summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima.h
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-091-4/+17
|\
| * IMA: Define a new template field bufPrakhar Srivastava2019-06-301-0/+2
| * IMA: Define a new hook to measure the kexec boot command line argumentsPrakhar Srivastava2019-06-241-0/+1
| * IMA: support for per policy rule template formatsMatthew Garrett2019-06-201-4/+12
| * ima: use the lsm policy update notifierJanne Karhunen2019-06-141-0/+2
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-5/+1Star
|/
* Merge branch 'next-tpm' of git://git.kernel.org/pub/scm/linux/kernel/git/jmor...Linus Torvalds2019-03-111-0/+1
|\
| * tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()Roberto Sassu2019-02-131-0/+1
* | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-02-011-2/+1Star
|/
* security/integrity: constify some read-only dataEric Biggers2018-10-101-1/+1
* Merge branch 'next-tpm' of git://git.kernel.org/pub/scm/linux/kernel/git/jmor...Linus Torvalds2018-08-161-1/+1
|\
| * ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL insteadStefan Berger2018-07-281-1/+0Star
| * ima: Use tpm_default_chip() and call TPM functions with a tpm_chipStefan Berger2018-07-281-0/+1
* | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-08-151-0/+1
|\|
| * ima: based on policy require signed kexec kernel imagesMimi Zohar2018-07-161-0/+1
* | IMA: don't propagate opened through the entire thingAl Viro2018-07-121-2/+2
|/
* ima: Remove unused variable ima_initializedPetr Vorel2018-05-171-1/+0Star
* IMA: Support using new creds in appraisal policyMatthew Garrett2018-03-231-4/+5
* ima: Simplify policy_func_show.Thiago Jung Bauermann2017-06-211-10/+15
* integrity: Small code improvementsThiago Jung Bauermann2017-06-211-1/+1
* ima: fix up #endif commentsTycho Andersen2017-06-211-2/+2
* ima: fix ima_d_path() possible race with renameMimi Zohar2017-01-271-1/+1
* ima: define a canonical binary_runtime_measurements list formatMimi Zohar2016-12-201-0/+6
* ima: store the builtin/custom template definitions in a listMimi Zohar2016-12-201-0/+2
* ima: on soft reboot, save the measurement listMimi Zohar2016-12-201-0/+1
* ima: maintain memory size needed for serializing the measurement listMimi Zohar2016-12-201-0/+1
* ima: on soft reboot, restore the measurement listMimi Zohar2016-12-201-0/+21
* ima: include pcr for each measurement log entryEric Richter2016-06-301-2/+4
* ima: extend ima_get_action() to return the policy pcrEric Richter2016-06-301-2/+3
* constify ima_d_path()Al Viro2016-03-281-1/+1
* ima: measure and appraise the IMA policy itselfMimi Zohar2016-02-211-0/+2
* ima: support for kexec image and initramfsMimi Zohar2016-02-211-0/+2
* ima: remove firmware and module specific cached status infoMimi Zohar2016-02-211-1/+2
* ima: define a new hook to measure and appraise a file already in memoryMimi Zohar2016-02-211-1/+3
* ima: provide buffer hash calculation functionDmitry Kasatkin2016-02-181-0/+2
* ima: use "ima_hooks" enum as function argumentMimi Zohar2016-02-181-8/+17
* ima: separate 'security.ima' reading functionality from collectDmitry Kasatkin2016-02-181-8/+7Star
* IMA: policy can be updated zero timesSasha Levin2015-12-251-0/+1
* IMA: allow reading back the current IMA policyPetko Manolov2015-12-151-2/+13
* integrity: define '.evm' as a builtin 'trusted' keyringDmitry Kasatkin2015-11-231-12/+0Star
* ima: fix ima_show_template_data_ascii()Mimi Zohar2015-06-161-1/+1
* ima: pass iint to ima_add_violation()Roberto Sassu2015-05-211-0/+2
* ima: wrap event related data to the new ima_event_data structureRoberto Sassu2015-05-211-10/+15
* ima: added ima_policy_flag variableRoberto Sassu2014-09-171-0/+4
* ima: provide 'ima_appraise=log' kernel optionDmitry Kasatkin2014-09-171-2/+3
* ima: add missing '__init' keywordsDmitry Kasatkin2014-09-091-2/+0Star
* integrity: remove declaration of non-existing functionsDmitry Kasatkin2014-09-091-9/+0Star
* ima: pass 'opened' flag to identify newly created filesDmitry Kasatkin2014-09-091-2/+2
* ima: add support for measuring and appraising firmwareMimi Zohar2014-07-251-1/+2
* ima: define '.ima' as a builtin 'trusted' keyringMimi Zohar2014-07-171-0/+12