linux-stable/security
Mateusz Guzik f8c001884b apparmor: use the condition in AA_BUG_FMT even with debug disabled
[ Upstream commit 67e370aa7f ]

This follows the established practice and fixes a build failure for me:
security/apparmor/file.c: In function ‘__file_sock_perm’:
security/apparmor/file.c:544:24: error: unused variable ‘sock’ [-Werror=unused-variable]
  544 |         struct socket *sock = (struct socket *) file->private_data;
      |                        ^~~~

Signed-off-by: Mateusz Guzik <mjguzik@gmail.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-08-28 16:28:28 +02:00
..
apparmor apparmor: use the condition in AA_BUG_FMT even with debug disabled 2025-08-28 16:28:28 +02:00
bpf
integrity ima: process_measurement() needlessly takes inode_lock() on MAY_READ 2025-06-04 14:41:53 +02:00
keys security/keys: fix slab-out-of-bounds in key_task_permission 2024-11-14 13:19:30 +01:00
landlock landlock: Add the errata interface 2025-04-25 10:45:57 +02:00
loadpin
lockdown
safesetid safesetid: check size of policy writes 2025-02-17 09:40:06 +01:00
selinux selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len 2025-06-27 11:08:59 +01:00
smack smack: Revert "smackfs: Added check catlen" 2025-06-04 14:42:09 +02:00
tomoyo tomoyo: don't emit warning in tomoyo_write_control() 2025-02-17 09:40:07 +01:00
yama
commoncap.c
device_cgroup.c
inode.c securityfs: don't pin dentries twice, once is enough... 2025-08-28 16:28:15 +02:00
Kconfig
Kconfig.hardening
lsm_audit.c
Makefile
min_addr.c
security.c