lsm: Add hooks to the TUN driver
authorPaul Moore <paul.moore@hp.com>
Fri, 28 Aug 2009 22:12:43 +0000 (18:12 -0400)
committerJames Morris <jmorris@namei.org>
Mon, 31 Aug 2009 22:29:48 +0000 (08:29 +1000)
commit2b980dbd77d229eb60588802162c9659726b11f4
tree78a7f734d0721029e4b4c961ca61d35abe9e6dbc
parentd8e180dcd5bbbab9cd3ff2e779efcf70692ef541
lsm: Add hooks to the TUN driver

The TUN driver lacks any LSM hooks which makes it difficult for LSM modules,
such as SELinux, to enforce access controls on network traffic generated by
TUN users; this is particularly problematic for virtualization apps such as
QEMU and KVM.  This patch adds three new LSM hooks designed to control the
creation and attachment of TUN devices, the hooks are:

 * security_tun_dev_create()
   Provides access control for the creation of new TUN devices

 * security_tun_dev_post_create()
   Provides the ability to create the necessary socket LSM state for newly
   created TUN devices

 * security_tun_dev_attach()
   Provides access control for attaching to existing, persistent TUN devices
   and the ability to update the TUN device's socket LSM state as necessary

Signed-off-by: Paul Moore <paul.moore@hp.com>
Acked-by: Eric Paris <eparis@parisplace.org>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: James Morris <jmorris@namei.org>
drivers/net/tun.c
include/linux/security.h
security/capability.c
security/security.c