This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 8565d64430f8 Merge tag 'bounds-fixes-v5.18-rc1' of git://git.kernel.org [...] new a635415a064e watch_queue: Fix NULL dereference in error cleanup new 3d8dcf278b1e watch_queue: Actually free the watch new 6ca014cd2ddb Merge branch 'keys-fixes' of git://git.kernel.org/pub/scm/ [...] new a5cd1ab7ab67 Fix incorrect type in assignment of ipv6 port for audit new 2c5a5358feff Merge tag 'Smack-for-5.18' of https://github.com/cschaufle [...] new 65603435599f ima: Fix trivial typos in the comments new 18848c719132 MAINTAINERS: add missing "security/integrity" directory new e4e071baea41 ima: Return error code obtained from securityfs functions new aae6ccbd826d ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS new 8c54135e2e6d ima: define ima_max_digest_data struct without a flexible [...] new cd3bc044af48 KEYS: encrypted: Instantiate key with user-provided decryp [...] new f2544f5e6c69 EVM: fix the evm= __setup handler return value new 4a48b4c428dc MAINTAINERS: add missing security/integrity/platform_certs new 7f313ff0acde Merge tag 'integrity-v5.18' of git://git.kernel.org/pub/sc [...] new 0266c25e7c28 selinux: access superblock_security_struct in LSM blob way new bcb62828e3e8 selinux: check return value of sel_make_avc_files new 08df49054f31 selinux: declare path parameters of _genfs_sid const new d3b1161f29cf selinux: declare name parameter of hash_eval const new 9e2fe574c02b selinux: enclose macro arguments in parenthesis new 0b3c2b3dc96a selinux: drop cast to same type new 056945a96cf5 selinux: drop unused parameter of avtab_insert_node new 73073d956a20 selinux: do not discard const qualifier in cast new b084e189b01a selinux: simplify cred_init_security new b5e68162f859 selinux: drop unused macro new cdeea45422f5 selinux: fix a type cast problem in cred_init_security() new ecff30575b5a LSM: general protection fault in legacy_parse_param new b8b87fd954b4 selinux: Fix selinux_sb_mnt_opts_compat() new 6bc1968c14e9 selinux: try to use preparsed sid before calling parse_sid() new 0e326df06980 selinux: various sparse fixes new 70f4169ab421 selinux: parse contexts for mount options early new 5e50f5d4ff31 security: add sctp_assoc_established hook new 3eb8eaf2ca3e security: implement sctp_assoc_established hook in selinux new 5ea33af9d430 selinux: drop return statement at end of void functions new b97df7c098c5 selinux: use correct type for context length new 65881e1db4e9 selinux: allow FIOCLEX and FIONCLEX with policy capability new 70868c6b8fd8 docs: fix 'make htmldocs' warning in SCTP.rst new cdbec3ede0b8 selinux: shorten the policy capability enum names new c269497d248e Merge tag 'selinux-pr-20220321' of git://git.kernel.org/pu [...] new 272ceeaea355 audit: log AUDIT_TIME_* records only from rules new b47d5a4f6b8d Merge tag 'audit-pr-20220321' of git://git.kernel.org/pub/ [...]
The 40 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/security/SCTP.rst | 26 +- Documentation/security/keys/trusted-encrypted.rst | 25 +- MAINTAINERS | 11 + include/linux/lsm_hook_defs.h | 2 + include/linux/lsm_hooks.h | 5 + include/linux/security.h | 8 + kernel/audit.h | 4 + kernel/auditsc.c | 87 +++++-- kernel/watch_queue.c | 3 +- net/sctp/sm_statefuns.c | 8 +- security/integrity/evm/evm_main.c | 2 +- security/integrity/ima/ima_api.c | 12 +- security/integrity/ima/ima_fs.c | 31 ++- security/integrity/ima/ima_init.c | 5 +- security/integrity/ima/ima_main.c | 9 +- security/integrity/ima/ima_policy.c | 4 +- security/integrity/ima/ima_template_lib.c | 7 +- security/integrity/integrity.h | 14 +- security/keys/Kconfig | 19 +- security/keys/encrypted-keys/encrypted.c | 71 +++-- security/security.c | 24 +- security/selinux/hooks.c | 299 ++++++++++------------ security/selinux/ibpkey.c | 2 +- security/selinux/ima.c | 4 +- security/selinux/include/policycap.h | 21 +- security/selinux/include/policycap_names.h | 5 +- security/selinux/include/security.h | 31 ++- security/selinux/netnode.c | 9 +- security/selinux/netport.c | 2 +- security/selinux/selinuxfs.c | 4 +- security/selinux/ss/avtab.c | 6 +- security/selinux/ss/conditional.c | 2 - security/selinux/ss/ebitmap.c | 1 - security/selinux/ss/ebitmap.h | 6 +- security/selinux/ss/mls.c | 1 - security/selinux/ss/policydb.c | 4 +- security/selinux/ss/services.c | 10 +- security/selinux/ss/sidtab.c | 4 +- security/selinux/xfrm.c | 2 +- security/smack/smack_lsm.c | 2 +- 40 files changed, 475 insertions(+), 317 deletions(-)