summaryrefslogtreecommitdiff
path: root/security/integrity
AgeCommit message (Expand)AuthorFilesLines
2020-11-26ima: Implement ima_inode_hashKP Singh1-24/+54
2020-10-30ima: Replace zero-length array with flexible-array memberGustavo A. R. Silva1-1/+1
2020-10-16Merge tag 'integrity-v5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds8-67/+161
2020-10-15Merge tag 'char-misc-5.10-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds4-23/+69
2020-10-13Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert...Linus Torvalds1-3/+11
2020-10-12Merge tag 'efi-core-2020-10-12' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds1-19/+66
2020-10-05fs/kernel_file_read: Add "offset" arg for partial readsKees Cook2-2/+3
2020-10-05IMA: Add support for file reads without contentsScott Branden1-6/+16
2020-10-05LSM: Add "contents" flag to kernel_read_file hookKees Cook1-1/+9
2020-10-05firmware_loader: Use security_post_load_data()Kees Cook1-10/+10
2020-10-05LSM: Introduce kernel_post_load_data() hookKees Cook1-1/+23
2020-10-05fs/kernel_read_file: Add file_size output argumentKees Cook2-2/+2
2020-10-05fs/kernel_read_file: Switch buffer size arg to size_tKees Cook2-2/+2
2020-10-05fs/kernel_read_file: Remove redundant size argumentKees Cook2-4/+7
2020-10-05fs/kernel_read_file: Split into separate include fileScott Branden4-0/+4
2020-10-05fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enumKees Cook3-6/+4
2020-09-25integrity: Asymmetric digsig supports SM2-with-SM3 algorithmTianjia Zhang1-3/+11
2020-09-17ima: Fix NULL pointer dereference in ima_file_hashKP Singh1-0/+10
2020-09-16integrity: Load certs from the EFI MOK config tableLenny Szubowicz1-0/+22
2020-09-16integrity: Move import of MokListRT certs to a separate routineLenny Szubowicz1-19/+44
2020-09-15evm: Check size of security.evm before using itRoberto Sassu1-0/+6
2020-09-15ima: Remove semicolon at the end of ima_get_binary_runtime_size()Roberto Sassu1-1/+1
2020-09-15ima: Don't ignore errors from crypto_shash_update()Roberto Sassu1-0/+2
2020-09-15ima: Use kmemdup rather than kmalloc+memcpyAlex Dewar1-5/+4
2020-09-10integrity: include keyring name for unknown key requestBruno Meneguele1-2/+8
2020-09-10ima: limit secure boot feedback scope for appraiseBruno Meneguele1-9/+16
2020-09-09integrity: invalid kernel parameters feedbackBruno Meneguele4-4/+16
2020-09-09ima: add check for enforced appraise optionBruno Meneguele1-0/+2
2020-09-01integrity: Use current_uid() in integrity_audit_message()Denis Efremov1-1/+1
2020-09-01ima: Fail rule parsing when asymmetric key measurement isn't supportableTyler Hicks1-2/+4
2020-09-01ima: Pre-parse the list of keyrings in a KEY_CHECK ruleTyler Hicks1-45/+93
2020-08-24treewide: Use fallthrough pseudo-keywordGustavo A. R. Silva3-7/+7
2020-08-12Merge tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris...Linus Torvalds4-4/+4
2020-08-06Replace HTTP links with HTTPS ones: securityAlexander A. Klimov4-4/+4
2020-08-06Merge tag 'integrity-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds12-140/+283
2020-07-27integrity: remove redundant initialization of variable retColin Ian King1-1/+1
2020-07-21ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtimeBruno Meneguele2-1/+7
2020-07-21ima: AppArmor satisfies the audit rule requirementsTyler Hicks1-1/+1
2020-07-21ima: Rename internal filter rule functionsTyler Hicks2-25/+21
2020-07-20ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks7-22/+28
2020-07-20ima: Use the common function to detect LSM conditionals in a ruleTyler Hicks1-9/+2
2020-07-20ima: Move comprehensive rule validation checks out of the token parserTyler Hicks3-46/+37
2020-07-20ima: Use correct type for the args_p member of ima_rule_entry.lsm elementsTyler Hicks1-9/+9
2020-07-20ima: Shallow copy the args_p member of ima_rule_entry.lsm elementsTyler Hicks1-10/+8
2020-07-20ima: Fail rule parsing when appraise_flag=blacklist is unsupportableTyler Hicks1-1/+14
2020-07-17ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid condTyler Hicks1-0/+7
2020-07-17ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invali...Tyler Hicks1-0/+21
2020-07-17ima: Fail rule parsing when buffer hook functions have an invalid actionTyler Hicks1-2/+38
2020-07-17ima: Free the entire rule if it fails to parseTyler Hicks1-1/+2
2020-07-17ima: Free the entire rule when deleting a list of rulesTyler Hicks1-5/+24