This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from b394eabd539d Merge tag 'chrome-platform-v6.14' of git://git.kernel.org/ [...] new bf2066caee80 firmware: google: cbmem: Constify 'struct bin_attribute' new 7da14dea76fb firmware: google: gsmi: Constify 'struct bin_attribute' new 093d752032f7 firmware: google: memconsole: Use const 'struct bin_attrib [...] new 7543d5702c2c firmware: google: vpd: Use const 'struct bin_attribute' callback new 7dd457a2fd78 Merge tag 'chrome-platform-firmware-v6.14' of git://git.ke [...] new 254ef9541d68 ima: Suspend PCR extends and log appends when rebooting new 68af44a71975 ima: kexec: silence RCU list traversal warning new 7eef7c8bac9a ima: limit the builtin 'tcb' dont_measure tmpfs policy rule new 4785ed362a24 ima: ignore suffixed policy rule comments new 0ca0cf9f8cb1 Merge tag 'integrity-v6.14' of git://git.kernel.org/pub/sc [...] new 6f71ad02aae8 smack: deduplicate access to string conversion new 678ca9f78e40 Merge tag 'Smack-for-6.14' of https://github.com/cschaufle [...] new 6fba89813ccf lsm: ensure the correct LSM context releaser new 2d470c778120 lsm: replace context+len with lsm_context new 76ecf306ae5d lsm: use lsm_context in security_inode_getsecctx new b530104f50e8 lsm: lsm_context in security_dentry_init_security new a4626e978677 lsm: secctx provider check on release new 9c76eaf78488 rust: replace lsm context+len with lsm_context new 012920131013 binder: initialize lsm_context structure new 7a9b65ab0abd selftests: refactor the lsm `flags_overset_lsm_set_self_at [...] new 7ccbe076d987 lsm: Only build lsm_audit.c if CONFIG_SECURITY and CONFIG_ [...] new 241d6a66404c security: remove redundant assignment to return variable new b0966c7c816a lsm: constify function parameters new b00083aed484 lsm: rename variable to avoid shadowing new 3b44cd099867 net: corrections for security_secid_to_secctx returns new f09ff307c729 safesetid: check size of policy writes new 714d87c90a76 lockdown: initialize local array before use to quiet stati [...] new f96a974170b7 Merge tag 'lsm-pr-20250121' of git://git.kernel.org/pub/sc [...] new b01c939d5854 selinux: add generated av_permissions.h to targets new c75c7945cd49 selinux: use native iterator types new 034294fbfdf0 selinux: Fix SCTP error inconsistency in selinux_socket_bind() new 4aa176193475 selinux: add support for xperms in conditional policies new 2ef6fc99e0d9 selinux: add netlink nlmsg_type audit message new 9d8d094fa307 selinux: supply missing field initializers new 046b85a993a1 selinux: avoid using types indicating user space interaction new 909030851011 selinux: constify and reconcile function parameter names new 5e99b81f48cd selinux: rework match_ipv6_addrmask() new 83e7e18eed6e selinux: rename comparison functions for clarity new f07586160fd5 selinux: use known type instead of void pointer new 749153636643 selinux: avoid unnecessary indirection in struct level_datum new 01c2253a0fbd selinux: make more use of str_read() when loading the policy new 690ffcd817ea Merge tag 'selinux-pr-20250121' of git://git.kernel.org/pu [...] new e92eebb0d611 audit: fix suffixed '/' filename matching new c4b9570cfb63 Merge tag 'audit-pr-20250121' of git://git.kernel.org/pub/ [...]
The 44 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: drivers/android/binder.c | 25 ++-- drivers/firmware/google/cbmem.c | 10 +- drivers/firmware/google/gsmi.c | 6 +- drivers/firmware/google/memconsole.c | 4 +- drivers/firmware/google/vpd.c | 8 +- fs/ceph/super.h | 3 +- fs/ceph/xattr.c | 12 +- fs/fuse/dir.c | 35 +++--- fs/nfs/nfs4proc.c | 22 ++-- fs/nfsd/nfs4xdr.c | 22 ++-- include/linux/lsm_audit.h | 16 +++ include/linux/lsm_hook_defs.h | 13 +- include/linux/security.h | 37 ++++-- include/net/scm.h | 12 +- kernel/audit.c | 33 +++-- kernel/auditfilter.c | 15 ++- kernel/auditsc.c | 27 ++--- net/ipv4/ip_sockglue.c | 12 +- net/netfilter/nf_conntrack_netlink.c | 20 +-- net/netfilter/nf_conntrack_standalone.c | 11 +- net/netfilter/nfnetlink_queue.c | 26 ++-- net/netlabel/netlabel_unlabeled.c | 44 +++---- net/netlabel/netlabel_user.c | 10 +- rust/helpers/security.c | 8 +- rust/kernel/security.rs | 38 +++--- security/Kconfig | 5 + security/Makefile | 2 +- security/apparmor/include/secid.h | 7 +- security/apparmor/secid.c | 34 +++--- security/integrity/ima/ima.h | 1 + security/integrity/ima/ima_init.c | 2 + security/integrity/ima/ima_kexec.c | 3 +- security/integrity/ima/ima_policy.c | 5 +- security/integrity/ima/ima_queue.c | 44 +++++++ security/lockdown/lockdown.c | 2 +- security/lsm_audit.c | 11 +- security/safesetid/securityfs.c | 3 + security/security.c | 67 +++++----- security/selinux/Makefile | 7 +- security/selinux/hooks.c | 59 ++++++--- security/selinux/include/classmap.h | 2 +- security/selinux/include/conditional.h | 2 +- security/selinux/include/security.h | 7 +- security/selinux/selinuxfs.c | 4 +- security/selinux/ss/avtab.c | 19 ++- security/selinux/ss/avtab.h | 13 +- security/selinux/ss/conditional.c | 24 ++-- security/selinux/ss/conditional.h | 6 +- security/selinux/ss/context.c | 2 +- security/selinux/ss/context.h | 14 +-- security/selinux/ss/ebitmap.c | 12 +- security/selinux/ss/ebitmap.h | 7 +- security/selinux/ss/mls.c | 6 +- security/selinux/ss/mls_types.h | 2 +- security/selinux/ss/policydb.c | 135 ++++++++++----------- security/selinux/ss/policydb.h | 22 ++-- security/selinux/ss/services.c | 30 ++--- security/selinux/ss/sidtab.c | 6 +- security/smack/smack.h | 1 + security/smack/smack_access.c | 10 +- security/smack/smack_lsm.c | 70 +++++------ security/smack/smackfs.c | 26 +--- .../testing/selftests/lsm/lsm_set_self_attr_test.c | 7 +- 63 files changed, 613 insertions(+), 535 deletions(-)