This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 740eaf7d4dd2 Merge tag 's390-5.6-1' of git://git.kernel.org/pub/scm/lin [...] new a8772fad0172 tomoyo: Use atomic_t for statistics counter new 2cf64d7cb20b Merge tag 'tomoyo-pr-20200128' of git://git.osdn.net/gitro [...] new 96c9e1de9954 ima: avoid appraise error for hash calc interrupt new c5563bad88e0 IMA: Check IMA policy flag new 5808611cccb2 IMA: Add KEY_CHECK func to measure keys new 88e70da170e8 IMA: Define an IMA hook to measure keys new cb1aa3823c92 KEYS: Call the IMA hook to measure keys new e9085e0ad38a IMA: Add support to limit measuring keys new 2b60c0ecedf8 IMA: Read keyrings= option from the IMA policy new f47825c69485 Merge branch 'next-integrity.measure-keys' into next-integrity new ea78979d302f IMA: fix measuring asymmetric keys Kconfig new 5350ceb0b7be ima: Add a space after printing LSM rules for readability new 6beea7afcc72 ima: add the ability to query the cached hash of a given file new 483ec26eed42 ima: ima/lsm policy rule loading logic bug fixes new 5c7bac9fb2c5 IMA: pre-allocate buffer to hold keyrings string new 9f81a2eda488 IMA: Define workqueue for early boot key measurements new 450d0fd51564 IMA: Call workqueue functions to measure queued keys new 5b3014b95272 IMA: Defined delayed workqueue to free the queued keys new d54e17b40666 Merge branch 'next-integrity.defer-measuring-keys' into ne [...] new 73a0bff2058f Merge branch 'next-integrity' of git://git.kernel.org/pub/ [...] new 10c2d111c906 security: remove EARLY_LSM_COUNT which never used new b3a608222336 Merge branch 'for-v5.6' of git://git.kernel.org:/pub/scm/l [...]
The 22 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/ima_policy | 16 ++- include/linux/ima.h | 20 ++++ security/integrity/ima/Kconfig | 12 ++ security/integrity/ima/Makefile | 2 + security/integrity/ima/ima.h | 33 +++++- security/integrity/ima/ima_api.c | 8 +- security/integrity/ima/ima_appraise.c | 4 +- security/integrity/ima/ima_asymmetric_keys.c | 66 +++++++++++ security/integrity/ima/ima_crypto.c | 4 +- security/integrity/ima/ima_init.c | 8 +- security/integrity/ima/ima_main.c | 61 +++++++++- security/integrity/ima/ima_policy.c | 165 ++++++++++++++++++++++---- security/integrity/ima/ima_queue_keys.c | 171 +++++++++++++++++++++++++++ security/keys/key.c | 10 ++ security/security.c | 1 - security/tomoyo/common.c | 11 +- 16 files changed, 544 insertions(+), 48 deletions(-) create mode 100644 security/integrity/ima/ima_asymmetric_keys.c create mode 100644 security/integrity/ima/ima_queue_keys.c