This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from d013cc800a2a Merge tag 'filelock-v5.4-1' of git://git.kernel.org/pub/sc [...] new 75798f85f2ba fscrypt: remove loadable module related code new 1c5100a2aab4 fscrypt: clean up base64 encoding/decoding new 886da8b39cf2 fscrypt: make fscrypt_msg() take inode instead of super_block new 63f668f0def1 fscrypt: improve warning messages for unsupported encrypti [...] new a4d14e915bcb fscrypt: improve warnings for missing crypto API support new 29a98c1caf7b fscrypt: use ENOPKG when crypto API support missing new 7af0ab0d3aab fs, fscrypt: move uapi definitions to new header <linux/fs [...] new 2336d0deb2d4 fscrypt: use FSCRYPT_ prefix for uapi constants new 3b6df59bc4d2 fscrypt: use FSCRYPT_* definitions, not FS_* new 59dc6a8e1f53 fscrypt: add ->ci_inode to fscrypt_info new a828daabb2ae fscrypt: rename fscrypt_master_key to fscrypt_direct_key new 3ec4f2a62927 fscrypt: refactor key setup code in preparation for v2 policies new 0109ce76dd6e fscrypt: move v1 policy key setup to keysetup_v1.c new feed82586191 fscrypt: rename keyinfo.c to keysetup.c new 22d94f493bfb fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl new b1c0ec3599f4 fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl new 5a7e29924dac fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl new c1144c9b8ad9 fscrypt: add an HKDF-SHA512 implementation new 5dae460c2292 fscrypt: v2 encryption policy support new 23c688b54016 fscrypt: allow unprivileged users to add/remove keys for v [...] new 78a1b96bcf7a fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl new 5ab7189a31ba fscrypt: require that key be added when setting a v2 encry [...] new 29b3692e6dbf ext4: wire up new fscrypt ioctls new 8ce589c77318 f2fs: wire up new fscrypt ioctls new 62de25927a25 ubifs: wire up new fscrypt ioctls new ba13f2c8d7a0 fscrypt: document the new ioctls and policy version new 0642ea2409f3 ext4 crypto: fix to check feature status before get policy new 734d1ed83e1f Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/ [...] new 6ff2deb2e8f6 fs-verity: add a documentation file new c9570b2ced03 fs-verity: add MAINTAINERS file entry new 085771ec14b9 fs-verity: add UAPI header new fe9918d3b228 fs: uapi: define verity bit for FS_IOC_GETFLAGS new 671e67b47e9f fs-verity: add Kconfig and the helper functions for hashing new 5585f2af737a fs-verity: add inode and superblock fields new fd2d1acfcadf fs-verity: add the hook for file ->open() new c1d9b584e2cf fs-verity: add the hook for file ->setattr() new 8a1d0f9cacc9 fs-verity: add data verification hooks for ->readpages() new 3fda4c617e84 fs-verity: implement FS_IOC_ENABLE_VERITY ioctl new 4dd893d832cf fs-verity: implement FS_IOC_MEASURE_VERITY ioctl new add890c9f9d2 fs-verity: add SHA-512 support new 432434c9f8e1 fs-verity: support builtin file signatures new c93d8f885809 ext4: add basic fs-verity support new 22cfe4b48ccb ext4: add fs-verity read support new 84fb7ca4b3f8 ext4: update on-disk format documentation for fs-verity new 95ae251fe828 f2fs: add fs-verity support new f60c55a94e1d Merge tag 'fsverity-for-linus' of git://git.kernel.org/pub [...]
The 46 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/filesystems/ext4/inodes.rst | 6 +- Documentation/filesystems/ext4/overview.rst | 1 + Documentation/filesystems/ext4/super.rst | 2 + Documentation/filesystems/ext4/verity.rst | 41 ++ Documentation/filesystems/fscrypt.rst | 758 +++++++++++++++++---- Documentation/filesystems/fsverity.rst | 726 ++++++++++++++++++++ Documentation/filesystems/index.rst | 1 + Documentation/ioctl/ioctl-number.rst | 1 + MAINTAINERS | 13 + fs/Kconfig | 2 + fs/Makefile | 1 + fs/crypto/Kconfig | 2 + fs/crypto/Makefile | 10 +- fs/crypto/crypto.c | 45 +- fs/crypto/fname.c | 47 +- fs/crypto/fscrypt_private.h | 399 +++++++++-- fs/crypto/hkdf.c | 181 +++++ fs/crypto/hooks.c | 6 +- fs/crypto/keyinfo.c | 611 ----------------- fs/crypto/keyring.c | 984 ++++++++++++++++++++++++++++ fs/crypto/keysetup.c | 591 +++++++++++++++++ fs/crypto/keysetup_v1.c | 340 ++++++++++ fs/crypto/policy.c | 434 +++++++++--- fs/ext4/Makefile | 1 + fs/ext4/ext4.h | 23 +- fs/ext4/file.c | 4 + fs/ext4/inode.c | 55 +- fs/ext4/ioctl.c | 45 ++ fs/ext4/readpage.c | 211 +++++- fs/ext4/super.c | 21 +- fs/ext4/sysfs.c | 6 + fs/ext4/verity.c | 367 +++++++++++ fs/f2fs/Makefile | 1 + fs/f2fs/data.c | 75 ++- fs/f2fs/f2fs.h | 20 +- fs/f2fs/file.c | 101 ++- fs/f2fs/inode.c | 5 +- fs/f2fs/super.c | 5 + fs/f2fs/sysfs.c | 11 + fs/f2fs/verity.c | 247 +++++++ fs/f2fs/xattr.h | 2 + fs/super.c | 2 + fs/ubifs/ioctl.c | 20 + fs/ubifs/super.c | 11 + fs/verity/Kconfig | 55 ++ fs/verity/Makefile | 10 + fs/verity/enable.c | 377 +++++++++++ fs/verity/fsverity_private.h | 185 ++++++ fs/verity/hash_algs.c | 280 ++++++++ fs/verity/init.c | 61 ++ fs/verity/measure.c | 57 ++ fs/verity/open.c | 356 ++++++++++ fs/verity/signature.c | 157 +++++ fs/verity/verify.c | 281 ++++++++ include/linux/fs.h | 12 + include/linux/fscrypt.h | 55 +- include/linux/fsverity.h | 211 ++++++ include/uapi/linux/fs.h | 55 +- include/uapi/linux/fscrypt.h | 181 +++++ include/uapi/linux/fsverity.h | 40 ++ 60 files changed, 7737 insertions(+), 1071 deletions(-) create mode 100644 Documentation/filesystems/ext4/verity.rst create mode 100644 Documentation/filesystems/fsverity.rst create mode 100644 fs/crypto/hkdf.c delete mode 100644 fs/crypto/keyinfo.c create mode 100644 fs/crypto/keyring.c create mode 100644 fs/crypto/keysetup.c create mode 100644 fs/crypto/keysetup_v1.c create mode 100644 fs/ext4/verity.c create mode 100644 fs/f2fs/verity.c create mode 100644 fs/verity/Kconfig create mode 100644 fs/verity/Makefile create mode 100644 fs/verity/enable.c create mode 100644 fs/verity/fsverity_private.h create mode 100644 fs/verity/hash_algs.c create mode 100644 fs/verity/init.c create mode 100644 fs/verity/measure.c create mode 100644 fs/verity/open.c create mode 100644 fs/verity/signature.c create mode 100644 fs/verity/verify.c create mode 100644 include/linux/fsverity.h create mode 100644 include/uapi/linux/fscrypt.h create mode 100644 include/uapi/linux/fsverity.h