diff options
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r-- | security/selinux/hooks.c | 60 |
1 files changed, 58 insertions, 2 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index ac79f9ef2da8..27b4c5527358 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -13,8 +13,8 @@ | |||
13 | * Eric Paris <eparis@redhat.com> | 13 | * Eric Paris <eparis@redhat.com> |
14 | * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. | 14 | * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. |
15 | * <dgoeddel@trustedcs.com> | 15 | * <dgoeddel@trustedcs.com> |
16 | * Copyright (C) 2006, 2007 Hewlett-Packard Development Company, L.P. | 16 | * Copyright (C) 2006, 2007, 2009 Hewlett-Packard Development Company, L.P. |
17 | * Paul Moore <paul.moore@hp.com> | 17 | * Paul Moore <paul.moore@hp.com> |
18 | * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. | 18 | * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. |
19 | * Yuichi Nakamura <ynakam@hitachisoft.jp> | 19 | * Yuichi Nakamura <ynakam@hitachisoft.jp> |
20 | * | 20 | * |
@@ -4325,6 +4325,59 @@ static void selinux_req_classify_flow(const struct request_sock *req, | |||
4325 | fl->secid = req->secid; | 4325 | fl->secid = req->secid; |
4326 | } | 4326 | } |
4327 | 4327 | ||
4328 | static int selinux_tun_dev_create(void) | ||
4329 | { | ||
4330 | u32 sid = current_sid(); | ||
4331 | |||
4332 | /* we aren't taking into account the "sockcreate" SID since the socket | ||
4333 | * that is being created here is not a socket in the traditional sense, | ||
4334 | * instead it is a private sock, accessible only to the kernel, and | ||
4335 | * representing a wide range of network traffic spanning multiple | ||
4336 | * connections unlike traditional sockets - check the TUN driver to | ||
4337 | * get a better understanding of why this socket is special */ | ||
4338 | |||
4339 | return avc_has_perm(sid, sid, SECCLASS_TUN_SOCKET, TUN_SOCKET__CREATE, | ||
4340 | NULL); | ||
4341 | } | ||
4342 | |||
4343 | static void selinux_tun_dev_post_create(struct sock *sk) | ||
4344 | { | ||
4345 | struct sk_security_struct *sksec = sk->sk_security; | ||
4346 | |||
4347 | /* we don't currently perform any NetLabel based labeling here and it | ||
4348 | * isn't clear that we would want to do so anyway; while we could apply | ||
4349 | * labeling without the support of the TUN user the resulting labeled | ||
4350 | * traffic from the other end of the connection would almost certainly | ||
4351 | * cause confusion to the TUN user that had no idea network labeling | ||
4352 | * protocols were being used */ | ||
4353 | |||
4354 | /* see the comments in selinux_tun_dev_create() about why we don't use | ||
4355 | * the sockcreate SID here */ | ||
4356 | |||
4357 | sksec->sid = current_sid(); | ||
4358 | sksec->sclass = SECCLASS_TUN_SOCKET; | ||
4359 | } | ||
4360 | |||
4361 | static int selinux_tun_dev_attach(struct sock *sk) | ||
4362 | { | ||
4363 | struct sk_security_struct *sksec = sk->sk_security; | ||
4364 | u32 sid = current_sid(); | ||
4365 | int err; | ||
4366 | |||
4367 | err = avc_has_perm(sid, sksec->sid, SECCLASS_TUN_SOCKET, | ||
4368 | TUN_SOCKET__RELABELFROM, NULL); | ||
4369 | if (err) | ||
4370 | return err; | ||
4371 | err = avc_has_perm(sid, sid, SECCLASS_TUN_SOCKET, | ||
4372 | TUN_SOCKET__RELABELTO, NULL); | ||
4373 | if (err) | ||
4374 | return err; | ||
4375 | |||
4376 | sksec->sid = sid; | ||
4377 | |||
4378 | return 0; | ||
4379 | } | ||
4380 | |||
4328 | static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) | 4381 | static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) |
4329 | { | 4382 | { |
4330 | int err = 0; | 4383 | int err = 0; |
@@ -5494,6 +5547,9 @@ static struct security_operations selinux_ops = { | |||
5494 | .inet_csk_clone = selinux_inet_csk_clone, | 5547 | .inet_csk_clone = selinux_inet_csk_clone, |
5495 | .inet_conn_established = selinux_inet_conn_established, | 5548 | .inet_conn_established = selinux_inet_conn_established, |
5496 | .req_classify_flow = selinux_req_classify_flow, | 5549 | .req_classify_flow = selinux_req_classify_flow, |
5550 | .tun_dev_create = selinux_tun_dev_create, | ||
5551 | .tun_dev_post_create = selinux_tun_dev_post_create, | ||
5552 | .tun_dev_attach = selinux_tun_dev_attach, | ||
5497 | 5553 | ||
5498 | #ifdef CONFIG_SECURITY_NETWORK_XFRM | 5554 | #ifdef CONFIG_SECURITY_NETWORK_XFRM |
5499 | .xfrm_policy_alloc_security = selinux_xfrm_policy_alloc, | 5555 | .xfrm_policy_alloc_security = selinux_xfrm_policy_alloc, |