[PATCH v4 2/3] Teach SELinux about anonymous inodes

Stephen Smalley sds at tycho.nsa.gov
Fri Mar 27 13:41:55 UTC 2020

On 3/26/20 4:06 PM, Daniel Colascione wrote:
> This change uses the anon_inodes and LSM infrastructure introduced in
> the previous patch to give SELinux the ability to control
> anonymous-inode files that are created using the new _secure()
> anon_inodes functions.
> A SELinux policy author detects and controls these anonymous inodes by
> adding a name-based type_transition rule that assigns a new security
> type to anonymous-inode files created in some domain. The name used
> for the name-based transition is the name associated with the
> anonymous inode for file listings --- e.g., "[userfaultfd]" or
> "[perf_event]".
> Example:
> type uffd_t;
> type_transition sysadm_t sysadm_t : anon_inode uffd_t "[userfaultfd]";
> allow sysadm_t uffd_t:anon_inode { create };
> (The next patch in this series is necessary for making userfaultfd
> support this new interface.  The example above is just
> for exposition.)
> Signed-off-by: Daniel Colascione <dancol at google.com>

Acked-by: Stephen Smalley <sds at tycho.nsa.gov>

More information about the Linux-security-module-archive mailing list