messages from 2019-07-19 16:03:35 to 2019-10-24 22:08:14 UTC [more...]
[PATCH ghak90 V7 00/21] audit: implement container identifier
2019-10-24 22:08 UTC (49+ messages)
` [PATCH ghak90 V7 01/21] audit: collect audit task parameters
` [PATCH ghak90 V7 02/21] audit: add container id
` [PATCH ghak90 V7 03/21] audit: read container ID of a process
` [PATCH ghak90 V7 04/21] audit: convert to contid list to check for orch/engine ownership
` [PATCH ghak90 V7 05/21] audit: log drop of contid on exit of last task
` [PATCH ghak90 V7 06/21] audit: contid limit of 32k imposed to avoid DoS
` [PATCH ghak90 V7 07/21] audit: log container info of syscalls
` [PATCH ghak90 V7 08/21] audit: add contid support for signalling the audit daemon
` [PATCH ghak90 V7 09/21] audit: add support for non-syscall auxiliary records
` [PATCH ghak90 V7 10/21] audit: add containerid support for user records
` [PATCH ghak90 V7 11/21] audit: add containerid filtering
` [PATCH ghak90 V7 12/21] audit: add support for containerid to network namespaces
` [PATCH ghak90 V7 13/21] audit: NETFILTER_PKT: record each container ID associated with a netNS
` [PATCH ghak90 V7 14/21] audit: contid check descendancy and nesting
` [PATCH ghak90 V7 15/21] sched: pull task_is_descendant into kernel/sched/core.c
` [PATCH ghak90 V7 16/21] audit: add support for contid set/get by netlink
` [PATCH ghak90 V7 17/21] audit: add support for loginuid/sessionid "
` [PATCH ghak90 V7 18/21] audit: track container nesting
` [PATCH ghak90 V7 19/21] audit: check cont depth
` [PATCH ghak90 V7 20/21] audit: add capcontid to set contid outside init_user_ns
` [PATCH ghak90 V7 21/21] audit: add proc interface for capcontid
[PATCH v10 21/25] Audit: Add subj_LSM fields when necessary
2019-10-24 21:41 UTC (2+ messages)
` [PATCH v10 22/25] Audit: Include object data for all security modules
[PATCH] kernel: convert switch/case fallthrough comments to fallthrough;
2019-10-24 3:39 UTC (4+ messages)
` [Kgdb-bugreport] "
shadow: what uid to log?
2019-10-23 16:20 UTC (2+ messages)
[PATCH] audit: remove redundant condition check in kauditd_thread()
2019-10-23 13:27 UTC
New field seen in audit.log
2019-10-18 15:49 UTC (3+ messages)
New field seen in audit.log
2019-10-16 20:15 UTC (3+ messages)
[PATCH v3] audit: Report suspicious O_CREAT usage
2019-10-03 18:29 UTC (2+ messages)
[PATCH v2] audit: Report suspicious O_CREAT usage
2019-10-02 21:12 UTC (2+ messages)
[PATCH] audit: Report suspicious O_CREAT usage
2019-10-01 5:37 UTC (9+ messages)
[PATCH] audit_set_pid: add wmode to man page
2019-10-01 4:27 UTC
ntp audit spew
2019-09-26 15:50 UTC (14+ messages)
[PATCH 0/2] Fix perltidy on Travis CI
2019-09-24 22:18 UTC (3+ messages)
` [PATCH 1/2] audit-testsuite: use our own version of perltidy in the Travis CI tests
` [PATCH 2/2] audit-testsuite: fix the style according to ./tools/check-syntax
[PATCH ghau51/ghau40 v7 00/12] add support for audit container identifier
2019-09-20 16:12 UTC (15+ messages)
` [PATCH ghau51/ghau40 v7 01/12] AUDIT_CONTAINER_OP message type basic support
` [PATCH ghau51/ghau40 v7 02/12] AUDIT_CONTAINER_ID "
` [PATCH ghau51/ghau40 v7 03/12] auditctl: add support for AUDIT_CONTID filter
` [PATCH ghau51/ghau40 v7 04/12] add ausearch containerid support
` [PATCH ghau51/ghau40 v7 05/12] start normalization "
` [PATCH ghau51/ghau40 v7 06/12] libaudit: add support to get the task audit container identifier
` [PATCH ghau51/ghau40 v7 07/12] signal_info: only print context if it is available
` [PATCH ghau51/ghau40 v7 08/12] add support for audit_signal_info2
` [PATCH ghau51/ghau40 v7 09/12] contid: interpret correctly CONTAINER_ID contid field csv
` [PATCH ghau51/ghau40 v7 10/12] contid: switch from /proc to netlink
` [PATCH ghau51/ghau40 v7 11/12] loginuid/sessionid: "
` [PATCH ghau51/ghau40 v7 12/12] libaudit: add support to get and set capcontid on a task
[PATCH][RFC] audit: set wait time to zero when audit failed
2019-09-19 14:04 UTC (13+ messages)
` 答复: "
RFC(V4): Audit Kernel Container IDs
2019-09-19 1:19 UTC
No audit/next patches for the v5.4 merge window
2019-09-17 19:41 UTC
When is EOE generated?
2019-09-12 12:55 UTC (4+ messages)
Help with audit syscall event output
2019-09-03 21:28 UTC (3+ messages)
[RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
2019-08-30 21:36 UTC (4+ messages)
[PATCH] audit-testsuite: update the docs for Debian SID/unstable
2019-08-27 14:43 UTC (2+ messages)
[Question] audit_names use after delete in audit_filter_inodes
2019-08-26 20:42 UTC (4+ messages)
[RFC] audit support for BPF notification
2019-08-20 13:54 UTC (7+ messages)
[RFC PATCH v3] security, capability: pass object information to security_capable
2019-08-16 16:36 UTC (4+ messages)
` [RFC PATCH v3] security,capability: "
[RFC PATCH v2] security, capability: pass object information to security_capable
2019-08-16 16:29 UTC (8+ messages)
` [Non-DoD Source] "
Number of TTY events vs Number of USER_TTY events
2019-08-09 20:48 UTC (2+ messages)
Query - System Calls Arguments in Linux Audit Kernel
2019-08-07 14:44 UTC (2+ messages)
Linux Audit userspace query
2019-07-31 14:36 UTC (2+ messages)
boot parameter question
2019-07-30 22:51 UTC (6+ messages)
How to filter PROCTITLE events
2019-07-30 12:29 UTC (6+ messages)
[PATCH] kernel: auditfilter: Fix a possible null-pointer dereference in audit_watch_path()
2019-07-24 20:45 UTC (2+ messages)
Preferred subj= with multiple LSMs
2019-07-23 21:46 UTC (27+ messages)
` Dbus and multiple LSMs (was Preferred subj= with multiple LSMs)
[PATCH ghak90 V6 02/10] audit: add container id
2019-07-20 2:19 UTC (15+ messages)
[PATCH v5 15/23] LSM: Specify which LSM to display
2019-07-19 23:37 UTC (4+ messages)
[PATCH ghak90 V6 00/10] audit: implement container identifier
2019-07-19 17:05 UTC (6+ messages)
` [PATCH ghak90 V6 02/10] audit: add container id
` [PATCH ghak90 V6 03/10] audit: read container ID of a process
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).