summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima
AgeCommit message (Expand)AuthorFilesLines
2016-04-11IMA: Use the the system trusted keyrings instead of .ima_mokDavid Howells3-27/+28
2016-04-11KEYS: Move the point of trust determination to __key_link()David Howells1-3/+3
2016-04-11KEYS: Add a facility to restrict new links into a keyringDavid Howells1-4/+4
2016-02-21ima: require signed IMA policyMimi Zohar1-0/+7
2016-02-21ima: measure and appraise the IMA policy itselfMimi Zohar4-3/+24
2016-02-21ima: load policy using pathDmitry Kasatkin1-2/+43
2016-02-21ima: support for kexec image and initramfsMimi Zohar3-7/+27
2016-02-21ima: remove firmware and module specific cached status infoMimi Zohar3-25/+22
2016-02-21module: replace copy_module_from_fd with kernel versionMimi Zohar1-22/+13
2016-02-21security: define kernel_read_file hookMimi Zohar1-0/+16
2016-02-21firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar1-11/+10
2016-02-20ima: define a new hook to measure and appraise a file already in memoryMimi Zohar5-12/+46
2016-02-18ima: calculate the hash of a buffer using aynchronous hash(ahash)Mimi Zohar1-2/+73
2016-02-18ima: provide buffer hash calculation functionDmitry Kasatkin2-0/+49
2016-02-18ima: use "ima_hooks" enum as function argumentMimi Zohar5-27/+37
2016-02-18ima: refactor ima_policy_show() to display "ima_hooks" rulesMimi Zohar1-27/+36
2016-02-18ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin8-40/+33
2016-02-08IMA: fix non-ANSI declaration of ima_check_policy()Colin Ian King1-1/+1
2016-01-22wrappers for ->i_mutex accessAl Viro1-4/+4
2016-01-03ima: ima_write_policy() limit lockingPetko Manolov1-9/+9
2015-12-24IMA: policy can be updated zero timesSasha Levin3-0/+14
2015-12-15security/integrity: make ima/ima_mok.c explicitly non-modularPaul Gortmaker1-3/+2
2015-12-15ima: update appraise flags after policy update completesMimi Zohar1-2/+5
2015-12-15IMA: prevent keys on the .ima_blacklist from being removedMimi Zohar1-0/+2
2015-12-15IMA: allow reading back the current IMA policyPetko Manolov4-8/+253
2015-12-15IMA: create machine owner and blacklist keyringsPetko Manolov3-0/+73
2015-12-15IMA: policy can now be updated multiple timesPetko Manolov3-28/+75
2015-11-23integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin3-14/+5
2015-11-06mm, page_alloc: rename __GFP_WAIT to __GFP_RECLAIMMel Gorman1-1/+1
2015-07-01Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds1-1/+1
2015-06-16ima: update builtin policiesMimi Zohar1-9/+56
2015-06-16ima: extend "mask" policy matching supportMimi Zohar1-5/+15
2015-06-16ima: add support for new "euid" policy conditionMimi Zohar1-4/+23
2015-06-16ima: fix ima_show_template_data_ascii()Mimi Zohar3-4/+5
2015-05-28kernel/params: constify struct kernel_param_ops usesLuis R. Rodriguez1-1/+1
2015-05-21ima: pass iint to ima_add_violation()Roberto Sassu5-9/+13
2015-05-21ima: wrap event related data to the new ima_event_data structureRoberto Sassu5-79/+61
2015-05-21ima: remove definition of IMA_X509_PATHDmitry Kasatkin1-7/+1
2015-05-21ima: limit file hash setting by user to fix and log modesDmitry Kasatkin1-2/+6
2015-05-21ima: do not measure or appraise the NSFS filesystemMimi Zohar1-0/+2
2015-05-21ima: skip measurement of cgroupfs files and update documentationRoberto Sassu1-0/+2
2015-05-13ima: cleanup ima_init_policy() a littleDan Carpenter1-10/+6
2015-04-15VFS: security/: d_backing_inode() annotationsDavid Howells1-5/+5
2015-02-02ima: /proc/keys is now mandatoryDavid Howells1-1/+0
2014-12-16Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/li...James Morris1-1/+1
2014-12-14Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds8-107/+164
2014-12-08Merge branch 'iov_iter' into for-nextAl Viro1-0/+2
2014-12-06ima: Fix build failure on powerpc when TCG_IBMVTPM dependencies are not metMichael Ellerman1-1/+1
2014-11-19kill f_dentry usesAl Viro3-5/+5
2014-11-17ima: require signature based appraisalDmitry Kasatkin2-0/+13