linux/security/selinux
Eric Paris 6a25b27d60 SELinux: open perm for sock files
When I did open permissions I didn't think any sockets would have an open.
Turns out AF_UNIX sockets can have an open when they are bound to the
filesystem namespace.  This patch adds a new SOCK_FILE__OPEN permission.
It's safe to add this as the open perms are already predicated on
capabilities and capabilities means we have unknown perm handling so
systems should be as backwards compatible as the policy wants them to
be.

https://bugzilla.redhat.com/show_bug.cgi?id=475224

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
2009-03-06 08:50:18 +11:00
..
include SELinux: open perm for sock files 2009-03-06 08:50:18 +11:00
ss SELinux: remove unused av.decided field 2009-02-14 09:23:08 +11:00
Kconfig selinux: Deprecate and schedule the removal of the the compat_net functionality 2008-12-31 12:54:11 -05:00
Makefile SELinux: Add network port SID cache 2008-04-18 20:26:16 +10:00
avc.c SELinux: convert the avc cache hash list to an hlist 2009-02-14 09:23:48 +11:00
exports.c CRED: Wrap current->cred and a few other accessors 2008-11-14 10:39:18 +11:00
hooks.c SELinux: open perm for sock files 2009-03-06 08:50:18 +11:00
netif.c SELinux fixups needed for preemptable RCU from -rt 2008-04-22 15:37:23 +10:00
netlabel.c selinux: Cache NetLabel secattrs in the socket's security struct 2008-10-10 10:16:33 -04:00
netlink.c SELinux: netlink.c whitespace, syntax, and static declaraction cleanups 2008-04-21 19:05:05 +10:00
netnode.c SELinux: keep the code clean formating and syntax 2008-07-14 15:01:36 +10:00
netport.c SELinux: keep the code clean formating and syntax 2008-07-14 15:01:36 +10:00
nlmsgtab.c selinux: recognize netlink messages for 'ip addrlabel' 2008-11-06 07:08:36 +08:00
selinuxfs.c SELinux: remove unused av.decided field 2009-02-14 09:23:08 +11:00
xfrm.c CRED: Wrap current->cred and a few other accessors 2008-11-14 10:39:18 +11:00