sst-linux/security/keys
Frederic Weisbecker a5a1788a49 task_work: s/task_work_cancel()/task_work_cancel_func()/
commit 68cbd415dd4b9c5b9df69f0f091879e56bf5907a upstream.

A proper task_work_cancel() API that actually cancels a callback and not
*any* callback pointing to a given function is going to be needed for
perf events event freeing. Do the appropriate rename to prepare for
that.

Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20240621091601.18227-2-frederic@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-08-03 08:49:33 +02:00
..
encrypted-keys Revert "KEYS: encrypted: Add check for strsep" 2024-01-25 15:27:52 -08:00
trusted-keys KEYS: trusted: Do not use WARN when encode fails 2024-05-25 16:21:35 +02:00
big_key.c
compat_dh.c
compat.c
dh.c
gc.c keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry 2024-01-01 12:38:58 +00:00
internal.h keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry 2024-01-01 12:38:58 +00:00
Kconfig
key.c keys: Fix overwrite of key expiration on instantiation 2024-05-17 11:56:23 +02:00
keyctl_pkey.c
keyctl.c task_work: s/task_work_cancel()/task_work_cancel_func()/ 2024-08-03 08:49:33 +02:00
keyring.c
Makefile
permission.c
persistent.c
proc.c keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry 2024-01-01 12:38:58 +00:00
process_keys.c
request_key_auth.c
request_key.c
sysctl.c
user_defined.c