linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2022-02-21 21:53:48 to 2022-04-18 15:14:43 UTC [more...]

[PATCH v35 00/29] LSM: Module stacking for AppArmor
 2022-04-18 14:59 UTC  (30+ messages)
  ` [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v35 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v35 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v35 14/29] LSM: Specify which LSM to display
  ` [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v35 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v35 23/29] Audit: Create audit_stamp structure
  ` [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v35 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v35 27/29] Audit: Add record for multiple object contexts
  ` [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v35 29/29] AppArmor: Remove the exclusive flag

[PATCH v34 00/29] LSM: Module stacking for AppArmor
 2022-04-17  9:33 UTC  (34+ messages)
  ` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v34 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
    ` [LSM] 0d4df6ae86: BUG:KASAN:stack-out-of-bounds_in_netlbl_unlabel_defconf
  ` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v34 14/29] LSM: Specify which LSM to display
  ` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v34 23/29] Audit: Create audit_stamp structure
  ` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v34 27/29] Audit: Add record for multiple object contexts
  ` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v34 29/29] AppArmor: Remove the exclusive flag

[PATCH v34 00/29] LSM: Module stacking for AppArmor
 2022-04-15 21:44 UTC  (31+ messages)
  ` [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v34 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v34 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v34 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v34 14/29] LSM: Specify which LSM to display
  ` [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v34 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v34 23/29] Audit: Create audit_stamp structure
  ` [PATCH v34 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v34 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v34 27/29] Audit: Add record for multiple object contexts
  ` [PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v34 29/29] AppArmor: Remove the exclusive flag

[PATCH] audit: do a quick exit when syscall number is invalid
 2022-04-07  2:36 UTC  (20+ messages)

[PATCH v2] audit: do a quick exit when syscall number is less than 0
 2022-04-04 13:12 UTC  (2+ messages)

audit-3.0.8 released
 2022-03-29 21:55 UTC 

[PATCH v2] audit: do a quick exit when syscall number is invalid
 2022-03-28 15:19 UTC  (2+ messages)

[GIT PULL] Audit patches for v5.18
 2022-03-22  3:56 UTC  (2+ messages)

[linux-next:master] BUILD REGRESSION 6d72dda014a4753974eb08950089ddf71fec4f60
 2022-03-19  3:39 UTC 

[ANNOUNCE][CFP] Linux Security Summit North America 2022
 2022-03-18 22:31 UTC  (2+ messages)

[PATCH v33 00/29] LSM: Module stacking for AppArmor
 2022-03-16  1:08 UTC  (41+ messages)
  ` [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v33 02/29] LSM: Infrastructure management of the sock security
  ` [PATCH v33 03/29] LSM: Add the lsmblob data structure
  ` [PATCH v33 04/29] LSM: provide lsm name and id slot mappings
  ` [PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v33 14/29] LSM: Specify which LSM to display
  ` [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser
  ` [PATCH v33 16/29] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v33 17/29] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v33 18/29] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v33 19/29] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v33 20/29] binder: Pass LSM identifier for confirmation
  ` [PATCH v33 21/29] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v33 22/29] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v33 23/29] Audit: Create audit_stamp structure
  ` [PATCH v33 24/29] LSM: Add a function to report multiple LSMs
  ` [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v33 26/29] Audit: Add record for multiple task security contexts
  ` [PATCH v33 27/29] Audit: Add record for multiple object "
  ` [PATCH v33 28/29] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v33 29/29] AppArmor: Remove the exclusive flag

[PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
 2022-03-11 21:03 UTC  (3+ messages)

Newer versions of audit missing information?
 2022-03-09 21:49 UTC  (3+ messages)

[PATCH v32 00/28] LSM: Module stacking for AppArmor
 2022-03-04 19:14 UTC  (16+ messages)
` [PATCH v32 03/28] LSM: Add the lsmblob data structure
` [PATCH v32 24/28] Audit: Add framework for auxiliary records
` [PATCH v32 26/28] Audit: Add record for multiple object security contexts

Bug in Queue Statistics?
 2022-03-03 22:23 UTC  (3+ messages)

Alert when auditd is stopped
 2022-03-02 17:11 UTC  (2+ messages)

audit user space build problems
 2022-02-28 15:37 UTC  (3+ messages)

[PATCH -next] audit: only print records that will be dropped via printk()
 2022-02-23 22:00 UTC  (2+ messages)

Removing Audit-libs, Python3-audit
 2022-02-23 20:19 UTC  (3+ messages)

[PATCH -next, v2] audit: only print records that will be dropped via printk()
 2022-02-23  9:35 UTC 

[PATCH v6] audit: log AUDIT_TIME_* records only from rules
 2022-02-22 19:02 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).