linux-audit
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: [PATCH 2/2] audit: add filterkey to special audit messages
Sven Schnelle
Re: [PATCH 1/2] audit: add call argument to socketcall auditing
kernel test robot
Re: [PATCH 1/2] audit: add call argument to socketcall auditing
kernel test robot
Re: [PATCH 1/2] audit: add call argument to socketcall auditing
kernel test robot
Re: [PATCH 1/2] audit: add call argument to socketcall auditing
Paul Moore
Re: [PATCH 1/2] audit: add call argument to socketcall auditing
Steve Grubb
[PATCH v2 0/3] fanotify: Allow user space to pass back additional audit info
Richard Guy Briggs
[PATCH v2 3/3] fanotify: Allow audit to use the full permission event response
Richard Guy Briggs
Re: [PATCH v2 3/3] fanotify: Allow audit to use the full permission event response
Paul Moore
[PATCH v2 2/3] fanotify: define struct members to hold response decision context
Richard Guy Briggs
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Paul Moore
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Richard Guy Briggs
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Paul Moore
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Jan Kara
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Amir Goldstein
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Jan Kara
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Steve Grubb
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Richard Guy Briggs
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Jan Kara
Re: [PATCH v2 2/3] fanotify: define struct members to hold response decision context
Richard Guy Briggs
[PATCH v2 1/3] fanotify: Ensure consistent variable type for response
Richard Guy Briggs
Re: [PATCH v2 1/3] fanotify: Ensure consistent variable type for response
Paul Moore
Re: [PATCH v2 1/3] fanotify: Ensure consistent variable type for response
Richard Guy Briggs
Re: [PATCH v2 0/3] fanotify: Allow user space to pass back additional audit info
Richard Guy Briggs
Re: [PATCH v2 0/3] fanotify: Allow user space to pass back additional audit info
Paul Moore
Re: [PATCH v2 0/3] fanotify: Allow user space to pass back additional audit info
Richard Guy Briggs
Re: [PATCH v2 0/3] fanotify: Allow user space to pass back additional audit info
Steve Grubb
[PATCH] signal: improve the signal test robustness
Paul Moore
Re: [PATCH] signal: improve the signal test robustness
Paul Moore
[PATCH v35 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
[PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
Re: [PATCH v35 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
John Johansen
[PATCH v35 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
[PATCH v35 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
Re: [PATCH v35 03/29] LSM: Add the lsmblob data structure.
John Johansen
[PATCH v35 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
Re: [PATCH v35 04/29] LSM: provide lsm name and id slot mappings
John Johansen
[PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
John Johansen
[PATCH v35 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
[PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
Re: [PATCH v35 06/29] LSM: Use lsmblob in security_audit_rule_match
John Johansen
[PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
Re: [PATCH v35 08/29] LSM: Use lsmblob in security_secctx_to_secid
John Johansen
[PATCH v35 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
[PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
[PATCH v35 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
[PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
[PATCH v35 14/29] LSM: Specify which LSM to display
Casey Schaufler
[PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
[PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
Casey Schaufler
[PATCH v35 17/29] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
[PATCH v35 16/29] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
[PATCH v35 20/29] binder: Pass LSM identifier for confirmation
Casey Schaufler
[PATCH v35 18/29] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
[PATCH v35 19/29] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
[PATCH v35 23/29] Audit: Create audit_stamp structure
Casey Schaufler
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
John Johansen
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
Paul Moore
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
John Johansen
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
Paul Moore
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
Casey Schaufler
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
Paul Moore
Re: [PATCH v35 23/29] Audit: Create audit_stamp structure
Casey Schaufler
[PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
Re: [PATCH v35 21/29] LSM: Extend security_secid_to_secctx to include module selection
John Johansen
[PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
Re: [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
John Johansen
Re: [PATCH v35 22/29] Audit: Keep multiple LSM data in audit_names
Paul Moore
[PATCH v35 24/29] LSM: Add a function to report multiple LSMs
Casey Schaufler
Re: [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
Paul Moore
Re: [PATCH v35 24/29] LSM: Add a function to report multiple LSMs
John Johansen
[PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
Paul Moore
Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
John Johansen
Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
Paul Moore
Re: [PATCH v35 25/29] Audit: Allow multiple records in an audit_buffer
John Johansen
[PATCH v35 26/29] Audit: Add record for multiple task security contexts
Casey Schaufler
Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
Paul Moore
Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
John Johansen
Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
Paul Moore
Re: [PATCH v35 26/29] Audit: Add record for multiple task security contexts
John Johansen
[PATCH v35 27/29] Audit: Add record for multiple object contexts
Casey Schaufler
Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
Paul Moore
Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
John Johansen
Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
Paul Moore
Re: [PATCH v35 27/29] Audit: Add record for multiple object contexts
John Johansen
[PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
Re: [PATCH v35 28/29] LSM: Add /proc attr entry for full LSM context
John Johansen
[PATCH v35 29/29] AppArmor: Remove the exclusive flag
Casey Schaufler
[PATCH v34 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
