summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima.h
Commit message (Expand)AuthorAgeFilesLines
* IMA: Add KEY_CHECK func to measure keysLakshmi Ramasubramanian2019-12-121-0/+1
* ima: Check against blacklisted hashes for files with modsigNayna Jain2019-11-121-0/+8
* ima: Make process_buffer_measurement() genericNayna Jain2019-11-121-0/+3
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-281-0/+2
|\
| * kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett2019-08-191-0/+2
* | ima: Store the measurement again when appraising a modsigThiago Jung Bauermann2019-08-051-0/+1
* | ima: Define ima-modsig templateThiago Jung Bauermann2019-08-051-1/+19
* | ima: Collect modsigThiago Jung Bauermann2019-08-051-1/+7
* | ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-051-2/+20
* | ima: Add modsig appraise_type option for module-style appended signaturesThiago Jung Bauermann2019-08-051-0/+9
* | Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-4/+17
|\ \ | |/ |/|
| * IMA: Define a new template field bufPrakhar Srivastava2019-06-301-0/+2
| * IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava2019-06-241-0/+1
| * IMA: support for per policy rule template formatsMatthew Garrett2019-06-191-4/+12
| * ima: use the lsm policy update notifierJanne Karhunen2019-06-141-0/+2
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-5/+1
|/
* Merge branch 'next-tpm' of git://git.kernel.org/pub/scm/linux/kernel/git/jmor...Linus Torvalds2019-03-101-0/+1
|\
| * tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()Roberto Sassu2019-02-131-0/+1
* | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-01-311-2/+1
|/
* security/integrity: constify some read-only dataEric Biggers2018-10-101-1/+1
* Merge branch 'next-tpm' of git://git.kernel.org/pub/scm/linux/kernel/git/jmor...Linus Torvalds2018-08-151-1/+1
|\
| * ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL insteadStefan Berger2018-07-281-1/+0
| * ima: Use tpm_default_chip() and call TPM functions with a tpm_chipStefan Berger2018-07-281-0/+1
* | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-151-0/+1
|\|
| * ima: based on policy require signed kexec kernel imagesMimi Zohar2018-07-161-0/+1
* | IMA: don't propagate opened through the entire thingAl Viro2018-07-121-2/+2
|/
* ima: Remove unused variable ima_initializedPetr Vorel2018-05-171-1/+0
* IMA: Support using new creds in appraisal policyMatthew Garrett2018-03-231-4/+5
* ima: Simplify policy_func_show.Thiago Jung Bauermann2017-06-211-10/+15
* integrity: Small code improvementsThiago Jung Bauermann2017-06-211-1/+1
* ima: fix up #endif commentsTycho Andersen2017-06-211-2/+2
* ima: fix ima_d_path() possible race with renameMimi Zohar2017-01-271-1/+1
* ima: define a canonical binary_runtime_measurements list formatMimi Zohar2016-12-201-0/+6
* ima: store the builtin/custom template definitions in a listMimi Zohar2016-12-201-0/+2
* ima: on soft reboot, save the measurement listMimi Zohar2016-12-201-0/+1
* ima: maintain memory size needed for serializing the measurement listMimi Zohar2016-12-201-0/+1
* ima: on soft reboot, restore the measurement listMimi Zohar2016-12-201-0/+21
* ima: include pcr for each measurement log entryEric Richter2016-06-301-2/+4
* ima: extend ima_get_action() to return the policy pcrEric Richter2016-06-301-2/+3
* constify ima_d_path()Al Viro2016-03-281-1/+1
* ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-211-0/+2
* ima: support for kexec image and initramfsMimi Zohar2016-02-211-0/+2
* ima: remove firmware and module specific cached status infoMimi Zohar2016-02-211-1/+2
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-201-1/+3
* ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-181-0/+2
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-181-8/+17
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-181-8/+7
* IMA: policy can be updated zero timesSasha Levin2015-12-241-0/+1
* IMA: allow reading back the current IMA policyPetko Manolov2015-12-151-2/+13
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-231-12/+0