summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: Don't ignore errors from crypto_shash_update()Roberto Sassu2020-10-291-0/+2
* evm: Fix possible memory leak in evm_calc_hmac_or_hash()Roberto Sassu2020-06-201-1/+1
* ima: Directly assign the ima_default_policy pointer to ima_rulesRoberto Sassu2020-06-201-2/+1
* ima: Fix ima digest hash table key calculationKrzysztof Struczynski2020-06-201-3/+4
* ima: Fix return value of ima_write_policy()Roberto Sassu2020-05-271-2/+1
* evm: Check also if *tfm is an error pointer in init_desc()Roberto Sassu2020-05-271-1/+1
* ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()Roberto Sassu2020-05-271-6/+6
* ima: always return negative code for errorSascha Hauer2019-10-111-1/+4
* ima: show rules with IMA_INMASK correctlyRoberto Sassu2019-06-091-9/+12
* ima: open a new file instance if no read permissionsGoldwyn Rodrigues2019-05-161-20/+34
* ima: re-initialize iint->atomic_flagsMimi Zohar2018-12-011-0/+1
* ima: re-introduce own integrity cache lockDmitry Kasatkin2018-12-014-40/+77
* EVM: Add support for portable signature formatMatthew Garrett2018-12-015-21/+91
* ima: always measure and audit files in policyMimi Zohar2018-12-013-30/+56
* ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers2018-11-131-3/+3
* evm: Don't deadlock if a crypto algorithm is unavailableMatthew Garrett2018-09-261-1/+2
* ima: based on policy verify firmware signatures (pre-allocated buffer)Mimi Zohar2018-08-031-0/+1
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-05-302-0/+15
* ima: Fix Kconfig to select TPM 2.0 CRB interfaceJiandi An2018-05-301-0/+1
* integrity/security: fix digsig.c build error with header fileRandy Dunlap2018-05-301-0/+1
* ima: relax requiring a file signature for new files with zero lengthMimi Zohar2018-03-191-1/+2
* ima/policy: fix parsing of fsuuidMike Rapoport2018-02-031-1/+1
* ima: fix hash algorithm initializationBoshi Wang2017-12-101-0/+4
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-241-0/+3
* License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-022-0/+2
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-07-0512-177/+211
|\
| * ima: Log the same audit cause whenever a file has no signatureThiago Jung Bauermann2017-06-211-1/+2
| * ima: Simplify policy_func_show.Thiago Jung Bauermann2017-06-212-62/+21
| * integrity: Small code improvementsThiago Jung Bauermann2017-06-216-9/+11
| * ima: fix get_binary_runtime_size()Roberto Sassu2017-06-211-1/+1
| * ima: use ima_parse_buf() to parse template dataRoberto Sassu2017-06-211-31/+13
| * ima: use ima_parse_buf() to parse measurements headersRoberto Sassu2017-06-211-52/+28
| * ima: introduce ima_parse_buf()Roberto Sassu2017-06-212-0/+67
| * ima: Add cgroups2 to the defaults listLaura Abbott2017-06-211-0/+3
| * ima: use memdup_user_nulGeliang Tang2017-06-211-9/+4
| * ima: fix up #endif commentsTycho Andersen2017-06-211-2/+2
| * IMA: Correct Kconfig dependencies for hash selectionBen Hutchings2017-06-211-4/+4
| * ima: define is_ima_appraise_enabled()Mimi Zohar2017-06-211-0/+10
| * ima: define Kconfig IMA_APPRAISE_BOOTPARAM optionMimi Zohar2017-06-212-0/+10
| * ima: define a set of appraisal rules requiring file signaturesMimi Zohar2017-06-211-1/+25
| * ima: extend the "ima_policy" boot command line to support multiple policiesMimi Zohar2017-06-211-5/+10
* | fs: switch ->s_uuid to uuid_tChristoph Hellwig2017-06-052-2/+2
* | ima/policy: switch to use uuid_tChristoph Hellwig2017-06-051-6/+5
* | block: remove blk_part_pack_uuidChristoph Hellwig2017-06-051-2/+1
|/
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris2017-04-192-34/+94
|\
| * ima: provide ">" and "<" operators for fowner/uid/euid rules.Mikhail Kurinnoi2017-03-131-28/+87
| * ima: accept previously set IMA_NEW_FILEDaniel Glöckner2017-03-071-2/+3
| * integrity: mark default IMA rules as __ro_after_initJames Morris2017-03-061-4/+4
* | KEYS: Use structure to capture key restriction function and dataMat Martineau2017-04-042-2/+18
|/
* sched/headers: Prepare to remove the <linux/magic.h> include from <linux/sche...Ingo Molnar2017-03-021-0/+2