summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima (follow)
Commit message (Expand)AuthorAgeFilesLines
* ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar2013-11-012-0/+19
* ima: extend the measurement list to include the file signatureMimi Zohar2013-11-018-12/+73
* ima: provide hash algo info in the xattrDmitry Kasatkin2013-10-271-14/+47
* ima: enable support for larger default filedata hash algorithmsMimi Zohar2013-10-272-2/+59
* ima: define kernel parameter 'ima_template=' to change configured defaultRoberto Sassu2013-10-271-0/+31
* ima: add Kconfig default measurement list templateMimi Zohar2013-10-272-2/+27
* ima: defer determining the appraisal hash algorithm for 'ima' templateRoberto Sassu2013-10-271-1/+5
* ima: add audit log support for larger hashesMimi Zohar2013-10-271-1/+4
* ima: switch to new template management mechanismRoberto Sassu2013-10-255-97/+107
* ima: define new template ima-ng and template fields d-ng and n-ngRoberto Sassu2013-10-253-17/+150
* ima: define template fields library and new helpersRoberto Sassu2013-10-256-8/+242
* ima: new templates management mechanismRoberto Sassu2013-10-254-1/+146
* ima: define new function ima_alloc_init_template() to APIRoberto Sassu2013-10-253-39/+76
* ima: pass the filename argument up to ima_add_template_entry()Roberto Sassu2013-10-254-10/+13
* ima: pass the file descriptor to ima_add_violation()Roberto Sassu2013-10-253-5/+5
* ima: ima_calc_boot_agregate must use SHA1Dmitry Kasatkin2013-10-253-5/+31
* ima: support arbitrary hash algorithms in ima_calc_buffer_hashDmitry Kasatkin2013-10-252-6/+25
* ima: provide dedicated hash algo allocation functionDmitry Kasatkin2013-10-251-14/+29
* ima: differentiate between template hash and file data hash sizesMimi Zohar2013-10-256-12/+12
* ima: use dynamically allocated hash storageDmitry Kasatkin2013-10-252-28/+45
* ima: pass full xattr with the signatureDmitry Kasatkin2013-10-251-1/+1
* ima: read and use signature hash algorithmDmitry Kasatkin2013-10-254-14/+83
* ima: provide support for arbitrary hash algorithmsDmitry Kasatkin2013-10-256-29/+86
* Revert "ima: policy for RAMFS"Mimi Zohar2013-10-251-1/+0
* ima: fix script messagesDmitry Kasatkin2013-10-253-10/+9
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2013-07-034-91/+0
|\
| * integrity: move integrity_audit_msg()Mimi Zohar2013-06-204-91/+0
* | Replace a bunch of file->dentry->d_inode refs with file_inode()David Howells2013-06-291-1/+1
|/
* ima: eliminate passing d_name.name to process_measurement()Mimi Zohar2013-04-181-9/+5
* hlist: drop the node parameter from iteratorsSasha Levin2013-02-281-2/+1
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-02-273-6/+6
|\
| * new helper: file_inode(file)Al Viro2013-02-233-6/+6
* | block: fix part_pack_uuid() build errorMimi Zohar2013-02-251-5/+6
* | ima: "remove enforce checking duplication" merge fixMimi Zohar2013-02-251-1/+2
* | Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2013-02-217-159/+341
|\ \ | |/ |/|
| * ima: rename hash calculation functionsDmitry Kasatkin2013-02-063-9/+9
| * ima: use new crypto_shash API instead of old crypto_hashDmitry Kasatkin2013-02-063-38/+41
| * ima: add policy support for file system uuidDmitry Kasatkin2013-02-061-1/+21
| * ima: differentiate appraise status only for hook specific rulesMimi Zohar2013-01-222-6/+12
| * ima: per hook cache integrity appraisal statusMimi Zohar2013-01-224-19/+106
| * ima: added policy support for 'security.ima' typeDmitry Kasatkin2013-01-223-1/+23
| * ima: forbid write access to files with digital signaturesDmitry Kasatkin2013-01-161-2/+5
| * ima: move full pathname resolution to separate functionDmitry Kasatkin2013-01-163-31/+38
| * ima: rename FILE_MMAP to MMAP_CHECKMimi Zohar2013-01-164-7/+8
| * ima: remove security.ima hexdumpDmitry Kasatkin2013-01-161-5/+0
| * ima: remove enforce checking duplicationDmitry Kasatkin2013-01-161-32/+20
| * ima: set appraise status in fix mode only when xattr is fixedDmitry Kasatkin2013-01-161-5/+6
| * ima: re-initialize IMA policy LSM infoMimi Zohar2013-01-161-10/+58
* | ima: fallback to MODULE_SIG_ENFORCE for existing kernel module syscallMimi Zohar2012-12-243-5/+11
|/
* ima: support new kernel module syscallMimi Zohar2012-12-144-3/+27