summaryrefslogtreecommitdiffstats
path: root/fs/userfaultfd.c
diff options
context:
space:
mode:
authorDaniel Colascione <dancol@google.com>2021-01-08 23:22:22 +0100
committerPaul Moore <paul@paul-moore.com>2021-01-14 23:38:10 +0100
commit29cd6591ab6fee3125ea5c1bf350f5013bc615e1 (patch)
treef21fb4dbfb14d257b7eb58a1707da549388b9449 /fs/userfaultfd.c
parentfs: add LSM-supporting anon-inode interface (diff)
downloadlinux-29cd6591ab6fee3125ea5c1bf350f5013bc615e1.tar.xz
linux-29cd6591ab6fee3125ea5c1bf350f5013bc615e1.zip
selinux: teach SELinux about anonymous inodes
This change uses the anon_inodes and LSM infrastructure introduced in the previous patches to give SELinux the ability to control anonymous-inode files that are created using the new anon_inode_getfd_secure() function. A SELinux policy author detects and controls these anonymous inodes by adding a name-based type_transition rule that assigns a new security type to anonymous-inode files created in some domain. The name used for the name-based transition is the name associated with the anonymous inode for file listings --- e.g., "[userfaultfd]" or "[perf_event]". Example: type uffd_t; type_transition sysadm_t sysadm_t : anon_inode uffd_t "[userfaultfd]"; allow sysadm_t uffd_t:anon_inode { create }; (The next patch in this series is necessary for making userfaultfd support this new interface. The example above is just for exposition.) Signed-off-by: Daniel Colascione <dancol@google.com> Signed-off-by: Lokesh Gidra <lokeshgidra@google.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'fs/userfaultfd.c')
0 files changed, 0 insertions, 0 deletions