summaryrefslogtreecommitdiff
path: root/security/integrity/ima/ima_appraise.c
AgeCommit message (Expand)AuthorFilesLines
2016-11-14security/integrity: Harden against malformed xattrsSeth Forshee1-1/+4
2016-11-14Revert "ima: limit file hash setting by user to fix and log modes"Mimi Zohar1-6/+2
2016-10-11Merge branch 'work.xattr' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds1-11/+10
2016-10-08xattr: Add __vfs_{get,set,remove}xattr helpersAndreas Gruenbacher1-11/+10
2016-09-16ima: use file_dentry()Miklos Szeredi1-2/+2
2016-06-30ima: change integrity cache to store measured pcrEric Richter1-0/+1
2016-06-30ima: extend ima_get_action() to return the policy pcrEric Richter1-1/+1
2016-05-01ima: add support for creating files using the mknodat syscallMimi Zohar1-0/+5
2016-05-01ima: fix ima_inode_post_setattrMimi Zohar1-1/+1
2016-02-21ima: remove firmware and module specific cached status infoMimi Zohar1-19/+16
2016-02-21ima: define a new hook to measure and appraise a file already in memoryMimi Zohar1-1/+1
2016-02-19ima: use "ima_hooks" enum as function argumentMimi Zohar1-6/+7
2016-02-19ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin1-11/+14
2015-05-21ima: limit file hash setting by user to fix and log modesDmitry Kasatkin1-2/+6
2015-04-15VFS: security/: d_backing_inode() annotationsDavid Howells1-5/+5
2014-12-09Merge branch 'iov_iter' into for-nextAl Viro1-0/+2
2014-11-19kill f_dentry usesAl Viro1-2/+2
2014-10-28ima: check xattr value length and type in the ima_inode_setxattr()Dmitry Kasatkin1-0/+2
2014-09-18ima: added ima_policy_flag variableRoberto Sassu1-2/+2
2014-09-18ima: provide 'ima_appraise=log' kernel optionDmitry Kasatkin1-0/+2
2014-09-09ima: remove unnecessary appraisal testDmitry Kasatkin1-2/+0
2014-09-09ima: pass 'opened' flag to identify newly created filesDmitry Kasatkin1-2/+2
2014-09-09ima: provide flag to identify new empty filesDmitry Kasatkin1-2/+5
2014-07-25ima: add support for measuring and appraising firmwareMimi Zohar1-0/+8
2014-07-17audit: fix dangling keywords in integrity ima message outputRichard Guy Briggs1-1/+1
2014-06-13ima: prevent new digsig xattr from being replacedMimi Zohar1-3/+7
2014-03-07ima: use static const char array definitionsMimi Zohar1-2/+2
2013-11-24Revert "ima: define '_ima' as a builtin 'trusted' keyring"Linus Torvalds1-11/+0
2013-11-01ima: define '_ima' as a builtin 'trusted' keyringMimi Zohar1-0/+11
2013-10-27ima: provide hash algo info in the xattrDmitry Kasatkin1-14/+47
2013-10-26ima: use dynamically allocated hash storageDmitry Kasatkin1-8/+8
2013-10-26ima: pass full xattr with the signatureDmitry Kasatkin1-1/+1
2013-10-26ima: read and use signature hash algorithmDmitry Kasatkin1-8/+37
2013-10-26ima: provide support for arbitrary hash algorithmsDmitry Kasatkin1-8/+12
2013-10-25ima: fix script messagesDmitry Kasatkin1-3/+3
2013-01-23ima: per hook cache integrity appraisal statusMimi Zohar1-9/+62
2013-01-23ima: added policy support for 'security.ima' typeDmitry Kasatkin1-0/+5
2013-01-17ima: remove security.ima hexdumpDmitry Kasatkin1-5/+0
2013-01-17ima: set appraise status in fix mode only when xattr is fixedDmitry Kasatkin1-5/+6
2012-10-05ima: fix bug in argument orderDmitry Kasatkin1-1/+1
2012-09-13ima: generic IMA action flag handlingDmitry Kasatkin1-1/+1
2012-09-07ima: digital signature verification supportDmitry Kasatkin1-19/+51
2012-09-07ima: add support for different security.ima data typesMimi Zohar1-10/+13
2012-09-07ima: add ima_inode_setxattr/removexattr function and callsMimi Zohar1-0/+57
2012-09-07ima: add appraise action keywords and default rulesMimi Zohar1-1/+4
2012-09-07ima: integrity appraisal extensionMimi Zohar1-0/+168