summaryrefslogtreecommitdiffstats
path: root/include/linux/ima.h
Commit message (Expand)AuthorAgeFilesLines
* LSM: Add "contents" flag to kernel_read_file hookKees Cook2020-10-051-2/+4
* LSM: Introduce kernel_post_load_data() hookKees Cook2020-10-051-2/+11
* fs/kernel_read_file: Split into separate include fileScott Branden2020-10-051-0/+1
* ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks2020-07-201-2/+2
* ima: verify mprotect change is consistent with mmap policyMimi Zohar2020-05-221-0/+7
* ima: add a new CONFIG for loading arch-specific policiesNayna Jain2020-03-121-2/+1
* ima: add the ability to query the cached hash of a given fileFlorent Revest2020-01-221-0/+6
* IMA: fix measuring asymmetric keys KconfigLakshmi Ramasubramanian2020-01-091-2/+2
* KEYS: Call the IMA hook to measure keysLakshmi Ramasubramanian2019-12-121-0/+14
* powerpc/ima: Add support to initialize ima policy rulesNayna Jain2019-11-121-1/+2
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-281-0/+9
|\
| * kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett2019-08-191-0/+9
* | Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-0/+2
|\ \ | |/ |/|
| * IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava2019-06-241-0/+2
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-4/+1
|/
* s390/kexec_file: Disable kexec_load when IPLed securePhilipp Rudo2019-04-291-1/+1
* ima: define ima_post_create_tmpfile() hook and add missing callMimi Zohar2019-02-041-0/+5
* x86/ima: retry detecting secure boot modeMimi Zohar2018-12-111-1/+1
* x86/ima: define arch_get_ima_policy() for x86Eric Richter2018-12-111-1/+2
* ima: add support for arch specific policiesNayna Jain2018-12-111-0/+5
* x86/ima: define arch_ima_get_securebootNayna Jain2018-11-131-0/+9
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-151-0/+7
|\
| * ima: based on policy require signed kexec kernel imagesMimi Zohar2018-07-161-0/+7
* | IMA: don't propagate opened through the entire thingAl Viro2018-07-121-2/+2
|/
* ima: define is_ima_appraise_enabled()Mimi Zohar2017-06-211-0/+6
* ima: on soft reboot, save the measurement listMimi Zohar2016-12-201-0/+12
* ima: add support for creating files using the mknodat syscallMimi Zohar2016-05-011-0/+6
* module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-6/+0
* security: define kernel_read_file hookMimi Zohar2016-02-211-0/+6
* firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-6/+0
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-201-0/+8
* ima: pass 'opened' flag to identify newly created filesDmitry Kasatkin2014-09-091-2/+2
* ima: add support for measuring and appraising firmwareMimi Zohar2014-07-251-0/+6
* Remove spurious _H suffixes from ifdef commentsPaul Bolle2013-03-271-2/+2
* ima: support new kernel module syscallMimi Zohar2012-12-141-0/+6
* ima: add ima_inode_setxattr/removexattr function and callsMimi Zohar2012-09-071-0/+17
* ima: add inode_post_setattr callMimi Zohar2012-09-071-0/+10
* integrity: move ima inode integrity data managementMimi Zohar2011-07-181-13/+0
* IMA: maintain i_readcount in the VFS layerMimi Zohar2011-02-101-6/+0
* ima: rename ima_path_check to ima_file_checkMimi Zohar2010-02-071-2/+2
* fix ima breakageMimi Zohar2010-02-071-2/+2
* Untangling ima mess, part 3: kill dead code in imaAl Viro2009-12-161-10/+2
* integrity: add ima_counts_put (updated)Mimi Zohar2009-06-291-0/+6
* integrity: path_check updateMimi Zohar2009-05-221-4/+7
* integrity: shmem zero fixMimi Zohar2009-02-111-2/+3
* Integrity: IMA file free imbalanceMimi Zohar2009-02-061-0/+6
* integrity: IMA as an integrity service providerMimi Zohar2009-02-061-0/+10
* integrity: IMA hooksMimi Zohar2009-02-061-0/+44