summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_main.c
Commit message (Expand)AuthorAgeFilesLines
* ima: define ima_post_create_tmpfile() hook and add missing callMimi Zohar2019-02-041-2/+33
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-01-021-7/+14
|\
| * Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...James Morris2018-12-171-7/+14
| |\
| | * ima: Use inode_is_open_for_writeNikolay Borisov2018-12-121-1/+1
| | * ima: prevent kexec_load syscall based on runtime secureboot flagNayna Jain2018-12-111-6/+13
* | | security: integrity: partial revert of make ima_main explicitly non-modularPaul Gortmaker2018-12-201-1/+1
|/ /
* / security: integrity: make ima_main explicitly non-modularPaul Gortmaker2018-12-121-4/+3
|/
* security/integrity: constify some read-only dataEric Biggers2018-10-101-1/+1
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-151-14/+54
|\
| * ima: based on policy warn about loading firmware (pre-allocated buffer)Mimi Zohar2018-07-161-0/+8
| * module: replace the existing LSM hook in init_moduleMimi Zohar2018-07-161-13/+10
| * ima: based on policy require signed firmware (sysfs fallback)Mimi Zohar2018-07-161-1/+9
| * ima: based on policy require signed kexec kernel imagesMimi Zohar2018-07-161-0/+27
* | IMA: don't propagate opened through the entire thingAl Viro2018-07-121-8/+8
|/
* ima: use match_string() helperYisheng Xie2018-05-311-7/+4
* ima: based on policy verify firmware signatures (pre-allocated buffer)Mimi Zohar2018-05-221-0/+1
* ima: Remove unused variable ima_initializedPetr Vorel2018-05-171-5/+2
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-03-251-0/+13
* ima: fail signature verification based on policyMimi Zohar2018-03-231-1/+2
* ima: re-evaluate files on privileged mounted filesystemsMimi Zohar2018-03-231-2/+11
* IMA: Support using new creds in appraisal policyMatthew Garrett2018-03-231-10/+32
* iversion: Rename make inode_cmp_iversion{+raw} to inode_eq_iversion{+raw}Goffredo Baroncelli2018-02-011-1/+1
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2018-01-311-26/+66
|\
| * ima: Use i_version only when filesystem supports itSascha Hauer2017-12-181-1/+2
| * ima: log message to module appraisal errorBruno E. O. Meneguele2017-12-181-1/+3
| * ima: pass filename to ima_rdwr_violation_check()Roberto Sassu2017-12-181-3/+3
| * ima: support new "hash" and "dont_hash" policy actionsMimi Zohar2017-12-181-0/+12
| * ima: re-introduce own integrity cache lockDmitry Kasatkin2017-12-111-22/+48
* | IMA: switch IMA over to new i_version APIJeff Layton2018-01-291-1/+2
* | ima: Use i_version only when filesystem supports itSascha Hauer2017-12-131-1/+2
|/
* ima: check signature enforcement against cmdline param instead of CONFIGBruno E. O. Meneguele2017-11-081-3/+3
* ima: fix hash algorithm initializationBoshi Wang2017-11-081-0/+4
* integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig2017-11-081-0/+4
* ima: always measure and audit files in policyMimi Zohar2017-11-081-5/+4
* ima: allow to check MAY_APPENDLans Zhang2017-01-271-3/+3
* ima: fix ima_d_path() possible race with renameMimi Zohar2017-01-271-3/+5
* ima: store the builtin/custom template definitions in a listMimi Zohar2016-12-201-0/+1
* ima: use file_dentry()Miklos Szeredi2016-09-161-1/+1
* ima: change integrity cache to store measured pcrEric Richter2016-06-301-1/+6
* ima: include pcr for each measurement log entryEric Richter2016-06-301-1/+1
* ima: extend ima_get_action() to return the policy pcrEric Richter2016-06-301-1/+2
* ima: add support for creating files using the mknodat syscallMimi Zohar2016-05-011-1/+24
* ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-211-0/+1
* ima: support for kexec image and initramfsMimi Zohar2016-02-211-6/+9
* module: replace copy_module_from_fd with kernel versionMimi Zohar2016-02-211-22/+13
* security: define kernel_read_file hookMimi Zohar2016-02-211-0/+16
* firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar2016-02-211-11/+10
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-201-8/+37
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-181-7/+7
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-181-4/+7