aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJames Morris <james.l.morris@oracle.com>2014-07-29 11:31:46 -0400
committerJames Morris <james.l.morris@oracle.com>2014-07-29 11:31:46 -0400
commit167225b775d47954d702db4743f9d918aabab0a8 (patch)
treee03a05550c87c702fe4c746dd156a8bd38de3651
parentb64cc5fb85f38ae7ca3c67a8fea9ad8c0d068bfa (diff)
parent2873ead7e46694910ac49c3a8ee0f54956f96e0c (diff)
Merge branch 'stable-3.16' of git://git.infradead.org/users/pcmoore/selinux into next
-rw-r--r--include/linux/security.h5
-rw-r--r--security/selinux/hooks.c13
2 files changed, 3 insertions, 15 deletions
diff --git a/include/linux/security.h b/include/linux/security.h
index 0ae4b147718a..623f90e5f38d 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -996,10 +996,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
996 * Retrieve the LSM-specific secid for the sock to enable caching of network 996 * Retrieve the LSM-specific secid for the sock to enable caching of network
997 * authorizations. 997 * authorizations.
998 * @sock_graft: 998 * @sock_graft:
999 * This hook is called in response to a newly created sock struct being 999 * Sets the socket's isec sid to the sock's sid.
1000 * grafted onto an existing socket and allows the security module to
1001 * perform whatever security attribute management is necessary for both
1002 * the sock and socket.
1003 * @inet_conn_request: 1000 * @inet_conn_request:
1004 * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. 1001 * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid.
1005 * @inet_csk_clone: 1002 * @inet_csk_clone:
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 7740f61588d6..b0e940497e23 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -4510,18 +4510,9 @@ static void selinux_sock_graft(struct sock *sk, struct socket *parent)
4510 struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; 4510 struct inode_security_struct *isec = SOCK_INODE(parent)->i_security;
4511 struct sk_security_struct *sksec = sk->sk_security; 4511 struct sk_security_struct *sksec = sk->sk_security;
4512 4512
4513 switch (sk->sk_family) { 4513 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 ||
4514 case PF_INET: 4514 sk->sk_family == PF_UNIX)
4515 case PF_INET6:
4516 case PF_UNIX:
4517 isec->sid = sksec->sid; 4515 isec->sid = sksec->sid;
4518 break;
4519 default:
4520 /* by default there is no special labeling mechanism for the
4521 * sksec label so inherit the label from the parent socket */
4522 BUG_ON(sksec->sid != SECINITSID_UNLABELED);
4523 sksec->sid = isec->sid;
4524 }
4525 sksec->sclass = isec->sclass; 4516 sksec->sclass = isec->sclass;
4526} 4517}
4527 4518