summaryrefslogtreecommitdiff
path: root/include/linux/ima.h
AgeCommit message (Expand)AuthorFilesLines
2020-12-16Merge tag 'integrity-v5.11' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-0/+6
2020-11-26ima: Implement ima_inode_hashKP Singh1-0/+6
2020-11-02ima: defer arch_ima_get_secureboot() call to IMA init timeArd Biesheuvel1-0/+6
2020-10-05LSM: Add "contents" flag to kernel_read_file hookKees Cook1-2/+4
2020-10-05LSM: Introduce kernel_post_load_data() hookKees Cook1-2/+11
2020-10-05fs/kernel_read_file: Split into separate include fileScott Branden1-0/+1
2020-07-20ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks1-2/+2
2020-05-22ima: verify mprotect change is consistent with mmap policyMimi Zohar1-0/+7
2020-03-12ima: add a new CONFIG for loading arch-specific policiesNayna Jain1-2/+1
2020-01-22ima: add the ability to query the cached hash of a given fileFlorent Revest1-0/+6
2020-01-09IMA: fix measuring asymmetric keys KconfigLakshmi Ramasubramanian1-2/+2
2019-12-12KEYS: Call the IMA hook to measure keysLakshmi Ramasubramanian1-0/+14
2019-11-12powerpc/ima: Add support to initialize ima policy rulesNayna Jain1-1/+2
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-0/+9
2019-08-20kexec: Allow kexec_file() with appropriate IMA policy when locked downMatthew Garrett1-0/+9
2019-07-09Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-0/+2
2019-06-24IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava1-0/+2
2019-06-05treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner1-4/+1
2019-04-29s390/kexec_file: Disable kexec_load when IPLed securePhilipp Rudo1-1/+1
2019-02-05ima: define ima_post_create_tmpfile() hook and add missing callMimi Zohar1-0/+5
2018-12-11x86/ima: retry detecting secure boot modeMimi Zohar1-1/+1
2018-12-11x86/ima: define arch_get_ima_policy() for x86Eric Richter1-1/+2
2018-12-11ima: add support for arch specific policiesNayna Jain1-0/+5
2018-11-13x86/ima: define arch_ima_get_securebootNayna Jain1-0/+9
2018-08-15Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-0/+7
2018-07-16ima: based on policy require signed kexec kernel imagesMimi Zohar1-0/+7
2018-07-12IMA: don't propagate opened through the entire thingAl Viro1-2/+2
2017-06-21ima: define is_ima_appraise_enabled()Mimi Zohar1-0/+6
2016-12-20ima: on soft reboot, save the measurement listMimi Zohar1-0/+12
2016-05-01ima: add support for creating files using the mknodat syscallMimi Zohar1-0/+6
2016-02-21module: replace copy_module_from_fd with kernel versionMimi Zohar1-6/+0
2016-02-21security: define kernel_read_file hookMimi Zohar1-0/+6
2016-02-21firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar1-6/+0
2016-02-21ima: define a new hook to measure and appraise a file already in memoryMimi Zohar1-0/+8
2014-09-09ima: pass 'opened' flag to identify newly created filesDmitry Kasatkin1-2/+2
2014-07-25ima: add support for measuring and appraising firmwareMimi Zohar1-0/+6
2013-03-27Remove spurious _H suffixes from ifdef commentsPaul Bolle1-2/+2
2012-12-14ima: support new kernel module syscallMimi Zohar1-0/+6
2012-09-07ima: add ima_inode_setxattr/removexattr function and callsMimi Zohar1-0/+17
2012-09-07ima: add inode_post_setattr callMimi Zohar1-0/+10
2011-07-18integrity: move ima inode integrity data managementMimi Zohar1-13/+0
2011-02-10IMA: maintain i_readcount in the VFS layerMimi Zohar1-6/+0
2010-02-07ima: rename ima_path_check to ima_file_checkMimi Zohar1-2/+2
2010-02-07fix ima breakageMimi Zohar1-2/+2
2009-12-16Untangling ima mess, part 3: kill dead code in imaAl Viro1-10/+2
2009-06-29integrity: add ima_counts_put (updated)Mimi Zohar1-0/+6
2009-05-22integrity: path_check updateMimi Zohar1-4/+7
2009-02-11integrity: shmem zero fixMimi Zohar1-2/+3
2009-02-06Integrity: IMA file free imbalanceMimi Zohar1-0/+6
2009-02-06integrity: IMA as an integrity service providerMimi Zohar1-0/+10