android_kernel_samsung_msm8976/net/tipc
Stephen Smalley afabf2a8b6 net/tipc: initialize security state for new connection socket
[ Upstream commit fdd75ea8df370f206a8163786e7470c1277a5064 ]

Calling connect() with an AF_TIPC socket would trigger a series
of error messages from SELinux along the lines of:
SELinux: Invalid class 0
type=AVC msg=audit(1434126658.487:34500): avc:  denied  { <unprintable> }
  for pid=292 comm="kworker/u16:5" scontext=system_u:system_r:kernel_t:s0
  tcontext=system_u:object_r:unlabeled_t:s0 tclass=<unprintable>
  permissive=0

This was due to a failure to initialize the security state of the new
connection sock by the tipc code, leaving it with junk in the security
class field and an unlabeled secid.  Add a call to security_sk_clone()
to inherit the security state from the parent socket.

Reported-by: Tim Shearer <tim.shearer@overturenetworks.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Paul Moore <paul@paul-moore.com>
Acked-by: Ying Xue <ying.xue@windriver.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2015-10-01 12:07:35 +02:00
..
Kconfig tipc: add InfiniBand media type 2013-04-17 14:18:33 -04:00
Makefile tipc: add InfiniBand media type 2013-04-17 14:18:33 -04:00
addr.c
addr.h
bcast.c tipc: clear 'next'-pointer of message fragments before reassembly 2014-07-28 08:00:05 -07:00
bcast.h
bearer.c tipc: add InfiniBand media type 2013-04-17 14:18:33 -04:00
bearer.h tipc: add InfiniBand media type 2013-04-17 14:18:33 -04:00
config.c
config.h
core.c tipc: add InfiniBand media type 2013-04-17 14:18:33 -04:00
core.h
discover.c tipc: move bcast_addr from struct tipc_media to struct tipc_bearer 2013-04-17 14:18:33 -04:00
discover.h
eth_media.c tipc: set skb->protocol in eth_media packet transmission 2013-04-17 14:18:33 -04:00
handler.c
ib_media.c tipc: add InfiniBand media type 2013-04-17 14:18:33 -04:00
link.c tipc: potential divide by zero in tipc_link_recv_fragment() 2013-05-06 16:16:52 -04:00
link.h
log.c
msg.c
msg.h
name_distr.c
name_distr.h
name_table.c
name_table.h
net.c
net.h
netlink.c net: Use netlink_ns_capable to verify the permisions of netlink messages 2014-06-26 15:12:37 -04:00
node.c
node.h
node_subscr.c
node_subscr.h
port.c
port.h
ref.c
ref.h
socket.c net/tipc: initialize security state for new connection socket 2015-10-01 12:07:35 +02:00
subscr.c
subscr.h