index
:
kernel/linux.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rockchip-6.1.y
linux-rockchip-6.5.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
integrity
Age
Commit message (
Expand
)
Author
Files
Lines
2022-10-26
ima: fix blocking of security.ima xattrs of unsupported algorithms
Mimi Zohar
1
-4
/
+8
2022-10-15
efi: Correct Macmini DMI match in uefi cert quirk
Orlando Chamberlain
1
-1
/
+1
2022-07-29
lockdown: Fix kexec lockdown bypass with ima policy
Eric Snowberg
1
-0
/
+4
2022-07-21
ima: Fix potential memory leak in ima_init_crypto()
Jianglei Nie
1
-0
/
+1
2022-07-21
ima: force signature verification when CONFIG_KEXEC_SIG is configured
Coiby Xu
1
-0
/
+2
2022-07-21
ima: Fix a potential integer overflow in ima_appraise_measurement
Huaxin Lu
1
-1
/
+2
2022-07-21
Revert "evm: Fix memleak in init_desc"
Xiu Jianfeng
1
-5
/
+2
2022-06-09
ima: remove the IMA_TEMPLATE Kconfig option
GUO Zihua
1
-8
/
+6
2022-06-09
efi: Do not import certificates from UEFI Secure Boot for T2 Macs
Aditya Garg
2
-0
/
+41
2022-04-08
EVM: fix the evm= __setup handler return value
Randy Dunlap
1
-1
/
+1
2022-02-16
ima: Do not print policy rule with inactive LSM labels
Stefan Berger
1
-0
/
+8
2022-02-16
ima: Allow template selection with ima_template[_fmt]= after ima_hash=
Roberto Sassu
1
-3
/
+7
2022-02-16
ima: Remove ima_policy file before directory
Stefan Berger
1
-1
/
+1
2022-02-16
ima: fix reference leak in asymmetric_verify()
Eric Biggers
1
-6
/
+9
2022-02-16
integrity: check the return value of audit_log_start()
Xiaoke Wang
1
-0
/
+2
2021-11-18
ima: fix deadlock when traversing "ima_default_rules".
liqiong
1
-9
/
+18
2021-11-18
evm: mark evm_fixmode as __ro_after_init
Austin Kim
1
-1
/
+1
2021-09-02
Merge tag 'integrity-v5.15' of git://git.kernel.org/pub/scm/linux/kernel/git/...
Linus Torvalds
10
-65
/
+316
2021-09-01
Merge tag 'for-5.15/dm-changes' of git://git.kernel.org/pub/scm/linux/kernel/...
Linus Torvalds
1
-0
/
+1
2021-08-27
efi: Don't use knowledge about efi_guid_t internals
Andy Shevchenko
1
-1
/
+1
2021-08-24
IMA: reject unknown hash algorithms in ima_get_hash_algo
THOBY Simon
1
-1
/
+2
2021-08-17
IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
THOBY Simon
1
-0
/
+6
2021-08-17
IMA: introduce a new policy option func=SETXATTR_CHECK
THOBY Simon
4
-17
/
+96
2021-08-17
IMA: add a policy option to restrict xattr hash algorithms on appraisal
THOBY Simon
1
-4
/
+70
2021-08-17
IMA: add support to restrict the hash algorithms used for file appraisal
THOBY Simon
5
-12
/
+41
2021-08-17
IMA: block writes of the security.ima xattr with unsupported algorithms
THOBY Simon
2
-4
/
+47
2021-08-17
IMA: remove the dependency on CRYPTO_MD5
THOBY Simon
1
-1
/
+0
2021-08-10
dm ima: measure data on table load
Tushar Sugandhi
1
-0
/
+1
2021-07-23
ima: Add digest and digest_len params to the functions to measure a buffer
Roberto Sassu
6
-15
/
+32
2021-07-23
ima: Return int in the functions to measure a buffer
Roberto Sassu
2
-22
/
+28
2021-07-23
ima: Introduce ima_get_current_hash_algo()
Roberto Sassu
1
-1
/
+6
2021-07-23
IMA: remove -Wmissing-prototypes warning
Austin Kim
1
-1
/
+1
2021-06-21
evm: Check xattr size discrepancy between kernel and user
Roberto Sassu
1
-1
/
+7
2021-06-20
evm: output EVM digest calculation info
Mimi Zohar
2
-0
/
+47
2021-06-11
IMA: support for duplicate measurement records
Tushar Sugandhi
2
-2
/
+10
2021-06-11
ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
Lakshmi Ramasubramanian
1
-0
/
+1
2021-06-10
ima: differentiate between EVM failures in the audit log
Mimi Zohar
1
-1
/
+2
2021-06-09
ima: Fix fall-through warning for Clang
Gustavo A. R. Silva
1
-0
/
+1
2021-06-08
ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()
Roberto Sassu
1
-1
/
+1
2021-06-08
ima: Include header defining ima_post_key_create_or_update()
Roberto Sassu
1
-0
/
+1
2021-06-08
ima/evm: Fix type mismatch
Roberto Sassu
4
-11
/
+12
2021-06-08
ima: Set correct casting types
Roberto Sassu
2
-9
/
+10
2021-06-03
evm: Don't return an error in evm_write_xattrs() if audit is not enabled
Roberto Sassu
1
-1
/
+1
2021-06-03
ima: Define new template evm-sig
Roberto Sassu
1
-1
/
+4
2021-06-03
ima: Define new template fields xattrnames, xattrlengths and xattrvalues
Roberto Sassu
4
-0
/
+148
2021-06-01
evm: Verify portable signatures against all protected xattrs
Roberto Sassu
4
-12
/
+68
2021-06-01
ima: Define new template field imode
Roberto Sassu
3
-0
/
+26
2021-06-01
ima: Define new template fields iuid and igid
Roberto Sassu
3
-0
/
+53
2021-06-01
ima: Add ima_show_template_uint() template library function
Roberto Sassu
2
-1
/
+39
2021-06-01
ima: Don't remove security.ima if file must not be appraised
Roberto Sassu
1
-2
/
+0
[next]