summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_policy.c
Commit message (Expand)AuthorAgeFilesLines
* ima: require signed IMA policyMimi Zohar2016-02-211-0/+7
* ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-211-1/+11
* ima: support for kexec image and initramfsMimi Zohar2016-02-211-1/+16
* ima: remove firmware and module specific cached status infoMimi Zohar2016-02-211-5/+4
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-201-0/+1
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-181-3/+3
* ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar2016-02-181-27/+36
* IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King2016-02-081-1/+1
* IMA: policy can be updated zero timesSasha Levin2015-12-241-0/+8
* ima: update appraise flags after policy update completesMimi Zohar2015-12-151-2/+5
* IMA: allow reading back the current IMA policyPetko Manolov2015-12-151-2/+205
* IMA: policy can now be updated multiple timesPetko Manolov2015-12-151-28/+51
* ima: update builtin policiesMimi Zohar2015-06-161-9/+56
* ima: extend "mask" policy matching supportMimi Zohar2015-06-161-5/+15
* ima: add support for new "euid" policy conditionMimi Zohar2015-06-161-4/+23
* ima: do not measure or appraise the NSFS filesystemMimi Zohar2015-05-211-0/+2
* ima: skip measurement of cgroupfs files and update documentationRoberto Sassu2015-05-211-0/+2
* ima: cleanup ima_init_policy() a littleDan Carpenter2015-05-131-10/+6
* ima: require signature based appraisalDmitry Kasatkin2014-11-171-0/+6
* ima: use atomic bit operations to protect policy update interfaceDmitry Kasatkin2014-10-111-21/+2
* ima: ignore empty and with whitespaces policy linesDmitry Kasatkin2014-10-111-1/+2
* ima: no need to allocate entry for commentDmitry Kasatkin2014-10-111-8/+6
* ima: added ima_policy_flag variableRoberto Sassu2014-09-171-0/+23
* ima: add support for measuring and appraising firmwareMimi Zohar2014-07-251-0/+7
* audit: fix dangling keywords in integrity ima message outputRichard Guy Briggs2014-07-171-3/+3
* ima: audit log files opened with O_DIRECT flagMimi Zohar2014-06-031-1/+5
* integrity: fix checkpatch errorsDmitry Kasatkin2014-03-071-33/+32
* ima: fix erroneous removal of security.ima xattrDmitry Kasatkin2014-03-071-2/+4
* ima: use static const char array definitionsMimi Zohar2014-03-071-2/+2
* security: replace strict_strto*() with kstrto*()Jingoo Han2014-02-061-3/+3
* Revert "ima: policy for RAMFS"Mimi Zohar2013-10-251-1/+0
* block: fix part_pack_uuid() build errorMimi Zohar2013-02-261-5/+6
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2013-02-211-14/+124
|\
| * ima: add policy support for file system uuidDmitry Kasatkin2013-02-061-1/+21
| * ima: differentiate appraise status only for hook specific rulesMimi Zohar2013-01-221-3/+6
| * ima: per hook cache integrity appraisal statusMimi Zohar2013-01-221-0/+22
| * ima: added policy support for 'security.ima' typeDmitry Kasatkin2013-01-221-1/+17
| * ima: rename FILE_MMAP to MMAP_CHECKMimi Zohar2013-01-161-3/+4
| * ima: re-initialize IMA policy LSM infoMimi Zohar2013-01-161-10/+58
* | ima: fallback to MODULE_SIG_ENFORCE for existing kernel module syscallMimi Zohar2012-12-241-1/+2
|/
* ima: support new kernel module syscallMimi Zohar2012-12-141-0/+3
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2012-10-021-47/+148
|\
| * ima: audit log hashesPeter Moody2012-09-131-0/+11
| * ima: generic IMA action flag handlingDmitry Kasatkin2012-09-131-10/+11
| * ima: add appraise action keywords and default rulesMimi Zohar2012-09-071-39/+112
| * ima: integrity appraisal extensionMimi Zohar2012-09-071-8/+24
* | userns: Add user namespace support to IMAEric W. Biederman2012-09-211-7/+7
|/
* ima: add policy for pseudo fsDmitry Kasatkin2012-07-051-0/+2
* IMA: fix audit res field to indicate 1 for success and 0 for failureEric Paris2012-02-161-1/+1
* Merge branch 'next-queue' into nextJames Morris2012-02-091-0/+1
|\
OpenPOWER on IntegriCloud