This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 1b294a1f3561 Merge tag 'net-next-6.10' of git://git.kernel.org/pub/scm/ [...] new 74560bb3685b lsm: remove the now superfluous sentinel element from ctl_ [...] new 67889688e05b MAINTAINERS: update the LSM file list new dd80c7465029 MAINTAINERS: repair file entry in SECURITY SUBSYSTEM new 4cd4e4b88100 Merge tag 'lsm-pr-20240513' of git://git.kernel.org/pub/sc [...] new 0142c56682fb selinux: reject invalid ebitmaps new e6b5ebca41dd selinux: cleanup selinux_lsm_getattr() new 42c773238037 selinux: improve error checking in sel_write_load() new 4b3124de63c6 selinux: update numeric format specifiers for ebitmaps new cdc12eb41224 selinux: make more use of current_sid() new 0fd0b4fefaf0 selinux: dump statistics for more hash tables new 32db469edfcc selinux: improve symtab string hashing new abb0f43fcdf2 selinux: use u32 as bit position type in ebitmap code new 4e551db04264 selinux: clarify return code in filename_trans_read_helper [...] new fc983171e4c8 selinux: pre-allocate the status page new 851541709afc selinux: avoid printk_ratelimit() new 581646c3fb98 selinux: constify source policy in cond_policydb_dup() new ccae19c6239a Merge tag 'selinux-pr-20240513' of git://git.kernel.org/pu [...] new be84f32bb2c9 ima: Fix use-after-free on a dentry's dname.name new cc293c846662 ima: define an init_module critical data record new 38aa3f5ac6d2 integrity: Avoid -Wflex-array-member-not-at-end warnings new c21632b66895 ima: Rename backing_inode to real_inode new 3253804773c0 security: allow finer granularity in permitting copy-up of [...] new f2b3fc42f6ce evm: Implement per signature type decision in security_ino [...] new faf994811e05 evm: Use the metadata inode to calculate metadata hash new 309e2b775da8 ima: Move file-change detection variables into new structure new a652aa59068b evm: Store and detect metadata inode attributes changes new cd9b909a1172 ima: re-evaluate file integrity on file metadata change new 47add87ad181 evm: Enforce signatures on unsupported filesystem for EVM_ [...] new 1f65e57dc541 fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED new 5e2e4d0ea5c2 evm: Rename is_unsupported_fs to is_unsupported_hmac_fs new 9fa8e7625008 ima: add crypto agility support for template-hash algorithm new 353ad6c08394 Merge tag 'integrity-v6.10' of ssh://ra.kernel.org/pub/scm [...] new dcaa86b904ea KEYS: asymmetric: Add missing dependency on CRYPTO_SIG new 9d2fd8bdc12f KEYS: asymmetric: Add missing dependencies of FIPS_SIGNATU [...] new 8cd9f234f706 certs: Move RSA self-test data to separate file new 747ae81883d2 certs: Add ECDSA signature verification self-test new 46c6d2b18691 Merge tag 'asymmetric-keys-next-6.10-rc1' of git://git.ker [...]
The 37 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: MAINTAINERS | 4 + crypto/asymmetric_keys/Kconfig | 17 ++ crypto/asymmetric_keys/Makefile | 2 + crypto/asymmetric_keys/selftest.c | 219 +++------------------ crypto/asymmetric_keys/selftest.h | 22 +++ crypto/asymmetric_keys/selftest_ecdsa.c | 88 +++++++++ .../asymmetric_keys/{selftest.c => selftest_rsa.c} | 96 ++------- fs/overlayfs/copy_up.c | 2 +- fs/overlayfs/super.c | 2 +- include/linux/evm.h | 8 + include/linux/fs.h | 2 +- include/linux/integrity.h | 34 ++++ include/linux/lsm_hook_defs.h | 3 +- include/linux/security.h | 4 +- security/apparmor/lsm.c | 1 - security/integrity/evm/evm.h | 8 +- security/integrity/evm/evm_crypto.c | 25 ++- security/integrity/evm/evm_main.c | 92 +++++++-- security/integrity/ima/ima.h | 12 +- security/integrity/ima/ima_api.c | 32 +-- security/integrity/ima/ima_appraise.c | 4 +- security/integrity/ima/ima_crypto.c | 7 +- security/integrity/ima/ima_fs.c | 134 +++++++++++-- security/integrity/ima/ima_iint.c | 2 +- security/integrity/ima/ima_init.c | 6 +- security/integrity/ima/ima_kexec.c | 1 + security/integrity/ima/ima_main.c | 44 +++-- security/integrity/ima/ima_template_lib.c | 27 ++- security/integrity/integrity.h | 12 +- security/keys/sysctl.c | 1 - security/loadpin/loadpin.c | 1 - security/security.c | 5 +- security/selinux/hooks.c | 60 +++--- security/selinux/selinuxfs.c | 36 ++-- security/selinux/ss/conditional.c | 18 +- security/selinux/ss/conditional.h | 2 +- security/selinux/ss/ebitmap.c | 50 +++-- security/selinux/ss/ebitmap.h | 38 ++-- security/selinux/ss/hashtab.c | 10 +- security/selinux/ss/hashtab.h | 4 +- security/selinux/ss/policydb.c | 24 ++- security/selinux/ss/services.c | 3 +- security/selinux/ss/symtab.c | 22 +-- security/selinux/xfrm.c | 7 +- security/smack/smack_lsm.c | 2 +- security/yama/yama_lsm.c | 1 - 46 files changed, 701 insertions(+), 493 deletions(-) create mode 100644 crypto/asymmetric_keys/selftest.h create mode 100644 crypto/asymmetric_keys/selftest_ecdsa.c copy crypto/asymmetric_keys/{selftest.c => selftest_rsa.c} (80%)