messages from 2022-06-09 23:05:17 to 2022-09-02 21:30:49 UTC [more...]
LSM stacking in next for 6.1?
2022-09-02 21:30 UTC (8+ messages)
[PATCH v4 0/4] fanotify: Allow user space to pass back additional audit info
2022-09-01 18:31 UTC (30+ messages)
` [PATCH v4 1/4] fanotify: Ensure consistent variable type for response
` [PATCH v4 2/4] fanotify: define struct members to hold response decision context
` [PATCH v4 3/4] fanotify, audit: Allow audit to use the full permission event response
` [PATCH v4 3/4] fanotify,audit: "
` [PATCH v4 4/4] fanotify, audit: deliver fan_info as a hex-encoded string
[RFC PATCH 2/2] fs/xattr: wire up syscalls
2022-08-31 19:54 UTC (3+ messages)
[PATCH] audit: remove obvious unnecessary header files
2022-08-31 1:04 UTC (7+ messages)
[PATCH] audit: use time_after to compare time
2022-08-29 23:48 UTC (2+ messages)
audit-3.0.9 released
2022-08-29 22:18 UTC
[GIT PULL] Audit fixes for v6.0 (#2)
2022-08-27 23:07 UTC (2+ messages)
[PATCH ghak138 v2 0/4] issues from moving beyond syscalls
2022-08-26 21:20 UTC (9+ messages)
` [PATCH ghak138 v2 1/4] audit: audit_context pid unused, context enum comment fix
` [PATCH ghak138 v2 2/4] audit: explicitly check audit_context->context enum value
` [PATCH ghak138 v2 3/4] audit: free audit_proctitle only on task exit
` [PATCH ghak138 v2 4/4] audit: move audit_return_fixup before the filters
[PATCH] tests/io_uring: ensure that tne io_uring::enter_ring_fd is imported
2022-08-25 21:07 UTC (4+ messages)
[PATCH ghak138] audit: move audit_return_fixup before the filters
2022-08-25 16:23 UTC (3+ messages)
[GIT PULL] Audit fixes for v6.0 (#1)
2022-08-24 2:45 UTC (2+ messages)
data-race in audit_log_start / audit_receive
2022-08-23 13:09 UTC (6+ messages)
[PATCH next] audit: printk before dropping logs in audit_log_end
2022-08-24 3:57 UTC (5+ messages)
[PATCH next] audit: fix potential double free on error path from fsnotify_add_inode_mark
2022-08-23 2:06 UTC (8+ messages)
[PATCH] kernel: fix repeated words in comments
2022-08-16 2:48 UTC (2+ messages)
[RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
2022-08-09 15:57 UTC (8+ messages)
` [RFC PATCH v8 02/17] ipe: add policy parser
` [RFC PATCH v8 07/17] ipe: add auditing support
` [RFC PATCH v8 13/17] fsverity: consume builtin signature via LSM hook
[PATCH] audit, io_uring, io-wq: Fix memory leak in io_sq_thread() and io_wqe_worker()
2022-08-04 14:44 UTC (10+ messages)
` [PATCH v2] "
[GIT PULL] Audit patches for v6.0
2022-08-02 22:29 UTC (2+ messages)
Excluding a script / process and its descendants from audit
2022-07-14 21:38 UTC (3+ messages)
[PATCH v37 00/33] LSM: Module stacking for AppArmor
2022-07-12 21:58 UTC (39+ messages)
` [PATCH v37 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
` [PATCH v37 02/33] LSM: Infrastructure management of the sock security
` [PATCH v37 03/33] LSM: Add the lsmblob data structure
` [PATCH v37 04/33] LSM: provide lsm name and id slot mappings
` [PATCH v37 05/33] IMA: avoid label collisions with stacked LSMs
` [PATCH v37 06/33] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v37 07/33] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v37 08/33] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v37 09/33] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v37 10/33] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v37 11/33] LSM: Use lsmblob in security_current_getsecid
` [PATCH v37 12/33] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v37 13/33] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v37 14/33] LSM: Specify which LSM to display
` [PATCH v37 15/33] LSM: Ensure the correct LSM context releaser
` [PATCH v37 16/33] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v37 17/33] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v37 18/33] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v37 19/33] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v37 20/33] NET: Store LSM netlabel data in a lsmblob
` [PATCH v37 21/33] binder: Pass LSM identifier for confirmation
` [PATCH v37 22/33] LSM: security_secid_to_secctx module selection
` [PATCH v37 23/33] Audit: Keep multiple LSM data in audit_names
` [PATCH v37 24/33] Audit: Create audit_stamp structure
` [PATCH v37 25/33] LSM: Add a function to report multiple LSMs
` [PATCH v37 26/33] Audit: Allow multiple records in an audit_buffer
` [PATCH v37 27/33] Audit: Add record for multiple task security contexts
` [PATCH v37 28/33] audit: multiple subject lsm values for netlabel
` [PATCH v37 29/33] Audit: Add record for multiple object contexts
` [PATCH v37 30/33] netlabel: Use a struct lsmblob in audit data
` [PATCH v37 31/33] LSM: Removed scaffolding function lsmcontext_init
` [PATCH v37 32/33] LSM: Add /proc attr entry for full LSM context
` [PATCH v37 33/33] AppArmor: Remove the exclusive flag
Trying to understand audisp-remote network behavior
2022-07-12 19:12 UTC (8+ messages)
[PATCH v36 00/33] LSM: Module stacking for AppArmor
2022-06-23 7:09 UTC (36+ messages)
` [PATCH v36 06/33] LSM: Use lsmblob in security_audit_rule_match
` [PATCH v36 07/33] LSM: Use lsmblob in security_kernel_act_as
` [PATCH v36 08/33] LSM: Use lsmblob in security_secctx_to_secid
` [PATCH v36 09/33] LSM: Use lsmblob in security_secid_to_secctx
` [PATCH v36 10/33] LSM: Use lsmblob in security_ipc_getsecid
` [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid
` [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v36 14/33] LSM: Specify which LSM to display
` [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser
` [PATCH v36 16/33] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v36 17/33] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v36 19/33] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v36 20/33] NET: Store LSM netlabel data in a lsmblob
` [PATCH v36 21/33] binder: Pass LSM identifier for confirmation
` [PATCH v36 22/33] LSM: Extend security_secid_to_secctx to include module selection
` [PATCH v36 23/33] Audit: Keep multiple LSM data in audit_names
` [PATCH v36 24/33] Audit: Create audit_stamp structure
` [PATCH v36 25/33] LSM: Add a function to report multiple LSMs
` [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer
` [PATCH v36 27/33] Audit: Add record for multiple task security contexts
` [PATCH v36 28/33] audit: multiple subject lsm values for netlabel
` [PATCH v36 29/33] Audit: Add record for multiple object contexts
` [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data
` [PATCH v36 31/33] LSM: Removed scaffolding function lsmcontext_init
` [PATCH v36 32/33] LSM: Add /proc attr entry for full LSM context
` [PATCH v36 33/33] AppArmor: Remove the exclusive flag
[GIT PULL] Audit fixes for v5.19 (#1)
2022-06-16 22:57 UTC (2+ messages)
[PATCH] audit: free module name
2022-06-15 23:33 UTC (2+ messages)
[PATCH -next] audit: make is_audit_feature_set() static
2022-06-13 18:13 UTC (2+ messages)
[PATCH v36 04/33] LSM: provide lsm name and id slot mappings
2022-06-10 7:51 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox