This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 029f56db6ac2 Merge tag 'x86_asm_for_v5.10' of git://git.kernel.org/pub/ [...] new 547bbf7d214f kernel: printk: delete repeated words in comments new 730037c3ee57 serial: 8250: change lock order in serial8250_do_startup() new 36d818f610f2 kernel.h: Move oops_in_progress to printk.h new 4e797e6ec79c printk: Use fallthrough pseudo-keyword new 0d6f55403a47 crash: add VMCOREINFO macro to define offset in a struct d [...] new b6cf8b3f3312 printk: add lockless ringbuffer new 8749efc0c0c3 Revert "printk: lock/unlock console only for new logbuf entries" new 896fbe20b4e2 printk: use the lockless ringbuffer new 3270ecb5214a MAINTAIERS: Add John Ogness as printk reviewer new d397820f36ff printk: ringbuffer: support dataless records new 550c10d28d21 printk: reduce LOG_BUF_SHIFT range for H8300 new f8ff195ef1b9 docs: vmcoreinfo: add lockless printk ringbuffer vmcoreinfo new 3e0d075cb0ab scripts/gdb: add utils.read_ulong() new e60768311af8 scripts/gdb: update for lockless printk ringbuffer new ce003d67ad52 printk: ringbuffer: fix setting state in desc_read() new e7c1fe21046a printk: ringbuffer: avoid memcpy() on state_var new 2a7f87ed05b9 printk: ringbuffer: relocate get_data() new e3bc0401c1de printk: ringbuffer: add BLK_DATALESS() macro new cc5c7041c6e1 printk: ringbuffer: clear initial reserved fields new 10dcb06d4041 printk: ringbuffer: change representation of states new 4cfc7258f876 printk: ringbuffer: add finalization/extension support new f5f022e53b87 printk: reimplement log_cont using record extension new cfe2790b163a printk: move printk_info into separate array new 74caba7f2a06 printk: move dictionary keys to dev_printk_info new f35efc78add6 printk: remove dict ring new 59f8bcca1ef6 printk: avoid and/or handle record truncation new 0463d04ea03a printk: reduce setup_text_buf size to LOG_LINE_MAX new 70333f4ff9c1 Merge branch 'printk-rework' into for-linus new d594d8f411d4 Merge tag 'printk-for-5.10' of git://git.kernel.org/pub/sc [...] new a20751677676 tomoyo: Loosen pathname/domainname validation. new b274279a0b0c Merge tag 'tomoyo-pr-20201012' of git://git.osdn.net/gitro [...] new 36be81293dbe Smack: Consolidate uses of secmark into a function new a2af03188507 Smack: Set socket labels only once new 322dd63c7f98 Smack: Use the netlabel cache new bf0afe673b99 Smack: Fix build when NETWORK_SECMARK is not set new edd615371b66 Smack: Remove unnecessary variable initialization new 99a6740f88e9 Merge tag 'Smack-for-5.10' of git://github.com/cschaufler/ [...] new 6b87024f76bc audit: change unnecessary globals into statics new 265c32072b0c audit: uninitialize variable audit_sig_sid new c07203516439 audit: Remove redundant null check new 01fb1e2f42d6 Merge tag 'audit-pr-20201012' of git://git.kernel.org/pub/ [...] new 339949be2586 scripts/selinux,selinux: update mdp to enable policy capabilities new 461698026ffa selinux: encapsulate policy state, refactor policy load new 02a52c5c8c3b selinux: move policy commit after updating selinuxfs new c7c556f1e81b selinux: refactor changing booleans new 69ea651c40f7 selinux: fix allocation failure check on newpolicy->sidtab new 37ea433c6607 selinux: avoid dereferencing the policy prior to initialization new 879229311bc8 selinux: fix memdup.cocci warnings new 9530a3e00459 selinux: permit removing security.selinux xattr before pol [...] new aeecf4a3fb11 selinux: Create function for selinuxfs directory cleanup new 66ec384ad304 selinux: Refactor selinuxfs directory populating functions new 613ba18798ac selinux: Standardize string literal usage for selinuxfs di [...] new 0eea6091539b selinux: Create new booleans and class dirs out of tree new dd8166212d9a selinux: add tracepoint on audited events new 30969bc8e075 selinux: add basic filtering for audit trace events new c76a2f9ecdcb selinux: delete repeated words in comments new 1b8b31a2e612 selinux: convert policy read-write lock to RCU new 0256b0aa8019 selinux: fix error handling bugs in security_load_policy() new 9ff9abc4c6be selinux: move policy mutex to selinux_state, use in lockde [...] new 66ccd2560aff selinux: simplify away security_policydb_len() new e8ba53d0023a selinux: access policycaps with READ_ONCE/WRITE_ONCE new 8861d0af642c selinux: Add helper functions to get and set checkreqprot new 0d50f059c4cd selinux: provide a "no sooner than" date for the checkreqp [...] new 7b540812cc06 Merge tag 'selinux-pr-20201012' of git://git.kernel.org/pu [...] new 4d671d922d51 seccomp: kill process instead of thread for unknown actions new 3932fcecd962 selftests/seccomp: Add test for unknown SECCOMP_RET kill behavior new 2d9ca267a944 