mirror of
https://github.com/torvalds/linux.git
synced 2024-11-10 22:21:40 +00:00
netlabel: Cleanup the Smack/NetLabel code to fix incoming TCP connections
This patch cleans up a lot of the Smack network access control code. The largest changes are to fix the labeling of incoming TCP connections in a manner similar to the recent SELinux changes which use the security_inet_conn_request() hook to label the request_sock and let the label move to the child socket via the normal network stack mechanisms. In addition to the incoming TCP connection fixes this patch also removes the smk_labled field from the socket_smack struct as the minor optimization advantage was outweighed by the difficulty in maintaining it's proper state. Signed-off-by: Paul Moore <paul.moore@hp.com> Acked-by: Casey Schaufler <casey@schaufler-ca.com> Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
parent
8651d5c0b1
commit
07feee8f81
@ -417,6 +417,7 @@ int netlbl_conn_setattr(struct sock *sk,
|
|||||||
const struct netlbl_lsm_secattr *secattr);
|
const struct netlbl_lsm_secattr *secattr);
|
||||||
int netlbl_req_setattr(struct request_sock *req,
|
int netlbl_req_setattr(struct request_sock *req,
|
||||||
const struct netlbl_lsm_secattr *secattr);
|
const struct netlbl_lsm_secattr *secattr);
|
||||||
|
void netlbl_req_delattr(struct request_sock *req);
|
||||||
int netlbl_skbuff_setattr(struct sk_buff *skb,
|
int netlbl_skbuff_setattr(struct sk_buff *skb,
|
||||||
u16 family,
|
u16 family,
|
||||||
const struct netlbl_lsm_secattr *secattr);
|
const struct netlbl_lsm_secattr *secattr);
|
||||||
@ -547,6 +548,10 @@ static inline int netlbl_req_setattr(struct request_sock *req,
|
|||||||
{
|
{
|
||||||
return -ENOSYS;
|
return -ENOSYS;
|
||||||
}
|
}
|
||||||
|
static inline void netlbl_req_delattr(struct request_sock *req)
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
static inline int netlbl_skbuff_setattr(struct sk_buff *skb,
|
static inline int netlbl_skbuff_setattr(struct sk_buff *skb,
|
||||||
u16 family,
|
u16 family,
|
||||||
const struct netlbl_lsm_secattr *secattr)
|
const struct netlbl_lsm_secattr *secattr)
|
||||||
|
@ -860,6 +860,19 @@ req_setattr_return:
|
|||||||
return ret_val;
|
return ret_val;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* netlbl_req_delattr - Delete all the NetLabel labels on a socket
|
||||||
|
* @req: the socket
|
||||||
|
*
|
||||||
|
* Description:
|
||||||
|
* Remove all the NetLabel labeling from @req.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
void netlbl_req_delattr(struct request_sock *req)
|
||||||
|
{
|
||||||
|
cipso_v4_req_delattr(req);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* netlbl_skbuff_setattr - Label a packet using the correct protocol
|
* netlbl_skbuff_setattr - Label a packet using the correct protocol
|
||||||
* @skb: the packet
|
* @skb: the packet
|
||||||
|
@ -42,7 +42,6 @@ struct superblock_smack {
|
|||||||
struct socket_smack {
|
struct socket_smack {
|
||||||
char *smk_out; /* outbound label */
|
char *smk_out; /* outbound label */
|
||||||
char *smk_in; /* inbound label */
|
char *smk_in; /* inbound label */
|
||||||
int smk_labeled; /* label scheme */
|
|
||||||
char smk_packet[SMK_LABELLEN]; /* TCP peer label */
|
char smk_packet[SMK_LABELLEN]; /* TCP peer label */
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@
|
|||||||
* Casey Schaufler <casey@schaufler-ca.com>
|
* Casey Schaufler <casey@schaufler-ca.com>
|
||||||
*
|
*
|
||||||
* Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com>
|
* Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com>
|
||||||
|
* Copyright (C) 2009 Hewlett-Packard Development Company, L.P.
