mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-17 01:04:19 +08:00
ed03218951
Add a new security check on mmap operations to see if the user is attempting to mmap to low area of the address space. The amount of space protected is indicated by the new proc tunable /proc/sys/vm/mmap_min_addr and defaults to 0, preserving existing behavior. This patch uses a new SELinux security class "memprotect." Policy already contains a number of allow rules like a_t self:process * (unconfined_t being one of them) which mean that putting this check in the process class (its best current fit) would make it useless as all user processes, which we also want to protect against, would be allowed. By taking the memprotect name of the new class it will also make it possible for us to move some of the other memory protect permissions out of 'process' and into the new class next time we bump the policy version number (which I also think is a good future idea) Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Chris Wright <chrisw@sous-sol.org> Signed-off-by: Eric Paris <eparis@redhat.com> Signed-off-by: James Morris <jmorris@namei.org>
67 lines
1.3 KiB
C
67 lines
1.3 KiB
C
/* This file is automatically generated. Do not edit. */
|
|
/*
|
|
* Security object class definitions
|
|
*/
|
|
S_(NULL)
|
|
S_("security")
|
|
S_("process")
|
|
S_("system")
|
|
S_("capability")
|
|
S_("filesystem")
|
|
S_("file")
|
|
S_("dir")
|
|
S_("fd")
|
|
S_("lnk_file")
|
|
S_("chr_file")
|
|
S_("blk_file")
|
|
S_("sock_file")
|
|
S_("fifo_file")
|
|
S_("socket")
|
|
S_("tcp_socket")
|
|
S_("udp_socket")
|
|
S_("rawip_socket")
|
|
S_("node")
|
|
S_("netif")
|
|
S_("netlink_socket")
|
|
S_("packet_socket")
|
|
S_("key_socket")
|
|
S_("unix_stream_socket")
|
|
S_("unix_dgram_socket")
|
|
S_("sem")
|
|
S_("msg")
|
|
S_("msgq")
|
|
S_("shm")
|
|
S_("ipc")
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_("netlink_route_socket")
|
|
S_("netlink_firewall_socket")
|
|
S_("netlink_tcpdiag_socket")
|
|
S_("netlink_nflog_socket")
|
|
S_("netlink_xfrm_socket")
|
|
S_("netlink_selinux_socket")
|
|
S_("netlink_audit_socket")
|
|
S_("netlink_ip6fw_socket")
|
|
S_("netlink_dnrt_socket")
|
|
S_(NULL)
|
|
S_(NULL)
|
|
S_("association")
|
|
S_("netlink_kobject_uevent_socket")
|
|
S_("appletalk_socket")
|
|
S_("packet")
|
|
S_("key")
|
|
S_(NULL)
|
|
S_("dccp_socket")
|
|
S_("memprotect")
|