linux-sg2042/security/smack
Casey Schaufler 4482a44f6a Smack: File receive audit correction
Eric Paris politely points out:

    Inside smack_file_receive() it seems like you are initting the audit
    field with LSM_AUDIT_DATA_TASK.  And then use
    smk_ad_setfield_u_fs_path().

    Seems like LSM_AUDIT_DATA_PATH would make more sense.  (and depending
    on how it's used fix a crash...)

He is correct. This puts things in order.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
2013-12-31 13:35:27 -08:00
..
Kconfig Smack: use select not depends in Kconfig 2012-12-14 10:57:10 -08:00
Makefile Smack: Simplified Mandatory Access Control Kernel 2008-02-05 09:44:20 -08:00
smack.h Smack: Make the syslog control configurable 2013-12-23 15:50:55 -08:00
smack_access.c Smack: Implement lock security mode 2013-10-18 09:39:33 -07:00
smack_lsm.c Smack: File receive audit correction 2013-12-31 13:35:27 -08:00
smackfs.c Smack: change rule cap check 2013-12-23 15:57:43 -08:00