linux-audit
Thread
Date
Earlier messages
Later messages
Messages by Thread
[PATCH v31 17/28] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
[PATCH v31 19/28] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
[PATCH v31 20/28] binder: Pass LSM identifier for confirmation
Casey Schaufler
[PATCH v31 21/28] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
[PATCH v31 22/28] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
[PATCH v31 23/28] Audit: Create audit_stamp structure
Casey Schaufler
[PATCH v31 24/28] Audit: Add framework for auxiliary records
Casey Schaufler
[PATCH v31 25/28] Audit: Add record for multiple task security contexts
Casey Schaufler
[PATCH v31 26/28] Audit: Add record for multiple object security contexts
Casey Schaufler
Re: [PATCH v31 26/28] Audit: Add record for multiple object security contexts
kernel test robot
Re: [PATCH v31 26/28] Audit: Add record for multiple object security contexts
kernel test robot
[PATCH v31 27/28] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
[PATCH v31 28/28] AppArmor: Remove the exclusive flag
Casey Schaufler
[PATCH] audit: improve robustness of the audit queue handling
Paul Moore
Re: [PATCH] audit: improve robustness of the audit queue handling
Richard Guy Briggs
Re: [PATCH] audit: improve robustness of the audit queue handling
Paul Moore
Re: [PATCH] audit: improve robustness of the audit queue handling
Paul Moore
[PATCH v2 0/7] pid: Introduce helper task_is_in_root_ns()
Leo Yan
[PATCH v2 2/7] coresight: etm3x: Use task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 2/7] coresight: etm3x: Use task_is_in_init_pid_ns()
Suzuki K Poulose
Re: [PATCH v2 2/7] coresight: etm3x: Use task_is_in_init_pid_ns()
Balbir Singh
[PATCH v2 1/7] pid: Introduce helper task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 1/7] pid: Introduce helper task_is_in_init_pid_ns()
Leon Romanovsky
Re: [PATCH v2 1/7] pid: Introduce helper task_is_in_init_pid_ns()
Suzuki K Poulose
Re: [PATCH v2 1/7] pid: Introduce helper task_is_in_init_pid_ns()
Balbir Singh
[PATCH v2 5/7] coda: Use task_is_in_init_pid_ns()
Leo Yan
[PATCH v2 4/7] connector/cn_proc: Use task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 4/7] connector/cn_proc: Use task_is_in_init_pid_ns()
Balbir Singh
Re: [PATCH v2 4/7] connector/cn_proc: Use task_is_in_init_pid_ns()
Leo Yan
[PATCH v2 3/7] coresight: etm4x: Use task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 3/7] coresight: etm4x: Use task_is_in_init_pid_ns()
Suzuki K Poulose
Re: [PATCH v2 3/7] coresight: etm4x: Use task_is_in_init_pid_ns()
Balbir Singh
[PATCH v2 7/7] taskstats: Use task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 7/7] taskstats: Use task_is_in_init_pid_ns()
Balbir Singh
[PATCH v2 6/7] audit: Use task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 6/7] audit: Use task_is_in_init_pid_ns()
Balbir Singh
Re: [PATCH v2 6/7] audit: Use task_is_in_init_pid_ns()
Paul Moore
Re: [PATCH v2 6/7] audit: Use task_is_in_init_pid_ns()
Richard Guy Briggs
Re: [PATCH v2 6/7] audit: Use task_is_in_init_pid_ns()
Leo Yan
Re: [PATCH v2 0/7] pid: Introduce helper task_is_in_root_ns()
Leo Yan
Re: [PATCH v2 0/7] pid: Introduce helper task_is_in_root_ns()
Leo Yan
[PATCH v1 0/7] pid: Introduce helper task_is_in_root_ns()
Leo Yan
[PATCH v1 3/7] coresight: etm4x: Use task_is_in_root_ns() to check PID namespace
Leo Yan
[PATCH v1 4/7] connector/cn_proc: Use task_is_in_root_ns() to check PID namespace
Leo Yan
[PATCH v1 7/7] taskstats: Use task_is_in_root_ns()
Leo Yan
[PATCH v1 6/7] audit: Use task_is_in_root_ns()
Leo Yan
[PATCH v1 2/7] coresight: etm3x: Use task_is_in_root_ns() to check PID namespace
Leo Yan
[PATCH v1 5/7] coda: Use task_is_in_root_ns()
Leo Yan
[PATCH v1 1/7] pid: Introduce helper task_is_in_root_ns()
Leo Yan
Re: [PATCH v1 1/7] pid: Introduce helper task_is_in_root_ns()
Leon Romanovsky
Re: [PATCH v1 1/7] pid: Introduce helper task_is_in_root_ns()
Leo Yan
Re: [PATCH v1 1/7] pid: Introduce helper task_is_in_root_ns()
Leon Romanovsky
Maximum Value for q_depth
Amjad Gabbar
Re: Maximum Value for q_depth
Steve Grubb
Fwd: Maximum Value for q_depth
Amjad Gabbar
Re: Maximum Value for q_depth
Steve Grubb
Re: Maximum Value for q_depth
Amjad Gabbar
Re: Maximum Value for q_depth
Steve Grubb
Re: Maximum Value for q_depth
Amjad Gabbar
Re: Maximum Value for q_depth
Steve Grubb
Re: Maximum Value for q_depth
Amjad Gabbar
Re: Maximum Value for q_depth
Steve Grubb
LSM stacking v30 Audit changes
Casey Schaufler
Re: LSM stacking v30 Audit changes
Paul Moore
Re: LSM stacking v30 Audit changes
Casey Schaufler
Re: [PATCH] audit: accelerate audit rule filter
Paul Moore
Re: [PATCH] audit: accelerate audit rule filter
Paul Moore
Re: [PATCH] audit: accelerate audit rule filter
Paul Moore
Re: [PATCH] audit: accelerate audit rule filter
Burn Alting
[PATCH v30 00/28] LSM: Module stacking for AppArmor
Casey Schaufler
[PATCH v30 02/28] LSM: Infrastructure management of the sock security
Casey Schaufler
[PATCH v30 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
Re: [PATCH v30 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
[PATCH v30 04/28] LSM: provide lsm name and id slot mappings
Casey Schaufler
[PATCH v30 05/28] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
[PATCH v30 03/28] LSM: Add the lsmblob data structure.
