linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2014-02-10 20:04:07 to 2014-03-17 20:15:29 UTC [more...]

[PATCH 09/12] pid: modify task_pid_nr to work without task->pid
 2014-03-17 20:15 UTC  (21+ messages)
  ` [PATCH] pid: change task_struct::pid to read-only
          ` [PATCH 0/7][RFC] pid: changes to support audit
            ` [PATCH 4/7] pid: modify task_tgid_nr to work without task->tgid
            ` [PATCH 5/7] pid: rewrite task helper function is_global_init() avoiding task->pid
            ` [PATCH 7/7] pid: get pid_t ppid of task in init_pid_ns

race in audit_log_untrusted_string for task_struct::comm
 2014-03-17 13:01 UTC  (4+ messages)
` [PATCH] audit: get comm using lock to avoid race in string printing
` [PATCH] audit: copy comm "

[PATCH v3 3/3] arm64: audit: Add audit hook in ptrace/syscall_trace
 2014-03-16 19:48 UTC  (29+ messages)
` [PATCH] arm64: make a single hook to syscall_trace() for all syscall features
  ` [PATCH v2 0/1] "
    ` [PATCH v2 1/1] "
    ` [PATCH v3 0/2] arm64: prerequisites for audit and ftrace
      ` [PATCH v3 1/2] arm64: make a single hook to syscall_trace() for all syscall features
      ` [PATCH v3 2/2] arm64: Add regs_return_value() in syscall.h
      ` [PATCH v4 0/3] arm64: prerequisites for audit and ftrace
        ` [PATCH v4 1/3] arm64: make a single hook to syscall_trace() for all syscall features
        ` [PATCH v4 2/3] arm64: split syscall_trace() into separate functions for enter/exit
        ` [PATCH v4 3/3] arm64: Add regs_return_value() in syscall.h
        ` [PATCH v5 0/4] arm64: prerequisites for audit and ftrace
          ` [PATCH v5 1/4] arm64: make a single hook to syscall_trace() for all syscall features
          ` [PATCH v5 2/4] arm64: split syscall_trace() into separate functions for enter/exit
          ` [PATCH v5 3/4] arm64: Add regs_return_value() in syscall.h
          ` [PATCH v5 4/4] arm64: is_compat_task is defined both in asm/compat.h and linux/compat.h

[PATCH v4 0/1] audit: generic compat system call support
 2014-03-16 19:13 UTC  (4+ messages)
` [PATCH_v5] "
  ` [PATCH_v5] audit: Add generic compat syscall support

[PATCH] audit: Use struct net not pid_t to remember the network namespce to reply in
 2014-03-16 19:13 UTC  (28+ messages)
    ` [PATCH] audit: Send replies in the proper network namespace
      ` [RFC][PATCH] audit: Simplify by assuming the callers socket buffer is large enough
                ` [GIT PULL] namespaces fixes for 3.14-rcX

[PATCH v3 0/3] arm64: Add audit support
 2014-03-15  5:49 UTC  (25+ messages)
` [PATCH v4 "
  ` [PATCH v4 3/3] arm64: audit: Add audit hook in ptrace/syscall_trace
  ` [PATCH v5 0/3] arm64: Add audit support
    ` [PATCH v5 1/3] arm64: Add regs_return_value() in syscall.h
    ` [PATCH v5 2/3] arm64: Add audit support
    ` [PATCH v5 3/3] arm64: audit: Add audit hook in ptrace/syscall_trace
    ` [PATCH v6 0/2] arm64: Add audit support
      ` [PATCH v6 1/2] "
      ` [PATCH v6 2/2] arm64: audit: Add audit hook in ptrace/syscall_trace
      ` [PATCH v7 0/2] arm64: Add audit support
        ` [PATCH v7 1/2] "
        ` [PATCH v7 2/2] arm64: audit: Add audit hook in syscall_trace_enter/exit()
        ` [PATCH_v8 0/2] arm64: Add audit support
          ` [PATCH_v8 1/2] "
          ` [PATCH_v8 2/2] arm64: audit: Add audit hook in syscall_trace_enter/exit()

scary syslog message (from audit ?)
 2014-03-13  2:14 UTC  (2+ messages)

Is zero a valid value for the pid member of the AUDIT_SIGNAL_INFO message?
 2014-03-12 18:27 UTC  (12+ messages)

