eb624fe214a2 ("ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond") 712183437ebe ("ima: Fail rule parsing when buffer hook functions have an invalid action") 5c7bac9fb2c5 ("IMA: pre-allocate buffer to hold keyrings string") 2b60c0ecedf8 ("IMA: Read keyrings= option from the IMA policy") e9085e0ad38a ("IMA: Add support to limit measuring keys") 88e70da170e8 ("IMA: Define an IMA hook to measure keys") 5808611cccb2 ("IMA: Add KEY_CHECK func to measure keys") 273df864cf74 ("ima: Check against blacklisted hashes for files with modsig") e14555e3d0e9 ("ima: Make process_buffer_measurement() generic") 3878d505aa71 ("ima: Define ima-modsig template") 15588227e086 ("ima: Collect modsig") 39b07096364a ("ima: Implement support for module-style appended signatures") a5fbeb615ca4 ("ima: Factor xattr_verify() out of ima_appraise_measurement()") 9044d627fd18 ("ima: Add modsig appraise_type option for module-style appended signatures") 650b29dbdf2c ("integrity: Introduce struct evm_xattr") 337619eb44ef ("ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition") 86b4da8c0e7f ("IMA: Define a new template field buf") b0935123a183 ("IMA: Define a new hook to measure the kexec boot command line arguments") 19453ce0bcfb ("IMA: support for per policy rule template formats") 8c655784e2cf ("integrity: Fix __integrity_init_keyring() section mismatch") e038f5f691e0 ("ima: Use designated initializers for struct ima_event_data") 2cd4737bc850 ("ima: prevent a file already mmap'ed write to be mmap'ed execute") f218a29c25ad ("Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security")