linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2022-05-17 12:41:03 to 2022-08-19 12:37:16 UTC [more...]

[PATCH v4 0/4] fanotify: Allow user space to pass back additional audit info
 2022-08-19 11:24 UTC  (19+ messages)
` [PATCH v4 1/4] fanotify: Ensure consistent variable type for response
` [PATCH v4 2/4] fanotify: define struct members to hold response decision context
` [PATCH v4 3/4] fanotify, audit: Allow audit to use the full permission event response
  ` [PATCH v4 3/4] fanotify,audit: "
` [PATCH v4 4/4] fanotify, audit: deliver fan_info as a hex-encoded string

data-race in audit_log_start / audit_receive
 2022-08-19 12:06 UTC  (3+ messages)

[PATCH] kernel: fix repeated words in comments
 2022-08-16  2:48 UTC  (2+ messages)

[RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
 2022-08-09 15:57 UTC  (26+ messages)
` [RFC PATCH v8 01/17] security: add ipe lsm & initial context creation
` [RFC PATCH v8 02/17] ipe: add policy parser
` [RFC PATCH v8 03/17] ipe: add evaluation loop
` [RFC PATCH v8 04/17] ipe: add userspace interface
` [RFC PATCH v8 05/17] ipe: add LSM hooks on execution and kernel read
` [RFC PATCH v8 06/17] uapi|audit: add ipe audit message definitions
` [RFC PATCH v8 07/17] ipe: add auditing support
` [RFC PATCH v8 08/17] ipe: add permissive toggle
` [RFC PATCH v8 09/17] ipe: introduce 'boot_verified' as a trust provider
` [RFC PATCH v8 10/17] block|security: add LSM blob to block_device
` [RFC PATCH v8 11/17] dm-verity: consume root hash digest and signature data via LSM hook
` [RFC PATCH v8 12/17] ipe: add support for dm-verity as a trust provider
` [RFC PATCH v8 13/17] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v8 14/17] ipe: enable support for fs-verity as a trust provider
` [RFC PATCH v8 15/17] scripts: add boot policy generation program
` [RFC PATCH v8 16/17] ipe: kunit tests
` [RFC PATCH v8 17/17] documentation: add ipe documentation

[PATCH] audit, io_uring, io-wq: Fix memory leak in io_sq_thread() and io_wqe_worker()
 2022-08-04 14:44 UTC  (10+ messages)
` [PATCH v2] "

LSM stacking in next for 6.1?
 2022-08-03  2:40 UTC  (7+ messages)

[GIT PULL] Audit patches for v6.0
 2022-08-02 22:29 UTC  (2+ messages)

Excluding a script / process and its descendants from audit
 2022-07-14 21:38 UTC  (3+ messages)

[PATCH v37 00/33] LSM: Module stacking for AppArmor
 2022-07-12 21:58 UTC  (39+ messages)
  ` [PATCH v37 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v37 02/33] LSM: Infrastructure management of the sock security
  ` [PATCH v37 03/33] LSM: Add the lsmblob data structure
  ` [PATCH v37 04/33] LSM: provide lsm name and id slot mappings
  ` [PATCH v37 05/33] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v37 06/33] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v37 07/33] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v37 08/33] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v37 09/33] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v37 10/33] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v37 11/33] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v37 12/33] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v37 13/33] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v37 14/33] LSM: Specify which LSM to display
  ` [PATCH v37 15/33] LSM: Ensure the correct LSM context releaser
  ` [PATCH v37 16/33] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v37 17/33] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v37 18/33] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v37 19/33] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v37 20/33] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v37 21/33] binder: Pass LSM identifier for confirmation
  ` [PATCH v37 22/33] LSM: security_secid_to_secctx module selection
  ` [PATCH v37 23/33] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v37 24/33] Audit: Create audit_stamp structure
  ` [PATCH v37 25/33] LSM: Add a function to report multiple LSMs
  ` [PATCH v37 26/33] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v37 27/33] Audit: Add record for multiple task security contexts
  ` [PATCH v37 28/33] audit: multiple subject lsm values for netlabel
  ` [PATCH v37 29/33] Audit: Add record for multiple object contexts
  ` [PATCH v37 30/33] netlabel: Use a struct lsmblob in audit data
  ` [PATCH v37 31/33] LSM: Removed scaffolding function lsmcontext_init
  ` [PATCH v37 32/33] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v37 33/33] AppArmor: Remove the exclusive flag

Trying to understand audisp-remote network behavior
 2022-07-12 19:12 UTC  (8+ messages)

[PATCH v36 00/33] LSM: Module stacking for AppArmor
 2022-06-23  7:09 UTC  (42+ messages)
  ` [PATCH v36 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v36 02/33] LSM: Infrastructure management of the sock security
  ` [PATCH v36 03/33] LSM: Add the lsmblob data structure
  ` [PATCH v36 04/33] LSM: provide lsm name and id slot mappings
  ` [PATCH v36 05/33] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v36 06/33] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v36 07/33] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v36 08/33] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v36 09/33] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v36 10/33] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v36 14/33] LSM: Specify which LSM to display
  ` [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser
  ` [PATCH v36 16/33] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v36 17/33] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security
  ` [PATCH v36 19/33] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v36 20/33] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v36 21/33] binder: Pass LSM identifier for confirmation
  ` [PATCH v36 22/33] LSM: Extend security_secid_to_secctx to include module selection
  ` [PATCH v36 23/33] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v36 24/33] Audit: Create audit_stamp structure
  ` [PATCH v36 25/33] LSM: Add a function to report multiple LSMs
  ` [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v36 27/33] Audit: Add record for multiple task security contexts
  ` [PATCH v36 28/33] audit: multiple subject lsm values for netlabel
  ` [PATCH v36 29/33] Audit: Add record for multiple object contexts
  ` [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data
  ` [PATCH v36 31/33] LSM: Removed scaffolding function lsmcontext_init
  ` [PATCH v36 32/33] LSM: Add /proc attr entry for full LSM context
  ` [PATCH v36 33/33] AppArmor: Remove the exclusive flag

[GIT PULL] Audit fixes for v5.19 (#1)
 2022-06-16 22:57 UTC  (2+ messages)

[PATCH] audit: free module name
 2022-06-15 23:33 UTC  (2+ messages)

[PATCH -next] audit: make is_audit_feature_set() static
 2022-06-13 18:13 UTC  (2+ messages)

[PATCH 1/2] audit: remove redundant data_len check
 2022-06-08  8:43 UTC  (4+ messages)

Be careful with rules
 2022-06-07 16:35 UTC  (5+ messages)

Linux v5.19 and audit
 2022-05-23 14:16 UTC 

Help setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr
 2022-05-19 22:08 UTC  (6+ messages)
  ` [EXTERNAL] "
    ` [EXTERNAL] Re: Help setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr

[PATCH v3 0/3] fanotify: Allow user space to pass back additional audit info
 2022-05-19  9:55 UTC  (11+ messages)
` [PATCH v3 2/3] fanotify: define struct members to hold response decision context

[GIT PULL] Audit fixes for v5.18 (#1)
 2022-05-19  0:35 UTC  (2+ messages)

What does "---" in audit.log timestamp / event-id field mean?
 2022-05-18 17:06 UTC  (4+ messages)

[ANNOUNCE][CFP] Linux Security Summit Europe 2022
 2022-05-18 15:50 UTC 

[PATCH 0/1] audit, io_uring, io-wq: call __audit_uring_exit for dummy contexts
 2022-05-17 21:34 UTC  (4+ messages)
` [PATCH 1/1] "
  ` [PATCH 1/1] audit,io_uring,io-wq: "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).