|
||||||
|
* Paul Moore <paul.moore@hp.com>
|
||||||
*
|
*
|
||||||
* This program is free software; you can redistribute it and/or modify
|
* This program is free software; you can redistribute it and/or modify
|
||||||
* it under the terms of the GNU General Public License version 2,
|
* it under the terms of the GNU General Public License version 2,
|
||||||
@ -20,6 +22,7 @@
|
|||||||
#include <linux/ext2_fs.h>
|
#include <linux/ext2_fs.h>
|
||||||
#include <linux/kd.h>
|
#include <linux/kd.h>
|
||||||
#include <asm/ioctls.h>
|
#include <asm/ioctls.h>
|
||||||
|
#include <linux/ip.h>
|
||||||
#include <linux/tcp.h>
|
#include <linux/tcp.h>
|
||||||
#include <linux/udp.h>
|
#include <linux/udp.h>
|
||||||
#include <linux/mutex.h>
|
#include <linux/mutex.h>
|
||||||
@ -1275,7 +1278,6 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags)
|
|||||||
|
|
||||||
ssp->smk_in = csp;
|
ssp->smk_in = csp;
|
||||||
ssp->smk_out = csp;
|
ssp->smk_out = csp;
|
||||||
ssp->smk_labeled = SMACK_CIPSO_SOCKET;
|
|
||||||
ssp->smk_packet[0] = '\0';
|
ssp->smk_packet[0] = '\0';
|
||||||
|
|
||||||
sk->sk_security = ssp;
|
sk->sk_security = ssp;
|
||||||
@ -1294,6 +1296,39 @@ static void smack_sk_free_security(struct sock *sk)
|
|||||||
kfree(sk->sk_security);
|
kfree(sk->sk_security);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* smack_host_label - check host based restrictions
|
||||||
|
* @sip: the object end
|
||||||
|
*
|
||||||
|
* looks for host based access restrictions
|
||||||
|
*
|
||||||
|
* This version will only be appropriate for really small sets of single label
|
||||||
|
* hosts. The caller is responsible for ensuring that the RCU read lock is
|
||||||
|
* taken before calling this function.
|
||||||
|
*
|
||||||
|
* Returns the label of the far end or NULL if it's not special.
|
||||||
|
*/
|
||||||
|
static char *smack_host_label(struct sockaddr_in *sip)
|
||||||
|
{
|
||||||
|
struct smk_netlbladdr *snp;
|
||||||
|
struct in_addr *siap = &sip->sin_addr;
|
||||||
|
|
||||||
|
if (siap->s_addr == 0)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
list_for_each_entry_rcu(snp, &smk_netlbladdr_list, list)
|
||||||
|
/*
|
||||||
|
* we break after finding the first match because
|
||||||
|
* the list is sorted from longest to shortest mask
|
||||||
|
* so we have found the most specific match
|
||||||
|
*/
|
||||||
|
if ((&snp->smk_host.sin_addr)->s_addr ==
|
||||||
|
(siap->s_addr & (&snp->smk_mask)->s_addr))
|
||||||
|
return snp->smk_label;
|
||||||
|
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* smack_set_catset - convert a capset to netlabel mls categories
|
* smack_set_catset - convert a capset to netlabel mls categories
|
||||||
* @catset: the Smack categories
|
* @catset: the Smack categories
|
||||||
@ -1365,11 +1400,10 @@ static void smack_to_secattr(char *smack, struct netlbl_lsm_secattr *nlsp)
|
|||||||
*/
|
*/
|
||||||
static int smack_netlabel(struct sock *sk, int labeled)
|
static int smack_netlabel(struct sock *sk, int labeled)
|
||||||
{
|
{
|
||||||
struct socket_smack *ssp;
|
struct socket_smack *ssp = sk->sk_security;
|
||||||
struct netlbl_lsm_secattr secattr;
|
struct netlbl_lsm_secattr secattr;
|
||||||
int rc = 0;
|
int rc = 0;
|
||||||
|
|
||||||
ssp = sk->sk_security;
|
|
||||||
/*
|
/*
|
||||||
* Usually the netlabel code will handle changing the
|
* Usually the netlabel code will handle changing the
|
||||||
* packet labeling based on the label.
|
* packet labeling based on the label.
|
||||||
@ -1393,20 +1427,44 @@ static int smack_netlabel(struct sock *sk, int labeled)
|
|||||||
|
|
||||||
bh_unlock_sock(sk);
|
bh_unlock_sock(sk);
|
||||||
local_bh_enable();
|
local_bh_enable();
|
||||||
/*
|
|
||||||
* Remember the label scheme used so that it is not
|
|
||||||
* necessary to do the netlabel setting if it has not
|
|
||||||
* changed the next time through.
|
|
||||||
*
|
|
||||||
* The -EDESTADDRREQ case is an indication that there's
|
|
||||||
* a single level host involved.
