WSL2-Linux-Kernel/security
Eric Paris 50c205f5e5 LSM: do not initialize common_audit_data to 0
It isn't needed.  If you don't set the type of the data associated with
that type it is a pretty obvious programming bug.  So why waste the cycles?

Signed-off-by: Eric Paris <eparis@redhat.com>
2012-04-09 12:23:04 -04:00
..
apparmor LSM: do not initialize common_audit_data to 0 2012-04-09 12:23:04 -04:00
integrity security: fix ima kconfig warning 2012-02-28 11:01:15 +11:00
keys usermodehelper: kill umh_wait, renumber UMH_* constants 2012-03-23 16:58:41 -07:00
selinux LSM: do not initialize common_audit_data to 0 2012-04-09 12:23:04 -04:00
smack LSM: do not initialize common_audit_data to 0 2012-04-09 12:23:04 -04:00
tomoyo SELinux: rename dentry_open to file_open 2012-04-09 12:22:50 -04:00
yama Yama: add PR_SET_PTRACER_ANY 2012-02-16 10:25:18 +11:00
Kconfig security: Yama LSM 2012-02-10 09:18:52 +11:00
Makefile security: Yama LSM 2012-02-10 09:18:52 +11:00
capability.c SELinux: rename dentry_open to file_open 2012-04-09 12:22:50 -04:00
commoncap.c security: trim security.h 2012-02-14 10:45:42 +11:00
device_cgroup.c cgroup: remove cgroup_subsys argument from callbacks 2012-02-02 09:20:22 -08:00
inode.c securityfs: fix object creation races 2012-01-10 10:20:35 -05:00
lsm_audit.c LSM: BUILD_BUG_ON if the common_audit_data union ever grows 2012-04-09 12:23:03 -04:00
min_addr.c mmap_min_addr check CAP_SYS_RAWIO only for write 2010-04-23 08:56:31 +10:00
security.c SELinux: rename dentry_open to file_open 2012-04-09 12:22:50 -04:00