On Wed, 9 Apr 2008, Paul Moore wrote: > Smack doesn't have the need to create a private copy of the LSM "domain" when > setting NetLabel security attributes like SELinux, however, the current > NetLabel code requires a private copy of the LSM "domain". This patches fixes > that by letting the LSM determine how it wants to pass the domain value. > > * NETLBL_SECATTR_DOMAIN_CPY > The current behavior, NetLabel assumes that the domain value is a copy and > frees it when done > > * NETLBL_SECATTR_DOMAIN > New, Smack-friendly behavior, NetLabel assumes that the domain value is a > reference to a string managed by the LSM and does not free it when done > > Signed-off-by: Paul Moore <paul.moore@xxxxxx> Acked-by: James Morris <jmorris@xxxxxxxxx> -- James Morris <jmorris@xxxxxxxxx> -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.