linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
 messages from 2022-08-16 00:22:28 to 2022-10-07 00:57:43 UTC [more...]

[PATCH 0/3] improve audit syscall-exit latency
 2022-10-07  0:57 UTC  (16+ messages)
` [PATCH 1/3] audit: cache ctx->major in audit_filter_syscall()
` [PATCH 2/3] audit: annotate branch direction for audit_in_mask()
` [PATCH 3/3] audit: unify audit_filter_{uring(), inode_name(), syscall()}
    ` [PATCH 3/3] audit: unify audit_filter_{uring(),inode_name(),syscall()}
  ` [PATCH v2] audit: unify audit_filter_{uring(), inode_name(), syscall()}

[GIT PULL] Audit patches for v6.1
 2022-10-04 18:18 UTC  (2+ messages)

[PATCH v38 00/39] LSM: Module stacking for AppArmor
 2022-09-28 14:27 UTC  (43+ messages)
  ` [PATCH v38 01/39] LSM: Identify modules by more than name
  ` [PATCH v38 02/39] LSM: Add an LSM identifier for external use
  ` [PATCH v38 03/39] LSM: Identify the process attributes for each module
  ` [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
  ` [PATCH v38 05/39] proc: Use lsmids instead of lsm names for attrs
  ` [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
  ` [PATCH v38 07/39] integrity: disassociate ima_filter_rule from security_audit_rule
  ` [PATCH v38 08/39] LSM: Infrastructure management of the sock security
  ` [PATCH v38 09/39] LSM: Add the lsmblob data structure
  ` [PATCH v38 10/39] LSM: provide lsm name and id slot mappings
  ` [PATCH v38 11/39] IMA: avoid label collisions with stacked LSMs
  ` [PATCH v38 12/39] LSM: Use lsmblob in security_audit_rule_match
  ` [PATCH v38 13/39] LSM: Use lsmblob in security_kernel_act_as
  ` [PATCH v38 14/39] LSM: Use lsmblob in security_secctx_to_secid
  ` [PATCH v38 15/39] LSM: Use lsmblob in security_secid_to_secctx
  ` [PATCH v38 16/39] LSM: Use lsmblob in security_ipc_getsecid
  ` [PATCH v38 17/39] LSM: Use lsmblob in security_current_getsecid
  ` [PATCH v38 18/39] LSM: Use lsmblob in security_inode_getsecid
  ` [PATCH v38 19/39] LSM: Use lsmblob in security_cred_getsecid
  ` [PATCH v38 20/39] LSM: Specify which LSM to display
  ` [PATCH v38 21/39] LSM: Ensure the correct LSM context releaser
  ` [PATCH v38 22/39] LSM: Use lsmcontext in security_secid_to_secctx
  ` [PATCH v38 23/39] LSM: Use lsmcontext in security_inode_getsecctx
  ` [PATCH v38 24/39] Use lsmcontext in security_dentry_init_security
  ` [PATCH v38 25/39] LSM: security_secid_to_secctx in netlink netfilter
  ` [PATCH v38 26/39] NET: Store LSM netlabel data in a lsmblob
  ` [PATCH v38 27/39] binder: Pass LSM identifier for confirmation
  ` [PATCH v38 28/39] LSM: security_secid_to_secctx module selection
  ` [PATCH v38 29/39] Audit: Keep multiple LSM data in audit_names
  ` [PATCH v38 30/39] Audit: Create audit_stamp structure
  ` [PATCH v38 31/39] LSM: Add a function to report multiple LSMs
  ` [PATCH v38 32/39] Audit: Allow multiple records in an audit_buffer
  ` [PATCH v38 33/39] Audit: Add record for multiple task security contexts
  ` [PATCH v38 34/39] audit: multiple subject lsm values for netlabel
  ` [PATCH v38 35/39] Audit: Add record for multiple object contexts
  ` [PATCH v38 36/39] netlabel: Use a struct lsmblob in audit data
  ` [PATCH v38 37/39] LSM: Removed scaffolding function lsmcontext_init
  ` [PATCH v38 38/39] AppArmor: Remove the exclusive flag
  ` [PATCH v38 39/39] LSM: Create lsm_module_list system call

LSM stacking in next for 6.1?
 2022-09-27 22:37 UTC  (47+ messages)

[PATCH RFC] LSM: lsm_self_attr system call to get security module attributes
 2022-09-19 23:54 UTC  (4+ messages)
  ` [PATCH v2 RFC] LSM: lsm_self_attr syscall for LSM self attributes
` [PATCH RFC] LSM: Specify which LSM to display

Query regarding the lib audit-userspace
 2022-09-16 21:03 UTC  (4+ messages)

[PATCH v4 0/4] fanotify: Allow user space to pass back additional audit info
 2022-09-09 18:50 UTC  (38+ messages)
` [PATCH v4 2/4] fanotify: define struct members to hold response decision context
` [PATCH v4 3/4] fanotify, audit: Allow audit to use the full permission event response
  ` [PATCH v4 3/4] fanotify,audit: "
` [PATCH v4 4/4] fanotify, audit: deliver fan_info as a hex-encoded string

[PATCH -next] audit: remove selinux_audit_rule_update() declaration
 2022-09-07 15:35 UTC  (2+ messages)

[RFC PATCH 2/2] fs/xattr: wire up syscalls
 2022-08-31 19:54 UTC  (3+ messages)

[PATCH] audit: remove obvious unnecessary header files
 2022-08-31  1:04 UTC  (7+ messages)

[PATCH] audit: use time_after to compare time
 2022-08-29 23:48 UTC  (2+ messages)

audit-3.0.9 released
 2022-08-29 22:18 UTC 

[GIT PULL] Audit fixes for v6.0 (#2)
 2022-08-27 23:07 UTC  (2+ messages)

[PATCH ghak138 v2 0/4] issues from moving beyond syscalls
 2022-08-26 21:20 UTC  (9+ messages)
` [PATCH ghak138 v2 1/4] audit: audit_context pid unused, context enum comment fix
` [PATCH ghak138 v2 2/4] audit: explicitly check audit_context->context enum value
` [PATCH ghak138 v2 3/4] audit: free audit_proctitle only on task exit
` [PATCH ghak138 v2 4/4] audit: move audit_return_fixup before the filters

[PATCH] tests/io_uring: ensure that tne io_uring::enter_ring_fd is imported
 2022-08-25 21:07 UTC  (4+ messages)

[PATCH ghak138] audit: move audit_return_fixup before the filters
 2022-08-25 16:23 UTC  (3+ messages)

[GIT PULL] Audit fixes for v6.0 (#1)
 2022-08-24  2:45 UTC  (2+ messages)

data-race in audit_log_start / audit_receive
 2022-08-23 13:09 UTC  (6+ messages)

[PATCH next] audit: printk before dropping logs in audit_log_end
 2022-08-24  3:57 UTC  (5+ messages)

[PATCH next] audit: fix potential double free on error path from fsnotify_add_inode_mark
 2022-08-23  2:06 UTC  (8+ messages)

[PATCH] kernel: fix repeated words in comments
 2022-08-16  2:48 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).