SELinuxProject/selinux-kernel

RFE: improve handling of anonymous inodes

pcmoore opened this issue · 3 comments

From @stephensmalley on the SELinux mailing list:

... the more general problem of how anonymous inodes are used and handled in the kernel. Presently they are marked S_PRIVATE and exempted by the security framework because they have no per-instance state and a single anon inode is typically shared by many users. Setting another label in the file security struct and using that instead for permission checks may be the only option, but that requires the callers of anon_inode_getfd/anon_inode_getfile to pass in additional information about the object being represented so we can label it meaningfully.