This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 0dd0c8f7db03 Merge tag 'hyperv-next-signed' of git://git.kernel.org/pub [...] new 0f8b5b6d56b5 kgdb: Remove unused DCPU_SSTEP definition new 54af3e39eed7 kdb: Remove unused "argcount" param from kdb_bt1(); make b [...] new 55a7e23f461f kdb: Fix "btc <cpu>" crash if the CPU didn't round up new 2277b492582d kdb: Fix stack crawling on 'running' CPUs that aren't the master new d07ce4e32a8d kdb: Avoid array subscript warnings on non-SMP builds new 53b63136e812 kdb: Tidy up code to handle escape sequences new d04213af9093 kdb: Simplify code to fetch characters from console new 4f27e824bf83 kdb: Remove special case logic from kdb_read() new cdca8d8900dd kdb: Improve handling of characters from different input sources new c58ff643763c kdb: Tweak escape handling for vi users new 8a99117f6e87 Merge tag 'kgdb-5.5-rc1' of git://git.kernel.org/pub/scm/l [...] new e40642dc01b8 selinux: remove load size limit new 3e3e24b42043 selinux: allow labeling before policy is loaded new 42345b68c2e3 selinux: default_range glblub implementation new ba75082efc18 Merge tag 'selinux-pr-20191126' of git://git.kernel.org/pu [...] new 245d73698ed7 audit: Report suspicious O_CREAT usage new c34c78dfc1fc audit: remove redundant condition check in kauditd_thread() new 3b805ca177a2 Merge tag 'audit-pr-20191126' of git://git.kernel.org/pub/ [...] new 223e660bc763 seccomp: avoid overflow in implicit constant conversion new fb3c5386b382 seccomp: add SECCOMP_USER_NOTIF_FLAG_CONTINUE new 0eebfed2954f seccomp: test SECCOMP_USER_NOTIF_FLAG_CONTINUE new fefad9ef58ff seccomp: simplify secure_computing() new 2aa8d8d04ca2 seccomp: fix SECCOMP_USER_NOTIF_FLAG_CONTINUE test new 23b2c96fad21 seccomp: rework define for SECCOMP_USER_NOTIF_FLAG_CONTINUE new b94ae8ad9fe7 Merge tag 'seccomp-v5.5-rc1' of git://git.kernel.org/pub/s [...]
The 25 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: arch/arm/kernel/ptrace.c | 2 +- arch/arm64/kernel/ptrace.c | 2 +- arch/parisc/kernel/ptrace.c | 2 +- arch/riscv/kernel/ptrace.c | 2 +- arch/s390/kernel/ptrace.c | 2 +- arch/um/kernel/skas/syscall.c | 2 +- arch/x86/entry/vsyscall/vsyscall_64.c | 2 +- fs/namei.c | 8 +- include/linux/audit.h | 5 +- include/linux/seccomp.h | 6 +- include/uapi/linux/audit.h | 1 + include/uapi/linux/seccomp.h | 29 ++++ kernel/audit.c | 15 +- kernel/debug/debug_core.c | 34 ++++ kernel/debug/debug_core.h | 3 +- kernel/debug/kdb/kdb_bt.c | 116 +++++++------ kernel/debug/kdb/kdb_io.c | 231 ++++++++++++-------------- kernel/debug/kdb/kdb_private.h | 1 + kernel/seccomp.c | 28 +++- security/selinux/hooks.c | 12 ++ security/selinux/include/security.h | 3 +- security/selinux/selinuxfs.c | 4 - security/selinux/ss/context.h | 32 ++++ security/selinux/ss/ebitmap.c | 18 ++ security/selinux/ss/ebitmap.h | 1 + security/selinux/ss/mls.c | 3 + security/selinux/ss/policydb.c | 5 + security/selinux/ss/policydb.h | 1 + tools/testing/selftests/seccomp/seccomp_bpf.c | 110 +++++++++++- 29 files changed, 470 insertions(+), 210 deletions(-)