summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: add sm3 algorithm to hash algorithm configuration listTianjia Zhang2020-02-181-0/+5
* efi: Only print errors about failing to get certs if EFI vars are foundJavier Martinez Canillas2020-02-181-14/+26
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2020-01-2811-38/+496
|\
| * IMA: Defined delayed workqueue to free the queued keysLakshmi Ramasubramanian2020-01-233-6/+48
| * IMA: Call workqueue functions to measure queued keysLakshmi Ramasubramanian2020-01-232-0/+11
| * IMA: Define workqueue for early boot key measurementsLakshmi Ramasubramanian2020-01-234-0/+166
| * IMA: pre-allocate buffer to hold keyrings stringLakshmi Ramasubramanian2020-01-221-8/+30
| * ima: ima/lsm policy rule loading logic bug fixesJanne Karhunen2020-01-221-18/+26
| * ima: add the ability to query the cached hash of a given fileFlorent Revest2020-01-221-0/+49
| * ima: Add a space after printing LSM rules for readabilityClay Chang2020-01-221-0/+1
| * IMA: fix measuring asymmetric keys KconfigLakshmi Ramasubramanian2020-01-092-1/+7
| * IMA: Read keyrings= option from the IMA policyLakshmi Ramasubramanian2019-12-121-1/+28
| * IMA: Add support to limit measuring keysLakshmi Ramasubramanian2019-12-126-17/+82
| * IMA: Define an IMA hook to measure keysLakshmi Ramasubramanian2019-12-122-0/+53
| * IMA: Add KEY_CHECK func to measure keysLakshmi Ramasubramanian2019-12-122-1/+4
| * IMA: Check IMA policy flagLakshmi Ramasubramanian2019-12-121-0/+3
| * ima: avoid appraise error for hash calc interruptPatrick Callaghan2019-12-121-1/+3
* | treewide: Use sizeof_field() macroPankaj Bharadiya2019-12-091-2/+2
|/
* x86/efi: remove unused variablesYueHaibing2019-11-291-5/+0
* powerpc: Load firmware trusted keys/hashes into kernel keyringNayna Jain2019-11-133-1/+108
* x86/efi: move common keyring handler functions to new fileNayna Jain2019-11-134-67/+115
* ima: Check against blacklisted hashes for files with modsigNayna Jain2019-11-125-6/+60
* ima: Make process_buffer_measurement() genericNayna Jain2019-11-122-18/+43
* integrity: remove pointless subdir-$(CONFIG_...)Masahiro Yamada2019-10-051-2/+0
* integrity: remove unneeded, broken attempt to add -fshort-wcharMasahiro Yamada2019-10-051-1/+0
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-284-3/+55
|\
| * kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett2019-08-193-1/+53
| * kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCEJiri Bohac2019-08-192-2/+2
* | ima: ima_api: Use struct_size() in kzalloc()Gustavo A. R. Silva2019-08-291-2/+2
* | ima: use struct_size() in kzalloc()Gustavo A. R. Silva2019-08-291-3/+2
* | ima: Fix use after free in ima_read_modsig()Thiago Jung Bauermann2019-08-281-1/+2
* | ima: fix freeing ongoing ahash_requestSascha Hauer2019-08-051-0/+5
* | ima: always return negative code for errorSascha Hauer2019-08-051-1/+4
* | ima: Store the measurement again when appraising a modsigThiago Jung Bauermann2019-08-054-7/+47
* | ima: Define ima-modsig templateThiago Jung Bauermann2019-08-058-6/+156
* | ima: Collect modsigThiago Jung Bauermann2019-08-055-5/+60
* | ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-058-23/+209
* | ima: Factor xattr_verify() out of ima_appraise_measurement()Thiago Jung Bauermann2019-08-051-60/+81
* | ima: Add modsig appraise_type option for module-style appended signaturesThiago Jung Bauermann2019-08-056-2/+62
* | integrity: Select CONFIG_KEYS instead of depending on itThiago Jung Bauermann2019-08-051-1/+1
* | ima: initialize the "template" field with the default templateMimi Zohar2019-08-011-2/+4
* | Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2019-07-106-39/+29
* | Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-0813-67/+363
|\ \
| * | integrity: Introduce struct evm_xattrThiago Jung Bauermann2019-06-303-7/+14
| * | ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definitionThiago Jung Bauermann2019-06-301-1/+7
| * | IMA: Define a new template field bufPrakhar Srivastava2019-06-305-1/+33
| * | IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava2019-06-244-0/+81
| * | IMA: support for per policy rule template formatsMatthew Garrett2019-06-197-27/+76
| * | integrity: Fix __integrity_init_keyring() section mismatchGeert Uytterhoeven2019-06-171-2/+3
| * | ima: Use designated initializers for struct ima_event_dataThiago Jung Bauermann2019-06-142-6/+11