This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 6991a564f597 Merge tag 'hardening-v5.20-rc1' of git://git.kernel.org/pu [...] new 494688efdc59 selinux: add __randomize_layout to selinux_audit_data new 4d3d0ed60ee0 selinux: drop unnecessary NULL check new 9691e4f9ba6c selinux: fix typos in comments new 2bfe15c52612 mm: create security context for memfd_secret inodes new 8d6d51edcb79 docs: selinux: add '=' signs to kernel boot options new 73de1befcc53 selinux: fix memleak in security_read_state_kernel() new 15ec76fb29be selinux: Add boundary check in put_entry() new ef54ccb61616 selinux: selinux_add_opt() callers free memory new 79802ada87fa Merge tag 'selinux-pr-20220801' of git://git.kernel.org/pu [...] new 5ee6cfdd11aa audit: remove redundant data_len check new 546093206ba1 audit: make is_audit_feature_set() static new f42e1e3e40da Merge tag 'audit-pr-20220801' of git://git.kernel.org/pub/ [...] new ed56f4b5173e MAINTAINERS: update the LSM maintainer info new 1b6cf909647e Merge tag 'lsm-pr-20220801' of git://git.kernel.org/pub/sc [...] new 63c3b5d2ca96 smack: Replace kzalloc + strncpy with kstrndup new aa16fb4b9e7e smack: Remove the redundant lsm_inode_alloc new ea7099d5229c Merge tag 'Smack-for-6.0' of https://github.com/cschaufler [...] new 92c005a11762 LSM: SafeSetID: fix userns bug in selftest new b2927170d4fb LSM: SafeSetID: selftest cleanup and prepare for GIDs new a1732d6898ce LSM: SafeSetID: add GID testing to selftest new fcfe0ac2fcfa security: Add LSM hook to setgroups() syscall new 3e3374d382ff LSM: SafeSetID: Add setgroups() security policy handling new 64b634830c91 LSM: SafeSetID: add setgroups() testing to selftest new 87fe1adb66a5 Merge tag 'safesetid-6.0' of https://github.com/micah-mort [...] new c808a6ec7166 evm: Use IS_ENABLED to initialize .enabled new 65d9a9a60fd7 kexec_file: drop weak attribute from functions new 0738eceb6201 kexec: drop weak attribute from functions new 689a71493bd2 kexec: clean up arch_kexec_kernel_verify_sig new c903dae8941d kexec, KEYS: make the code in bzImage64_verify_sig generic new 0d519cadf751 arm64: kexec_file: use more system keyrings to verify kern [...] new 0828c4a39be5 kexec, KEYS, s390: Make use of built-in and secondary keyr [...] new 88b61b130334 Merge remote-tracking branch 'linux-integrity/kexec-keyrin [...] new 043402495deb Merge tag 'integrity-v6.0' of git://git.kernel.org/pub/scm [...] new 8da572c52a9b fs-verity: mention btrfs support new 569bede0cff5 Merge tag 'fsverity-for-linus' of git://git.kernel.org/pub [...]
The 35 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/kernel-parameters.txt | 4 +- Documentation/filesystems/fsverity.rst | 53 ++-- MAINTAINERS | 3 +- arch/arm64/include/asm/kexec.h | 18 +- arch/arm64/kernel/kexec_image.c | 11 +- arch/powerpc/include/asm/kexec.h | 14 + arch/s390/include/asm/kexec.h | 14 + arch/s390/kernel/machine_kexec_file.c | 18 +- arch/x86/include/asm/kexec.h | 12 + arch/x86/kernel/kexec-bzimage64.c | 20 +- fs/verity/Kconfig | 10 +- include/linux/audit.h | 2 - include/linux/kexec.h | 82 +++++- include/linux/lsm_hook_defs.h | 1 + include/linux/lsm_hooks.h | 7 + include/linux/security.h | 7 + kernel/audit.c | 4 +- kernel/groups.c | 13 + kernel/kexec_core.c | 27 -- kernel/kexec_file.c | 83 +++--- mm/secretmem.c | 9 + security/integrity/evm/evm_main.c | 52 ++-- security/safesetid/lsm.c | 39 ++- security/security.c | 5 + security/selinux/hooks.c | 17 +- security/selinux/include/audit.h | 2 +- security/selinux/include/avc.h | 2 +- security/selinux/ss/policydb.h | 2 + security/selinux/ss/services.c | 9 +- security/smack/smack_access.c | 7 +- security/smack/smack_lsm.c | 7 - tools/testing/selftests/safesetid/Makefile | 2 +- tools/testing/selftests/safesetid/safesetid-test.c | 295 ++++++++++++++++++--- 33 files changed, 581 insertions(+), 270 deletions(-)