diff options
author | Paul Moore <paul.moore@hp.com> | 2009-08-28 18:12:49 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2009-08-31 18:29:52 -0400 |
commit | ed6d76e4c32de0c2ad5f1d572b948ef49e465176 (patch) | |
tree | 893914916ad849fefed72df48bca0bf9c78e392d /security/selinux/hooks.c | |
parent | 2b980dbd77d229eb60588802162c9659726b11f4 (diff) |
selinux: Support for the new TUN LSM hooks
Add support for the new TUN LSM hooks: security_tun_dev_create(),
security_tun_dev_post_create() and security_tun_dev_attach(). This includes
the addition of a new object class, tun_socket, which represents the socks
associated with TUN devices. The _tun_dev_create() and _tun_dev_post_create()
hooks are fairly similar to the standard socket functions but _tun_dev_attach()
is a bit special. The _tun_dev_attach() is unique because it involves a
domain attaching to an existing TUN device and its associated tun_socket
object, an operation which does not exist with standard sockets and most
closely resembles a relabel operation.
Signed-off-by: Paul Moore <paul.moore@hp.com>
Acked-by: Eric Paris <eparis@parisplace.org>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r-- | security/selinux/hooks.c | 60 |
1 files changed, 58 insertions, 2 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index ac79f9ef2da8..27b4c5527358 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -13,8 +13,8 @@ | |||
13 | * Eric Paris <eparis@redhat.com> | 13 | * Eric Paris <eparis@redhat.com> |
14 | * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. | 14 | * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. |
15 | * <dgoeddel@trustedcs.com> | 15 | * <dgoeddel@trustedcs.com> |
16 | * Copyright (C) 2006, 2007 Hewlett-Packard Development Company, L.P. | 16 | * Copyright (C) 2006, 2007, 2009 Hewlett-Packard Development Company, L.P. |
17 | * Paul Moore <paul.moore@hp.com> | 17 | * Paul Moore <paul.moore@hp.com> |
18 | * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. | 18 | * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. |
19 | * Yuichi Nakamura <ynakam@hitachisoft.jp> | 19 | * Yuichi Nakamura <ynakam@hitachisoft.jp> |
20 | * | 20 | * |
@@ -4325,6 +4325,59 @@ static void selinux_req_classify_flow(const struct request_sock *req, | |||
4325 | fl->secid = req->secid; | 4325 | fl->secid = req->secid; |
4326 | } | 4326 | } |
4327 | 4327 | ||
4328 | static int selinux_tun_dev_create(void) | ||
4329 | { | ||
4330 | u32 sid = current_sid(); | ||
4331 | |||
4332 | /* we aren't taking into account the "sockcreate" SID since the socket | ||
4333 | * that is being created here is not a socket in the traditional sense, | ||
4334 | * instead it is a private sock, accessible only to the kernel, and | ||
4335 | * representing a wide range of network traffic spanning multiple | ||
4336 | * connections unlike traditional sockets - check the TUN driver to | ||
4337 | * get a better understanding of why this socket is special */ | ||
4338 | |||
4339 | return avc_has_perm(sid, sid, SECCLASS_TUN_SOCKET, TUN_SOCKET__CREATE, | ||
4340 | NULL); | ||
4341 | } | ||
4342 | |||
4343 | static void selinux_tun_dev_post_create(struct sock *sk) | ||
4344 | { | ||
4345 | struct sk_security_struct *sksec = sk->sk_security; | ||
4346 | |||
4347 | /* we don't currently perform any NetLabel based labeling here and it | ||
4348 | * isn't clear that we would want to do so anyway; while we could apply | ||
4349 | * labeling without the support of the TUN user the resulting labeled | ||
4350 | * traffic from the other end of the connection would almost certainly | ||
4351 | * cause confusion to the TUN user that had no idea network labeling | ||
4352 | * protocols were being used */ | ||
4353 | |||
4354 | /* see the comments in selinux_tun_dev_create() about why we don't use | ||
4355 | * the sockcreate SID here */ | ||
4356 | |||
4357 | sksec->sid = current_sid(); | ||
4358 | sksec->sclass = SECCLASS_TUN_SOCKET; | ||
4359 | } | ||
4360 | |||
4361 | static int selinux_tun_dev_attach(struct sock *sk) | ||
4362 | { | ||
4363 | struct sk_security_struct *sksec = sk->sk_security; | ||
4364 | u32 sid = current_sid(); | ||
4365 | int err; | ||
4366 | |||
4367 | err = avc_has_perm(sid, sksec->sid, SECCLASS_TUN_SOCKET, | ||
4368 | TUN_SOCKET__RELABELFROM, NULL); | ||
4369 | if (err) | ||
4370 | return err; | ||
4371 | err = avc_has_perm(sid, sid, SECCLASS_TUN_SOCKET, | ||
4372 | TUN_SOCKET__RELABELTO, NULL); | ||
4373 | if (err) | ||
4374 | return err; | ||
4375 | |||
4376 | sksec->sid = sid; | ||
4377 | |||
4378 | return 0; | ||
4379 | } | ||
4380 | |||
4328 | static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) | 4381 | static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) |
4329 | { | 4382 | { |
4330 | int err = 0; | 4383 | int err = 0; |
@@ -5494,6 +5547,9 @@ static struct security_operations selinux_ops = { | |||
5494 | .inet_csk_clone = selinux_inet_csk_clone, | 5547 | .inet_csk_clone = selinux_inet_csk_clone, |
5495 | .inet_conn_established = selinux_inet_conn_established, | 5548 | .inet_conn_established = selinux_inet_conn_established, |
5496 | .req_classify_flow = selinux_req_classify_flow, | 5549 | .req_classify_flow = selinux_req_classify_flow, |
5550 | .tun_dev_create = selinux_tun_dev_create, | ||
5551 | .tun_dev_post_create = selinux_tun_dev_post_create, | ||
5552 | .tun_dev_attach = selinux_tun_dev_attach, | ||
5497 | 5553 | ||
5498 | #ifdef CONFIG_SECURITY_NETWORK_XFRM | 5554 | #ifdef CONFIG_SECURITY_NETWORK_XFRM |
5499 | .xfrm_policy_alloc_security = selinux_xfrm_policy_alloc, | 5555 | .xfrm_policy_alloc_security = selinux_xfrm_policy_alloc, |