summaryrefslogtreecommitdiffstats
path: root/security/integrity (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'fs.acl.rework.prep.v6.1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2022-10-041-3/+14
|\
| * acl: move idmapping handling into posix_acl_xattr_set()Christian Brauner2022-08-311-3/+14
* | efi: Correct Macmini DMI match in uefi cert quirkOrlando Chamberlain2022-09-301-1/+1
* | ima: fix blocking of security.ima xattrs of unsupported algorithmsMimi Zohar2022-08-231-4/+8
|/
* Merge tag 'integrity-v6.0' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2022-08-031-29/+23
|\
| * evm: Use IS_ENABLED to initialize .enabledXiu Jianfeng2022-07-131-29/+23
* | Merge tag 'x86_kdump_for_v6.0_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-08-011-1/+1
|\ \
| * | x86/kexec: Carry forward IMA measurement log on kexecJonathan McDowell2022-07-011-1/+1
* | | Merge tag 'fs.idmapped.vfsuid.v5.20' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2022-08-011-5/+7
|\ \ \
| * | | attr: port attribute changes to new typesChristian Brauner2022-06-261-2/+2
| * | | security: pass down mount idmapping to setattr hookChristian Brauner2022-06-261-3/+5
| * | | fs: port to iattr ownership update helpersChristian Brauner2022-06-261-2/+2
| |/ /
* | / lockdown: Fix kexec lockdown bypass with ima policyEric Snowberg2022-07-201-0/+4
| |/ |/|
* | ima: Fix potential memory leak in ima_init_crypto()Jianglei Nie2022-07-131-0/+1
* | ima: force signature verification when CONFIG_KEXEC_SIG is configuredCoiby Xu2022-07-131-0/+2
* | ima: Fix a potential integer overflow in ima_appraise_measurementHuaxin Lu2022-07-071-1/+2
* | ima: fix violation measurement list recordMimi Zohar2022-07-071-3/+3
* | Revert "evm: Fix memleak in init_desc"Xiu Jianfeng2022-06-151-5/+2
|/
* Merge tag 'integrity-v5.19' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2022-05-2416-52/+395
|\
| * integrity: Fix sparse warnings in keyring_handlerStefan Berger2022-05-161-3/+3
| * evm: Clean up some variablesStefan Berger2022-05-162-4/+1
| * evm: Return INTEGRITY_PASS for enum integrity_status value '0'Stefan Berger2022-05-161-1/+1
| * efi: Do not import certificates from UEFI Secure Boot for T2 MacsAditya Garg2022-05-152-0/+41
| * ima: support fs-verity file digest based version 3 signaturesMimi Zohar2022-05-055-16/+177
| * ima: permit fsverity's file digests in the IMA measurement listMimi Zohar2022-05-055-8/+90
| * ima: define a new template field named 'd-ngv2' and templatesMimi Zohar2022-05-053-11/+73
| * ima: use IMA default hash algorithm for integrity violationsMimi Zohar2022-05-011-1/+1
| * ima: fix 'd-ng' comments and documentationMimi Zohar2022-05-011-3/+5
| * ima: remove the IMA_TEMPLATE Kconfig optionGUO Zihua2022-04-071-8/+6
| * ima: remove redundant initialization of pointer 'file'.Colin Ian King2022-04-041-1/+1
* | certs: Factor out the blacklist hash creationMickaël Salaün2022-05-231-24/+2
|/
* Merge tag 'net-next-5.18' of git://git.kernel.org/pub/scm/linux/kernel/git/ne...Linus Torvalds2022-03-241-18/+39
|\
| * ima: Always return a file measurement in ima_file_hash()Roberto Sassu2022-03-111-13/+33
| * ima: Fix documentation-related warnings in ima_main.cRoberto Sassu2022-03-111-5/+6
* | Merge tag 'integrity-v5.18' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2022-03-228-35/+49
|\ \
| * | EVM: fix the evm= __setup handler return valueRandy Dunlap2022-02-231-1/+1
| * | ima: define ima_max_digest_data struct without a flexible array variableMimi Zohar2022-02-155-18/+17
| * | ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGSMimi Zohar2022-02-153-4/+4
| * | ima: Return error code obtained from securityfs functionsStefan Berger2022-02-151-8/+23
| * | ima: Fix trivial typos in the commentsAustin Kim2022-02-154-4/+4
| |/
* | Merge tag 'for-5.18/block-2022-03-18' of git://git.kernel.dk/linux-blockLinus Torvalds2022-03-221-1/+0
|\ \
| * | block: remove genhd.hChristoph Hellwig2022-02-021-1/+0
* | | integrity: Only use machine keyring when uefi_check_trust_mok_keys is trueEric Snowberg2022-03-084-2/+23
* | | integrity: Trust MOK keys if MokListTrustedRT foundEric Snowberg2022-03-081-0/+19
* | | KEYS: store reference to machine keyringEric Snowberg2022-03-081-0/+2
* | | integrity: add new keyring handler for mok keysEric Snowberg2022-03-083-3/+23
* | | integrity: Introduce a Linux keyring called machineEric Snowberg2022-03-085-3/+78
* | | integrity: Fix warning about missing prototypesEric Snowberg2022-03-081-0/+1
| |/ |/|
* | ima: Do not print policy rule with inactive LSM labelsStefan Berger2022-02-021-0/+8
* | ima: Allow template selection with ima_template[_fmt]= after ima_hash=Roberto Sassu2022-02-021-3/+7