This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from d0989d01c66f Merge tag 'hardening-v6.1-rc1' of git://git.kernel.org/pub [...] new 4ca165fc6c49 SMACK: Add sk_clone_security LSM hook new d3f84f5c9627 smack: lsm: remove the unneeded result variable new cc71271f5b79 smack: cleanup obsolete mount option flags new 74a0f84590ee Merge tag 'Smack-for-6.1' of https://github.com/cschaufler [...] new 5926586f291b ima: fix blocking of security.ima xattrs of unsupported al [...] new bab715bdaa9e efi: Correct Macmini DMI match in uefi cert quirk new eafb121ec0db Merge tag 'integrity-v6.1' of git://git.kernel.org/pub/scm [...] new 5698f08169b9 selinux: remove an unneeded variable in sel_make_class_dir [...] new c3fae2b2e690 selinux: use int arrays for boolean values new 6354324d8a3e selinux: declare read-only parameters const new 09b71adab095 selinux: remove the unneeded result variable new c969bb8dbaf2 selinux: use "grep -E" instead of "egrep" new 2fe2fb4ce60b selinux: remove runtime disable message in the install_pol [...] new e816da29bc0c Merge tag 'selinux-pr-20221003' of git://git.kernel.org/pu [...] new 4847c0eb663a lsm: clean up redundant NULL pointer check new 7cd4c5c2101c security, lsm: Introduce security_create_user_ns() new 401e64b3a4af bpf-lsm: Make bpf_lsm_userns_create() sleepable new d5810139cca3 selftests/bpf: Add tests verifying bpf lsm userns_create hook new ed5d44d42c95 selinux: Implement userns_create hook new abec3d015fdf userfaultfd: open userfaultfds with O_RDONLY new 1e7d8bcbe37d lockdown: ratelimit denial messages new 26b84401da84 Merge tag 'lsm-pr-20221003' of git://git.kernel.org/pub/sc [...]
The 22 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: fs/userfaultfd.c | 4 +- include/linux/lsm_hook_defs.h | 1 + include/linux/lsm_hooks.h | 4 + include/linux/security.h | 6 ++ kernel/bpf/bpf_lsm.c | 1 + kernel/user_namespace.c | 5 + scripts/selinux/install_policy.sh | 5 +- security/integrity/ima/ima_appraise.c | 12 ++- security/integrity/platform_certs/load_uefi.c | 2 +- security/lockdown/lockdown.c | 2 +- security/lsm_audit.c | 14 +-- security/security.c | 5 + security/selinux/hooks.c | 33 ++++--- security/selinux/include/classmap.h | 2 + security/selinux/selinuxfs.c | 15 ++- security/selinux/ss/context.h | 17 ++-- security/selinux/ss/ebitmap.c | 21 +++-- security/selinux/ss/ebitmap.h | 18 ++-- security/selinux/ss/mls_types.h | 4 +- security/smack/smack.h | 9 -- security/smack/smack_lsm.c | 20 +++- .../selftests/bpf/prog_tests/deny_namespace.c | 102 +++++++++++++++++++++ .../selftests/bpf/progs/test_deny_namespace.c | 33 +++++++ 23 files changed, 246 insertions(+), 89 deletions(-) create mode 100644 tools/testing/selftests/bpf/prog_tests/deny_namespace.c create mode 100644 tools/testing/selftests/bpf/progs/test_deny_namespace.c