selinux: Support for the new TUN LSM hooks
authorPaul Moore <paul.moore@hp.com>
Fri, 28 Aug 2009 22:12:49 +0000 (18:12 -0400)
committerJames Morris <jmorris@namei.org>
Mon, 31 Aug 2009 22:29:52 +0000 (08:29 +1000)
commited6d76e4c32de0c2ad5f1d572b948ef49e465176
tree893914916ad849fefed72df48bca0bf9c78e392d
parent2b980dbd77d229eb60588802162c9659726b11f4
selinux: Support for the new TUN LSM hooks

Add support for the new TUN LSM hooks: security_tun_dev_create(),
security_tun_dev_post_create() and security_tun_dev_attach().  This includes
the addition of a new object class, tun_socket, which represents the socks
associated with TUN devices.  The _tun_dev_create() and _tun_dev_post_create()
hooks are fairly similar to the standard socket functions but _tun_dev_attach()
is a bit special.  The _tun_dev_attach() is unique because it involves a
domain attaching to an existing TUN device and its associated tun_socket
object, an operation which does not exist with standard sockets and most
closely resembles a relabel operation.

Signed-off-by: Paul Moore <paul.moore@hp.com>
Acked-by: Eric Paris <eparis@parisplace.org>
Signed-off-by: James Morris <jmorris@namei.org>
security/selinux/hooks.c
security/selinux/include/av_inherit.h
security/selinux/include/av_permissions.h
security/selinux/include/class_to_string.h
security/selinux/include/flask.h