summaryrefslogtreecommitdiff
path: root/security/integrity/ima/ima_appraise.c
AgeCommit message (Expand)AuthorFilesLines
2021-11-23lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()Paul Moore1-1/+1
2021-08-24IMA: reject unknown hash algorithms in ima_get_hash_algoTHOBY Simon1-1/+2
2021-08-17IMA: introduce a new policy option func=SETXATTR_CHECKTHOBY Simon1-5/+24
2021-08-17IMA: add support to restrict the hash algorithms used for file appraisalTHOBY Simon1-2/+3
2021-08-17IMA: block writes of the security.ima xattr with unsupported algorithmsTHOBY Simon1-3/+46
2021-07-23ima: Add digest and digest_len params to the functions to measure a bufferRoberto Sassu1-1/+1
2021-06-10ima: differentiate between EVM failures in the audit logMimi Zohar1-1/+2
2021-06-01ima: Don't remove security.ima if file must not be appraisedRoberto Sassu1-2/+0
2021-06-01ima: Allow imasig requirement to be satisfied by EVM portable signaturesRoberto Sassu1-7/+17
2021-05-21evm: Allow xattr/attr operations for portable signaturesRoberto Sassu1-0/+2
2021-05-21evm: Introduce evm_revalidate_status()Roberto Sassu1-5/+10
2021-03-22lsm: separate security_task_getsecid() into subjective and objective variantsPaul Moore1-1/+1
2021-02-24Merge tag 'idmapped-mounts-v5.12' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds1-10/+13
2021-01-24ima: handle idmapped mountsChristian Brauner1-6/+9
2021-01-24xattr: handle idmapped mountsTycho Andersen1-4/+4
2021-01-15IMA: add support to measure buffer data hashTushar Sugandhi1-1/+1
2020-11-02ima: defer arch_ima_get_secureboot() call to IMA init timeArd Biesheuvel1-6/+11
2020-10-16Merge tag 'integrity-v5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-8/+19
2020-09-10ima: limit secure boot feedback scope for appraiseBruno Meneguele1-9/+16
2020-09-09integrity: invalid kernel parameters feedbackBruno Meneguele1-0/+2
2020-09-09ima: add check for enforced appraise optionBruno Meneguele1-0/+2
2020-08-24treewide: Use fallthrough pseudo-keywordGustavo A. R. Silva1-2/+2
2020-07-21ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtimeBruno Meneguele1-0/+6
2020-07-20ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks1-1/+1
2019-12-12IMA: Add support to limit measuring keysLakshmi Ramasubramanian1-2/+2
2019-11-12ima: Check against blacklisted hashes for files with modsigNayna Jain1-0/+33
2019-08-06ima: Collect modsigThiago Jung Bauermann1-1/+1
2019-08-06ima: Implement support for module-style appended signaturesThiago Jung Bauermann1-4/+47
2019-08-06ima: Factor xattr_verify() out of ima_appraise_measurement()Thiago Jung Bauermann1-60/+81
2019-07-09Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-4/+5
2019-07-01integrity: Introduce struct evm_xattrThiago Jung Bauermann1-3/+4
2019-06-20IMA: support for per policy rule template formatsMatthew Garrett1-1/+1
2019-06-05treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner1-4/+1
2019-02-22security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva1-0/+1
2018-12-17Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...James Morris1-2/+12
2018-12-13ima: Support platform keyring for kernel appraisalNayna Jain1-2/+12
2018-12-13security: audit and remove any unnecessary uses of module.hPaul Gortmaker1-1/+1
2018-07-12IMA: don't propagate opened through the entire thingAl Viro1-2/+2
2018-03-25ima: Improvements in ima_appraise_measurement()Thiago Jung Bauermann1-13/+22
2018-03-23ima: fail signature verification based on policyMimi Zohar1-5/+6
2018-03-23ima: fail file signature verification on non-init mounted filesystemsMimi Zohar1-1/+14
2018-03-23IMA: Support using new creds in appraisal policyMatthew Garrett1-2/+12
2017-12-18ima: support new "hash" and "dont_hash" policy actionsMimi Zohar1-7/+9
2017-12-12ima: re-introduce own integrity cache lockDmitry Kasatkin1-13/+14
2017-12-12EVM: Add support for portable signature formatMatthew Garrett1-1/+3
2017-12-11ima: relax requiring a file signature for new files with zero lengthMimi Zohar1-1/+2
2017-11-20ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu1-0/+3
2017-11-08ima: Remove redundant conditional operatorThiago Jung Bauermann1-2/+2
2017-06-21ima: Log the same audit cause whenever a file has no signatureThiago Jung Bauermann1-1/+2
2017-06-21integrity: Small code improvementsThiago Jung Bauermann1-0/+1