summaryrefslogtreecommitdiff
path: root/security/integrity
AgeCommit message (Expand)AuthorFilesLines
2016-02-12EVM: Use crypto_memneq() for digest comparisonsRyan Ware1-1/+2
2016-01-23wrappers for ->i_mutex accessAl Viro1-4/+4
2016-01-18Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds17-76/+575
2016-01-04fix the leak in integrity_read_file()Al Viro1-5/+6
2016-01-03ima: ima_write_policy() limit lockingPetko Manolov1-9/+9
2015-12-25IMA: policy can be updated zero timesSasha Levin3-0/+14
2015-12-15security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker1-3/+2
2015-12-15ima: update appraise flags after policy update completesMimi Zohar1-2/+5
2015-12-15IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar1-0/+2
2015-12-15IMA: allow reading back the current IMA policyPetko Manolov4-8/+253
2015-12-15IMA: create machine owner and blacklist keyringsPetko Manolov4-0/+87
2015-12-15IMA: policy can now be updated multiple timesPetko Manolov3-28/+75
2015-12-15evm: EVM_LOAD_X509 depends on EVMArnd Bergmann1-1/+1
2015-12-15evm: reset EVM status when file attributes changeDmitry Kasatkin1-0/+13
2015-12-15evm: provide a function to set the EVM key from the kernelDmitry Kasatkin2-14/+46
2015-12-15evm: enable EVM when X509 certificate is loadedDmitry Kasatkin4-3/+14
2015-12-15evm: load an x509 certificate from the kernelDmitry Kasatkin4-0/+33
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin7-22/+35
2015-11-07mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman1-1/+1
2015-10-21KEYS: Merge the type-specific data with the payload dataDavid Howells1-1/+1
2015-10-09integrity: prevent loading untrusted certificates on the IMA trusted keyringDmitry Kasatkin1-1/+1
2015-07-01Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds1-1/+1
2015-06-16ima: update builtin policiesMimi Zohar1-9/+56
2015-06-16ima: extend "mask" policy matching supportMimi Zohar1-5/+15
2015-06-16ima: add support for new "euid" policy conditionMimi Zohar1-4/+23
2015-06-16ima: fix ima_show_template_data_ascii()Mimi Zohar3-4/+5
2015-05-28kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez1-1/+1
2015-05-21ima: pass iint to ima_add_violation()Roberto Sassu5-9/+13
2015-05-21ima: wrap event related data to the new ima_event_data structureRoberto Sassu5-79/+61
2015-05-21integrity: add validity checks for 'path' parameterDmitry Kasatkin3-2/+5
2015-05-21evm: fix potential race when removing xattrsDmitry Kasatkin1-4/+3
2015-05-21evm: labeling pseudo filesystems exceptionMimi Zohar1-0/+11
2015-05-21ima: remove definition of IMA_X509_PATHDmitry Kasatkin1-7/+1
2015-05-21ima: limit file hash setting by user to fix and log modesDmitry Kasatkin1-2/+6
2015-05-21ima: do not measure or appraise the NSFS filesystemMimi Zohar1-0/+2
2015-05-21ima: skip measurement of cgroupfs files and update documentationRoberto Sassu1-0/+2
2015-05-13ima: cleanup ima_init_policy() a littleDan Carpenter1-10/+6
2015-04-15VFS: security/: d_backing_inode() annotationsDavid Howells3-16/+16
2015-02-19Merge branch 'kconfig' of git://git.kernel.org/pub/scm/linux/kernel/git/mmare...Linus Torvalds2-3/+3
2015-02-02ima: /proc/keys is now mandatoryDavid Howells1-1/+0
2015-01-07kconfig: use bool instead of boolean for type definition attributesChristoph Jaeger2-3/+3
2014-12-16Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris1-1/+1
2014-12-15Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds12-119/+308
2014-12-09Merge branch 'iov_iter' into for-nextAl Viro3-3/+9
2014-12-07ima: Fix build failure on powerpc when TCG_IBMVTPM dependencies are not metMichael Ellerman1-1/+1
2014-11-19kill f_dentry usesAl Viro3-5/+5
2014-11-18VFS: refactor vfs_read()Dmitry Kasatkin1-7/+3
2014-11-18ima: require signature based appraisalDmitry Kasatkin2-0/+13
2014-11-18integrity: provide a hook to load keys when rootfs is readyDmitry Kasatkin1-0/+11
2014-11-18ima: load x509 certificate from the kernelDmitry Kasatkin4-2/+44