Casey Schaufler
Re: [PATCH v30 03/28] LSM: Add the lsmblob data structure.
Paul Moore
[PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
Re: [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
kernel test robot
Re: [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
Paul Moore
[PATCH v30 07/28] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
[PATCH v30 08/28] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
[PATCH v30 09/28] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
[PATCH v30 10/28] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
[PATCH v30 11/28] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
[PATCH v30 12/28] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
[PATCH v30 13/28] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
[PATCH v30 14/28] LSM: Specify which LSM to display
Casey Schaufler
[PATCH v30 15/28] LSM: Ensure the correct LSM context releaser
Casey Schaufler
[PATCH v30 16/28] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
[PATCH v30 17/28] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
[PATCH v30 19/28] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
[PATCH v30 18/28] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
[PATCH v30 20/28] binder: Pass LSM identifier for confirmation
Casey Schaufler
[PATCH v30 21/28] LSM: Extend security_secid_to_secctx to include module selection
Casey Schaufler
[PATCH v30 22/28] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
Re: [PATCH v30 22/28] Audit: Keep multiple LSM data in audit_names
Paul Moore
[PATCH v30 23/28] Audit: Create audit_stamp structure
Casey Schaufler
Re: [PATCH v30 23/28] Audit: Create audit_stamp structure
Paul Moore
[PATCH v30 24/28] Audit: Add framework for auxiliary records
Casey Schaufler
Re: [PATCH v30 24/28] Audit: Add framework for auxiliary records
Paul Moore
[PATCH v30 25/28] Audit: Add record for multiple task security contexts
Casey Schaufler
Re: [PATCH v30 25/28] Audit: Add record for multiple task security contexts
Paul Moore
[PATCH v30 26/28] Audit: Add record for multiple object security contexts
Casey Schaufler
Re: [PATCH v30 26/28] Audit: Add record for multiple object security contexts
kernel test robot
Re: [PATCH v30 26/28] Audit: Add record for multiple object security contexts
kernel test robot
Re: [PATCH v30 26/28] Audit: Add record for multiple object security contexts
Paul Moore
[PATCH v30 27/28] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
[PATCH v30 28/28] AppArmor: Remove the exclusive flag
Casey Schaufler
[PATCH RFC] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
Re: [PATCH RFC] integrity: disassociate ima_filter_rule from security_audit_rule
Mimi Zohar
[PATCH v1] add clock_adjtime to certification rulesets
Richard Guy Briggs
Re: [PATCH v1] add clock_adjtime to certification rulesets
Steve Grubb
Re: [PATCH v1] add clock_adjtime to certification rulesets
Richard Guy Briggs
[RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Richard Guy Briggs
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Richard Guy Briggs
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Richard Guy Briggs
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Richard Guy Briggs
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Richard Guy Briggs
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Richard Guy Briggs
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Casey Schaufler
Re: [RFC PATCH v1] audit: log AUDIT_TIME_* records only from rules
Paul Moore
Disassociating ima_filter_rule* from security_audit_rule*
Casey Schaufler
Re: Disassociating ima_filter_rule* from security_audit_rule*
Paul Moore
[GIT PULL] Audit patches for v5.16
Paul Moore
Re: [GIT PULL] Audit patches for v5.16
pr-tracker-bot
[PATCH v3 0/7] Add uringop support
Richard Guy Briggs
[PATCH v3 5/7] add ausearch --uringop option
Richard Guy Briggs
[PATCH v3 7/7] add iouring support to the normalizer
Richard Guy Briggs
[PATCH v3 3/7] add support for uringop names
Richard Guy Briggs
[PATCH v3 2/7] add support for the uring filter list
Richard Guy Briggs
Re: [PATCH v3 2/7] add support for the uring filter list
Steve Grubb
Re: [PATCH v3 2/7] add support for the uring filter list
Richard Guy Briggs
Re: [PATCH v3 2/7] add support for the uring filter list
Steve Grubb
Re: [PATCH v3 2/7] add support for the uring filter list
Richard Guy Briggs
[PATCH v3 1/7] add basic support for the AUDIT_URINGOP record type
Richard Guy Briggs
Re: [PATCH v3 1/7] add basic support for the AUDIT_URINGOP record type
Steve Grubb
[PATCH v3 4/7] add field support for the AUDIT_URINGOP record type
Richard Guy Briggs
[PATCH v3 6/7] add aureport --uringop option
Richard Guy Briggs
[PATCH v1] auditctl: check for a watch before adding perm
Richard Guy Briggs
Re: [PATCH v1] auditctl: check for a watch before adding perm
Steve Grubb
[PATCH v1] add filesystem filter list to auditctl usage
Richard Guy Briggs
Re: [PATCH v1] add filesystem filter list to auditctl usage
Steve Grubb
[PATCH v1] remove unused fn audit_add_dir and decl audit_rule_syscall_data
Richard Guy Briggs
Re: [PATCH v1] remove unused fn audit_add_dir and decl audit_rule_syscall_data
Steve Grubb
why no LOGOUT event record on some OSes
Li Zhijian
RE: [EXT] why no LOGOUT event record on some OSes
Wieprecht, Karen M.
