aboutsummaryrefslogtreecommitdiffstats
path: root/security/capability.c
diff options
context:
space:
mode:
authorPaul Moore <paul.moore@hp.com>2009-08-28 18:12:43 -0400
committerJames Morris <jmorris@namei.org>2009-08-31 18:29:48 -0400
commit2b980dbd77d229eb60588802162c9659726b11f4 (patch)
tree78a7f734d0721029e4b4c961ca61d35abe9e6dbc /security/capability.c
parentd8e180dcd5bbbab9cd3ff2e779efcf70692ef541 (diff)
lsm: Add hooks to the TUN driver
The TUN driver lacks any LSM hooks which makes it difficult for LSM modules, such as SELinux, to enforce access controls on network traffic generated by TUN users; this is particularly problematic for virtualization apps such as QEMU and KVM. This patch adds three new LSM hooks designed to control the creation and attachment of TUN devices, the hooks are: * security_tun_dev_create() Provides access control for the creation of new TUN devices * security_tun_dev_post_create() Provides the ability to create the necessary socket LSM state for newly created TUN devices * security_tun_dev_attach() Provides access control for attaching to existing, persistent TUN devices and the ability to update the TUN device's socket LSM state as necessary Signed-off-by: Paul Moore <paul.moore@hp.com> Acked-by: Eric Paris <eparis@parisplace.org> Acked-by: Serge Hallyn <serue@us.ibm.com> Acked-by: David S. Miller <davem@davemloft.net> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/capability.c')
-rw-r--r--security/capability.c19
1 files changed, 19 insertions, 0 deletions
diff --git a/security/capability.c b/security/capability.c
index 1b943f54b2ea..06400cf07757 100644
--- a/security/capability.c
+++ b/security/capability.c
@@ -706,10 +706,26 @@ static void cap_inet_conn_established(struct sock *sk, struct sk_buff *skb)
706{ 706{
707} 707}
708 708
709
710
709static void cap_req_classify_flow(const struct request_sock *req, 711static void cap_req_classify_flow(const struct request_sock *req,
710 struct flowi *fl) 712 struct flowi *fl)
711{ 713{
712} 714}
715
716static int cap_tun_dev_create(void)
717{
718 return 0;
719}
720
721static void cap_tun_dev_post_create(struct sock *sk)
722{
723}
724
725static int cap_tun_dev_attach(struct sock *sk)
726{
727 return 0;
728}
713#endif /* CONFIG_SECURITY_NETWORK */ 729#endif /* CONFIG_SECURITY_NETWORK */
714 730
715#ifdef CONFIG_SECURITY_NETWORK_XFRM 731#ifdef CONFIG_SECURITY_NETWORK_XFRM
@@ -1026,6 +1042,9 @@ void security_fixup_ops(struct security_operations *ops)
1026 set_to_cap_if_null(ops, inet_csk_clone); 1042 set_to_cap_if_null(ops, inet_csk_clone);
1027 set_to_cap_if_null(ops, inet_conn_established); 1043 set_to_cap_if_null(ops, inet_conn_established);
1028 set_to_cap_if_null(ops, req_classify_flow); 1044 set_to_cap_if_null(ops, req_classify_flow);
1045 set_to_cap_if_null(ops, tun_dev_create);
1046 set_to_cap_if_null(ops, tun_dev_post_create);
1047 set_to_cap_if_null(ops, tun_dev_attach);
1029#endif /* CONFIG_SECURITY_NETWORK */ 1048#endif /* CONFIG_SECURITY_NETWORK */
1030#ifdef CONFIG_SECURITY_NETWORK_XFRM 1049#ifdef CONFIG_SECURITY_NETWORK_XFRM
1031 set_to_cap_if_null(ops, xfrm_policy_alloc_security); 1050 set_to_cap_if_null(ops, xfrm_policy_alloc_security);