messages from 2017-07-28 20:55:49 to 2017-09-08 18:15:45 UTC [more...]
[PATCH V4 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
2017-09-08 18:15 UTC (16+ messages)
` [PATCH V4 01/10] capabilities: factor out cap_bprm_set_creds privileged root
` [PATCH V4 02/10] capabilities: intuitive names for cap gain status
` [PATCH V4 03/10] capabilities: rename has_cap to has_fcap
` [PATCH V4 04/10] capabilities: use root_priveleged inline to clarify logic
` [PATCH V4 05/10] capabilities: use intuitive names for id changes
` [PATCH V4 06/10] capabilities: move audit log decision to function
` [PATCH V4 07/10] capabilities: remove a layer of conditional logic
` [PATCH V4 08/10] capabilities: invert logic for clarity
` [PATCH V4 09/10] capabilities: fix logic for effective root or real root
` [PATCH V4 10/10] capabilities: audit log other surprising conditions
Why there is no PATH record for change file time syscalls ?(utimensat)
2017-09-08 15:38 UTC (6+ messages)
[PATCH 1/1] audit: Record fanotify access control decisions
2017-09-08 10:55 UTC (14+ messages)
[PATCH ALT4 V3 1/2] audit: show fstype:pathname for entries with anonymous parents
2017-09-07 23:07 UTC (6+ messages)
` [PATCH ALT4 V3 2/2] audit: filter PATH records keyed on filesystem magic
[GIT PULL] Audit patches for v4.14
2017-09-07 20:34 UTC
Auditing console access
2017-09-07 18:23 UTC (4+ messages)
[PATCH] audit: reserve a numerical code for AUDIT_ANOM_PATCHED
2017-09-06 14:29 UTC (4+ messages)
[PATCH 2/9] Implement containers as kernel objects
2017-09-06 14:03 UTC (4+ messages)
[PATCH] docs: add exclude filter never note
2017-09-06 10:57 UTC
FYI: rebasing audit/next
2017-09-05 14:47 UTC
[PATCH V3 00/10] capabilities: do not audit log BPRM_FCAPS on set*id
2017-09-05 6:45 UTC (57+ messages)
` [PATCH V3 01/10] capabilities: factor out cap_bprm_set_creds privileged root
` [PATCH V3 02/10] capabilities: intuitive names for cap gain status
` [PATCH V3 03/10] capabilities: rename has_cap to has_fcap
` [PATCH V3 04/10] capabilities: use root_priveleged inline to clarify logic
` [PATCH V3 05/10] capabilities: use intuitive names for id changes
` [PATCH V3 06/10] capabilities: move audit log decision to function
` [PATCH V3 07/10] capabilities: remove a layer of conditional logic
` [PATCH V3 08/10] capabilities: invert logic for clarity
` [PATCH V3 09/10] capabilities: fix logic for effective root or real root
` [PATCH V3 10/10] capabilities: audit log other surprising conditions
[RFC PATCH 0/5] Fix some early boot audit problems
2017-09-03 4:52 UTC (11+ messages)
` [RFC PATCH 1/5] audit: ensure that 'audit=1' actually enables audit for PID 1
` [RFC PATCH 2/5] audit: initialize the audit subsystem as early as possible
` [RFC PATCH 3/5] audit: don't use simple_strtol() anymore
` [RFC PATCH 4/5] audit: convert audit_ever_enabled to a boolean
` [RFC PATCH 5/5] audit: use audit_set_enabled() in audit_enable()
how to audit auditd itself ?
2017-09-01 15:11 UTC (2+ messages)
passwd and USER_CHAUTHTOK
2017-08-30 19:02 UTC (3+ messages)
[PATCH] lsm_audit: use get_task_comm
2017-08-29 11:34 UTC (3+ messages)
[PATCH] selinux: remove AVC init audit log message
2017-08-23 14:52 UTC (5+ messages)
ausearch --text : missing information
2017-08-21 16:01 UTC
[PATCH 0/2] audit: Fix two bugs with deleting audit watches
2017-08-18 5:12 UTC (8+ messages)
` [PATCH 1/2] audit: Fix use after free in audit_remove_watch_rule()
` [PATCH 2/2] audit: Receive unmount event
[GIT PULL] Audit fixes for v4.13 (#2)
2017-08-16 23:56 UTC (2+ messages)
[PATCH 1/1] Fanotify: Introduce a permissive mode
2017-08-15 19:19 UTC (7+ messages)
[PATCH ALT4 V2 1/2] audit: show fstype:pathname for entries with anonymous parents
2017-08-14 4:32 UTC (6+ messages)
[PATCH v6 0/6] Improved seccomp logging
2017-08-11 19:35 UTC (11+ messages)
` [PATCH v6 1/6] seccomp: Sysctl to display available actions
` [PATCH v6 2/6] seccomp: Operation for checking if an action is available
` [PATCH v6 3/6] seccomp: Sysctl to configure actions that are allowed to be logged
` [PATCH v6 4/6] seccomp: Selftest for detection of filter flag support
` [PATCH v6 5/6] seccomp: Filter flag to log all actions except SECCOMP_RET_ALLOW
` [PATCH v6 6/6] seccomp: Action to log before allowing
[PATCH v5 0/6] Improved seccomp logging
2017-08-10 23:58 UTC (21+ messages)
` [PATCH v5 1/6] seccomp: Sysctl to display available actions
` [PATCH v5 2/6] seccomp: Sysctl to configure actions that are allowed to be logged
` [PATCH v5 3/6] seccomp: Filter flag to log all actions except SECCOMP_RET_ALLOW
` [PATCH v5 4/6] seccomp: Operation for checking if an action is available
` [PATCH v5 5/6] seccomp: Action to log before allowing
` [PATCH v5 6/6] seccomp: Selftest for detection of filter flag support
[PATCH] audit: update the function comments
2017-08-08 12:22 UTC (3+ messages)
Questions about enriched format and Node on RHEL 7.4
2017-08-07 16:48 UTC (2+ messages)
Questions about enriched format and Node on RHEL 7.4
2017-08-07 14:43 UTC
Stop/Disable AUDITD on RHEL7
2017-08-04 20:48 UTC (5+ messages)
[PATCH] specs: update message dictionary with origin and class columns
2017-08-02 6:00 UTC
Please adjust the SELinux/audit trees for linux-next
2017-07-30 3:00 UTC (2+ messages)
[RESEND PATCH 2/6] ipc: mqueue: Replace timespec with timespec64
2017-07-29 15:27 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).