summaryrefslogtreecommitdiff
path: root/security/integrity/ima/ima_main.c
AgeCommit message (Expand)AuthorFilesLines
2018-12-13ima: Use inode_is_open_for_writeNikolay Borisov1-1/+1
2018-12-11ima: prevent kexec_load syscall based on runtime secureboot flagNayna Jain1-6/+13
2018-10-10security/integrity: constify some read-only dataEric Biggers1-1/+1
2018-08-15Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-14/+54
2018-07-16ima: based on policy warn about loading firmware (pre-allocated buffer)Mimi Zohar1-0/+8
2018-07-16module: replace the existing LSM hook in init_moduleMimi Zohar1-13/+10
2018-07-16ima: based on policy require signed firmware (sysfs fallback)Mimi Zohar1-1/+9
2018-07-16ima: based on policy require signed kexec kernel imagesMimi Zohar1-0/+27
2018-07-12IMA: don't propagate opened through the entire thingAl Viro1-8/+8
2018-05-31ima: use match_string() helperYisheng Xie1-7/+4
2018-05-22ima: based on policy verify firmware signatures (pre-allocated buffer)Mimi Zohar1-0/+1
2018-05-17ima: Remove unused variable ima_initializedPetr Vorel1-5/+2
2018-03-25ima: Fallback to the builtin hash algorithmPetr Vorel1-0/+13
2018-03-23ima: fail signature verification based on policyMimi Zohar1-1/+2
2018-03-23ima: re-evaluate files on privileged mounted filesystemsMimi Zohar1-2/+11
2018-03-23IMA: Support using new creds in appraisal policyMatthew Garrett1-10/+32
2018-02-01iversion: Rename make inode_cmp_iversion{+raw} to inode_eq_iversion{+raw}Goffredo Baroncelli1-1/+1
2018-02-01Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-26/+66
2018-01-29IMA: switch IMA over to new i_version APIJeff Layton1-1/+2
2017-12-18ima: Use i_version only when filesystem supports itSascha Hauer1-1/+2
2017-12-18ima: log message to module appraisal errorBruno E. O. Meneguele1-1/+3
2017-12-18ima: pass filename to ima_rdwr_violation_check()Roberto Sassu1-3/+3
2017-12-18ima: support new "hash" and "dont_hash" policy actionsMimi Zohar1-0/+12
2017-12-13ima: Use i_version only when filesystem supports itSascha Hauer1-1/+2
2017-12-12ima: re-introduce own integrity cache lockDmitry Kasatkin1-22/+48
2017-11-08ima: check signature enforcement against cmdline param instead of CONFIGBruno E. O. Meneguele1-3/+3
2017-11-08ima: fix hash algorithm initializationBoshi Wang1-0/+4
2017-11-08integrity: use kernel_read_file_from_path() to read x509 certsChristoph Hellwig1-0/+4
2017-11-08ima: always measure and audit files in policyMimi Zohar1-5/+4
2017-01-27ima: allow to check MAY_APPENDLans Zhang1-3/+3
2017-01-27ima: fix ima_d_path() possible race with renameMimi Zohar1-3/+5
2016-12-20ima: store the builtin/custom template definitions in a listMimi Zohar1-0/+1
2016-09-16ima: use file_dentry()Miklos Szeredi1-1/+1
2016-06-30ima: change integrity cache to store measured pcrEric Richter1-1/+6
2016-06-30ima: include pcr for each measurement log entryEric Richter1-1/+1
2016-06-30ima: extend ima_get_action() to return the policy pcrEric Richter1-1/+2
2016-05-01ima: add support for creating files using the mknodat syscallMimi Zohar1-1/+24
2016-02-21ima: measure and appraise the IMA policy itselfMimi Zohar1-0/+1
2016-02-21ima: support for kexec image and initramfsMimi Zohar1-6/+9
2016-02-21module: replace copy_module_from_fd with kernel versionMimi Zohar1-22/+13
2016-02-21security: define kernel_read_file hookMimi Zohar1-0/+16
2016-02-21firmware: replace call to fw_read_file_contents() with kernel versionMimi Zohar1-11/+10
2016-02-21ima: define a new hook to measure and appraise a file already in memoryMimi Zohar1-8/+37
2016-02-19ima: use "ima_hooks" enum as function argumentMimi Zohar1-7/+7
2016-02-19ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin1-4/+7
2016-01-23wrappers for ->i_mutex accessAl Viro1-4/+4
2015-05-21ima: pass iint to ima_add_violation()Roberto Sassu1-2/+3
2014-10-07ima: use path names cacheDmitry Kasatkin1-1/+2
2014-10-07ima: check ima_policy_flag in the ima_file_free() hookDmitry Kasatkin1-1/+1
2014-09-18ima: detect violations for mmaped filesRoberto Sassu1-4/+5