summaryrefslogtreecommitdiffstats
path: root/security/integrity
Commit message (Expand)AuthorAgeFilesLines
* security/integrity/ima/ima_policy.c: use %pU to output UUID in printable formatAndy Shevchenko2016-05-211-12/+2Star
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2016-05-198-37/+73
|\
| * Merge tag 'keys-next-20160505' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2016-05-065-35/+42
| |\
| | * Merge branch 'keys-trust' into keys-nextDavid Howells2016-05-044-34/+42
| | |\
| | | * IMA: Use the the system trusted keyrings instead of .ima_mokDavid Howells2016-04-114-53/+32Star
| | | * KEYS: Remove KEY_FLAG_TRUSTED and KEY_ALLOC_TRUSTEDDavid Howells2016-04-111-2/+1Star
| | | * KEYS: Move the point of trust determination to __key_link()David Howells2016-04-112-4/+35
| | | * KEYS: Add a facility to restrict new links into a keyringDavid Howells2016-04-112-8/+7Star
| | * | security: integrity: Remove select to deleted option PUBLIC_KEY_ALGO_RSAAndreas Ziegler2016-04-121-1/+0Star
| | |/
| * | ima: add support for creating files using the mknodat syscallMimi Zohar2016-05-012-1/+29
| * | ima: fix ima_inode_post_setattrMimi Zohar2016-05-012-1/+2
| |/
* | Merge branch 'work.const-path' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2016-05-172-2/+2
|\ \
| * | constify ima_d_path()Al Viro2016-03-282-2/+2
| |/
* | Merge branch 'ovl-fixes' into for-linusAl Viro2016-05-171-2/+2
|\ \
| * | ima: fix the string representation of the LSM/IMA hook enumeration orderingMimi Zohar2016-05-041-2/+2
| |/
* | ->getxattr(): pass dentry and inode as separate argumentsAl Viro2016-04-111-1/+1
* | don't bother with ->d_inode->i_sb - it's always equal to ->d_sbAl Viro2016-04-101-2/+2
|/
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2016-03-1714-158/+409
|\
| * Merge tag 'keys-next-20160303' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2016-03-043-11/+9Star
| |\
| | * X.509: Make algo identifiers text instead of enumDavid Howells2016-03-032-4/+5
| | * akcipher: Move the RSA DER encoding check to the crypto layerDavid Howells2016-03-031-0/+1
| | * integrity: convert digsig to akcipher apiTadeusz Struk2016-02-182-7/+4Star
| | * KEYS: CONFIG_KEYS_DEBUG_PROC_KEYS is no longer an optionDavid Howells2016-02-101-1/+0Star
| * | ima: require signed IMA policyMimi Zohar2016-02-211-0/+7
| * | ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-214-3/+24
| * | ima: load policy using pathDmitry Kasatkin2016-02-211-2/+43
| * | ima: support for kexec image and initramfsMimi Zohar2016-02-213-7/+27
| * | ima: remove firmware and module specific cached status infoMimi Zohar2016-02-215-39/+28Star
| * | module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-22/+13Star
| * | security: define kernel_read_file hookMimi Zohar2016-02-211-0/+16
| * | firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-11/+10Star
| * | ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-216-14/+51
| * | ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar2016-02-181-2/+73
| * | ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-182-0/+49
| * | ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-185-27/+37
| * | ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar2016-02-181-27/+36
| * | ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-188-40/+33Star
| * | IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King2016-02-091-1/+1
| |/
* / EVM: Use crypto_memneq() for digest comparisonsRyan Ware2016-02-121-1/+2
|/
* wrappers for ->i_mutex accessAl Viro2016-01-231-4/+4
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2016-01-1817-76/+575
|\
| * ima: ima_write_policy() limit lockingPetko Manolov2016-01-031-9/+9
| * IMA: policy can be updated zero timesSasha Levin2015-12-253-0/+14
| * security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker2015-12-151-3/+2Star
| * ima: update appraise flags after policy update completesMimi Zohar2015-12-151-2/+5
| * IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar2015-12-151-0/+2
| * IMA: allow reading back the current IMA policyPetko Manolov2015-12-154-8/+253
| * IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-154-0/+87
| * IMA: policy can now be updated multiple timesPetko Manolov2015-12-153-28/+75
| * evm: EVM_LOAD_X509 depends on EVMArnd Bergmann2015-12-151-1/+1