[PATCH 0/5] audit: add restricted capability read-only netlink multicast socket
 2014-03-12 15:25 UTC  (12+ messages)
` [PATCH 1/5] audit: move kaudit thread start from auditd registration to kaudit init
` [PATCH 2/5] netlink: have netlink per-protocol bind function return an error code
` [PATCH 3/5] audit: add netlink audit protocol bind to check capabilities on multicast join
` [PATCH 4/5] audit: add netlink multicast group for log read
` [PATCH 5/5] audit: send multicast messages only if there are listeners

[PATCH 1/2] syscall_get_arch: remove useless function arguments
 2014-03-11 21:32 UTC  (2+ messages)
` [PATCH 2/2] audit: use uapi/linux/audit.h for AUDIT_ARCH declarations

[PATCH 0/2] kernel AUDIT_LOGIN event is missing subject label
 2014-03-11 19:58 UTC  (3+ messages)
` [PATCH 1/2] audit: remove superfluous new- prefix in AUDIT_LOGIN messages
` [PATCH 2/2] audit: include subject in login records

audit_status in kernel
 2014-03-10 23:14 UTC  (3+ messages)

[PATCH 0/6][RFC] audit: standardize and simplify syscall_get_arch()
 2014-03-06 19:55 UTC  (10+ messages)
` [PATCH 1/6][RFC] syscall: define syscall_get_arch() for each audit-supported arch
` [PATCH 2/6][RFC] audit: add arch field to seccomp event log
` [PATCH 3/6][RFC] audit: __audit_syscall_entry: ignore arch arg and call syscall_get_arch() directly
` [PATCH 4/6][RFC] audit: drop arch from audit_syscall_entry() interface
` [PATCH 5/6][RFC] audit: drop args from syscall_get_arch() interface
` [PATCH 6/6][RFC] audit: drop arch from __audit_syscall_entry() interface

Audit proctitle/cmdline patches
 2014-03-05 14:24 UTC 

[PATCH] audit: don't generate loginuid log when audit disabled
 2014-03-03 22:51 UTC  (3+ messages)

audit 2.3.4 released
 2014-02-27 14:02 UTC 

[PATCH] audit: Add CONFIG_HAVE_ARCH_AUDITSYSCALL
 2014-02-26 12:31 UTC  (7+ messages)
` [PATCH v2 0/1] "
  ` [PATCH v2 1/1] "

Audit Architecture doc
 2014-02-26 12:19 UTC 

[PATCH] lib/vsprintf: add %pT format specifier
 2014-02-22  1:40 UTC  (4+ messages)

[PATCH] audit: add arch field to seccomp event log
 2014-02-21 23:32 UTC  (11+ messages)

[ARCH question] Do syscall_get_nr and syscall_get_arguments always work?
 2014-02-21 21:21 UTC  (7+ messages)

[PATCH 0/5][RFC][v2] steps to make audit pid namespace-safe
 2014-02-19 20:57 UTC  (10+ messages)
` [PATCH 4/5] audit: anchor all pid references in the initial pid namespace
` [PATCH 0/5][RFC][v3] steps to make audit pid namespace-safe
  ` [PATCH 1/5] pid: get pid_t ppid of task in init_pid_ns
  ` [PATCH 2/5] audit: convert PPIDs to the inital PID namespace
  ` [PATCH 3/5] audit: store audit_pid as a struct pid pointer
  ` [PATCH 5/5] audit: allow user processes to log from another PID namespace

[PATCH v3] audit: Turn off TIF_SYSCALL_AUDIT when there are no rules
 2014-02-18 20:17 UTC  (9+ messages)

[Bisected] CONFIG_AUDIT in linux-3.14-rc1+ breaking Linux Containers?
 2014-02-18  2:17 UTC  (4+ messages)

[PATCH v7 1/3] mm: Create utility function for accessing a tasks commandline value
 2014-02-11 18:57 UTC  (4+ messages)
` [PATCH v7 2/3] proc: Update get proc_pid_cmdline() to use mm.h helpers
` [PATCH v7 3/3] audit: Audit proc/<pid>/cmdline aka proctitle

[PATCH v5 1/3] mm: Create utility function for accessing a tasks commandline value
 2014-02-11 18:56 UTC  (10+ messages)
` [PATCH v5 2/3] proc: Update get proc_pid_cmdline() to use mm.h helpers
` [PATCH v5 3/3] audit: Audit proc/<pid>/cmdline aka proctitle

VERY basic question
 2014-02-11 13:57 UTC  (2+ messages)

ausearch-test 0.5
 2014-02-11 12:49 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).