Re: why no LOGOUT event record on some OSes
Richard Guy Briggs
Re: why no LOGOUT event record on some OSes
lizhij...@fujitsu.com
Re: why no LOGOUT event record on some OSes
Richard Guy Briggs
Re: why no LOGOUT event record on some OSes
Steve Grubb
Re: why no LOGOUT event record on some OSes
lizhij...@fujitsu.com
Re: why no LOGOUT event record on some OSes
lizhij...@fujitsu.com
Re: why no LOGOUT event record on some OSes
Andreas Hasenack
Re: why no LOGOUT event record on some OSes
lizhij...@fujitsu.com
[GIT PULL] Audit fixes for v5.15 (#1)
Paul Moore
Re: [GIT PULL] Audit fixes for v5.15 (#1)
pr-tracker-bot
[PATCH] audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
Paul Moore
Re: [PATCH] audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
Paul Moore
Re: [PATCH] audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
Paul Moore
Re: audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
Mike Snitzer
Re: audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
Paul Moore
Re: audit: correct the AUDIT_DM_CTRL and AUDIT_DM_EVENT numbering
Richard Guy Briggs
[PATCH -next,v3 0/2] Audit: fix warning and check priority early
Gaosheng Cui
[PATCH -next, v3 1/2] audit: fix possible null-pointer dereference in audit_filter_rules
Gaosheng Cui
Re: [PATCH -next, v3 1/2] audit: fix possible null-pointer dereference in audit_filter_rules
Paul Moore
[PATCH -next, v3 2/2] audit: return early if the rule has a lower priority
Gaosheng Cui
Re: [PATCH -next, v3 2/2] audit: return early if the rule has a lower priority
Paul Moore
Re: [PATCH -next, v3 2/2] audit: return early if the rule has a lower priority
Steve Grubb
Re: [PATCH -next, v3 2/2] audit: return early if the rule has a lower priority
Paul Moore
audit=1 on 'append' and 'linuxefi' lines
Joe Wulf
[RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
deven . desai
[RFC PATCH v7 06/16] uapi|audit: add trust audit message definitions
deven . desai
[RFC PATCH v7 01/16] security: add ipe lsm & initial context creation
deven . desai
[RFC PATCH v7 04/16] ipe: add userspace interface
deven . desai
RE: [RFC PATCH v7 04/16] ipe: add userspace interface
Roberto Sassu
Re: [RFC PATCH v7 04/16] ipe: add userspace interface
Deven Bowers
[RFC PATCH v7 08/16] ipe: add permissive toggle
deven . desai
[RFC PATCH v7 15/16] ipe: kunit tests
deven . desai
[RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
deven . desai
Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
Casey Schaufler
Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
Deven Bowers
RE: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
Roberto Sassu
Re: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
Deven Bowers
RE: [RFC PATCH v7 05/16] ipe: add LSM hooks on execution and kernel read
Roberto Sassu
[RFC PATCH v7 02/16] ipe: add policy parser
deven . desai
[RFC PATCH v7 09/16] ipe: introduce 'boot_verified' as a trust provider
deven . desai
[RFC PATCH v7 07/16] ipe: add auditing support
deven . desai
Re: [RFC PATCH v7 07/16] ipe: add auditing support
Steve Grubb
Re: [RFC PATCH v7 07/16] ipe: add auditing support
Deven Bowers
Re: [RFC PATCH v7 07/16] ipe: add auditing support
Steve Grubb
Re: [RFC PATCH v7 07/16] ipe: add auditing support
Deven Bowers
Re: [RFC PATCH v7 07/16] ipe: add auditing support
Randy Dunlap
Re: [RFC PATCH v7 07/16] ipe: add auditing support
Deven Bowers
Earlier messages
Later messages