linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-25 13:31:06 to 2021-12-14 18:24:00 UTC [more...]

[PATCH v2 0/7] pid: Introduce helper task_is_in_root_ns()
 2021-12-14  7:05 UTC  (19+ messages)
` [PATCH v2 1/7] pid: Introduce helper task_is_in_init_pid_ns()
` [PATCH v2 2/7] coresight: etm3x: Use task_is_in_init_pid_ns()
` [PATCH v2 3/7] coresight: etm4x: "
` [PATCH v2 4/7] connector/cn_proc: "
` [PATCH v2 5/7] coda: "
` [PATCH v2 6/7] audit: "
` [PATCH v2 7/7] taskstats: "

[PATCH v31 00/28] LSM: Module stacking for AppArmor
 2021-12-14 13:12 UTC  (30+ messages)
  ` [PATCH v31 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v31 02/28] LSM: Infrastructure management of the sock security
  ` [PATCH v31 03/28] LSM: Add the lsmblob data structure
  ` [PATCH v31 04/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v31 05/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v31 06/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v31 07/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v31 08/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v31 09/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v31 10/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v31 11/28] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v31 12/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v31 13/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v31 14/28] LSM: Specify which LSM to display
  ` [PATCH v31 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v31 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v31 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v31 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v31 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v31 20/28] binder: Pass LSM identifier for confirmation
  ` [PATCH v31 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v31 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v31 23/28] Audit: Create audit_stamp structure
  ` [PATCH v31 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v31 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v31 26/28] Audit: Add record for multiple object "
  ` [PATCH v31 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v31 28/28] AppArmor: Remove the exclusive flag

[PATCH -next] audit: use struct_size() helper in kmalloc()
 2021-12-14 18:10 UTC  (4+ messages)

[PATCH] audit: ensure userspace is penalized the same as the kernel when under pressure
 2021-12-14 16:16 UTC 

[PATCH] audit: improve robustness of the audit queue handling
 2021-12-13 18:31 UTC 

Maximum Value for q_depth
 2021-12-09 14:18 UTC  (6+ messages)
    ` Fwd: "

[PATCH v1 0/7] pid: Introduce helper task_is_in_root_ns()
 2021-12-06  7:13 UTC  (11+ messages)
` [PATCH v1 1/7] "
` [PATCH v1 2/7] coresight: etm3x: Use task_is_in_root_ns() to check PID namespace
` [PATCH v1 3/7] coresight: etm4x: "
` [PATCH v1 4/7] connector/cn_proc: "
` [PATCH v1 5/7] coda: Use task_is_in_root_ns()
` [PATCH v1 6/7] audit: "
` [PATCH v1 7/7] taskstats: "

[RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
 2021-12-06 10:57 UTC  (51+ messages)
` [RFC PATCH v7 04/16] ipe: add userspace interface
` [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v7 07/16] ipe: add auditing support
` [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
      ` [RFC][PATCH] device mapper: Add builtin function dm_get_status()
` [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
` [RFC PATCH v7 14/16] scripts: add boot policy generation program

[PATCH] audit: accelerate audit rule filter
 2021-12-06  7:42 UTC  (3+ messages)

[PATCH v30 00/28] LSM: Module stacking for AppArmor
 2021-12-06  2:45 UTC  (40+ messages)
  ` [PATCH v30 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v30 02/28] LSM: Infrastructure management of the sock security
  ` [PATCH v30 03/28] LSM: Add the lsmblob data structure
  ` [PATCH v30 04/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v30 05/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v30 07/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v30 08/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v30 09/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v30 10/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v30 11/28] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v30 12/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v30 13/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v30 14/28] LSM: Specify which LSM to display
  ` [PATCH v30 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v30 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v30 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v30 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v30 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v30 20/28] binder: Pass LSM identifier for confirmation
  ` [PATCH v30 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v30 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v30 23/28] Audit: Create audit_stamp structure
  ` [PATCH v30 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v30 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v30 26/28] Audit: Add record for multiple object "
  ` [PATCH v30 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v30 28/28] AppArmor: Remove the exclusive flag

[PATCH] audit: accelerate audit rule filter
 2021-12-01 19:39 UTC  (4+ messages)

LSM stacking v30 Audit changes
 2021-11-29 20:05 UTC  (3+ messages)

[RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
 2021-11-24 15:44 UTC  (6+ messages)

[PATCH RFC] integrity: disassociate ima_filter_rule from security_audit_rule
 2021-11-04 21:46 UTC  (2+ messages)

[PATCH v1] add clock_adjtime to certification rulesets
 2021-11-04 21:41 UTC  (3+ messages)

Disassociating ima_filter_rule* from security_audit_rule*
 2021-11-04 18:57 UTC  (2+ messages)

[PATCH v2 RESEND] powerpc/audit: Convert powerpc to AUDIT_ARCH_COMPAT_GENERIC
 2021-11-04 14:32 UTC  (9+ messages)

[PATCH v3 0/7] Add uringop support
 2021-11-02 16:32 UTC  (13+ messages)
` [PATCH v3 1/7] add basic support for the AUDIT_URINGOP record type
` [PATCH v3 2/7] add support for the uring filter list
` [PATCH v3 3/7] add support for uringop names
` [PATCH v3 4/7] add field support for the AUDIT_URINGOP record type
` [PATCH v3 5/7] add ausearch --uringop option
` [PATCH v3 6/7] add aureport "
` [PATCH v3 7/7] add iouring support to the normalizer

[GIT PULL] Audit patches for v5.16
 2021-11-02  4:21 UTC  (2+ messages)

[PATCH v1] add filesystem filter list to auditctl usage
 2021-10-28 21:15 UTC  (2+ messages)

[PATCH v1] auditctl: check for a watch before adding perm
 2021-10-28 21:14 UTC  (2+ messages)

[PATCH v1] remove unused fn audit_add_dir and decl audit_rule_syscall_data
 2021-10-28 21:13 UTC  (2+ messages)

[RFC PATCH v2 0/9] Add LSM access controls and auditing to io_uring
 2021-10-28 20:07 UTC  (5+ messages)

[PATCH] audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
 2021-10-27 21:21 UTC  (5+ messages)
    `  "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).