aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJames Morris <james.l.morris@oracle.com>2014-07-16 13:05:51 -0400
committerJames Morris <james.l.morris@oracle.com>2014-07-16 13:05:51 -0400
commitb6b8a371f5541c2b839caba84fede693f3fcc43d (patch)
tree8bee0d6e115133436a2a1781814cbc2e9f72629e
parentbd89bb78f35fd175db7a9cfc504d789b6ca0f7b0 (diff)
parent4da6daf4d3df5a977e4623963f141a627fd2efce (diff)
Merge branch 'stable-3.16' of git://git.infradead.org/users/pcmoore/selinux into next
-rw-r--r--include/linux/security.h5
-rw-r--r--security/selinux/hooks.c13
2 files changed, 15 insertions, 3 deletions
diff --git a/include/linux/security.h b/include/linux/security.h
index 9c6b9722ff48..59820f8782a1 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -987,7 +987,10 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
987 * Retrieve the LSM-specific secid for the sock to enable caching of network 987 * Retrieve the LSM-specific secid for the sock to enable caching of network
988 * authorizations. 988 * authorizations.
989 * @sock_graft: 989 * @sock_graft:
990 * Sets the socket's isec sid to the sock's sid. 990 * This hook is called in response to a newly created sock struct being
991 * grafted onto an existing socket and allows the security module to
992 * perform whatever security attribute management is necessary for both
993 * the sock and socket.
991 * @inet_conn_request: 994 * @inet_conn_request:
992 * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. 995 * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid.
993 * @inet_csk_clone: 996 * @inet_csk_clone:
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 83d06db34d03..a1ac1c5c729b 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -4499,9 +4499,18 @@ static void selinux_sock_graft(struct sock *sk, struct socket *parent)
4499 struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; 4499 struct inode_security_struct *isec = SOCK_INODE(parent)->i_security;
4500 struct sk_security_struct *sksec = sk->sk_security; 4500 struct sk_security_struct *sksec = sk->sk_security;
4501 4501
4502 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 || 4502 switch (sk->sk_family) {
4503 sk->sk_family == PF_UNIX) 4503 case PF_INET:
4504 case PF_INET6:
4505 case PF_UNIX:
4504 isec->sid = sksec->sid; 4506 isec->sid = sksec->sid;
4507 break;
4508 default:
4509 /* by default there is no special labeling mechanism for the
4510 * sksec label so inherit the label from the parent socket */
4511 BUG_ON(sksec->sid != SECINITSID_UNLABELED);
4512 sksec->sid = isec->sid;
4513 }
4505 sksec->sclass = isec->sclass; 4514 sksec->sclass = isec->sclass;
4506} 4515}
4507 4516