messages from 2022-04-07 21:32:49 to 2022-06-08 19:26:27 UTC [more...]
[RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
2022-06-08 19:01 UTC (4+ messages)
` [RFC PATCH v8 05/17] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v8 06/17] uapi|audit: add ipe audit message definitions
` [RFC PATCH v8 16/17] ipe: kunit tests
[PATCH 1/2] audit: remove redundant data_len check
2022-06-08 8:43 UTC (6+ messages)
` [PATCH 2/2] audit: fix most of the checkpatch.pl warnnings & errors
Be careful with rules
2022-06-07 16:35 UTC (5+ messages)
Linux v5.19 and audit
2022-05-23 14:16 UTC
Help setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr
2022-05-19 22:08 UTC (6+ messages)
` [EXTERNAL] "
` [EXTERNAL] Re: Help setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr
[PATCH v3 0/3] fanotify: Allow user space to pass back additional audit info
2022-05-19 9:55 UTC (16+ messages)
` [PATCH v3 1/3] fanotify: Ensure consistent variable type for response
` [PATCH v3 2/3] fanotify: define struct members to hold response decision context
` [PATCH v3 3/3] fanotify: Allow audit to use the full permission event response
[GIT PULL] Audit fixes for v5.18 (#1)
2022-05-19 0:35 UTC (2+ messages)
What does "---" in audit.log timestamp / event-id field mean?
2022-05-18 17:06 UTC (4+ messages)
[ANNOUNCE][CFP] Linux Security Summit Europe 2022
2022-05-18 15:50 UTC
[PATCH 0/1] audit, io_uring, io-wq: call __audit_uring_exit for dummy contexts
2022-05-17 21:34 UTC (4+ messages)
` [PATCH 1/1] "
` [PATCH 1/1] audit,io_uring,io-wq: "
[PATCH v2 0/3] fanotify: Allow user space to pass back additional audit info
2022-05-16 20:53 UTC (21+ messages)
` [PATCH v2 1/3] fanotify: Ensure consistent variable type for response
` [PATCH v2 2/3] fanotify: define struct members to hold response decision context
` [PATCH v2 3/3] fanotify: Allow audit to use the full permission event response
[PATCH 1/5] char: lp: ensure that index has not exceeded LP_NO
2022-05-15 23:30 UTC (11+ messages)
` [PATCH 2/5] char: lp: remove redundant initialization of err
` [PATCH 3/5] char: lp: fix most of checkspec.pl warnings & errors
` [PATCH 4/5] audit: remove redundant data_len check
` [PATCH 5/5] audit: fix most of the checkspec.pl warnnings & errors
[PATCH 1/2] audit: add call argument to socketcall auditing
2022-05-04 5:22 UTC (9+ messages)
` [PATCH 2/2] audit: add filterkey to special audit messages
[PATCH v35 00/29] LSM: Module stacking for AppArmor
2022-04-27 20:55 UTC (64+ messages)
` [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v35 02/29] LSM: Infrastructure management of the sock security
` [PATCH v35 03/29] LSM: Add the lsmblob data structure
` [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
` [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
` [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
` [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v35 14/29] LSM: Specify which LSM to display
` [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
` [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
` [PATCH v35 20/29] binder: Pass LSM identifier for confirmation
` [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
` [PATCH v35 23/29] Audit: Create audit_stamp structure
` [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
` [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
` [PATCH v35 26/29] Audit: Add record for multiple task security contexts
` [PATCH v35 27/29] Audit: Add record for multiple object contexts
` [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
` [PATCH v35 29/29] AppArmor: Remove the exclusive flag
[PATCH] signal: improve the signal test robustness
2022-04-27 0:44 UTC (2+ messages)
[PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
2022-04-17 9:33 UTC (4+ messages)
` [LSM] 0d4df6ae86: BUG:KASAN:stack-out-of-bounds_in_netlbl_unlabel_defconf
[PATCH v34 00/29] LSM: Module stacking for AppArmor
2022-04-15 21:44 UTC (31+ messages)
` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
` [PATCH v34 03/29] LSM: Add the lsmblob data structure
` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v34 14/29] LSM: Specify which LSM to display
` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
` [PATCH v34 23/29] Audit: Create audit_stamp structure
` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
` [PATCH v34 27/29] Audit: Add record for multiple object contexts
` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
` [PATCH v34 29/29] AppArmor: Remove the exclusive flag
[PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
2022-04-08 5:46 UTC (2+ messages)
[PATCH v34 00/29] LSM: Module stacking for AppArmor
2022-04-07 21:22 UTC (11+ messages)
` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
` [PATCH v34 23/29] Audit: Create audit_stamp structure
` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
` [PATCH v34 27/29] Audit: Add record for multiple object contexts
` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
` [PATCH v34 29/29] AppArmor: Remove the exclusive flag
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).