Security/SELinux: seperate lsm specific mmap_min_addr
authorEric Paris <eparis@redhat.com>
Fri, 31 Jul 2009 16:54:11 +0000 (12:54 -0400)
committerJames Morris <jmorris@namei.org>
Mon, 17 Aug 2009 05:09:11 +0000 (15:09 +1000)
commit788084aba2ab7348257597496befcbccabdc98a3
tree2da42d746d67b16ef705229a1b5a3528ec19c725
parent8cf948e744e0218af604c32edecde10006dc8e9e
Security/SELinux: seperate lsm specific mmap_min_addr

Currently SELinux enforcement of controls on the ability to map low memory
is determined by the mmap_min_addr tunable.  This patch causes SELinux to
ignore the tunable and instead use a seperate Kconfig option specific to how
much space the LSM should protect.

The tunable will now only control the need for CAP_SYS_RAWIO and SELinux
permissions will always protect the amount of low memory designated by
CONFIG_LSM_MMAP_MIN_ADDR.

This allows users who need to disable the mmap_min_addr controls (usual reason
being they run WINE as a non-root user) to do so and still have SELinux
controls preventing confined domains (like a web server) from being able to
map some area of low memory.

Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
include/linux/mm.h
include/linux/security.h
kernel/sysctl.c
mm/Kconfig
mm/mmap.c
mm/nommu.c
security/Kconfig
security/Makefile
security/commoncap.c
security/min_addr.c [new file with mode: 0644]
security/selinux/hooks.c