diff options
| author | James Morris <james.l.morris@oracle.com> | 2014-07-16 13:05:51 -0400 |
|---|---|---|
| committer | James Morris <james.l.morris@oracle.com> | 2014-07-16 13:05:51 -0400 |
| commit | b6b8a371f5541c2b839caba84fede693f3fcc43d (patch) | |
| tree | 8bee0d6e115133436a2a1781814cbc2e9f72629e | |
| parent | bd89bb78f35fd175db7a9cfc504d789b6ca0f7b0 (diff) | |
| parent | 4da6daf4d3df5a977e4623963f141a627fd2efce (diff) | |
Merge branch 'stable-3.16' of git://git.infradead.org/users/pcmoore/selinux into next
| -rw-r--r-- | include/linux/security.h | 5 | ||||
| -rw-r--r-- | security/selinux/hooks.c | 13 |
2 files changed, 15 insertions, 3 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 9c6b9722ff48..59820f8782a1 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
| @@ -987,7 +987,10 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
| 987 | * Retrieve the LSM-specific secid for the sock to enable caching of network | 987 | * Retrieve the LSM-specific secid for the sock to enable caching of network |
| 988 | * authorizations. | 988 | * authorizations. |
| 989 | * @sock_graft: | 989 | * @sock_graft: |
| 990 | * Sets the socket's isec sid to the sock's sid. | 990 | * This hook is called in response to a newly created sock struct being |
| 991 | * grafted onto an existing socket and allows the security module to | ||
| 992 | * perform whatever security attribute management is necessary for both | ||
| 993 | * the sock and socket. | ||
| 991 | * @inet_conn_request: | 994 | * @inet_conn_request: |
| 992 | * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. | 995 | * Sets the openreq's sid to socket's sid with MLS portion taken from peer sid. |
| 993 | * @inet_csk_clone: | 996 | * @inet_csk_clone: |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 83d06db34d03..a1ac1c5c729b 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
| @@ -4499,9 +4499,18 @@ static void selinux_sock_graft(struct sock *sk, struct socket *parent) | |||
| 4499 | struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; | 4499 | struct inode_security_struct *isec = SOCK_INODE(parent)->i_security; |
| 4500 | struct sk_security_struct *sksec = sk->sk_security; | 4500 | struct sk_security_struct *sksec = sk->sk_security; |
| 4501 | 4501 | ||
| 4502 | if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 || | 4502 | switch (sk->sk_family) { |
| 4503 | sk->sk_family == PF_UNIX) | 4503 | case PF_INET: |
| 4504 | case PF_INET6: | ||
| 4505 | case PF_UNIX: | ||
| 4504 | isec->sid = sksec->sid; | 4506 | isec->sid = sksec->sid; |
| 4507 | break; | ||
| 4508 | default: | ||
| 4509 | /* by default there is no special labeling mechanism for the | ||
| 4510 | * sksec label so inherit the label from the parent socket */ | ||
| 4511 | BUG_ON(sksec->sid != SECINITSID_UNLABELED); | ||
| 4512 | sksec->sid = isec->sid; | ||
| 4513 | } | ||
| 4505 | sksec->sclass = isec->sclass; | 4514 | sksec->sclass = isec->sclass; |
| 4506 | } | 4515 | } |
| 4507 | 4516 | ||
