diff options
author | James Morris <james.l.morris@oracle.com> | 2014-07-29 11:31:46 -0400 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2014-07-29 11:31:46 -0400 |
commit | 167225b775d47954d702db4743f9d918aabab0a8 (patch) | |
tree | e03a05550c87c702fe4c746dd156a8bd38de3651 | |
parent | b64cc5fb85f38ae7ca3c67a8fea9ad8c0d068bfa (diff) | |
parent | 2873ead7e46694910ac49c3a8ee0f54956f96e0c (diff) |
Merge branch 'stable-3.16' of git://git.infradead.org/users/pcmoore/selinux into next
-rw-r--r-- | include/linux/security.h | 5 | ||||
-rw-r--r-- | security/selinux/hooks.c | 13 |
2 files changed, 3 insertions, 15 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 0ae4b147718a..623f90e5f38d 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -996,10 +996,7 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
996 | * Retrieve the LSM-specific secid for the sock to enable caching of network | 996 | * Retrieve the LSM-specific secid for the sock to enable caching of network |
997 | * authorizations. | 997 | * authorizations. |
998 | * @sock_graft: | 998 | * @sock_graft: |
999 | * This hook is called in response to a newly created sock struct being | 999 | * Sets the socket's isec sid to the sock's sid. |
1000 | * grafted onto an existing socket and allows the security module to | ||
1001 | * perform whatever security attribute management is necessary for both | ||
1002 | * the sock and socket. | ||
1003 | * @inet_conn_request: | 1000 | * @inet_conn_request: |
1004 | * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. | 1001 | * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. |
1005 | * @inet_csk_clone: | 1002 | * @inet_csk_clone: |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 7740f61588d6..b0e940497e23 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -4510,18 +4510,9 @@ static void selinux_sock_graft(struct sock *sk, struct socket *parent) | |||
4510 | struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; | 4510 | struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; |
4511 | struct sk_security_struct *sksec = sk->sk_security; | 4511 | struct sk_security_struct *sksec = sk->sk_security; |
4512 | 4512 | ||
4513 | switch (sk->sk_family) { | 4513 | if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 || |
4514 | case PF_INET: | 4514 | sk->sk_family == PF_UNIX) |
4515 | case PF_INET6: | ||
4516 | case PF_UNIX: | ||
4517 | isec->sid = sksec->sid; | 4515 | isec->sid = sksec->sid; |
4518 | break; | ||
4519 | default: | ||
4520 | /* by default there is no special labeling mechanism for the | ||
4521 | * sksec label so inherit the label from the parent socket */ | ||
4522 | BUG_ON(sksec->sid != SECINITSID_UNLABELED); | ||
4523 | sksec->sid = isec->sid; | ||
4524 | } | ||
4525 | sksec->sclass = isec->sclass; | 4516 | sksec->sclass = isec->sclass; |
4526 | } | 4517 | } |
4527 | 4518 | ||