diff options
author | Eric Paris <eparis@redhat.com> | 2009-07-31 12:54:11 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2009-08-05 19:02:23 -0400 |
commit | a2551df7ec568d87793d2eea4ca744e86318f205 (patch) | |
tree | 3bdd4257bf757d9d1d64d9d7aa10cd144cd3a657 /security/selinux | |
parent | 84336d1a77ccd2c06a730ddd38e695c2324a7386 (diff) |
Security/SELinux: seperate lsm specific mmap_min_addr
Currently SELinux enforcement of controls on the ability to map low memory
is determined by the mmap_min_addr tunable. This patch causes SELinux to
ignore the tunable and instead use a seperate Kconfig option specific to how
much space the LSM should protect.
The tunable will now only control the need for CAP_SYS_RAWIO and SELinux
permissions will always protect the amount of low memory designated by
CONFIG_LSM_MMAP_MIN_ADDR.
This allows users who need to disable the mmap_min_addr controls (usual reason
being they run WINE as a non-root user) to do so and still have SELinux
controls preventing confined domains (like a web server) from being able to
map some area of low memory.
Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/hooks.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 8a78f584f46e..5dee88362e71 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -3040,7 +3040,7 @@ static int selinux_file_mmap(struct file *file, unsigned long reqprot, | |||
3040 | * at bad behaviour/exploit that we always want to get the AVC, even | 3040 | * at bad behaviour/exploit that we always want to get the AVC, even |
3041 | * if DAC would have also denied the operation. | 3041 | * if DAC would have also denied the operation. |
3042 | */ | 3042 | */ |
3043 | if (addr < mmap_min_addr) { | 3043 | if (addr < CONFIG_LSM_MMAP_MIN_ADDR) { |
3044 | rc = avc_has_perm(sid, sid, SECCLASS_MEMPROTECT, | 3044 | rc = avc_has_perm(sid, sid, SECCLASS_MEMPROTECT, |
3045 | MEMPROTECT__MMAP_ZERO, NULL); | 3045 | MEMPROTECT__MMAP_ZERO, NULL); |
3046 | if (rc) | 3046 | if (rc) |