linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2021-12-08 13:06:57 to 2022-02-09 22:32:02 UTC [more...]

[PATCH v4 0/3] audit: add support for openat2
 2022-02-09 22:31 UTC  (9+ messages)
` [PATCH v4 2/3] audit: add support for the openat2 syscall

[PATCH v1] audit: fix illegal pointer dereference for openat2
 2022-02-09 21:50 UTC 

[PATCH] audit: don't deref the syscall args when checking the openat2 open_how::flags
 2022-02-09 21:11 UTC 

How to configure auditd to register like internal bash commands?
 2022-02-09  1:43 UTC  (7+ messages)
      ` Aw: "

[ANNOUNCE][CFP] Linux Security Summit North America 2022
 2022-02-07 22:24 UTC 

[PATCH v4 0/5] pid: Use helper task_is_in_root_ns()
 2022-02-04 13:50 UTC  (6+ messages)
` [PATCH v4 1/5] coresight: etm3x: Use task_is_in_init_pid_ns()
` [PATCH v4 2/5] coresight: etm4x: "
` [PATCH v4 3/5] coda: "
` [PATCH v4 4/5] audit: "
` [PATCH v4 5/5] taskstats: "

[PATCH 1/1] Smack:- Fix the issue of wrong info printed in ptrace error logs
 2022-02-03 18:09 UTC  (14+ messages)
      `  "
          `  "

[GIT PULL] Audit fixes for v5.17 (#1)
 2022-02-01 20:46 UTC  (2+ messages)

[PATCH v32 00/28] LSM: Module stacking for AppArmor
 2022-02-02 23:53 UTC  (29+ messages)
  ` [PATCH v32 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v32 02/28] LSM: Infrastructure management of the sock security
  ` [PATCH v32 03/28] LSM: Add the lsmblob data structure
  ` [PATCH v32 04/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v32 06/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v32 07/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v32 08/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v32 09/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v32 10/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v32 14/28] LSM: Specify which LSM to display
  ` [PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v32 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v32 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v32 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v32 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v32 20/28] binder: Pass LSM identifier for confirmation
  ` [PATCH v32 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v32 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v32 23/28] Audit: Create audit_stamp structure
  ` [PATCH v32 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v32 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v32 26/28] Audit: Add record for multiple object "
  ` [PATCH v32 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v32 28/28] AppArmor: Remove the exclusive flag

[PATCH v3] audit: log AUDIT_TIME_* records only from rules
 2022-02-01  1:29 UTC  (5+ messages)

[PATCH v2] audit: log AUDIT_TIME_* records only from rules
 2022-01-25 21:47 UTC  (4+ messages)

Maximum Value for q_depth
 2022-01-25 20:30 UTC  (10+ messages)
    ` Fwd: "

[PATCH v2] audit: improve audit queue handling when "audit=1" on cmdline
 2022-01-25 18:26 UTC  (6+ messages)

[PATCH v2 0/7] pid: Introduce helper task_is_in_root_ns()
 2022-01-24  9:29 UTC  (21+ messages)
` [PATCH v2 1/7] pid: Introduce helper task_is_in_init_pid_ns()
` [PATCH v2 2/7] coresight: etm3x: Use task_is_in_init_pid_ns()
` [PATCH v2 3/7] coresight: etm4x: "
` [PATCH v2 4/7] connector/cn_proc: "
` [PATCH v2 6/7] audit: "
` [PATCH v2 7/7] taskstats: "

audit-3.0.7 released
 2022-01-23 20:29 UTC 

[RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
 2022-01-20 23:07 UTC  (14+ messages)

[RFC PATCH] audit: improve audit queue handling when "audit=1" on cmdline
 2022-01-19 16:10 UTC  (3+ messages)

[PATCH AUTOSEL 5.15 121/188] audit: ensure userspace is penalized the same as the kernel when under pressure
 2022-01-18  2:30 UTC 

[PATCH AUTOSEL 4.19 33/59] audit: ensure userspace is penalized the same as the kernel when under pressure
 2022-01-18  2:46 UTC 

[PATCH AUTOSEL 5.16 142/217] audit: ensure userspace is penalized the same as the kernel when under pressure
 2022-01-18  2:18 UTC 

[PATCH AUTOSEL 5.10 071/116] audit: ensure userspace is penalized the same as the kernel when under pressure
 2022-01-18  2:39 UTC 

[PATCH AUTOSEL 5.4 43/73] audit: ensure userspace is penalized the same as the kernel when under pressure
 2022-01-18  2:44 UTC 

Flush the hold queue fall into an infinite loop
 2022-01-14 22:35 UTC  (5+ messages)
  ` some logs about the issue // "

[GIT PULL] Audit patches for v5.17
 2022-01-11 21:24 UTC  (2+ messages)

Mapping of Audit rule to Record Type Generated + chmod log query
 2022-01-11 15:42 UTC  (4+ messages)

initial io_uring test for audit-testsuite
 2022-01-04 22:43 UTC 

[PATCH -next 0/1] audit: ignore userspace log when backlog limit exceeded and backlog_wait_time is 0
 2021-12-29  1:20 UTC  (3+ messages)
` [PATCH -next 1/1] "

[PATCH -next, v3 1/2] audit: use struct_size() helper in audit_[send|make]_reply()
 2021-12-20 21:20 UTC  (4+ messages)
` [PATCH -next, v3 2/2] audit: replace zero-length array with flexible-array member

[PATCH] audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
 2021-12-20 21:07 UTC  (6+ messages)
    `  "

[GIT PULL] Audit fixes for v5.16 (#1)
 2021-12-17  0:03 UTC  (2+ messages)

Fwd: [PATCH -next, v3 1/2] audit: use struct_size() helper in audit_[send|make]_reply()
 2021-12-16 23:16 UTC  (2+ messages)
  ` Fwd: [PATCH -next, v3 2/2] audit: replace zero-length array with flexible-array member

[PATCH] audit: improve robustness of the audit queue handling
 2021-12-15 18:28 UTC  (5+ messages)

[PATCH] audit: ensure userspace is penalized the same as the kernel when under pressure
 2021-12-15 18:15 UTC  (4+ messages)

[PATCH -next] audit: use struct_size() helper in kmalloc()
 2021-12-15  2:56 UTC  (8+ messages)

[PATCH v31 00/28] LSM: Module stacking for AppArmor
 2021-12-15  9:14 UTC  (35+ messages)
  ` [PATCH v31 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v31 02/28] LSM: Infrastructure management of the sock security
  ` [PATCH v31 03/28] LSM: Add the lsmblob data structure
  ` [PATCH v31 04/28] LSM: provide lsm name and id slot mappings
  ` [PATCH v31 05/28] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v31 06/28] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v31 07/28] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v31 08/28] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v31 09/28] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v31 10/28] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v31 11/28] LSM: Use lsmblob in security_task_getsecid
  ` [PATCH v31 12/28] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v31 13/28] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v31 14/28] LSM: Specify which LSM to display
  ` [PATCH v31 15/28] LSM: Ensure the correct LSM context releaser
  ` [PATCH v31 16/28] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v31 17/28] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v31 18/28] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v31 19/28] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v31 20/28] binder: Pass LSM identifier for confirmation
  ` [PATCH v31 21/28] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v31 22/28] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v31 23/28] Audit: Create audit_stamp structure
  ` [PATCH v31 24/28] Audit: Add framework for auxiliary records
  ` [PATCH v31 25/28] Audit: Add record for multiple task security contexts
  ` [PATCH v31 26/28] Audit: Add record for multiple object "
  ` [PATCH v31 27/28] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v31 28/28] AppArmor: Remove the exclusive flag


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).