summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: Allow template selection with ima_template[_fmt]= after ima_hash=Roberto Sassu2022-02-161-3/+7
* ima: Remove ima_policy file before directoryStefan Berger2022-02-161-1/+1
* integrity: check the return value of audit_log_start()Xiaoke Wang2022-02-161-0/+2
* evm: mark evm_fixmode as __ro_after_initAustin Kim2021-11-261-1/+1
* IMA: remove the dependency on CRYPTO_MD5THOBY Simon2021-09-221-1/+0
* IMA: remove -Wmissing-prototypes warningAustin Kim2021-09-221-1/+1
* evm: fix writing <securityfs>/evm overflowMimi Zohar2021-07-201-2/+3
* evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loadedRoberto Sassu2021-07-201-4/+4
* evm: Execute evm_inode_init_security() only when an HMAC key is loadedRoberto Sassu2021-07-201-2/+3
* certs: Fix blacklist flag type confusionDavid Howells2021-03-041-3/+2
* ima: Free IMA measurement buffer after kexec syscallLakshmi Ramasubramanian2021-03-041-0/+2
* ima: Free IMA measurement buffer on errorLakshmi Ramasubramanian2021-03-041-0/+1
* ima: Remove __init annotation from ima_pcrread()Roberto Sassu2021-01-191-1/+1
* ima: Don't modify file descriptor mode on the flyRoberto Sassu2020-12-301-15/+5
* evm: Check size of security.evm before using itRoberto Sassu2020-11-051-0/+6
* ima: Don't ignore errors from crypto_shash_update()Roberto Sassu2020-10-291-0/+2
* ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()Roberto Sassu2020-06-224-5/+24
* evm: Fix possible memory leak in evm_calc_hmac_or_hash()Roberto Sassu2020-06-221-1/+1
* ima: Directly assign the ima_default_policy pointer to ima_rulesRoberto Sassu2020-06-221-2/+1
* ima: Fix ima digest hash table key calculationKrzysztof Struczynski2020-06-221-3/+4
* evm: Fix RCU list related warningsMadhuparna Bhowmik2020-06-073-4/+11
* ima: Fix return value of ima_write_policy()Roberto Sassu2020-05-271-2/+1
* evm: Check also if *tfm is an error pointer in init_desc()Roberto Sassu2020-05-271-1/+1
* ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()Roberto Sassu2020-05-271-6/+6
* ima: fix freeing ongoing ahash_requestSascha Hauer2019-10-111-0/+5
* ima: always return negative code for errorSascha Hauer2019-10-111-1/+4
* evm: check hash algorithm passed to init_desc()Roberto Sassu2019-06-091-0/+3
* ima: show rules with IMA_INMASK correctlyRoberto Sassu2019-06-091-9/+12
* ima: open a new file instance if no read permissionsGoldwyn Rodrigues2018-11-131-20/+34
* ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers2018-11-131-3/+3
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2018-08-1511-45/+102
|\
| * EVM: fix return value check in evm_write_xattrs()Wei Yongjun2018-07-221-2/+2
| * integrity: prevent deadlock during digsig verification.Mikhail Kurinnoi2018-07-181-0/+23
| * evm: Allow non-SHA1 digital signaturesMatthew Garrett2018-07-184-31/+46
| * evm: Don't deadlock if a crypto algorithm is unavailableMatthew Garrett2018-07-181-1/+2
| * integrity: silence warning when CONFIG_SECURITYFS is not enabledSudeep Holla2018-07-181-3/+6
| * ima: Differentiate auditing policy rules from "audit" actionsStefan Berger2018-07-181-2/+2
| * ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not setStefan Berger2018-07-183-1/+21
| * ima: Use audit_log_format() rather than audit_log_string()Stefan Berger2018-07-182-7/+2
| * ima: Call audit_log_string() rather than logging it untrustedStefan Berger2018-07-181-1/+1
* | Merge branch 'next-tpm' of git://git.kernel.org/pub/scm/linux/kernel/git/jmor...Linus Torvalds2018-08-154-16/+10
|\ \
| * | ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL insteadStefan Berger2018-07-284-8/+4
| * | ima: Use tpm_default_chip() and call TPM functions with a tpm_chipStefan Berger2018-07-284-9/+7
| |/
* | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-154-17/+158
|\|
| * ima: based on policy warn about loading firmware (pre-allocated buffer)Mimi Zohar2018-07-161-0/+8
| * module: replace the existing LSM hook in init_moduleMimi Zohar2018-07-161-13/+10
| * ima: add build time policyMimi Zohar2018-07-162-3/+101
| * ima: based on policy require signed firmware (sysfs fallback)Mimi Zohar2018-07-161-1/+9
| * ima: based on policy require signed kexec kernel imagesMimi Zohar2018-07-163-0/+30
* | IMA: don't propagate opened through the entire thingAl Viro2018-07-123-12/+12
|/