summaryrefslogtreecommitdiff
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'net-next-5.11' of git://git.kernel.org/pub/scm/linux/kernel/git/ne...Linus Torvalds2020-12-151-24/+54
|\
| * ima: Implement ima_inode_hashKP Singh2020-11-261-24/+54
* | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2020-12-141-1/+1
|\ \ | |/ |/|
| * crypto: sha - split sha.h into sha1.h and sha2.hEric Biggers2020-11-201-1/+1
* | ima: Replace zero-length array with flexible-array memberGustavo A. R. Silva2020-10-291-1/+1
|/
* Merge tag 'integrity-v5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2020-10-158-67/+161
|\
| * ima: Fix NULL pointer dereference in ima_file_hashKP Singh2020-09-161-0/+10
| * evm: Check size of security.evm before using itRoberto Sassu2020-09-151-0/+6
| * ima: Remove semicolon at the end of ima_get_binary_runtime_size()Roberto Sassu2020-09-151-1/+1
| * ima: Don't ignore errors from crypto_shash_update()Roberto Sassu2020-09-151-0/+2
| * ima: Use kmemdup rather than kmalloc+memcpyAlex Dewar2020-09-151-5/+4
| * integrity: include keyring name for unknown key requestBruno Meneguele2020-09-091-2/+8
| * ima: limit secure boot feedback scope for appraiseBruno Meneguele2020-09-091-9/+16
| * integrity: invalid kernel parameters feedbackBruno Meneguele2020-09-084-4/+16
| * ima: add check for enforced appraise optionBruno Meneguele2020-09-081-0/+2
| * integrity: Use current_uid() in integrity_audit_message()Denis Efremov2020-08-311-1/+1
| * ima: Fail rule parsing when asymmetric key measurement isn't supportableTyler Hicks2020-08-311-2/+4
| * ima: Pre-parse the list of keyrings in a KEY_CHECK ruleTyler Hicks2020-08-311-45/+93
* | Merge tag 'char-misc-5.10-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2020-10-154-23/+69
|\ \
| * | fs/kernel_file_read: Add "offset" arg for partial readsKees Cook2020-10-052-2/+3
| * | IMA: Add support for file reads without contentsScott Branden2020-10-051-6/+16
| * | LSM: Add "contents" flag to kernel_read_file hookKees Cook2020-10-051-1/+9
| * | firmware_loader: Use security_post_load_data()Kees Cook2020-10-051-10/+10
| * | LSM: Introduce kernel_post_load_data() hookKees Cook2020-10-051-1/+23
| * | fs/kernel_read_file: Add file_size output argumentKees Cook2020-10-052-2/+2
| * | fs/kernel_read_file: Switch buffer size arg to size_tKees Cook2020-10-052-2/+2
| * | fs/kernel_read_file: Remove redundant size argumentKees Cook2020-10-052-4/+7
| * | fs/kernel_read_file: Split into separate include fileScott Branden2020-10-054-0/+4
| * | fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enumKees Cook2020-10-053-6/+4
* | | Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds2020-10-131-3/+11
|\ \ \
| * | | integrity: Asymmetric digsig supports SM2-with-SM3 algorithmTianjia Zhang2020-09-251-3/+11
| | |/ | |/|
* | | Merge tag 'efi-core-2020-10-12' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2020-10-121-19/+66
|\ \ \ | |_|/ |/| |
| * | integrity: Load certs from the EFI MOK config tableLenny Szubowicz2020-09-161-0/+22
| * | integrity: Move import of MokListRT certs to a separate routineLenny Szubowicz2020-09-161-19/+44
| |/
* | treewide: Use fallthrough pseudo-keywordGustavo A. R. Silva2020-08-233-7/+7
|/
* Merge tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris...Linus Torvalds2020-08-114-4/+4
|\
| * Replace HTTP links with HTTPS ones: securityAlexander A. Klimov2020-08-064-4/+4
* | Merge tag 'integrity-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2020-08-0612-140/+283
|\ \
| * | integrity: remove redundant initialization of variable retColin Ian King2020-07-271-1/+1
| * | ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtimeBruno Meneguele2020-07-202-1/+7
| * | ima: AppArmor satisfies the audit rule requirementsTyler Hicks2020-07-201-1/+1
| * | ima: Rename internal filter rule functionsTyler Hicks2020-07-202-25/+21
| * | ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks2020-07-207-22/+28
| * | ima: Use the common function to detect LSM conditionals in a ruleTyler Hicks2020-07-201-9/+2
| * | ima: Move comprehensive rule validation checks out of the token parserTyler Hicks2020-07-203-46/+37
| * | ima: Use correct type for the args_p member of ima_rule_entry.lsm elementsTyler Hicks2020-07-201-9/+9
| * | ima: Shallow copy the args_p member of ima_rule_entry.lsm elementsTyler Hicks2020-07-201-10/+8
| * | ima: Fail rule parsing when appraise_flag=blacklist is unsupportableTyler Hicks2020-07-201-1/+14
| * | ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid condTyler Hicks2020-07-161-0/+7
| * | ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invali...Tyler Hicks2020-07-161-0/+21