This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 4a3bb4200a59 Merge tag 'dma-mapping-5.15' of git://git.infradead.org/us [...] new 00974b9a83cb memblock: Add missing debug code to memblock_add_node() new e888fa7bb882 memblock: Check memory add/cap ordering new 612b23f27793 Merge tag 'memblock-v5.15-rc1' of git://git.kernel.org/pub [...] new b0d4adaf3b3c fat: Add KUnit tests for checksums and timestamps new 1195505f5de2 kunit: ubsan integration new 6cb51a1874d0 kunit: tool: add --kernel_args to allow setting module params new 6a499c9c42d0 kunit: tool: make --raw_output support only showing kunit output new acd8e8407b8f kunit: Print test statistics on failure new c815f04ba949 Merge tag 'linux-kselftest-kunit-5.15-rc1' of git://git.ke [...] new a82adfd5c7cb hardening: Introduce CONFIG_ZERO_CALL_USED_REGS new dcb7c0b9461c hardening: Clarify Kconfig text for auto-var-init new f9398f15605a lib/test_stackinit: Fix static initializer test new 1e2cd3084fff lib/test_stackinit: Allow building stand-alone new a8fc576d4af2 lib/test_stackinit: Add assigned initializers new b55060d796c5 Merge tag 'hardening-v5.15-rc1' of git://git.kernel.org/pu [...] new a32ad90426a9 IMA: remove -Wmissing-prototypes warning new 5d1ef2ce13a9 ima: Introduce ima_get_current_hash_algo() new ce5bb5a86e5e ima: Return int in the functions to measure a buffer new ca3c9bdb101d ima: Add digest and digest_len params to the functions to [...] new e37be5343ae2 Merge branch 'ima-buffer-measurement-changes-v4' into next [...] new 8510505d55e1 IMA: remove the dependency on CRYPTO_MD5 new 50f742dd9147 IMA: block writes of the security.ima xattr with unsupport [...] new 1624dc008605 IMA: add support to restrict the hash algorithms used for [...] new 583a80ae86b5 IMA: add a policy option to restrict xattr hash algorithms [...] new 4f2946aa0c45 IMA: introduce a new policy option func=SETXATTR_CHECK new 8ecd39cb61d9 IMA: prevent SETXATTR_CHECK policy rules with unavailable [...] new d07eeeb87459 Merge branch 'restrict-digest-alg-v8' into next-integrity new cb181da16196 IMA: reject unknown hash algorithms in ima_get_hash_algo new aef4892a63c2 Merge tag 'integrity-v5.15' of git://git.kernel.org/pub/sc [...] new eb32f9f990d9 kcsan: Improve some Kconfig comments new a7a73697360e kcsan: Remove CONFIG_KCSAN_DEBUG new e675d2533a74 kcsan: Introduce CONFIG_KCSAN_STRICT new 08cac6049412 kcsan: Reduce get_ctx() uses in kcsan_found_watchpoint() new 49f72d5358dd kcsan: Rework atomic.h into permissive.h new 9c827cd1fcdf kcsan: Print if strict or non-strict during init new d8fd74d35a8d kcsan: permissive: Ignore data-racy 1-bit value changes new e04938042d77 kcsan: Make strict mode imply interruptible watchers new 7f3b457977d2 Merge branch 'kcsan' of git://git.kernel.org/pub/scm/linux [...] new 1846a7fa767f tools/memory-model: Make read_foo_diagnostic() more clearl [...] new 436eef23c41f tools/memory-model: Add example for heuristic lockless reads new f92975d76d53 tools/memory-model: Heuristics using data_race() must hand [...] new 87859a8e3f08 tools/memory-model: Document data_race(READ_ONCE()) new 4812c9111220 Merge branch 'lkmm' of git://git.kernel.org/pub/scm/linux/ [...] new aa829778b16f Merge tag 'locking-debug-2021-09-01' of git://git.kernel.o [...]
The 44 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/ima_policy | 15 +- Documentation/dev-tools/kcsan.rst | 12 + Documentation/dev-tools/kunit/kunit-tool.rst | 9 +- Documentation/dev-tools/kunit/running_tips.rst | 10 + Makefile | 5 + drivers/md/dm-ima.c | 3 +- fs/fat/.kunitconfig | 5 + fs/fat/Kconfig | 14 +- fs/fat/Makefile | 2 + fs/fat/fat_test.c | 196 ++++++++++++++++ fs/fat/misc.c | 3 + include/linux/ima.h | 23 +- kernel/kcsan/atomic.h | 23 -- kernel/kcsan/core.c | 77 ++++--- kernel/kcsan/kcsan_test.c | 32 +++ kernel/kcsan/permissive.h | 94 ++++++++ lib/Kconfig.kcsan | 42 +++- lib/kunit/test.c | 109 +++++++++ lib/test_stackinit.c | 253 +++++++++++++++------ lib/ubsan.c | 3 + mm/memblock.c | 10 + security/Kconfig.hardening | 71 ++++-- security/integrity/ima/Kconfig | 1 - security/integrity/ima/ima.h | 24 +- security/integrity/ima/ima_api.c | 6 +- security/integrity/ima/ima_appraise.c | 78 ++++++- security/integrity/ima/ima_asymmetric_keys.c | 2 +- security/integrity/ima/ima_init.c | 3 +- security/integrity/ima/ima_main.c | 89 ++++++-- security/integrity/ima/ima_mok.c | 2 +- security/integrity/ima/ima_policy.c | 174 ++++++++++++-- security/integrity/ima/ima_queue_keys.c | 2 +- security/selinux/ima.c | 6 +- .../memory-model/Documentation/access-marking.txt | 151 ++++++++++-- tools/testing/kunit/kunit.py | 36 ++- tools/testing/kunit/kunit_parser.py | 6 +- tools/testing/kunit/kunit_tool_test.py | 29 ++- 37 files changed, 1354 insertions(+), 266 deletions(-) create mode 100644 fs/fat/.kunitconfig create mode 100644 fs/fat/fat_test.c delete mode 100644 kernel/kcsan/atomic.h create mode 100644 kernel/kcsan/permissive.h