Hi Linus, Except for extending the "encrypted" key type to support user provided data, the rest is code cleanup, __setup() usage bug fix, and a trivial change. thanks, Mimi The following changes since commit 754e0b0e35608ed5206d6a67a791563c631cec07: Linux 5.17-rc4 (2022-02-13 12:13:30 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.18 for you to fetch changes up to 4a48b4c428dc92b5e0b19de83e7eb8d530dddd48: MAINTAINERS: add missing security/integrity/platform_certs (2022-02-28 21:08:54 -0500) ---------------------------------------------------------------- integrity-v5.18 ---------------------------------------------------------------- Austin Kim (1): ima: Fix trivial typos in the comments Mimi Zohar (4): MAINTAINERS: add missing "security/integrity" directory ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS ima: define ima_max_digest_data struct without a flexible array variable MAINTAINERS: add missing security/integrity/platform_certs Randy Dunlap (1): EVM: fix the evm= __setup handler return value Stefan Berger (1): ima: Return error code obtained from securityfs functions Yael Tzur (1): KEYS: encrypted: Instantiate key with user-provided decrypted data Documentation/security/keys/trusted-encrypted.rst | 25 ++++++-- MAINTAINERS | 11 ++++ security/integrity/evm/evm_main.c | 2 +- security/integrity/ima/ima_api.c | 12 ++-- security/integrity/ima/ima_fs.c | 31 +++++++--- security/integrity/ima/ima_init.c | 5 +- security/integrity/ima/ima_main.c | 9 +-- security/integrity/ima/ima_policy.c | 4 +- security/integrity/ima/ima_template_lib.c | 7 +-- security/integrity/integrity.h | 14 ++++- security/keys/Kconfig | 19 ++++-- security/keys/encrypted-keys/encrypted.c | 71 +++++++++++++++++------ 12 files changed, 146 insertions(+), 64 deletions(-)