seccomp: Use current_pt_regs() instead of task_pt_regs(current) new a23042882ff2 selftests/seccomp: Use bitwise instead of arithmetic opera [...] new 05b52c662527 selftests/seccomp: Use __NR_mknodat instead of __NR_mknod new a6a4d78419a0 selftests/seccomp: Refactor arch register macros to avoid [...] new 31c36eb87c85 selftests/seccomp: Provide generic syscall setting macro new a084a6cba37c selftests/seccomp: mips: Define SYSCALL_NUM_SET macro new aa8fbb80a803 selftests/seccomp: arm: Define SYSCALL_NUM_SET macro new 0dd7d68572d9 selftests/seccomp: arm64: Define SYSCALL_NUM_SET macro new 37989de731db selftests/seccomp: mips: Remove O32-specific macro new 78f26627fd36 selftests/seccomp: Remove syscall setting #ifdefs new fdbaa798eaf5 selftests/seccomp: Convert HAVE_GETREG into ARCH_GETREG/AR [...] new dc2ad165f4fb selftests/seccomp: Convert REGSET calls into ARCH_GETREG/A [...] new e4e8e5d28d5e selftests/seccomp: Avoid redundant register flushes new f04cf78bbfcd selftests/seccomp: Remove SYSCALL_NUM_RET_SHARE_REG in fav [...] new 46138329faea selftests/seccomp: powerpc: Fix seccomp return value testing new 71c87fbe7200 selftests/seccomp: Record syscall during ptrace entry new bef71f86b64d selftests/seccomp: Allow syscall nr and ret value to be se [...] new a39caac02f2f selftests/seccomp: powerpc: Set syscall return during ptra [...] new e953aeaa913b selftests/clone3: Avoid OS-defined clone_args new 282a181b1a0d seccomp: Move config option SECCOMP to arch/Kconfig new dfe719fef03d seccomp: Make duplicate listener detection non-racy new 8b05418b2521 Merge tag 'seccomp-v5.10-rc1' of git://git.kernel.org/pub/ [...] new 9b80e4c4ddac overflow: Add __must_check attribute to check_*() helpers new b5fc7a89e58b Merge tag 'overflow-v5.10-rc1' of git://git.kernel.org/pub [...]
The 90 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: .../ABI/obsolete/sysfs-selinux-checkreqprot | 2 +- Documentation/admin-guide/kdump/gdbmacros.txt | 159 +- Documentation/admin-guide/kdump/vmcoreinfo.rst | 131 +- MAINTAINERS | 2 + arch/Kconfig | 30 + arch/arm/Kconfig | 15 +- arch/arm64/Kconfig | 13 - arch/csky/Kconfig | 13 - arch/microblaze/Kconfig | 18 +- arch/mips/Kconfig | 17 - arch/parisc/Kconfig | 16 - arch/powerpc/Kconfig | 17 - arch/riscv/Kconfig | 13 - arch/s390/Kconfig | 17 - arch/sh/Kconfig | 16 - arch/sparc/Kconfig | 18 +- arch/um/Kconfig | 16 - arch/x86/Kconfig | 16 - arch/xtensa/Kconfig | 14 - drivers/base/core.c | 46 +- include/linux/crash_core.h | 3 + include/linux/debug_locks.h | 2 +- include/linux/dev_printk.h | 8 + include/linux/kernel.h | 1 - include/linux/overflow.h | 39 +- include/linux/printk.h | 8 +- include/trace/events/avc.h | 53 + init/Kconfig | 3 +- kernel/audit.c | 9 +- kernel/audit.h | 4 - kernel/printk/Makefile | 1 + kernel/printk/internal.h | 4 +- kernel/printk/printk.c | 1153 ++++++----- kernel/printk/printk_ringbuffer.c | 2083 ++++++++++++++++++++ kernel/printk/printk_ringbuffer.h | 382 ++++ kernel/printk/printk_safe.c | 2 +- kernel/seccomp.c | 64 +- scripts/gdb/linux/dmesg.py | 147 +- scripts/gdb/linux/utils.py | 7 + scripts/selinux/mdp/mdp.c | 7 + security/selinux/avc.c | 29 +- security/selinux/hooks.c | 17 +- security/selinux/include/conditional.h | 2 +- security/selinux/include/policycap.h | 20 + security/selinux/include/policycap_names.h | 18 + security/selinux/include/security.h | 63 +- security/selinux/selinuxfs.c | 259 ++- security/selinux/ss/avtab.c | 49 +- security/selinux/ss/avtab.h | 1 + security/selinux/ss/conditional.c | 155 ++ security/selinux/ss/conditional.h | 2 + security/selinux/ss/hashtab.c | 53 + security/selinux/ss/hashtab.h | 6 + security/selinux/ss/services.c | 875 ++++---- security/selinux/ss/services.h | 5 +- security/selinux/ss/sidtab.c | 10 + security/selinux/ss/sidtab.h | 2 + security/smack/smack.h | 19 +- security/smack/smack_access.c | 55 +- security/smack/smack_lsm.c | 252 ++- security/smack/smackfs.c | 23 +- security/tomoyo/util.c | 29 +- tools/testing/selftests/clone3/clone3.c | 45 +- .../clone3/clone3_cap_checkpoint_restore.c | 4 +- .../selftests/clone3/clone3_clear_sighand.c | 2 +- tools/testing/selftests/clone3/clone3_selftests.h | 24 +- tools/testing/selftests/clone3/clone3_set_tid.c | 4 +- tools/testing/selftests/pidfd/pidfd_setns_test.c | 2 +- tools/testing/selftests/seccomp/seccomp_bpf.c | 440 +++-- 69 files changed, 5188 insertions(+), 1846 deletions(-) create mode 100644 include/trace/events/avc.h create mode 100644 kernel/printk/printk_ringbuffer.c create mode 100644 kernel/printk/printk_ringbuffer.h create mode 100644 security/selinux/include/policycap.h create mode 100644 security/selinux/include/policycap_names.h