index
:
linux-stable.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree
Greg Kroah-Hartman
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
security
/
integrity
Commit message (
Expand
)
Author
Age
Files
Lines
...
|
|
*
akcipher: Move the RSA DER encoding check to the crypto layer
David Howells
2016-03-03
1
-0
/
+1
|
|
*
integrity: convert digsig to akcipher api
Tadeusz Struk
2016-02-18
2
-7
/
+4
|
|
*
KEYS: CONFIG_KEYS_DEBUG_PROC_KEYS is no longer an option
David Howells
2016-02-10
1
-1
/
+0
|
*
|
ima: require signed IMA policy
Mimi Zohar
2016-02-21
1
-0
/
+7
|
*
|
ima: measure and appraise the IMA policy itself
Mimi Zohar
2016-02-21
4
-3
/
+24
|
*
|
ima: load policy using path
Dmitry Kasatkin
2016-02-21
1
-2
/
+43
|
*
|
ima: support for kexec image and initramfs
Mimi Zohar
2016-02-21
3
-7
/
+27
|
*
|
ima: remove firmware and module specific cached status info
Mimi Zohar
2016-02-21
5
-39
/
+28
|
*
|
module: replace copy_module_from_fd with kernel version
Mimi Zohar
2016-02-21
1
-22
/
+13
|
*
|
security: define kernel_read_file hook
Mimi Zohar
2016-02-21
1
-0
/
+16
|
*
|
firmware: replace call to fw_read_file_contents() with kernel version
Mimi Zohar
2016-02-21
1
-11
/
+10
|
*
|
ima: define a new hook to measure and appraise a file already in memory
Mimi Zohar
2016-02-20
6
-14
/
+51
|
*
|
ima: calculate the hash of a buffer using aynchronous hash(ahash)
Mimi Zohar
2016-02-18
1
-2
/
+73
|
*
|
ima: provide buffer hash calculation function
Dmitry Kasatkin
2016-02-18
2
-0
/
+49
|
*
|
ima: use "ima_hooks" enum as function argument
Mimi Zohar
2016-02-18
5
-27
/
+37
|
*
|
ima: refactor ima_policy_show() to display "ima_hooks" rules
Mimi Zohar
2016-02-18
1
-27
/
+36
|
*
|
ima: separate 'security.ima' reading functionality from collect
Dmitry Kasatkin
2016-02-18
8
-40
/
+33
|
*
|
IMA: fix non-ANSI declaration of ima_check_policy()
Colin Ian King
2016-02-08
1
-1
/
+1
|
|
/
*
/
EVM: Use crypto_memneq() for digest comparisons
Ryan Ware
2016-02-12
1
-1
/
+2
|
/
*
wrappers for ->i_mutex access
Al Viro
2016-01-22
1
-4
/
+4
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...
Linus Torvalds
2016-01-17
17
-76
/
+575
|
\
|
*
ima: ima_write_policy() limit locking
Petko Manolov
2016-01-03
1
-9
/
+9
|
*
IMA: policy can be updated zero times
Sasha Levin
2015-12-24
3
-0
/
+14
|
*
security/integrity: make ima/ima_mok.c explicitly non-modular
Paul Gortmaker
2015-12-15
1
-3
/
+2
|
*
ima: update appraise flags after policy update completes
Mimi Zohar
2015-12-15
1
-2
/
+5
|
*
IMA: prevent keys on the .ima_blacklist from being removed
Mimi Zohar
2015-12-15
1
-0
/
+2
|
*
IMA: allow reading back the current IMA policy
Petko Manolov
2015-12-15
4
-8
/
+253
|
*
IMA: create machine owner and blacklist keyrings
Petko Manolov
2015-12-15
4
-0
/
+87
|
*
IMA: policy can now be updated multiple times
Petko Manolov
2015-12-15
3
-28
/
+75
|
*
evm: EVM_LOAD_X509 depends on EVM
Arnd Bergmann
2015-12-15
1
-1
/
+1
|
*
evm: reset EVM status when file attributes change
Dmitry Kasatkin
2015-12-15
1
-0
/
+13
|
*
evm: provide a function to set the EVM key from the kernel
Dmitry Kasatkin
2015-12-15
2
-14
/
+46
|
*
evm: enable EVM when X509 certificate is loaded
Dmitry Kasatkin
2015-12-15
4
-3
/
+14
|
*
evm: load an x509 certificate from the kernel
Dmitry Kasatkin
2015-12-15
4
-0
/
+33
|
*
integrity: define '.evm' as a builtin 'trusted' keyring
Dmitry Kasatkin
2015-11-23
7
-22
/
+35
*
|
fix the leak in integrity_read_file()
Al Viro
2016-01-04
1
-5
/
+6
|
/
*
mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIM
Mel Gorman
2015-11-06
1
-1
/
+1
*
KEYS: Merge the type-specific data with the payload data
David Howells
2015-10-21
1
-1
/
+1
*
integrity: prevent loading untrusted certificates on the IMA trusted keyring
Dmitry Kasatkin
2015-10-09
1
-1
/
+1
*
Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...
Linus Torvalds
2015-07-01
1
-1
/
+1
|
\
|
*
kernel/params: constify struct kernel_param_ops uses
Luis R. Rodriguez
2015-05-28
1
-1
/
+1
*
|
ima: update builtin policies
Mimi Zohar
2015-06-16
1
-9
/
+56
*
|
ima: extend "mask" policy matching support
Mimi Zohar
2015-06-16
1
-5
/
+15
*
|
ima: add support for new "euid" policy condition
Mimi Zohar
2015-06-16
1
-4
/
+23
*
|
ima: fix ima_show_template_data_ascii()
Mimi Zohar
2015-06-16
3
-4
/
+5
*
|
ima: pass iint to ima_add_violation()
Roberto Sassu
2015-05-21
5
-9
/
+13
*
|
ima: wrap event related data to the new ima_event_data structure
Roberto Sassu
2015-05-21
5
-79
/
+61
*
|
integrity: add validity checks for 'path' parameter
Dmitry Kasatkin
2015-05-21
3
-2
/
+5
*
|
evm: fix potential race when removing xattrs
Dmitry Kasatkin
2015-05-21
1
-4
/
+3
*
|
evm: labeling pseudo filesystems exception
Mimi Zohar
2015-05-21
1
-0
/
+11
[prev]
[next]