This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 6c1b980a7e79 Merge tag 'dma-mapping-6.6-2023-08-29' of git://git.infrad [...] new be4187faa8a4 audit: include security.h unconditionally new bf98354280bf audit: correct audit_filter_inodes() definition new b59bc6e37237 audit: fix possible soft lockup in __audit_inode_child() new 62acadda115a audit: add space before parenthesis and around '=', "==", and '<' new 22cde1012f6a audit: cleanup function braces and assignment-in-if-condition new b1a0f64cc65e audit: move trailing statements to next line new 3ea67c4f462e Merge tag 'audit-pr-20230829' of git://git.kernel.org/pub/ [...] new d91c1ab470ed selinux: cleanup the policycap accessor functions new 5b0eea835d4e selinux: introduce an initial SID for early boot processes new bbea03f47485 selinux: check for multiplication overflow in put_entry() new f785c54101e0 selinux: avoid avtab overflows new 1f270f1c3412 selinux: consistently use u32 as sequence number type in t [...] new 777ea29c57a0 selinux: avoid implicit conversions in the netif code new 5f740953ab2f selinux: avoid implicit conversions in the AVC code new a13479bb3c9d selinux: avoid implicit conversions in the LSM hooks new 7128578c79a7 selinux: use consistent type for AV rule specifier new 0e83c9c6fb0d selinux: fix implicit conversions in the symtab new c867248cf451 selinux: avoid implicit conversions regarding enforcing status new 90aa4f5e92f2 selinux: de-brand SELinux new 08a12b39e289 selinux: drop avtab_search() new e5faa839c3ee selinux: add missing newlines in pr_err() statements new 0fe53224bf5b selinux: update my email address new dd51fcd42fd6 selinux: introduce and use lsm_ad_net_init*() helpers new 55a0e73806ec selinux: introduce SECURITY_SELINUX_DEBUG configuration new 3876043ad9f7 selinux: fix a 0/NULL mistmatch in ad_net_init_from_iif() new 19c5b015d1b9 selinux: log about VM being executable by default new f01dd5904519 selinux: move debug functions into debug configuration new c17c55c2d1ab selinux: use identical iterator type in hashtab_duplicate() new fd5a90ff1e95 selinux: avoid implicit conversions in mls code new c50e125d0571 selinux: avoid implicit conversions in services code new 64f18f8a8c09 selinux: update comment on selinux_hooks[] new 2b86e04bce14 selinux: use GFP_KERNEL while reading binary policy new 817199e006e5 selinux: revert SECINITSID_INIT support new df9d4749250d selinux: avoid implicit conversions in avtab code new 002903e1d10f selinux: update type for number of class permissions in se [...] new aa4b60518280 selinux: make left shifts well defined new 97842c56b8c8 selinux: avoid implicit conversions in selinuxfs code new dee153754843 selinux: avoid implicit conversions in policydb code new e49be9bc7c1b selinux: use unsigned iterator in nlmsgtab code new 1df83cbf23a2 selinux: prevent KMSAN warning in selinux_inet_conn_request() new 1dbae1898730 Merge tag 'selinux-pr-20230829' of git://git.kernel.org/pu [...] new ff72942caa58 lsm: fix typo in security_file_lock() comment header new 6bcdfd2cac55 security: Allow all LSMs to provide xattrs for inode_init_ [...] new baed456a6a2f smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_ [...] new 6db7d1dee800 evm: Align evm_inode_init_security() definition with LSM i [...] new c31288e56c1a evm: Support multiple LSMs providing an xattr new ca22eca6e2ad cred: remove unsued extern declaration change_create_files_as() new faf302f5a213 security: Fix ret values doc for security_inode_init_security() new bd1f5934e460 lsm: add comment block for security_sk_classify_flow LSM hook new 6672efbb685f lsm: constify the 'target' parameter in security_capget() new 8e4672d6f902 lsm: constify the 'file' parameter in security_binder_tran [...] new 1086eeac9c33 Merge tag 'lsm-pr-20230829' of git://git.kernel.org/pub/sc [...] new 5087fd9e80e5 ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig new f20765fdfdc2 integrity: Always reference the blacklist keyring with appraisal new 56dc986a6b20 ima: require signed IMA policy when UEFI secure boot is enabled new 55e2b69649be kexec_lock: Replace kexec_mutex() by kexec_lock() in two comments new 1a35914f738c Merge tag 'integrity-v6.6' of git://git.kernel.org/pub/scm [...] new c47b65840024 security: smack: smackfs: fix typo (lables->labels) new 3ad49d37cf57 smackfs: Prevent underflow in smk_set_cipso() new 872459663c52 Merge tag 'Smack-for-6.6' of https://github.com/cschaufler [...]
