kernel-ark/security/smack
Marcin Lis 7412301b76 Smack: Assign smack_known_web as default smk_in label for kernel thread's socket
This change fixes the bug associated with sockets owned by kernel threads. These
sockets, created usually by network devices' drivers tasks, received smk_in
label from the task that created them - the "floor" label in the most cases. The
result was that they were not able to receive data packets because of missing
smack rules. The main reason of the access deny is that the socket smk_in label
is placed as the object during smk check, kernel thread's capabilities are
omitted.

Signed-off-by: Marcin Lis <m.lis@samsung.com>
2015-03-23 13:19:37 -07:00
..
Kconfig Smack: secmark support for netfilter 2015-01-20 16:34:25 -08:00
Makefile Smack: Repair netfilter dependency 2015-01-23 10:08:19 -08:00
smack_access.c security: smack: fix out-of-bounds access in smk_parse_smack() 2014-11-21 13:14:22 -08:00
smack_lsm.c Smack: Assign smack_known_web as default smk_in label for kernel thread's socket 2015-03-23 13:19:37 -07:00
smack_netfilter.c Smack: secmark support for netfilter 2015-01-20 16:34:25 -08:00
smack.h smack: fix possible use after frees in task_security() callers 2015-01-21 11:56:53 -08:00
smackfs.c Make Smack operate on smack_known struct where it still used char* 2014-08-29 10:10:55 -07:00