This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 0f75ef6a9cff Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/ [...] new 980ef4d22a95 x86/ima: check EFI SetupMode too new 2cd4737bc850 ima: prevent a file already mmap'ed write to be mmap'ed execute new 68f2529078f9 ima: Make arch_policy_entry static new 9e1e5d4372d6 x86/ima: fix the Kconfig dependency for IMA_ARCH_POLICY new 42df744c4166 LSM: switch to blocking policy update notifiers new b16942455193 ima: use the lsm policy update notifier new e038f5f691e0 ima: Use designated initializers for struct ima_event_data new 8c655784e2cf integrity: Fix __integrity_init_keyring() section mismatch new 19453ce0bcfb IMA: support for per policy rule template formats new b0935123a183 IMA: Define a new hook to measure the kexec boot command l [...] new 86b4da8c0e7f IMA: Define a new template field buf new 6a31fcd4cff8 KEXEC: Call ima_kexec_cmdline to measure the boot command [...] new 337619eb44ef ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonabl [...] new 650b29dbdf2c integrity: Introduce struct evm_xattr new 8b68150883ca Merge branch 'next-integrity' of git://git.kernel.org/pub/ [...]
The 15 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/ima_policy | 6 +- Documentation/security/IMA-templates.rst | 7 +- arch/x86/kernel/ima_arch.c | 12 ++- drivers/infiniband/core/device.c | 6 +- include/linux/ima.h | 2 + include/linux/security.h | 12 +-- kernel/kexec_file.c | 9 +- security/integrity/digsig.c | 5 +- security/integrity/evm/evm_main.c | 8 +- security/integrity/ima/Kconfig | 3 +- security/integrity/ima/ima.h | 21 +++- security/integrity/ima/ima_api.c | 38 +++++-- security/integrity/ima/ima_appraise.c | 9 +- security/integrity/ima/ima_init.c | 6 +- security/integrity/ima/ima_main.c | 123 ++++++++++++++++++++-- security/integrity/ima/ima_policy.c | 163 +++++++++++++++++++++++++----- security/integrity/ima/ima_template.c | 23 +++-- security/integrity/ima/ima_template_lib.c | 21 ++++ security/integrity/ima/ima_template_lib.h | 4 + security/integrity/integrity.h | 6 ++ security/security.c | 23 +++-- security/selinux/hooks.c | 2 +- security/selinux/selinuxfs.c | 2 +- 23 files changed, 413 insertions(+), 98 deletions(-)