| 48ce1ddce16b ("ima: Fail rule parsing when asymmetric key measurement isn't supportable") |
| 176377d97d6a ("ima: Pre-parse the list of keyrings in a KEY_CHECK rule") |
| 30031b0ec8ae ("ima: Move comprehensive rule validation checks out of the token parser") |
| 712183437ebe ("ima: Fail rule parsing when buffer hook functions have an invalid action") |
| 465aee77aae8 ("ima: Free the entire rule when deleting a list of rules") |
| 5c7bac9fb2c5 ("IMA: pre-allocate buffer to hold keyrings string") |
| 2b60c0ecedf8 ("IMA: Read keyrings= option from the IMA policy") |
| e9085e0ad38a ("IMA: Add support to limit measuring keys") |
| 88e70da170e8 ("IMA: Define an IMA hook to measure keys") |
| 5808611cccb2 ("IMA: Add KEY_CHECK func to measure keys") |
| 273df864cf74 ("ima: Check against blacklisted hashes for files with modsig") |
| e14555e3d0e9 ("ima: Make process_buffer_measurement() generic") |
| 3878d505aa71 ("ima: Define ima-modsig template") |
| 15588227e086 ("ima: Collect modsig") |
| 39b07096364a ("ima: Implement support for module-style appended signatures") |
| a5fbeb615ca4 ("ima: Factor xattr_verify() out of ima_appraise_measurement()") |
| 9044d627fd18 ("ima: Add modsig appraise_type option for module-style appended signatures") |
| 650b29dbdf2c ("integrity: Introduce struct evm_xattr") |
| 337619eb44ef ("ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition") |
| 86b4da8c0e7f ("IMA: Define a new template field buf") |
| b0935123a183 ("IMA: Define a new hook to measure the kexec boot command line arguments") |
| 19453ce0bcfb ("IMA: support for per policy rule template formats") |
| 8c655784e2cf ("integrity: Fix __integrity_init_keyring() section mismatch") |
| e038f5f691e0 ("ima: Use designated initializers for struct ima_event_data") |