summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima_appraise.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* integrity: Always reference the blacklist keyring with appraisalEric Snowberg2023-08-011-5/+7
* Merge tag 'integrity-v6.3' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2023-02-221-0/+3
|\
| * ima: Introduce MMAP_CHECK_REQPROT hookRoberto Sassu2023-01-311-0/+3
* | fs: port acl to mnt_idmapChristian Brauner2023-01-191-1/+1
* | fs: port xattr to mnt_idmapChristian Brauner2023-01-191-7/+7
* | fs: port ->permission() to pass mnt_idmapChristian Brauner2023-01-191-1/+1
|/
* Merge tag 'lsm-pr-20221212' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2022-12-131-3/+3
|\
| * lsm,fs: fix vfs_getxattr_alloc() return type and caller error pathsPaul Moore2022-11-181-3/+3
* | integrity: implement get and set acl hookChristian Brauner2022-10-201-0/+9
|/
* ima: fix blocking of security.ima xattrs of unsupported algorithmsMimi Zohar2022-08-231-4/+8
* ima: Fix a potential integer overflow in ima_appraise_measurementHuaxin Lu2022-07-071-1/+2
* ima: support fs-verity file digest based version 3 signaturesMimi Zohar2022-05-051-4/+110
* lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()Paul Moore2021-11-221-1/+1
* IMA: reject unknown hash algorithms in ima_get_hash_algoTHOBY Simon2021-08-241-1/+2
* IMA: introduce a new policy option func=SETXATTR_CHECKTHOBY Simon2021-08-161-5/+24
* IMA: add support to restrict the hash algorithms used for file appraisalTHOBY Simon2021-08-161-2/+3
* IMA: block writes of the security.ima xattr with unsupported algorithmsTHOBY Simon2021-08-161-3/+46
* ima: Add digest and digest_len params to the functions to measure a bufferRoberto Sassu2021-07-231-1/+1
* ima: differentiate between EVM failures in the audit logMimi Zohar2021-06-101-1/+2
* ima: Don't remove security.ima if file must not be appraisedRoberto Sassu2021-06-011-2/+0
* ima: Allow imasig requirement to be satisfied by EVM portable signaturesRoberto Sassu2021-06-011-7/+17
* evm: Allow xattr/attr operations for portable signaturesRoberto Sassu2021-05-211-0/+2
* evm: Introduce evm_revalidate_status()Roberto Sassu2021-05-211-5/+10
* lsm: separate security_task_getsecid() into subjective and objective variantsPaul Moore2021-03-221-1/+1
* Merge tag 'idmapped-mounts-v5.12' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2021-02-231-10/+13
|\
| * ima: handle idmapped mountsChristian Brauner2021-01-241-6/+9
| * xattr: handle idmapped mountsTycho Andersen2021-01-241-4/+4
* | IMA: add support to measure buffer data hashTushar Sugandhi2021-01-151-1/+1
|/
* ima: defer arch_ima_get_secureboot() call to IMA init timeArd Biesheuvel2020-11-021-6/+11
* Merge tag 'integrity-v5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2020-10-161-8/+19
|\
| * ima: limit secure boot feedback scope for appraiseBruno Meneguele2020-09-101-9/+16
| * integrity: invalid kernel parameters feedbackBruno Meneguele2020-09-091-0/+2
| * ima: add check for enforced appraise optionBruno Meneguele2020-09-091-0/+2
* | treewide: Use fallthrough pseudo-keywordGustavo A. R. Silva2020-08-241-2/+2
|/
* ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtimeBruno Meneguele2020-07-211-0/+6
* ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks2020-07-201-1/+1
* IMA: Add support to limit measuring keysLakshmi Ramasubramanian2019-12-121-2/+2
* ima: Check against blacklisted hashes for files with modsigNayna Jain2019-11-121-0/+33
* ima: Collect modsigThiago Jung Bauermann2019-08-061-1/+1
* ima: Implement support for module-style appended signaturesThiago Jung Bauermann2019-08-061-4/+47
* ima: Factor xattr_verify() out of ima_appraise_measurement()Thiago Jung Bauermann2019-08-061-60/+81
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-091-4/+5
|\
| * integrity: Introduce struct evm_xattrThiago Jung Bauermann2019-06-301-3/+4
| * IMA: support for per policy rule template formatsMatthew Garrett2019-06-201-1/+1
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-4/+1
|/
* security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva2019-02-221-0/+1
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...James Morris2018-12-171-2/+12
|\
| * ima: Support platform keyring for kernel appraisalNayna Jain2018-12-131-2/+12
* | security: audit and remove any unnecessary uses of module.hPaul Gortmaker2018-12-121-1/+1
|/
* IMA: don't propagate opened through the entire thingAl Viro2018-07-121-2/+2