summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_appraise.c
Commit message (Expand)AuthorAgeFilesLines
* ima: Check against blacklisted hashes for files with modsigNayna Jain2019-11-121-0/+33
* ima: Collect modsigThiago Jung Bauermann2019-08-051-1/+1
* ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-051-4/+47
* ima: Factor xattr_verify() out of ima_appraise_measurement()Thiago Jung Bauermann2019-08-051-60/+81
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-4/+5
|\
| * integrity: Introduce struct evm_xattrThiago Jung Bauermann2019-06-301-3/+4
| * IMA: support for per policy rule template formatsMatthew Garrett2019-06-191-1/+1
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-4/+1
|/
* security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva2019-02-221-0/+1
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...James Morris2018-12-171-2/+12
|\
| * ima: Support platform keyring for kernel appraisalNayna Jain2018-12-121-2/+12
* | security: audit and remove any unnecessary uses of module.hPaul Gortmaker2018-12-121-1/+1
|/
* IMA: don't propagate opened through the entire thingAl Viro2018-07-121-2/+2
* ima: Improvements in ima_appraise_measurement()Thiago Jung Bauermann2018-03-251-13/+22
* ima: fail signature verification based on policyMimi Zohar2018-03-231-5/+6
* ima: fail file signature verification on non-init mounted filesystemsMimi Zohar2018-03-231-1/+14
* IMA: Support using new creds in appraisal policyMatthew Garrett2018-03-231-2/+12
* ima: support new "hash" and "dont_hash" policy actionsMimi Zohar2017-12-181-7/+9
* ima: re-introduce own integrity cache lockDmitry Kasatkin2017-12-111-13/+14
* EVM: Add support for portable signature formatMatthew Garrett2017-12-111-1/+3
* ima: relax requiring a file signature for new files with zero lengthMimi Zohar2017-12-111-1/+2
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-201-0/+3
* ima: Remove redundant conditional operatorThiago Jung Bauermann2017-11-081-2/+2
* ima: Log the same audit cause whenever a file has no signatureThiago Jung Bauermann2017-06-211-1/+2
* integrity: Small code improvementsThiago Jung Bauermann2017-06-211-0/+1
* ima: define is_ima_appraise_enabled()Mimi Zohar2017-06-211-0/+10
* ima: define Kconfig IMA_APPRAISE_BOOTPARAM optionMimi Zohar2017-06-211-0/+2
* ima: accept previously set IMA_NEW_FILEDaniel Glöckner2017-03-071-2/+3
* security/integrity: Harden against malformed xattrsSeth Forshee2016-11-131-1/+4
* Revert "ima: limit file hash setting by user to fix and log modes"Mimi Zohar2016-11-131-6/+2
* Merge branch 'work.xattr' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2016-10-101-11/+10
|\
| * xattr: Add __vfs_{get,set,remove}xattr helpersAndreas Gruenbacher2016-10-071-11/+10
* | ima: use file_dentry()Miklos Szeredi2016-09-161-2/+2
|/
* ima: change integrity cache to store measured pcrEric Richter2016-06-301-0/+1
* ima: extend ima_get_action() to return the policy pcrEric Richter2016-06-301-1/+1
* ima: add support for creating files using the mknodat syscallMimi Zohar2016-05-011-0/+5
* ima: fix ima_inode_post_setattrMimi Zohar2016-05-011-1/+1
* ima: remove firmware and module specific cached status infoMimi Zohar2016-02-211-19/+16
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-201-1/+1
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-181-6/+7
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-181-11/+14
* ima: limit file hash setting by user to fix and log modesDmitry Kasatkin2015-05-211-2/+6
* VFS: security/: d_backing_inode() annotationsDavid Howells2015-04-151-5/+5
* Merge branch 'iov_iter' into for-nextAl Viro2014-12-081-0/+2
|\
| * ima: check xattr value length and type in the ima_inode_setxattr()Dmitry Kasatkin2014-10-281-0/+2
* | kill f_dentry usesAl Viro2014-11-191-2/+2
|/
* ima: added ima_policy_flag variableRoberto Sassu2014-09-171-2/+2
* ima: provide 'ima_appraise=log' kernel optionDmitry Kasatkin2014-09-171-0/+2
* ima: remove unnecessary appraisal testDmitry Kasatkin2014-09-091-2/+0
* ima: pass 'opened' flag to identify newly created filesDmitry Kasatkin2014-09-091-2/+2