summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: Do not print policy rule with inactive LSM labelsStefan Berger2022-02-021-0/+8
* ima: Allow template selection with ima_template[_fmt]= after ima_hash=Roberto Sassu2022-02-021-3/+7
* ima: Remove ima_policy file before directoryStefan Berger2022-02-021-1/+1
* integrity: check the return value of audit_log_start()Xiaoke Wang2022-02-021-0/+2
* ima: fix reference leak in asymmetric_verify()Eric Biggers2022-01-241-6/+9
* Merge tag 'integrity-v5.17' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2022-01-112-3/+8
|\
| * ima: silence measurement list hexdump during kexecBruno Meneguele2022-01-051-3/+3
| * integrity: Do not load MOK and MOKx when secure boot be disabledLee, Chun-Yi2021-12-241-0/+5
* | lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()Paul Moore2021-11-222-8/+8
|/
* evm: mark evm_fixmode as __ro_after_initAustin Kim2021-10-281-1/+1
* ima: Use strscpy instead of strlcpyPetr Vorel2021-10-092-2/+2
* ima_policy: Remove duplicate 'the' in docs commentPetr Vorel2021-10-091-2/+1
* ima: add gid supportCurtis Veit2021-10-091-27/+174
* ima: fix uid code style problemsAlex Henrie2021-10-091-4/+6
* ima: fix deadlock when traversing "ima_default_rules".liqiong2021-10-091-9/+18
* Merge tag 'integrity-v5.15' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2021-09-0210-65/+316
|\
| * IMA: reject unknown hash algorithms in ima_get_hash_algoTHOBY Simon2021-08-231-1/+2
| * IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithmsTHOBY Simon2021-08-161-0/+6
| * IMA: introduce a new policy option func=SETXATTR_CHECKTHOBY Simon2021-08-164-17/+96
| * IMA: add a policy option to restrict xattr hash algorithms on appraisalTHOBY Simon2021-08-161-4/+70
| * IMA: add support to restrict the hash algorithms used for file appraisalTHOBY Simon2021-08-165-12/+41
| * IMA: block writes of the security.ima xattr with unsupported algorithmsTHOBY Simon2021-08-162-4/+47
| * IMA: remove the dependency on CRYPTO_MD5THOBY Simon2021-08-161-1/+0
| * ima: Add digest and digest_len params to the functions to measure a bufferRoberto Sassu2021-07-236-15/+32
| * ima: Return int in the functions to measure a bufferRoberto Sassu2021-07-232-22/+28
| * ima: Introduce ima_get_current_hash_algo()Roberto Sassu2021-07-231-1/+6
| * IMA: remove -Wmissing-prototypes warningAustin Kim2021-07-231-1/+1
* | Merge tag 'for-5.15/dm-changes' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2021-08-311-0/+1
|\ \
| * | dm ima: measure data on table loadTushar Sugandhi2021-08-101-0/+1
| |/
* / efi: Don't use knowledge about efi_guid_t internalsAndy Shevchenko2021-08-271-1/+1
|/
* evm: Check xattr size discrepancy between kernel and userRoberto Sassu2021-06-211-1/+7
* evm: output EVM digest calculation infoMimi Zohar2021-06-202-0/+47
* IMA: support for duplicate measurement recordsTushar Sugandhi2021-06-112-2/+10
* ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'Lakshmi Ramasubramanian2021-06-111-0/+1
* ima: differentiate between EVM failures in the audit logMimi Zohar2021-06-101-1/+2
* ima: Fix fall-through warning for ClangGustavo A. R. Silva2021-06-081-0/+1
* ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()Roberto Sassu2021-06-081-1/+1
* ima: Include header defining ima_post_key_create_or_update()Roberto Sassu2021-06-081-0/+1
* ima/evm: Fix type mismatchRoberto Sassu2021-06-084-11/+12
* ima: Set correct casting typesRoberto Sassu2021-06-082-9/+10
* evm: Don't return an error in evm_write_xattrs() if audit is not enabledRoberto Sassu2021-06-031-1/+1
* ima: Define new template evm-sigRoberto Sassu2021-06-031-1/+4
* ima: Define new template fields xattrnames, xattrlengths and xattrvaluesRoberto Sassu2021-06-024-0/+148
* evm: Verify portable signatures against all protected xattrsRoberto Sassu2021-06-014-12/+68
* ima: Define new template field imodeRoberto Sassu2021-06-013-0/+26
* ima: Define new template fields iuid and igidRoberto Sassu2021-06-013-0/+53
* ima: Add ima_show_template_uint() template library functionRoberto Sassu2021-06-012-1/+39
* ima: Don't remove security.ima if file must not be appraisedRoberto Sassu2021-06-011-2/+0
* ima: Introduce template field evmsig and write to field sig as fallbackRoberto Sassu2021-06-013-1/+36
* ima: Allow imasig requirement to be satisfied by EVM portable signaturesRoberto Sassu2021-06-011-7/+17