diff options
| author | Paul Moore <[email protected]> | 2013-12-09 20:32:33 +0000 |
|---|---|---|
| committer | Paul Moore <[email protected]> | 2013-12-09 20:32:33 +0000 |
| commit | 5b67c493248059909d7e0ff646d8475306669b27 (patch) | |
| tree | c1fb0f7caba61189811b12fc7e89c72d34610afb /security/selinux/hooks.c | |
| parent | selinux: pull address family directly from the request_sock struct (diff) | |
| download | kernel-5b67c493248059909d7e0ff646d8475306669b27.tar.gz kernel-5b67c493248059909d7e0ff646d8475306669b27.zip | |
selinux: look for IPsec labels on both inbound and outbound packets
Previously selinux_skb_peerlbl_sid() would only check for labeled
IPsec security labels on inbound packets, this patch enables it to
check both inbound and outbound traffic for labeled IPsec security
labels.
Reported-by: Janak Desai <[email protected]>
Cc: [email protected]
Signed-off-by: Paul Moore <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
| -rw-r--r-- | security/selinux/hooks.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 17d7689660ea..95cb1345257d 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -3829,7 +3829,7 @@ static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) u32 nlbl_sid; u32 nlbl_type; - err = selinux_skb_xfrm_sid(skb, &xfrm_sid); + err = selinux_xfrm_skb_sid(skb, &xfrm_sid); if (unlikely(err)) return -EACCES; err = selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); |