|
|
||||||
*/
|
|
||||||
if (rc == 0)
|
|
||||||
ssp->smk_labeled = labeled;
|
|
||||||
|
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* smack_netlbel_send - Set the secattr on a socket and perform access checks
|
||||||
|
* @sk: the socket
|
||||||
|
* @sap: the destination address
|
||||||
|
*
|
||||||
|
* Set the correct secattr for the given socket based on the destination
|
||||||
|
* address and perform any outbound access checks needed.
|
||||||
|
*
|
||||||
|
* Returns 0 on success or an error code.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
static int smack_netlabel_send(struct sock *sk, struct sockaddr_in *sap)
|
||||||
|
{
|
||||||
|
int rc;
|
||||||
|
int sk_lbl;
|
||||||
|
char *hostsp;
|
||||||
|
struct socket_smack *ssp = sk->sk_security;
|
||||||
|
|
||||||
|
rcu_read_lock();
|
||||||
|
hostsp = smack_host_label(sap);
|
||||||
|
if (hostsp != NULL) {
|
||||||
|
sk_lbl = SMACK_UNLABELED_SOCKET;
|
||||||
|
rc = smk_access(ssp->smk_out, hostsp, MAY_WRITE);
|
||||||
|
} else {
|
||||||
|
sk_lbl = SMACK_CIPSO_SOCKET;
|
||||||
|
rc = 0;
|
||||||
|
}
|
||||||
|
rcu_read_unlock();
|
||||||
|
if (rc != 0)
|
||||||
|
return rc;
|
||||||
|
|
||||||
|
return smack_netlabel(sk, sk_lbl);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* smack_inode_setsecurity - set smack xattrs
|
* smack_inode_setsecurity - set smack xattrs
|
||||||
* @inode: the object
|
* @inode: the object
|
||||||
@ -1488,43 +1546,6 @@ static int smack_socket_post_create(struct socket *sock, int family,
|
|||||||
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
|
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* smack_host_label - check host based restrictions
|
|
||||||
* @sip: the object end
|
|
||||||
*
|
|
||||||
* looks for host based access restrictions
|
|
||||||
*
|
|
||||||
* This version will only be appropriate for really small
|
|
||||||
* sets of single label hosts.
|
|
||||||
*
|
|
||||||
* Returns the label of the far end or NULL if it's not special.
|
|
||||||
*/
|
|
||||||
static char *smack_host_label(struct sockaddr_in *sip)
|
|
||||||
{
|
|
||||||
struct smk_netlbladdr *snp;
|
|
||||||
struct in_addr *siap = &sip->sin_addr;
|
|
||||||
|
|
||||||
if (siap->s_addr == 0)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
rcu_read_lock();
|
|
||||||
list_for_each_entry_rcu(snp, &smk_netlbladdr_list, list) {
|
|
||||||
/*
|
|
||||||
* we break after finding the first match because
|
|
||||||
* the list is sorted from longest to shortest mask
|
|
||||||
* so we have found the most specific match
|
|
||||||
*/
|
|
||||||
if ((&snp->smk_host.sin_addr)->s_addr ==
|
|
||||||
(siap->s_addr & (&snp->smk_mask)->s_addr)) {
|
|
||||||
rcu_read_unlock();
|
|
||||||
return snp->smk_label;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
rcu_read_unlock();
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* smack_socket_connect - connect access check
|
* smack_socket_connect - connect access check
|
||||||
* @sock: the socket
|
* @sock: the socket
|
||||||
@ -1538,30 +1559,12 @@ static char *smack_host_label(struct sockaddr_in *sip)
|
|||||||
static int smack_socket_connect(struct socket *sock, struct sockaddr *sap,
|
static int smack_socket_connect(struct socket *sock, struct sockaddr *sap,
|
||||||
int addrlen)
|
int addrlen)
|
||||||
{
|
{
|
||||||
struct socket_smack *ssp = sock->sk->sk_security;
|
|
||||||
char *hostsp;
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
if (sock->sk == NULL || sock->sk->sk_family != PF_INET)
|
if (sock->sk == NULL || sock->sk->sk_family != PF_INET)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
if (addrlen < sizeof(struct sockaddr_in))
|
if (addrlen < sizeof(struct sockaddr_in))
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
hostsp = smack_host_label((struct sockaddr_in *)sap);
|
return smack_netlabel_send(sock->sk, (struct sockaddr_in *)sap);
|
||||||
if (hostsp == NULL) {
|
|
||||||
if (ssp->smk_labeled != SMACK_CIPSO_SOCKET)
|
|
||||||
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
rc = smk_access(ssp->smk_out, hostsp, MAY_WRITE);
|
|
||||||
if (rc != 0)
|
|
||||||
return rc;
|
|
||||||
|
|
||||||
if (ssp->smk_labeled != SMACK_UNLABELED_SOCKET)
|
|
||||||
return smack_netlabel(sock->sk, SMACK_UNLABELED_SOCKET);
|
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -2262,9 +2265,6 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg,
|
|||||||
int size)
|
int size)