[PATCH v34 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
[PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
[PATCH v34 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
[PATCH v34 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
[PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
[PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
[PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
[PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
[PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
kernel test robot
Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
kernel test robot
[PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
[PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
[PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
Re: [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
kernel test robot
[PATCH v34 14/29] LSM: Specify which LSM to display
Casey Schaufler
[PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
[PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
Casey Schaufler
[PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
[PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
[PATCH v34 20/29] binder: Pass LSM identifier for confirmation
Casey Schaufler
[PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
[PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
[PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
[PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
[PATCH v34 23/29] Audit: Create audit_stamp structure
Casey Schaufler
[PATCH v34 24/29] LSM: Add a function to report multiple LSMs
Casey Schaufler
[PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
[PATCH v34 26/29] Audit: Add record for multiple task security contexts
Casey Schaufler
[PATCH v34 27/29] Audit: Add record for multiple object contexts
Casey Schaufler
[PATCH v34 29/29] AppArmor: Remove the exclusive flag
Casey Schaufler
[PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
[PATCH v34 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
[PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
[PATCH v34 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
[PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
[PATCH v34 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
[PATCH v34 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
[PATCH v34 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
[PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
[PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
[PATCH v34 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
[PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
[PATCH v34 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
[PATCH v34 14/29] LSM: Specify which LSM to display
Casey Schaufler
[PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
[PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
[PATCH v34 16/29] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
[PATCH v34 17/29] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
[PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
Casey Schaufler
[PATCH v34 19/29] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
[PATCH v34 18/29] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
[PATCH v34 20/29] binder: Pass LSM identifier for confirmation
Casey Schaufler
[PATCH v34 22/29] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
[PATCH v34 21/29] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
[PATCH v34 23/29] Audit: Create audit_stamp structure
Casey Schaufler
[PATCH v34 25/29] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
[PATCH v34 26/29] Audit: Add record for multiple task security contexts
Casey Schaufler
[PATCH v34 24/29] LSM: Add a function to report multiple LSMs
Casey Schaufler
[PATCH v34 27/29] Audit: Add record for multiple object contexts
Casey Schaufler
[PATCH v34 29/29] AppArmor: Remove the exclusive flag
Casey Schaufler
[PATCH v34 28/29] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
Re: [PATCH v34 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
[PATCH v2] audit: do a quick exit when syscall number is less than 0
cgel . zte
Re: [PATCH v2] audit: do a quick exit when syscall number is less than 0
Paul Moore
audit-3.0.8 released
Steve Grubb
[PATCH v2] audit: do a quick exit when syscall number is invalid
cgel . zte
Re: [PATCH v2] audit: do a quick exit when syscall number is invalid
kernel test robot
[PATCH] audit: do a quick exit when syscall number is invalid
cgel . zte
Re: [PATCH] audit: do a quick exit when syscall number is invalid
kernel test robot
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Enzo Matsumiya
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Paul Moore
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Paul Moore
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Paul Moore
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Paul Moore
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Steve Grubb
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Paul Moore
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Paul Moore
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Richard Guy Briggs
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
Re: [PATCH] audit: do a quick exit when syscall number is invalid
Richard Guy Briggs
Re: [PATCH] audit: do a quick exit when syscall number is invalid
CGEL
[GIT PULL] Audit patches for v5.18
Paul Moore
Re: [GIT PULL] Audit patches for v5.18
pr-tracker-bot
Bug: Auditd messes with directory permissions (chmod 750)
Elof of Unit #17
Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
Paul Moore
Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
Luis Chamberlain
Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
Paul Moore
[PATCH v33 00/29] LSM: Module stacking for AppArmor
Casey Schaufler
[PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
Re: [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
kernel test robot
[PATCH v33 02/29] LSM: Infrastructure management of the sock security
Casey Schaufler
[PATCH v33 03/29] LSM: Add the lsmblob data structure.
Casey Schaufler
[PATCH v33 04/29] LSM: provide lsm name and id slot mappings
Casey Schaufler
[PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
[PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
[PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
[PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
[PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
[PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
Earlier messages
Later messages