Searched hist:"2 b980dbd77d229eb60588802162c9659726b11f4" (Results 1 – 3 of 3) sorted by relevance
/openbmc/linux/drivers/net/ |
H A D | tun.c | diff 36989b90879c785f95b877bdcf65a2527dadd893 Wed Sep 16 16:36:13 CDT 2009 Kusanagi Kouichi <slash@ma.neweb.ne.jp> tun: Return -EINVAL if neither IFF_TUN nor IFF_TAP is set.
After commit 2b980dbd77d229eb60588802162c9659726b11f4 ("lsm: Add hooks to the TUN driver") tun_set_iff doesn't return -EINVAL though neither IFF_TUN nor IFF_TAP is set.
Signed-off-by: Kusanagi Kouichi <slash@ma.neweb.ne.jp> Reviewed-by: Paul Moore <paul.moore@hp.com> Signed-off-by: David S. Miller <davem@davemloft.net> diff 2b980dbd77d229eb60588802162c9659726b11f4 Fri Aug 28 17:12:43 CDT 2009 Paul Moore <paul.moore@hp.com> lsm: Add hooks to the TUN driver
The TUN driver lacks any LSM hooks which makes it difficult for LSM modules, such as SELinux, to enforce access controls on network traffic generated by TUN users; this is particularly problematic for virtualization apps such as QEMU and KVM. This patch adds three new LSM hooks designed to control the creation and attachment of TUN devices, the hooks are:
* security_tun_dev_create() Provides access control for the creation of new TUN devices
* security_tun_dev_post_create() Provides the ability to create the necessary socket LSM state for newly created TUN devices
* security_tun_dev_attach() Provides access control for attaching to existing, persistent TUN devices and the ability to update the TUN device's socket LSM state as necessary
Signed-off-by: Paul Moore <paul.moore@hp.com> Acked-by: Eric Paris <eparis@parisplace.org> Acked-by: Serge Hallyn <serue@us.ibm.com> Acked-by: David S. Miller <davem@davemloft.net> Signed-off-by: James Morris <jmorris@namei.org>
|
/openbmc/linux/include/linux/ |
H A D | security.h | diff 2b980dbd77d229eb60588802162c9659726b11f4 Fri Aug 28 17:12:43 CDT 2009 Paul Moore <paul.moore@hp.com> lsm: Add hooks to the TUN driver
The TUN driver lacks any LSM hooks which makes it difficult for LSM modules, such as SELinux, to enforce access controls on network traffic generated by TUN users; this is particularly problematic for virtualization apps such as QEMU and KVM. This patch adds three new LSM hooks designed to control the creation and attachment of TUN devices, the hooks are:
* security_tun_dev_create() Provides access control for the creation of new TUN devices
* security_tun_dev_post_create() Provides the ability to create the necessary socket LSM state for newly created TUN devices
* security_tun_dev_attach() Provides access control for attaching to existing, persistent TUN devices and the ability to update the TUN device's socket LSM state as necessary
Signed-off-by: Paul Moore <paul.moore@hp.com> Acked-by: Eric Paris <eparis@parisplace.org> Acked-by: Serge Hallyn <serue@us.ibm.com> Acked-by: David S. Miller <davem@davemloft.net> Signed-off-by: James Morris <jmorris@namei.org>
|
/openbmc/linux/security/ |
H A D | security.c | diff 2b980dbd77d229eb60588802162c9659726b11f4 Fri Aug 28 17:12:43 CDT 2009 Paul Moore <paul.moore@hp.com> lsm: Add hooks to the TUN driver
The TUN driver lacks any LSM hooks which makes it difficult for LSM modules, such as SELinux, to enforce access controls on network traffic generated by TUN users; this is particularly problematic for virtualization apps such as QEMU and KVM. This patch adds three new LSM hooks designed to control the creation and attachment of TUN devices, the hooks are:
* security_tun_dev_create() Provides access control for the creation of new TUN devices
* security_tun_dev_post_create() Provides the ability to create the necessary socket LSM state for newly created TUN devices
* security_tun_dev_attach() Provides access control for attaching to existing, persistent TUN devices and the ability to update the TUN device's socket LSM state as necessary
Signed-off-by: Paul Moore <paul.moore@hp.com> Acked-by: Eric Paris <eparis@parisplace.org> Acked-by: Serge Hallyn <serue@us.ibm.com> Acked-by: David S. Miller <davem@davemloft.net> Signed-off-by: James Morris <jmorris@namei.org>
|