summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-201-0/+3
* Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2017-11-141-39/+17
|\
| * ima: move to generic async completionGilad Ben-Yossef2017-11-031-39/+17
* | Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2017-11-1313-110/+108
|\ \
| * | ima: Remove redundant conditional operatorThiago Jung Bauermann2017-11-081-2/+2
| * | ima: Fix bool initialization/comparisonThomas Meyer2017-11-082-4/+4
| * | ima: check signature enforcement against cmdline param instead of CONFIGBruno E. O. Meneguele2017-11-081-3/+3
| * | ima: fix hash algorithm initializationBoshi Wang2017-11-081-0/+4
| * | EVM: Only complain about a missing HMAC key onceMatthew Garrett2017-11-081-1/+1
| * | EVM: Allow userspace to signal an RSA key has been loadedMatthew Garrett2017-11-082-12/+20
| * | EVM: Include security.apparmor in EVM measurementsMatthew Garrett2017-11-081-0/+3
| * | integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig2017-11-084-56/+13
| * | ima: always measure and audit files in policyMimi Zohar2017-11-083-30/+56
| * | ima: don't remove the securityfs policy fileMimi Zohar2017-11-081-2/+2
| |/
* | License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-022-0/+2
|/
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2017-07-0512-177/+211
|\
| * ima: Log the same audit cause whenever a file has no signatureThiago Jung Bauermann2017-06-211-1/+2
| * ima: Simplify policy_func_show.Thiago Jung Bauermann2017-06-212-62/+21
| * integrity: Small code improvementsThiago Jung Bauermann2017-06-216-9/+11
| * ima: fix get_binary_runtime_size()Roberto Sassu2017-06-211-1/+1
| * ima: use ima_parse_buf() to parse template dataRoberto Sassu2017-06-211-31/+13
| * ima: use ima_parse_buf() to parse measurements headersRoberto Sassu2017-06-211-52/+28
| * ima: introduce ima_parse_buf()Roberto Sassu2017-06-212-0/+67
| * ima: Add cgroups2 to the defaults listLaura Abbott2017-06-211-0/+3
| * ima: use memdup_user_nulGeliang Tang2017-06-211-9/+4
| * ima: fix up #endif commentsTycho Andersen2017-06-211-2/+2
| * IMA: Correct Kconfig dependencies for hash selectionBen Hutchings2017-06-211-4/+4
| * ima: define is_ima_appraise_enabled()Mimi Zohar2017-06-211-0/+10
| * ima: define Kconfig IMA_APPRAISE_BOOTPARAM optionMimi Zohar2017-06-212-0/+10
| * ima: define a set of appraisal rules requiring file signaturesMimi Zohar2017-06-211-1/+25
| * ima: extend the "ima_policy" boot command line to support multiple policiesMimi Zohar2017-06-211-5/+10
* | fs: switch ->s_uuid to uuid_tChristoph Hellwig2017-06-052-2/+2
* | ima/policy: switch to use uuid_tChristoph Hellwig2017-06-051-6/+5
* | block: remove blk_part_pack_uuidChristoph Hellwig2017-06-051-2/+1
|/
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris2017-04-192-34/+94
|\
| * ima: provide ">" and "<" operators for fowner/uid/euid rules.Mikhail Kurinnoi2017-03-131-28/+87
| * ima: accept previously set IMA_NEW_FILEDaniel Glöckner2017-03-071-2/+3
| * integrity: mark default IMA rules as __ro_after_initJames Morris2017-03-061-4/+4
* | KEYS: Use structure to capture key restriction function and dataMat Martineau2017-04-042-2/+18
|/
* sched/headers: Prepare to remove the <linux/magic.h> include from <linux/sche...Ingo Molnar2017-03-021-0/+2
* ima: allow to check MAY_APPENDLans Zhang2017-01-272-4/+5
* ima: fix ima_d_path() possible race with renameMimi Zohar2017-01-273-6/+24
* ima: platform-independent hash valueAndreas Steffen2016-12-201-2/+4
* ima: define a canonical binary_runtime_measurements list formatMimi Zohar2016-12-205-13/+62
* ima: support restoring multiple template formatsMimi Zohar2016-12-201-3/+49
* ima: store the builtin/custom template definitions in a listMimi Zohar2016-12-203-11/+43
* ima: on soft reboot, save the measurement listMimi Zohar2016-12-203-1/+119
* ima: maintain memory size needed for serializing the measurement listMimi Zohar2016-12-203-2/+64
* ima: permit duplicate measurement list entriesMimi Zohar2016-12-201-6/+10
* ima: on soft reboot, restore the measurement listMimi Zohar2016-12-206-0/+255
OpenPOWER on IntegriCloud