WSL2-Linux-Kernel/security/smack
Eric Paris 50c205f5e5 LSM: do not initialize common_audit_data to 0
It isn't needed.  If you don't set the type of the data associated with
that type it is a pretty obvious programming bug.  So why waste the cycles?

Signed-off-by: Eric Paris <eparis@redhat.com>
2012-04-09 12:23:04 -04:00
..
Kconfig Smack: Simplified Mandatory Access Control Kernel 2008-02-05 09:44:20 -08:00
Makefile Smack: Simplified Mandatory Access Control Kernel 2008-02-05 09:44:20 -08:00
smack.h LSM: do not initialize common_audit_data to 0 2012-04-09 12:23:04 -04:00
smack_access.c lsm_audit: don't specify the audit pre/post callbacks in 'struct common_audit_data' 2012-04-03 09:49:59 -07:00
smack_lsm.c SELinux: rename dentry_open to file_open 2012-04-09 12:22:50 -04:00
smackfs.c Smack: smackfs cipso seq read repair 2011-11-11 11:07:21 -08:00