The 60 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/ima_policy | 6 +- arch/powerpc/kernel/ima_arch.c | 8 +- include/linux/cred.h | 1 - include/linux/evm.h | 14 +-- include/linux/lsm_hook_defs.h | 10 +- include/linux/lsm_hooks.h | 20 ++++ include/linux/security.h | 11 ++- kernel/acct.c | 2 +- kernel/audit.c | 5 +- kernel/audit.h | 2 +- kernel/auditfilter.c | 19 ++-- kernel/auditsc.c | 10 +- kernel/capability.c | 2 +- kernel/kexec_file.c | 2 +- security/apparmor/lsm.c | 2 +- security/commoncap.c | 2 +- security/integrity/evm/evm.h | 4 +- security/integrity/evm/evm_crypto.c | 11 ++- security/integrity/evm/evm_main.c | 39 ++++++-- security/integrity/ima/Kconfig | 12 --- security/integrity/ima/ima_appraise.c | 12 ++- security/integrity/ima/ima_efi.c | 3 + security/integrity/ima/ima_kexec.c | 2 +- security/integrity/ima/ima_policy.c | 17 +--- security/security.c | 90 +++++++++++------ security/selinux/Kconfig | 25 +++-- security/selinux/avc.c | 17 ++-- security/selinux/hooks.c | 149 ++++++++++++++--------------- security/selinux/include/avc.h | 2 +- security/selinux/include/avc_ss.h | 2 +- security/selinux/include/objsec.h | 4 +- security/selinux/include/policycap_names.h | 2 +- security/selinux/include/security.h | 45 ++++----- security/selinux/netif.c | 4 +- security/selinux/netlabel.c | 1 + security/selinux/nlmsgtab.c | 3 +- security/selinux/selinuxfs.c | 28 +++--- security/selinux/ss/avtab.c | 66 ++++--------- security/selinux/ss/avtab.h | 12 ++- security/selinux/ss/conditional.c | 4 +- security/selinux/ss/constraint.h | 2 +- security/selinux/ss/context.h | 2 +- security/selinux/ss/ebitmap.c | 2 +- security/selinux/ss/ebitmap.h | 2 +- security/selinux/ss/hashtab.c | 8 +- security/selinux/ss/hashtab.h | 8 +- security/selinux/ss/mls.c | 12 ++- security/selinux/ss/mls.h | 2 +- security/selinux/ss/mls_types.h | 2 +- security/selinux/ss/policydb.c | 98 ++++++++++--------- security/selinux/ss/policydb.h | 9 +- security/selinux/ss/services.c | 54 +++++------ security/selinux/ss/services.h | 4 +- security/selinux/ss/sidtab.c | 2 +- security/selinux/ss/sidtab.h | 2 +- security/selinux/ss/symtab.c | 4 +- security/selinux/ss/symtab.h | 4 +- security/selinux/status.c | 6 +- security/selinux/xfrm.c | 2 +- security/smack/smack.h | 2 +- security/smack/smack_lsm.c | 68 +++++++------ security/smack/smackfs.c | 4 +- 62 files changed, 525 insertions(+), 444 deletions(-)