summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima
Commit message (Expand)AuthorAgeFilesLines
...
| * Merge tag 'keys-next-20160505' of git://git.kernel.org/pub/scm/linux/kernel/g...James Morris2016-05-063-30/+31
| |\
| | * IMA: Use the the system trusted keyrings instead of .ima_mokDavid Howells2016-04-113-27/+28
| | * KEYS: Move the point of trust determination to __key_link()David Howells2016-04-111-3/+3
| | * KEYS: Add a facility to restrict new links into a keyringDavid Howells2016-04-111-4/+4
| * | ima: add support for creating files using the mknodat syscallMimi Zohar2016-05-012-1/+29
| * | ima: fix ima_inode_post_setattrMimi Zohar2016-05-011-1/+1
| |/
* | Merge branch 'work.const-path' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2016-05-172-2/+2
|\ \
| * | constify ima_d_path()Al Viro2016-03-282-2/+2
| |/
* | ima: fix the string representation of the LSM/IMA hook enumeration orderingMimi Zohar2016-05-041-2/+2
|/
* ima: require signed IMA policyMimi Zohar2016-02-211-0/+7
* ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-214-3/+24
* ima: load policy using pathDmitry Kasatkin2016-02-211-2/+43
* ima: support for kexec image and initramfsMimi Zohar2016-02-213-7/+27
* ima: remove firmware and module specific cached status infoMimi Zohar2016-02-213-25/+22
* module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-22/+13
* security: define kernel_read_file hookMimi Zohar2016-02-211-0/+16
* firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-11/+10
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-205-12/+46
* ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar2016-02-181-2/+73
* ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-182-0/+49
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-185-27/+37
* ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar2016-02-181-27/+36
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-188-40/+33
* IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King2016-02-081-1/+1
* wrappers for ->i_mutex accessAl Viro2016-01-221-4/+4
* ima: ima_write_policy() limit lockingPetko Manolov2016-01-031-9/+9
* IMA: policy can be updated zero timesSasha Levin2015-12-243-0/+14
* security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker2015-12-151-3/+2
* ima: update appraise flags after policy update completesMimi Zohar2015-12-151-2/+5
* IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar2015-12-151-0/+2
* IMA: allow reading back the current IMA policyPetko Manolov2015-12-154-8/+253
* IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-153-0/+73
* IMA: policy can now be updated multiple timesPetko Manolov2015-12-153-28/+75
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-233-14/+5
* mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman2015-11-061-1/+1
* Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2015-07-011-1/+1
|\
| * kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez2015-05-281-1/+1
* | ima: update builtin policiesMimi Zohar2015-06-161-9/+56
* | ima: extend "mask" policy matching supportMimi Zohar2015-06-161-5/+15
* | ima: add support for new "euid" policy conditionMimi Zohar2015-06-161-4/+23
* | ima: fix ima_show_template_data_ascii()Mimi Zohar2015-06-163-4/+5
* | ima: pass iint to ima_add_violation()Roberto Sassu2015-05-215-9/+13
* | ima: wrap event related data to the new ima_event_data structureRoberto Sassu2015-05-215-79/+61
* | ima: remove definition of IMA_X509_PATHDmitry Kasatkin2015-05-211-7/+1
* | ima: limit file hash setting by user to fix and log modesDmitry Kasatkin2015-05-211-2/+6
* | ima: do not measure or appraise the NSFS filesystemMimi Zohar2015-05-211-0/+2
* | ima: skip measurement of cgroupfs files and update documentationRoberto Sassu2015-05-211-0/+2
* | ima: cleanup ima_init_policy() a littleDan Carpenter2015-05-131-10/+6
|/
* VFS: security/: d_backing_inode() annotationsDavid Howells2015-04-151-5/+5
* ima: /proc/keys is now mandatoryDavid Howells2015-02-021-1/+0
OpenPOWER on IntegriCloud