summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
...
| * | ima: require signed IMA policyMimi Zohar2016-02-211-0/+7
| * | ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-214-3/+24
| * | ima: load policy using pathDmitry Kasatkin2016-02-211-2/+43
| * | ima: support for kexec image and initramfsMimi Zohar2016-02-213-7/+27
| * | ima: remove firmware and module specific cached status infoMimi Zohar2016-02-215-39/+28
| * | module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-22/+13
| * | security: define kernel_read_file hookMimi Zohar2016-02-211-0/+16
| * | firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-11/+10
| * | ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-206-14/+51
| * | ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar2016-02-181-2/+73
| * | ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-182-0/+49
| * | ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-185-27/+37
| * | ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar2016-02-181-27/+36
| * | ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-188-40/+33
| * | IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King2016-02-081-1/+1
| |/
* | EVM: Use crypto_memneq() for digest comparisonsRyan Ware2016-02-121-1/+2
|/
* wrappers for ->i_mutex accessAl Viro2016-01-221-4/+4
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2016-01-1717-76/+575
|\
| * ima: ima_write_policy() limit lockingPetko Manolov2016-01-031-9/+9
| * IMA: policy can be updated zero timesSasha Levin2015-12-243-0/+14
| * security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker2015-12-151-3/+2
| * ima: update appraise flags after policy update completesMimi Zohar2015-12-151-2/+5
| * IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar2015-12-151-0/+2
| * IMA: allow reading back the current IMA policyPetko Manolov2015-12-154-8/+253
| * IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-154-0/+87
| * IMA: policy can now be updated multiple timesPetko Manolov2015-12-153-28/+75
| * evm: EVM_LOAD_X509 depends on EVMArnd Bergmann2015-12-151-1/+1
| * evm: reset EVM status when file attributes changeDmitry Kasatkin2015-12-151-0/+13
| * evm: provide a function to set the EVM key from the kernelDmitry Kasatkin2015-12-152-14/+46
| * evm: enable EVM when X509 certificate is loadedDmitry Kasatkin2015-12-154-3/+14
| * evm: load an x509 certificate from the kernelDmitry Kasatkin2015-12-154-0/+33
| * integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-237-22/+35
* | fix the leak in integrity_read_file()Al Viro2016-01-041-5/+6
|/
* mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman2015-11-061-1/+1
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-1/+1
* integrity: prevent loading untrusted certificates on the IMA trusted keyringDmitry Kasatkin2015-10-091-1/+1
* Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2015-07-011-1/+1
|\
| * kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez2015-05-281-1/+1
* | ima: update builtin policiesMimi Zohar2015-06-161-9/+56
* | ima: extend "mask" policy matching supportMimi Zohar2015-06-161-5/+15
* | ima: add support for new "euid" policy conditionMimi Zohar2015-06-161-4/+23
* | ima: fix ima_show_template_data_ascii()Mimi Zohar2015-06-163-4/+5
* | ima: pass iint to ima_add_violation()Roberto Sassu2015-05-215-9/+13
* | ima: wrap event related data to the new ima_event_data structureRoberto Sassu2015-05-215-79/+61
* | integrity: add validity checks for 'path' parameterDmitry Kasatkin2015-05-213-2/+5
* | evm: fix potential race when removing xattrsDmitry Kasatkin2015-05-211-4/+3
* | evm: labeling pseudo filesystems exceptionMimi Zohar2015-05-211-0/+11
* | ima: remove definition of IMA_X509_PATHDmitry Kasatkin2015-05-211-7/+1
* | ima: limit file hash setting by user to fix and log modesDmitry Kasatkin2015-05-211-2/+6
* | ima: do not measure or appraise the NSFS filesystemMimi Zohar2015-05-211-0/+2
OpenPOWER on IntegriCloud