NetLabel: Allow passing the LSM domain as a shared pointer
authorPaul Moore <paul.moore@hp.com>
Sun, 13 Apr 2008 02:06:42 +0000 (19:06 -0700)
committerDavid S. Miller <davem@davemloft.net>
Sun, 13 Apr 2008 02:06:42 +0000 (19:06 -0700)
commit00447872a643787411c2c0cb1df6169dda8b0c47
treeea4215f6f3040507b46bf90fe133ca73a59c9c0e
parentb9f3124f08fffe2ad706fd164f6702fdca409a91
NetLabel: Allow passing the LSM domain as a shared pointer

Smack doesn't have the need to create a private copy of the LSM "domain" when
setting NetLabel security attributes like SELinux, however, the current
NetLabel code requires a private copy of the LSM "domain".  This patches fixes
that by letting the LSM determine how it wants to pass the domain value.

 * NETLBL_SECATTR_DOMAIN_CPY
   The current behavior, NetLabel assumes that the domain value is a copy and
   frees it when done

 * NETLBL_SECATTR_DOMAIN
   New, Smack-friendly behavior, NetLabel assumes that the domain value is a
   reference to a string managed by the LSM and does not free it when done

Signed-off-by: Paul Moore <paul.moore@hp.com>
Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
include/net/netlabel.h
security/selinux/ss/services.c
security/smack/smack_lsm.c