diff options
author | Paul Moore <pmoore@redhat.com> | 2014-07-28 18:42:48 +0400 |
---|---|---|
committer | Paul Moore <pmoore@redhat.com> | 2014-07-28 18:46:07 +0400 |
commit | 2873ead7e46694910ac49c3a8ee0f54956f96e0c (patch) | |
tree | ca9560e878d2842d45c6f99077d0d8b8f8b0f9ba /include/linux/security.h | |
parent | 4da6daf4d3df5a977e4623963f141a627fd2efce (diff) | |
download | linux-2873ead7e46694910ac49c3a8ee0f54956f96e0c.tar.xz |
Revert "selinux: fix the default socket labeling in sock_graft()"
This reverts commit 4da6daf4d3df5a977e4623963f141a627fd2efce.
Unfortunately, the commit in question caused problems with Bluetooth
devices, specifically it caused them to get caught in the newly
created BUG_ON() check. The AF_ALG problem still exists, but will be
addressed in a future patch.
Cc: stable@vger.kernel.org
Signed-off-by: Paul Moore <pmoore@redhat.com>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 794be735ff4b..6478ce3252c7 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -987,10 +987,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) * Retrieve the LSM-specific secid for the sock to enable caching of network * authorizations. * @sock_graft: - * This hook is called in response to a newly created sock struct being - * grafted onto an existing socket and allows the security module to - * perform whatever security attribute management is necessary for both - * the sock and socket. + * Sets the socket's isec sid to the sock's sid. * @inet_conn_request: * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. * @inet_csk_clone: |