|
||||||
{
|
{
|
||||||
struct sockaddr_in *sip = (struct sockaddr_in *) msg->msg_name;
|
struct sockaddr_in *sip = (struct sockaddr_in *) msg->msg_name;
|
||||||
struct socket_smack *ssp = sock->sk->sk_security;
|
|
||||||
char *hostsp;
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Perfectly reasonable for this to be NULL
|
* Perfectly reasonable for this to be NULL
|
||||||
@ -2272,22 +2272,7 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg,
|
|||||||
if (sip == NULL || sip->sin_family != PF_INET)
|
if (sip == NULL || sip->sin_family != PF_INET)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
hostsp = smack_host_label(sip);
|
return smack_netlabel_send(sock->sk, sip);
|
||||||
if (hostsp == NULL) {
|
|
||||||
if (ssp->smk_labeled != SMACK_CIPSO_SOCKET)
|
|
||||||
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
rc = smk_access(ssp->smk_out, hostsp, MAY_WRITE);
|
|
||||||
if (rc != 0)
|
|
||||||
return rc;
|
|
||||||
|
|
||||||
if (ssp->smk_labeled != SMACK_UNLABELED_SOCKET)
|
|
||||||
return smack_netlabel(sock->sk, SMACK_UNLABELED_SOCKET);
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -2492,31 +2477,24 @@ static int smack_socket_getpeersec_dgram(struct socket *sock,
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* smack_sock_graft - graft access state between two sockets
|
* smack_sock_graft - Initialize a newly created socket with an existing sock
|
||||||
* @sk: fresh sock
|
* @sk: child sock
|
||||||
* @parent: donor socket
|
* @parent: parent socket
|
||||||
*
|
*
|
||||||
* Sets the netlabel socket state on sk from parent
|
* Set the smk_{in,out} state of an existing sock based on the process that
|
||||||
|
* is creating the new socket.
|
||||||
*/
|
*/
|
||||||
static void smack_sock_graft(struct sock *sk, struct socket *parent)
|
static void smack_sock_graft(struct sock *sk, struct socket *parent)
|
||||||
{
|
{
|
||||||
struct socket_smack *ssp;
|
struct socket_smack *ssp;
|
||||||
int rc;
|
|
||||||
|
|
||||||
if (sk == NULL)
|
if (sk == NULL ||
|
||||||
return;
|
(sk->sk_family != PF_INET && sk->sk_family != PF_INET6))
|
||||||
|
|
||||||
if (sk->sk_family != PF_INET && sk->sk_family != PF_INET6)
|
|
||||||
return;
|
return;
|
||||||
|
|
||||||
ssp = sk->sk_security;
|
ssp = sk->sk_security;
|
||||||
ssp->smk_in = ssp->smk_out = current_security();
|
ssp->smk_in = ssp->smk_out = current_security();
|
||||||
ssp->smk_packet[0] = '\0';
|
/* cssp->smk_packet is already set in smack_inet_csk_clone() */
|
||||||
|
|
||||||
rc = smack_netlabel(sk, SMACK_CIPSO_SOCKET);
|
|
||||||
if (rc != 0)
|
|
||||||
printk(KERN_WARNING "Smack: \"%s\" netlbl error %d.\n",
|
|
||||||
__func__, -rc);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -2531,35 +2509,82 @@ static void smack_sock_graft(struct sock *sk, struct socket *parent)
|
|||||||
static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb,
|
static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb,
|
||||||
struct request_sock *req)
|
struct request_sock *req)
|
||||||
{
|
{
|
||||||
struct netlbl_lsm_secattr skb_secattr;
|
u16 family = sk->sk_family;
|
||||||
struct socket_smack *ssp = sk->sk_security;
|
struct socket_smack *ssp = sk->sk_security;
|
||||||
|
struct netlbl_lsm_secattr secattr;
|
||||||
|
struct sockaddr_in addr;
|
||||||
|
struct iphdr *hdr;
|
||||||
char smack[SMK_LABELLEN];
|
char smack[SMK_LABELLEN];
|
||||||
int rc;
|
int rc;
|
||||||
|
|
||||||
if (skb == NULL)
|
/* handle mapped IPv4 packets arriving via IPv6 sockets */
|
||||||
return -EACCES;
|
if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP))
|
||||||
|
family = PF_INET;
|
||||||
|
|
||||||
netlbl_secattr_init(&skb_secattr);
|
netlbl_secattr_init(&secattr);
|
||||||
rc = netlbl_skbuff_getattr(skb, sk->sk_family, &skb_secattr);
|
rc = netlbl_skbuff_getattr(skb, family, &secattr);
|
||||||
if (rc == 0)
|
if (rc == 0)
|
||||||
smack_from_secattr(&skb_secattr, smack);
|
smack_from_secattr(&secattr, smack);
|
||||||
else
|
else
|
||||||
strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN);
|
strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN);
|
||||||
netlbl_secattr_destroy(&skb_secattr);
|
netlbl_secattr_destroy(&secattr);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Receiving a packet requires that the other end
|
* Receiving a packet requires that the other end be able to write
|
||||||
* be able to write here. Read access is not required.
