diff options
author | Paul Moore <paul@paul-moore.com> | 2022-08-10 15:55:36 -0400 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2022-08-26 11:19:43 -0400 |
commit | f4d653dcaa4e4056e1630423e6a8ece4869b544f (patch) | |
tree | 36943975de28bc16aceaade7c51c2988cc6f71e6 /net/sctp/objcnt.c | |
parent | 2a5840124009f133bd09fd855963551fb2cefe22 (diff) | |
download | linux-f4d653dcaa4e4056e1630423e6a8ece4869b544f.tar.gz linux-f4d653dcaa4e4056e1630423e6a8ece4869b544f.tar.bz2 linux-f4d653dcaa4e4056e1630423e6a8ece4869b544f.zip |
selinux: implement the security_uring_cmd() LSM hook
Add a SELinux access control for the iouring IORING_OP_URING_CMD
command. This includes the addition of a new permission in the
existing "io_uring" object class: "cmd". The subject of the new
permission check is the domain of the process requesting access, the
object is the open file which points to the device/file that is the
target of the IORING_OP_URING_CMD operation. A sample policy rule
is shown below:
allow <domain> <file>:io_uring { cmd };
Cc: stable@vger.kernel.org
Fixes: ee692a21e9bf ("fs,io_uring: add infrastructure for uring-cmd")
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'net/sctp/objcnt.c')
0 files changed, 0 insertions, 0 deletions