linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2021-01-26 16:50:46 to 2021-03-18 01:17:09 UTC [more...]

Backlog not working with kernel 3.10
 2021-03-18  1:16 UTC  (11+ messages)
    ` Fwd: "

checkpoint question
 2021-03-18  0:02 UTC 

[RFC PATCH 0/4] Split security_task_getsecid() into subj and obj variants
 2021-03-17 22:56 UTC  (39+ messages)
` [RFC PATCH 1/4] lsm: separate security_task_getsecid() into subjective and objective variants
` [RFC PATCH 2/4] selinux: clarify task subjective and objective credentials
` [RFC PATCH 3/4] smack: differentiate between subjective and objective task credentials
` [RFC PATCH 4/4] apparmor: "

[PATCH 0/2] audit: add documentation for /proc/PID/stable interfaces
 2021-03-17 15:58 UTC  (6+ messages)
` [PATCH 1/2] audit: document /proc/PID/loginuid
` [PATCH 2/2] audit: document /proc/PID/sessionid

Deleted directory path not recorded when running rmdir with slash at directory path end
 2021-03-15 13:56 UTC  (3+ messages)

[PATCH] MAINTAINERS: update audit files
 2021-03-13  4:04 UTC  (3+ messages)

[PATCH] audit: further cleanup of AUDIT_FILTER_ENTRY deprecation
 2021-03-12 21:34 UTC  (2+ messages)

[PATCH v25 00/25] LSM: Module stacking for AppArmor
 2021-03-12 16:16 UTC  (32+ messages)
  ` [PATCH v25 01/25] LSM: Infrastructure management of the sock security
  ` [PATCH v25 02/25] LSM: Add the lsmblob data structure
  ` [PATCH v25 03/25] LSM: provide lsm name and id slot mappings
  ` [PATCH v25 04/25] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v25 05/25] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v25 06/25] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v25 07/25] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v25 08/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v25 09/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v25 10/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v25 11/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v25 12/25] LSM: Use lsmblob in security_cred_getsecid
    ` [RFC PATCH] LSM: audit_sig_lsm can be static
  ` [PATCH v25 13/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v25 14/25] LSM: Specify which LSM to display
  ` [PATCH v25 15/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v25 16/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v25 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v25 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v25 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v25 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v25 21/25] audit: add support for non-syscall auxiliary records
  ` [PATCH v25 22/25] Audit: Add new record for multiple process LSM attributes
  ` [PATCH v25 23/25] Audit: Add a new record for multiple object "
  ` [PATCH v25 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v25 25/25] AppArmor: Remove the exclusive flag

renameat2 syscall is not recorded
 2021-03-11 10:31 UTC  (6+ messages)

Quick announcement on the selinux/next and audit/next branches
 2021-03-06 15:20 UTC  (4+ messages)

auditd daemon is changing /tmp permissions
 2021-03-04 16:05 UTC  (2+ messages)

Audit ipset changes?
 2021-03-03 14:53 UTC  (3+ messages)

Getting the value of a syscall's memory address argument - setxattr
 2021-03-02 16:55 UTC  (5+ messages)

open_by_handle_at and CVE-2020-35501
 2021-03-02 15:10 UTC  (3+ messages)

[PATCH v24 00/25] LSM: Module stacking for AppArmor
 2021-02-23  0:27 UTC  (31+ messages)
  ` [PATCH v24 04/25] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v24 08/25] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v24 09/25] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
  ` [PATCH v24 14/25] LSM: Specify which LSM to display
  ` [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
  ` [PATCH v24 16/25] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v24 17/25] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v24 18/25] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v24 19/25] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v24 20/25] LSM: Verify LSM display sanity in binder
  ` [PATCH v24 21/25] audit: add support for non-syscall auxiliary records
  ` [PATCH v24 22/25] Audit: Add new record for multiple process LSM attributes
  ` [PATCH v24 23/25] Audit: Add a new record for multiple object "
  ` [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v24 25/25] AppArmor: Remove the exclusive flag

[GIT PULL] Audit patches for v5.12
 2021-02-22  1:20 UTC  (2+ messages)

security_task_getsecid() and subjective vs objective task creds
 2021-02-20 14:50 UTC  (7+ messages)

[PATCH ghak124 v3] audit: log nftables configuration change events
 2021-02-19 19:25 UTC  (16+ messages)

audit 3.0.1 released
 2021-02-12 20:45 UTC 

Samba and AuditD
 2021-02-11 22:14 UTC  (2+ messages)

Auditd statsd integration
 2021-02-10 20:06 UTC  (4+ messages)

[ANNOUNCE][CFP] Linux Security Summit 2021
 2021-02-08 19:59 UTC 

[PATCH 2/2] audit: show (grand)parents information of an audit context
 2021-02-03 19:11 UTC  (6+ messages)

[PATCH 1/2] audit: show user land backtrace as part of audit context messages
 2021-02-02 22:11 UTC  (5+ messages)

Fw:Re:[RFC,v3,1/1] audit: speed up syscall rule filtering
 2021-01-29 11:28 UTC 

[PATCH v2] audit: Make audit_filter_syscall() return void
 2021-01-28  3:00 UTC  (2+ messages)

[RFC,v3,1/1] audit: speed up syscall rule filtering
 2021-01-28  2:51 UTC  (2+ messages)

Occasional delayed output of events
 2021-01-27 12:12 UTC  (5+ messages)

[PATCH] audit: Make audit_filter_syscall() return void
 2021-01-26 19:04 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).