summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima
AgeCommit message (Expand)AuthorLines
2016-01-22wrappers for ->i_mutex accessAl Viro-4/+4
2016-01-03ima: ima_write_policy() limit lockingPetko Manolov-9/+9
2015-12-24IMA: policy can be updated zero timesSasha Levin-0/+14
2015-12-15security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker-3/+2
2015-12-15ima: update appraise flags after policy update completesMimi Zohar-2/+5
2015-12-15IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar-0/+2
2015-12-15IMA: allow reading back the current IMA policyPetko Manolov-8/+253
2015-12-15IMA: create machine owner and blacklist keyringsPetko Manolov-0/+73
2015-12-15IMA: policy can now be updated multiple timesPetko Manolov-28/+75
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin-14/+5
2015-11-06mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman-1/+1
2015-07-01Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds-1/+1
2015-06-16ima: update builtin policiesMimi Zohar-9/+56
2015-06-16ima: extend "mask" policy matching supportMimi Zohar-5/+15
2015-06-16ima: add support for new "euid" policy conditionMimi Zohar-4/+23
2015-06-16ima: fix ima_show_template_data_ascii()Mimi Zohar-4/+5
2015-05-28kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez-1/+1
2015-05-21ima: pass iint to ima_add_violation()Roberto Sassu-9/+13
2015-05-21ima: wrap event related data to the new ima_event_data structureRoberto Sassu-79/+61
2015-05-21ima: remove definition of IMA_X509_PATHDmitry Kasatkin-7/+1
2015-05-21ima: limit file hash setting by user to fix and log modesDmitry Kasatkin-2/+6
2015-05-21ima: do not measure or appraise the NSFS filesystemMimi Zohar-0/+2
2015-05-21ima: skip measurement of cgroupfs files and update documentationRoberto Sassu-0/+2
2015-05-13ima: cleanup ima_init_policy() a littleDan Carpenter-10/+6
2015-04-15VFS: security/: d_backing_inode() annotationsDavid Howells-5/+5
2015-02-02ima: /proc/keys is now mandatoryDavid Howells-1/+0
2014-12-16Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris-1/+1
2014-12-14Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds-107/+164
2014-12-08Merge branch 'iov_iter' into for-nextAl Viro-0/+2
2014-12-06ima: Fix build failure on powerpc when TCG_IBMVTPM dependencies are not metMichael Ellerman-1/+1
2014-11-19kill f_dentry usesAl Viro-5/+5
2014-11-17ima: require signature based appraisalDmitry Kasatkin-0/+13
2014-11-17ima: load x509 certificate from the kernelDmitry Kasatkin-2/+36
2014-11-17integrity: define a new function integrity_read_file()Dmitry Kasatkin-32/+3
2014-10-29Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/zoh...James Morris-0/+2
2014-10-28ima: check xattr value length and type in the ima_inode_setxattr()Dmitry Kasatkin-0/+2
2014-10-14security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.cBehan Webster-28/+19
2014-10-13ima: added support for new kernel cmdline parameter ima_template_fmtRoberto Sassu-5/+34
2014-10-13ima: allocate field pointers array on demand in template_desc_init_fields()Roberto Sassu-21/+13
2014-10-13ima: don't allocate a copy of template_fmt in template_desc_init_fields()Roberto Sassu-13/+17
2014-10-13ima: display template format in meas. list if template name length is zeroRoberto Sassu-5/+15
2014-10-13ima: added error messages to template-related functionsRoberto Sassu-5/+17
2014-10-11ima: use atomic bit operations to protect policy update interfaceDmitry Kasatkin-28/+18
2014-10-11ima: ignore empty and with whitespaces policy linesDmitry Kasatkin-1/+2
2014-10-11ima: no need to allocate entry for commentDmitry Kasatkin-8/+6
2014-10-11ima: report policy load statusDmitry Kasatkin-0/+2
2014-10-07ima: use path names cacheDmitry Kasatkin-3/+4
2014-10-07ima: check ima_policy_flag in the ima_file_free() hookDmitry Kasatkin-1/+1
2014-09-18ima: detect violations for mmaped filesRoberto Sassu-9/+5
2014-09-18ima: fix race condition on ima_rdwr_violation_check and process_measurementRoberto Sassu-21/+33