diff options
author | Lontke Michael <michael.lontke@elektrobit.com> | 2022-08-31 14:03:26 +0200 |
---|---|---|
committer | Casey Schaufler <casey@schaufler-ca.com> | 2022-09-27 10:33:03 -0700 |
commit | 4ca165fc6c49c3b0100f61524ffbca4743d46e8d (patch) | |
tree | d4173b1c3e8290074b3329be13e39a44d2d51629 /scripts/spdxcheck-test.sh | |
parent | b90cb1053190353cc30f0fef0ef1f378ccc063c5 (diff) |
SMACK: Add sk_clone_security LSM hook
Using smk_of_current() during sk_alloc_security hook leads in
rare cases to a faulty initialization of the security context
of the created socket.
By adding the LSM hook sk_clone_security to SMACK this initialization
fault is corrected by copying the security context of the old socket
pointer to the newly cloned one.
Co-authored-by: Martin Ostertag: <martin.ostertag@elektrobit.com>
Signed-off-by: Lontke Michael <michael.lontke@elektrobit.com>
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Diffstat (limited to 'scripts/spdxcheck-test.sh')
0 files changed, 0 insertions, 0 deletions