summaryrefslogtreecommitdiff
path: root/security/integrity/ima/ima_main.c
AgeCommit message (Expand)Author
2020-01-22ima: add the ability to query the cached hash of a given fileFlorent Revest
2019-12-12IMA: Add support to limit measuring keysLakshmi Ramasubramanian
2019-12-12IMA: Check IMA policy flagLakshmi Ramasubramanian
2019-11-12ima: Check against blacklisted hashes for files with modsigNayna Jain
2019-11-12ima: Make process_buffer_measurement() genericNayna Jain
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds
2019-08-19kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett
2019-08-19kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCEJiri Bohac
2019-08-05ima: Store the measurement again when appraising a modsigThiago Jung Bauermann
2019-08-05ima: Define ima-modsig templateThiago Jung Bauermann
2019-08-05ima: Collect modsigThiago Jung Bauermann
2019-08-05ima: Implement support for module-style appended signaturesThiago Jung Bauermann
2019-07-08Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds
2019-06-30IMA: Define a new template field bufPrakhar Srivastava
2019-06-24IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava
2019-06-19IMA: support for per policy rule template formatsMatthew Garrett
2019-06-14ima: use the lsm policy update notifierJanne Karhunen
2019-06-05treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner
2019-06-04ima: prevent a file already mmap'ed write to be mmap'ed executeMimi Zohar
2019-02-04ima: define ima_post_create_tmpfile() hook and add missing callMimi Zohar
2019-01-02Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds
2018-12-20security: integrity: partial revert of make ima_main explicitly non-modularPaul Gortmaker
2018-12-17Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...James Morris
2018-12-12ima: Use inode_is_open_for_writeNikolay Borisov
2018-12-12security: integrity: make ima_main explicitly non-modularPaul Gortmaker
2018-12-11ima: prevent kexec_load syscall based on runtime secureboot flagNayna Jain
2018-10-10security/integrity: constify some read-only dataEric Biggers
2018-08-15Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds
2018-07-16ima: based on policy warn about loading firmware (pre-allocated buffer)Mimi Zohar
2018-07-16module: replace the existing LSM hook in init_moduleMimi Zohar
2018-07-16ima: based on policy require signed firmware (sysfs fallback)Mimi Zohar
2018-07-16ima: based on policy require signed kexec kernel imagesMimi Zohar
2018-07-12IMA: don't propagate opened through the entire thingAl Viro
2018-05-31ima: use match_string() helperYisheng Xie
2018-05-22ima: based on policy verify firmware signatures (pre-allocated buffer)Mimi Zohar
2018-05-17ima: Remove unused variable ima_initializedPetr Vorel
2018-03-25ima: Fallback to the builtin hash algorithmPetr Vorel
2018-03-23ima: fail signature verification based on policyMimi Zohar
2018-03-23ima: re-evaluate files on privileged mounted filesystemsMimi Zohar
2018-03-23IMA: Support using new creds in appraisal policyMatthew Garrett
2018-02-01iversion: Rename make inode_cmp_iversion{+raw} to inode_eq_iversion{+raw}Goffredo Baroncelli
2018-01-31Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds
2018-01-29IMA: switch IMA over to new i_version APIJeff Layton
2017-12-18ima: Use i_version only when filesystem supports itSascha Hauer
2017-12-18ima: log message to module appraisal errorBruno E. O. Meneguele
2017-12-18ima: pass filename to ima_rdwr_violation_check()Roberto Sassu
2017-12-18ima: support new "hash" and "dont_hash" policy actionsMimi Zohar
2017-12-13ima: Use i_version only when filesystem supports itSascha Hauer
2017-12-11ima: re-introduce own integrity cache lockDmitry Kasatkin
2017-11-08ima: check signature enforcement against cmdline param instead of CONFIGBruno E. O. Meneguele