summaryrefslogtreecommitdiff
path: root/crypto/gcm.c
diff options
context:
space:
mode:
authorLontke Michael <michael.lontke@elektrobit.com>2022-08-31 15:03:26 +0300
committerCasey Schaufler <casey@schaufler-ca.com>2022-09-27 20:33:03 +0300
commit4ca165fc6c49c3b0100f61524ffbca4743d46e8d (patch)
treed4173b1c3e8290074b3329be13e39a44d2d51629 /crypto/gcm.c
parentb90cb1053190353cc30f0fef0ef1f378ccc063c5 (diff)
downloadlinux-4ca165fc6c49c3b0100f61524ffbca4743d46e8d.tar.xz
SMACK: Add sk_clone_security LSM hook
Using smk_of_current() during sk_alloc_security hook leads in rare cases to a faulty initialization of the security context of the created socket. By adding the LSM hook sk_clone_security to SMACK this initialization fault is corrected by copying the security context of the old socket pointer to the newly cloned one. Co-authored-by: Martin Ostertag: <martin.ostertag@elektrobit.com> Signed-off-by: Lontke Michael <michael.lontke@elektrobit.com> Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Diffstat (limited to 'crypto/gcm.c')
0 files changed, 0 insertions, 0 deletions