summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_main.c
Commit message (Expand)AuthorAgeFilesLines
* integrity: Remove duplicate pr_fmt definitionsTushar Sugandhi2020-02-281-2/+0
* IMA: Add log statements for failure conditionsTushar Sugandhi2020-02-281-0/+3
* ima: add the ability to query the cached hash of a given fileFlorent Revest2020-01-221-0/+49
* IMA: Add support to limit measuring keysLakshmi Ramasubramanian2019-12-121-4/+5
* IMA: Check IMA policy flagLakshmi Ramasubramanian2019-12-121-0/+3
* ima: Check against blacklisted hashes for files with modsigNayna Jain2019-11-121-4/+8
* ima: Make process_buffer_measurement() genericNayna Jain2019-11-121-18/+40
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-281-2/+2
|\
| * kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett2019-08-191-1/+1
| * kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCEJiri Bohac2019-08-191-1/+1
* | ima: Store the measurement again when appraising a modsigThiago Jung Bauermann2019-08-051-3/+12
* | ima: Define ima-modsig templateThiago Jung Bauermann2019-08-051-1/+1
* | ima: Collect modsigThiago Jung Bauermann2019-08-051-1/+1
* | ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-051-2/+9
* | Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-6/+117
|\ \ | |/ |/|
| * IMA: Define a new template field bufPrakhar Srivastava2019-06-301-1/+3
| * IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava2019-06-241-0/+72
| * IMA: support for per policy rule template formatsMatthew Garrett2019-06-191-4/+5
| * ima: use the lsm policy update notifierJanne Karhunen2019-06-141-0/+8
| * ima: prevent a file already mmap'ed write to be mmap'ed executeMimi Zohar2019-06-041-2/+30
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-5/+1
|/
* ima: define ima_post_create_tmpfile() hook and add missing callMimi Zohar2019-02-041-2/+33
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-01-021-7/+14
|\
| * Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...James Morris2018-12-171-7/+14
| |\
| | * ima: Use inode_is_open_for_writeNikolay Borisov2018-12-121-1/+1
| | * ima: prevent kexec_load syscall based on runtime secureboot flagNayna Jain2018-12-111-6/+13
* | | security: integrity: partial revert of make ima_main explicitly non-modularPaul Gortmaker2018-12-201-1/+1
|/ /
* / security: integrity: make ima_main explicitly non-modularPaul Gortmaker2018-12-121-4/+3
|/
* security/integrity: constify some read-only dataEric Biggers2018-10-101-1/+1
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-151-14/+54
|\
| * ima: based on policy warn about loading firmware (pre-allocated buffer)Mimi Zohar2018-07-161-0/+8
| * module: replace the existing LSM hook in init_moduleMimi Zohar2018-07-161-13/+10
| * ima: based on policy require signed firmware (sysfs fallback)Mimi Zohar2018-07-161-1/+9
| * ima: based on policy require signed kexec kernel imagesMimi Zohar2018-07-161-0/+27
* | IMA: don't propagate opened through the entire thingAl Viro2018-07-121-8/+8
|/
* ima: use match_string() helperYisheng Xie2018-05-311-7/+4
* ima: based on policy verify firmware signatures (pre-allocated buffer)Mimi Zohar2018-05-221-0/+1
* ima: Remove unused variable ima_initializedPetr Vorel2018-05-171-5/+2
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-03-251-0/+13
* ima: fail signature verification based on policyMimi Zohar2018-03-231-1/+2
* ima: re-evaluate files on privileged mounted filesystemsMimi Zohar2018-03-231-2/+11
* IMA: Support using new creds in appraisal policyMatthew Garrett2018-03-231-10/+32
* iversion: Rename make inode_cmp_iversion{+raw} to inode_eq_iversion{+raw}Goffredo Baroncelli2018-02-011-1/+1
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2018-01-311-26/+66
|\
| * ima: Use i_version only when filesystem supports itSascha Hauer2017-12-181-1/+2
| * ima: log message to module appraisal errorBruno E. O. Meneguele2017-12-181-1/+3
| * ima: pass filename to ima_rdwr_violation_check()Roberto Sassu2017-12-181-3/+3
| * ima: support new "hash" and "dont_hash" policy actionsMimi Zohar2017-12-181-0/+12
| * ima: re-introduce own integrity cache lockDmitry Kasatkin2017-12-111-22/+48
* | IMA: switch IMA over to new i_version APIJeff Layton2018-01-291-1/+2