From: Casey Schaufler Date: Tue, 31 Dec 2013 01:37:45 +0000 (-0800) Subject: BACKPORT: Smack: File receive audit correction X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=e3fec99bcc0eabb631d0169cd76e39a0d2694616;p=platform%2Fkernel%2Flinux-stable.git BACKPORT: Smack: File receive audit correction Eric Paris politely points out: Inside smack_file_receive() it seems like you are initting the audit field with LSM_AUDIT_DATA_TASK. And then use smk_ad_setfield_u_fs_path(). Seems like LSM_AUDIT_DATA_PATH would make more sense. (and depending on how it's used fix a crash...) He is correct. This puts things in order. Targeted for git://git.gitorious.org/smack-next/kernel.git Signed-off-by: Casey Schaufler (cherry-picked from upstream 4482a44f6a3221cd0076eb6af65672a7e198d8da) --- diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 888e1be1fdd3..df82d43cef21 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -1354,7 +1354,7 @@ static int smack_file_receive(struct file *file) int may = 0; struct smk_audit_info ad; - smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_TASK); + smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_PATH); smk_ad_setfield_u_fs_path(&ad, file->f_path); /* * This code relies on bitmasks.