| 30031b0ec8ae ("ima: Move comprehensive rule validation checks out of the token parser") |
| 712183437ebe ("ima: Fail rule parsing when buffer hook functions have an invalid action") |
| 5c7bac9fb2c5 ("IMA: pre-allocate buffer to hold keyrings string") |
| 2b60c0ecedf8 ("IMA: Read keyrings= option from the IMA policy") |
| e9085e0ad38a ("IMA: Add support to limit measuring keys") |
| 88e70da170e8 ("IMA: Define an IMA hook to measure keys") |
| 5808611cccb2 ("IMA: Add KEY_CHECK func to measure keys") |
| 273df864cf74 ("ima: Check against blacklisted hashes for files with modsig") |
| e14555e3d0e9 ("ima: Make process_buffer_measurement() generic") |
| 3878d505aa71 ("ima: Define ima-modsig template") |
| 15588227e086 ("ima: Collect modsig") |
| 39b07096364a ("ima: Implement support for module-style appended signatures") |
| a5fbeb615ca4 ("ima: Factor xattr_verify() out of ima_appraise_measurement()") |
| 9044d627fd18 ("ima: Add modsig appraise_type option for module-style appended signatures") |
| 650b29dbdf2c ("integrity: Introduce struct evm_xattr") |
| 337619eb44ef ("ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition") |
| 86b4da8c0e7f ("IMA: Define a new template field buf") |
| b0935123a183 ("IMA: Define a new hook to measure the kexec boot command line arguments") |
| 19453ce0bcfb ("IMA: support for per policy rule template formats") |
| 8c655784e2cf ("integrity: Fix __integrity_init_keyring() section mismatch") |
| e038f5f691e0 ("ima: Use designated initializers for struct ima_event_data") |
| 2cd4737bc850 ("ima: prevent a file already mmap'ed write to be mmap'ed execute") |
| f218a29c25ad ("Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security") |