed, Jun 16, 2021 at 4:51 AM Ondrej Mosnacek wrote:
> >
> > Commit 59438b46471a ("security,lockdown,selinux: implement SELinux
> > lockdown") added an implementation of the locked_down LSM hook to
> > SELinux, with the aim to restrict which
On Sat, Jun 19, 2021 at 1:00 PM Thomas Gleixner wrote:
> On Wed, Jun 16 2021 at 10:51, Ondrej Mosnacek wrote:
> > diff --git a/arch/x86/mm/testmmiotrace.c b/arch/x86/mm/testmmiotrace.c
> > index bda73cb7a044..c43a13241ae8 100644
> > --- a/arch/x86/mm/testmmiotrace.c
> > +++
On Wed, Jun 16, 2021 at 10:51:18AM +0200, Ondrej Mosnacek wrote:
> Commit 59438b46471a ("security,lockdown,selinux: implement SELinux
> lockdown") added an implementation of the locked_down LSM hook to
> SELinux, with the aim to restrict which domains are allowed to perform
> operations that would
On Wed, Jun 16 2021 at 10:51, Ondrej Mosnacek wrote:
> diff --git a/arch/x86/mm/testmmiotrace.c b/arch/x86/mm/testmmiotrace.c
> index bda73cb7a044..c43a13241ae8 100644
> --- a/arch/x86/mm/testmmiotrace.c
> +++ b/arch/x86/mm/testmmiotrace.c
> @@ -116,7 +116,7 @@ static void
On Wed, Jun 16, 2021 at 1:51 AM Ondrej Mosnacek wrote:
>
> Commit 59438b46471a ("security,lockdown,selinux: implement SELinux
> lockdown") added an implementation of the locked_down LSM hook to
> SELinux, with the aim to restrict which domains are allowed to perform
> operations that would breach
On Wed, Jun 16, 2021 at 4:51 AM Ondrej Mosnacek wrote:
>
> Commit 59438b46471a ("security,lockdown,selinux: implement SELinux
> lockdown") added an implementation of the locked_down LSM hook to
> SELinux, with the aim to restrict which domains are allowed to perform
> operations that would breach
Commit 59438b46471a ("security,lockdown,selinux: implement SELinux
lockdown") added an implementation of the locked_down LSM hook to
SELinux, with the aim to restrict which domains are allowed to perform
operations that would breach lockdown.
However, in several places the security_locked_down()
12 matches
Mail list logo