acrn-kernel/security
Peter Zijlstra 579cfab21b apparmor: Free up __cleanup() name
commit 9a1f37ebcf upstream.

In order to use __cleanup for __attribute__((__cleanup__(func))) the
name must not be used for anything else. Avoid the conflict.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Acked-by: John Johansen <john.johansen@canonical.com>
Link: https://lkml.kernel.org/r/20230612093537.536441207%40infradead.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-02-23 09:12:51 +01:00
..
apparmor apparmor: Free up __cleanup() name 2024-02-23 09:12:51 +01:00
bpf
integrity ima: detect changes to the backing overlay file 2023-11-28 17:07:12 +00:00
keys Revert "KEYS: encrypted: Add check for strsep" 2024-01-25 15:27:52 -08:00
landlock landlock: Fix documentation style 2022-09-29 18:43:04 +02:00
loadpin LoadPin: Ignore the "contents" argument of the LSM hooks 2022-12-31 13:33:07 +01:00
lockdown lockdown: ratelimit denial messages 2022-09-14 07:37:50 -04:00
safesetid LSM: SafeSetID: Add setgroups() security policy handling 2022-07-15 18:24:42 +00:00
selinux lsm: new security_file_ioctl_compat() hook 2024-01-31 16:17:00 -08:00
smack lsm: new security_file_ioctl_compat() hook 2024-01-31 16:17:00 -08:00
tomoyo lsm: new security_file_ioctl_compat() hook 2024-01-31 16:17:00 -08:00
yama
Kconfig x86/retbleed: Add fine grained Kconfig knobs 2022-06-29 17:43:41 +02:00
Kconfig.hardening randstruct: disable Clang 15 support 2023-02-25 11:25:43 +01:00
Makefile
commoncap.c capabilities: fix potential memleak on error path from vfs_getxattr_alloc() 2022-10-28 06:44:33 -04:00
device_cgroup.c device_cgroup: Roll back to original exceptions after copy failure 2023-01-07 11:11:56 +01:00
inode.c
lsm_audit.c lsm: clean up redundant NULL pointer check 2022-08-15 22:44:01 -04:00
min_addr.c
security.c lsm: fix the logic in security_inode_getsecctx() 2024-02-23 09:12:37 +01:00