blob: 32e7441c397e2d047a77db18e4ea69e2b419f3e1 [file] [log] [blame]
eb624fe214a2 ("ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond")
712183437ebe ("ima: Fail rule parsing when buffer hook functions have an invalid action")
5c7bac9fb2c5 ("IMA: pre-allocate buffer to hold keyrings string")
2b60c0ecedf8 ("IMA: Read keyrings= option from the IMA policy")
e9085e0ad38a ("IMA: Add support to limit measuring keys")
88e70da170e8 ("IMA: Define an IMA hook to measure keys")
5808611cccb2 ("IMA: Add KEY_CHECK func to measure keys")
273df864cf74 ("ima: Check against blacklisted hashes for files with modsig")
e14555e3d0e9 ("ima: Make process_buffer_measurement() generic")
3878d505aa71 ("ima: Define ima-modsig template")
15588227e086 ("ima: Collect modsig")
39b07096364a ("ima: Implement support for module-style appended signatures")
a5fbeb615ca4 ("ima: Factor xattr_verify() out of ima_appraise_measurement()")
9044d627fd18 ("ima: Add modsig appraise_type option for module-style appended signatures")
650b29dbdf2c ("integrity: Introduce struct evm_xattr")
337619eb44ef ("ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition")
86b4da8c0e7f ("IMA: Define a new template field buf")
b0935123a183 ("IMA: Define a new hook to measure the kexec boot command line arguments")
19453ce0bcfb ("IMA: support for per policy rule template formats")
8c655784e2cf ("integrity: Fix __integrity_init_keyring() section mismatch")
e038f5f691e0 ("ima: Use designated initializers for struct ima_event_data")
2cd4737bc850 ("ima: prevent a file already mmap'ed write to be mmap'ed execute")
f218a29c25ad ("Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security")