|
* here. Read access is not required.
|
||||||
*
|
|
||||||
* If the request is successful save the peer's label
|
|
||||||
* so that SO_PEERCRED can report it.
|
|
||||||
*/
|
*/
|
||||||
rc = smk_access(smack, ssp->smk_in, MAY_WRITE);
|
rc = smk_access(smack, ssp->smk_in, MAY_WRITE);
|
||||||
if (rc == 0)
|
if (rc != 0)
|
||||||
strncpy(ssp->smk_packet, smack, SMK_MAXLEN);
|
return rc;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Save the peer's label in the request_sock so we can later setup
|
||||||
|
* smk_packet in the child socket so that SO_PEERCRED can report it.
|
||||||
|
*/
|
||||||
|
req->peer_secid = smack_to_secid(smack);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* We need to decide if we want to label the incoming connection here
|
||||||
|
* if we do we only need to label the request_sock and the stack will
|
||||||
|
* propogate the wire-label to the sock when it is created.
|
||||||
|
*/
|
||||||
|
hdr = ip_hdr(skb);
|
||||||
|
addr.sin_addr.s_addr = hdr->saddr;
|
||||||
|
rcu_read_lock();
|
||||||
|
if (smack_host_label(&addr) == NULL) {
|
||||||
|
rcu_read_unlock();
|
||||||
|
netlbl_secattr_init(&secattr);
|
||||||
|
smack_to_secattr(smack, &secattr);
|
||||||
|
rc = netlbl_req_setattr(req, &secattr);
|
||||||
|
netlbl_secattr_destroy(&secattr);
|
||||||
|
} else {
|
||||||
|
rcu_read_unlock();
|
||||||
|
netlbl_req_delattr(req);
|
||||||
|
}
|
||||||
|
|
||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* smack_inet_csk_clone - Copy the connection information to the new socket
|
||||||
|
* @sk: the new socket
|
||||||
|
* @req: the connection's request_sock
|
||||||
|
*
|
||||||
|
* Transfer the connection's peer label to the newly created socket.
|
||||||
|
*/
|
||||||
|
static void smack_inet_csk_clone(struct sock *sk,
|
||||||
|
const struct request_sock *req)
|
||||||
|
{
|
||||||
|
struct socket_smack *ssp = sk->sk_security;
|
||||||
|
char *smack;
|
||||||
|
|
||||||
|
if (req->peer_secid != 0) {
|
||||||
|
smack = smack_from_secid(req->peer_secid);
|
||||||
|
strncpy(ssp->smk_packet, smack, SMK_MAXLEN);
|
||||||
|
} else
|
||||||
|
ssp->smk_packet[0] = '\0';
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Key management security hooks
|
* Key management security hooks
|
||||||
*
|
*
|
||||||
@ -2911,6 +2936,7 @@ struct security_operations smack_ops = {
|
|||||||
.sk_free_security = smack_sk_free_security,
|
.sk_free_security = smack_sk_free_security,
|
||||||
.sock_graft = smack_sock_graft,
|
.sock_graft = smack_sock_graft,
|
||||||
.inet_conn_request = smack_inet_conn_request,
|
.inet_conn_request = smack_inet_conn_request,
|
||||||
|
.inet_csk_clone = smack_inet_csk_clone,
|
||||||
|
|
||||||
/* key management security hooks */
|
/* key management security hooks */
|
||||||
#ifdef CONFIG_KEYS
|
#ifdef CONFIG_KEYS
|
||||||
|
Loading…
Reference in New Issue
Block a user