summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'integrity-v5.8-fix' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2020-06-121-1/+2
|\
| * ima: fix mprotect checkingMimi Zohar2020-06-121-1/+2
* | ima: Remove __init annotation from ima_pcrread()Roberto Sassu2020-06-071-1/+1
* | Merge tag 'integrity-v5.8' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2020-06-0610-85/+383
|\|
| * ima: Directly free *entry in ima_alloc_init_template() if digests is NULLRoberto Sassu2020-06-051-2/+3
| * ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()Roberto Sassu2020-06-034-5/+24
| * ima: Directly assign the ima_default_policy pointer to ima_rulesRoberto Sassu2020-06-031-2/+1
| * ima: verify mprotect change is consistent with mmap policyMimi Zohar2020-05-221-0/+51
| * ima: Set again build_ima_appraise variableKrzysztof Struczynski2020-05-071-2/+8
| * ima: Remove redundant policy rule set in add_rules()Krzysztof Struczynski2020-05-071-4/+1
| * ima: Fix ima digest hash table key calculationKrzysztof Struczynski2020-05-071-3/+4
| * ima: Use ima_hash_algo for collision detection in the measurement listRoberto Sassu2020-04-193-5/+23
| * ima: Calculate and extend PCR with digests in ima_template_entryRoberto Sassu2020-04-193-15/+58
| * ima: Allocate and initialize tfm for each PCR bankRoberto Sassu2020-04-191-26/+119
| * ima: Switch to dynamically allocated buffer for template digestsRoberto Sassu2020-04-196-10/+45
| * ima: Store template digest directly in ima_template_entryRoberto Sassu2020-04-193-24/+9
| * ima: Evaluate error in init_ima()Roberto Sassu2020-04-191-0/+3
| * ima: Switch to ima_hash_algo for boot aggregateRoberto Sassu2020-04-192-11/+58
* | ima: Fix return value of ima_write_policy()Roberto Sassu2020-05-071-2/+1
* | ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()Roberto Sassu2020-05-071-6/+6
|/
* ima: add a new CONFIG for loading arch-specific policiesNayna Jain2020-03-121-0/+7
* integrity: Remove duplicate pr_fmt definitionsTushar Sugandhi2020-02-2811-21/+0
* IMA: Add log statements for failure conditionsTushar Sugandhi2020-02-281-0/+3
* IMA: Update KBUILD_MODNAME for IMA files to imaTushar Sugandhi2020-02-281-3/+3
* ima: add sm3 algorithm to hash algorithm configuration listTianjia Zhang2020-02-181-0/+5
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2020-01-2811-38/+496
|\
| * IMA: Defined delayed workqueue to free the queued keysLakshmi Ramasubramanian2020-01-233-6/+48
| * IMA: Call workqueue functions to measure queued keysLakshmi Ramasubramanian2020-01-232-0/+11
| * IMA: Define workqueue for early boot key measurementsLakshmi Ramasubramanian2020-01-234-0/+166
| * IMA: pre-allocate buffer to hold keyrings stringLakshmi Ramasubramanian2020-01-221-8/+30
| * ima: ima/lsm policy rule loading logic bug fixesJanne Karhunen2020-01-221-18/+26
| * ima: add the ability to query the cached hash of a given fileFlorent Revest2020-01-221-0/+49
| * ima: Add a space after printing LSM rules for readabilityClay Chang2020-01-221-0/+1
| * IMA: fix measuring asymmetric keys KconfigLakshmi Ramasubramanian2020-01-092-1/+7
| * IMA: Read keyrings= option from the IMA policyLakshmi Ramasubramanian2019-12-121-1/+28
| * IMA: Add support to limit measuring keysLakshmi Ramasubramanian2019-12-126-17/+82
| * IMA: Define an IMA hook to measure keysLakshmi Ramasubramanian2019-12-122-0/+53
| * IMA: Add KEY_CHECK func to measure keysLakshmi Ramasubramanian2019-12-122-1/+4
| * IMA: Check IMA policy flagLakshmi Ramasubramanian2019-12-121-0/+3
| * ima: avoid appraise error for hash calc interruptPatrick Callaghan2019-12-121-1/+3
* | treewide: Use sizeof_field() macroPankaj Bharadiya2019-12-091-2/+2
|/
* ima: Check against blacklisted hashes for files with modsigNayna Jain2019-11-124-6/+59
* ima: Make process_buffer_measurement() genericNayna Jain2019-11-122-18/+43
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-284-3/+55
|\
| * kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett2019-08-193-1/+53
| * kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCEJiri Bohac2019-08-192-2/+2
* | ima: ima_api: Use struct_size() in kzalloc()Gustavo A. R. Silva2019-08-291-2/+2
* | ima: use struct_size() in kzalloc()Gustavo A. R. Silva2019-08-291-3/+2
* | ima: Fix use after free in ima_read_modsig()Thiago Jung Bauermann2019-08-281-1/+2
* | ima: fix freeing ongoing ahash_requestSascha Hauer2019-08-051-0/+5