[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200207180148.235161-1-smoreland@google.com>
Date: Fri, 7 Feb 2020 10:01:49 -0800
From: Steven Moreland <smoreland@...gle.com>
To: paul@...l-moore.com, sds@...ho.nsa.gov, eparis@...isplace.org,
keescook@...omium.org, anton@...msg.org, ccross@...roid.com,
tony.luck@...el.com, selinux@...r.kernel.org,
linux-kernel@...r.kernel.org, kernel-team@...roid.com
Cc: "Connor O'Brien" <connoro@...gle.com>,
Steven Moreland <smoreland@...gle.com>
Subject: [PATCH v3] security: selinux: allow per-file labeling for bpffs
From: Connor O'Brien <connoro@...gle.com>
Add support for genfscon per-file labeling of bpffs files. This allows
for separate permissions for different pinned bpf objects, which may
be completely unrelated to each other.
Signed-off-by: Connor O'Brien <connoro@...gle.com>
Signed-off-by: Steven Moreland <smoreland@...gle.com>
---
security/selinux/hooks.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index d9e8b2131a65..18f8cd47729c 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -699,6 +699,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
if (!strcmp(sb->s_type->name, "debugfs") ||
!strcmp(sb->s_type->name, "tracefs") ||
!strcmp(sb->s_type->name, "binderfs") ||
+ !strcmp(sb->s_type->name, "bpf") ||
!strcmp(sb->s_type->name, "pstore"))
sbsec->flags |= SE_SBGENFS;
--
2.25.0.341.g760bfbb309-goog
v2 -> v3
- on selinux next branch (instead of master)
Powered by blists - more mailing lists