diff options
author | Marcelo Ricardo Leitner <marcelo.leitner@gmail.com> | 2015-12-23 19:44:09 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-12-28 06:18:47 +0100 |
commit | 3538a5c8ffa37c715029af4a2e384c077558eb18 (patch) | |
tree | ad231d72e2e789a9140d4f49563212a88df0b84e /net/openvswitch | |
parent | sctp: use GFP_USER for user-controlled kmalloc (diff) | |
download | linux-3538a5c8ffa37c715029af4a2e384c077558eb18.tar.xz linux-3538a5c8ffa37c715029af4a2e384c077558eb18.zip |
sctp: label accepted/peeled off sockets
Accepted or peeled off sockets were missing a security label (e.g.
SELinux) which means that socket was in "unlabeled" state.
This patch clones the sock's label from the parent sock and resolves the
issue (similar to AF_BLUETOOTH protocol family).
Cc: Paul Moore <pmoore@redhat.com>
Cc: David Teigland <teigland@redhat.com>
Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/openvswitch')
0 files changed, 0 insertions, 0 deletions