summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima
Commit message (Expand)AuthorAgeFilesLines
* ima: require signed IMA policyMimi Zohar2016-02-211-0/+7
* ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-214-3/+24
* ima: load policy using pathDmitry Kasatkin2016-02-211-2/+43
* ima: support for kexec image and initramfsMimi Zohar2016-02-213-7/+27
* ima: remove firmware and module specific cached status infoMimi Zohar2016-02-213-25/+22
* module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-22/+13
* security: define kernel_read_file hookMimi Zohar2016-02-211-0/+16
* firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-11/+10
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-205-12/+46
* ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar2016-02-181-2/+73
* ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-182-0/+49
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-185-27/+37
* ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar2016-02-181-27/+36
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-188-40/+33
* IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King2016-02-081-1/+1
* wrappers for ->i_mutex accessAl Viro2016-01-221-4/+4
* ima: ima_write_policy() limit lockingPetko Manolov2016-01-031-9/+9
* IMA: policy can be updated zero timesSasha Levin2015-12-243-0/+14
* security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker2015-12-151-3/+2
* ima: update appraise flags after policy update completesMimi Zohar2015-12-151-2/+5
* IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar2015-12-151-0/+2
* IMA: allow reading back the current IMA policyPetko Manolov2015-12-154-8/+253
* IMA: create machine owner and blacklist keyringsPetko Manolov2015-12-153-0/+73
* IMA: policy can now be updated multiple timesPetko Manolov2015-12-153-28/+75
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-233-14/+5
* mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman2015-11-061-1/+1
* Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2015-07-011-1/+1
|\
| * kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez2015-05-281-1/+1
* | ima: update builtin policiesMimi Zohar2015-06-161-9/+56
* | ima: extend "mask" policy matching supportMimi Zohar2015-06-161-5/+15
* | ima: add support for new "euid" policy conditionMimi Zohar2015-06-161-4/+23
* | ima: fix ima_show_template_data_ascii()Mimi Zohar2015-06-163-4/+5
* | ima: pass iint to ima_add_violation()Roberto Sassu2015-05-215-9/+13
* | ima: wrap event related data to the new ima_event_data structureRoberto Sassu2015-05-215-79/+61
* | ima: remove definition of IMA_X509_PATHDmitry Kasatkin2015-05-211-7/+1
* | ima: limit file hash setting by user to fix and log modesDmitry Kasatkin2015-05-211-2/+6
* | ima: do not measure or appraise the NSFS filesystemMimi Zohar2015-05-211-0/+2
* | ima: skip measurement of cgroupfs files and update documentationRoberto Sassu2015-05-211-0/+2
* | ima: cleanup ima_init_policy() a littleDan Carpenter2015-05-131-10/+6
|/
* VFS: security/: d_backing_inode() annotationsDavid Howells2015-04-151-5/+5
* ima: /proc/keys is now mandatoryDavid Howells2015-02-021-1/+0
* Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris2014-12-161-1/+1
|\
| * ima: Fix build failure on powerpc when TCG_IBMVTPM dependencies are not metMichael Ellerman2014-12-061-1/+1
* | Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2014-12-148-107/+164
|\ \ | |/
| * ima: require signature based appraisalDmitry Kasatkin2014-11-172-0/+13
| * ima: load x509 certificate from the kernelDmitry Kasatkin2014-11-173-2/+36
| * integrity: define a new function integrity_read_file()Dmitry Kasatkin2014-11-171-32/+3
| * ima: added support for new kernel cmdline parameter ima_template_fmtRoberto Sassu2014-10-131-5/+34
| * ima: allocate field pointers array on demand in template_desc_init_fields()Roberto Sassu2014-10-131-21/+13
| * ima: don't allocate a copy of template_fmt in template_desc_init_fields()Roberto Sassu2014-10-131-13/+17
OpenPOWER on IntegriCloud