summaryrefslogtreecommitdiffstats
path: root/include/linux/xfrm.h
diff options
context:
space:
mode:
authorEric Paris2009-07-31 18:54:11 +0200
committerJames Morris2009-08-06 01:02:23 +0200
commita2551df7ec568d87793d2eea4ca744e86318f205 (patch)
tree3bdd4257bf757d9d1d64d9d7aa10cd144cd3a657 /include/linux/xfrm.h
parentSELinux: call cap_file_mmap in selinux_file_mmap (diff)
downloadkernel-qcow2-linux-a2551df7ec568d87793d2eea4ca744e86318f205.tar.gz
kernel-qcow2-linux-a2551df7ec568d87793d2eea4ca744e86318f205.tar.xz
kernel-qcow2-linux-a2551df7ec568d87793d2eea4ca744e86318f205.zip
Security/SELinux: seperate lsm specific mmap_min_addr
Currently SELinux enforcement of controls on the ability to map low memory is determined by the mmap_min_addr tunable. This patch causes SELinux to ignore the tunable and instead use a seperate Kconfig option specific to how much space the LSM should protect. The tunable will now only control the need for CAP_SYS_RAWIO and SELinux permissions will always protect the amount of low memory designated by CONFIG_LSM_MMAP_MIN_ADDR. This allows users who need to disable the mmap_min_addr controls (usual reason being they run WINE as a non-root user) to do so and still have SELinux controls preventing confined domains (like a web server) from being able to map some area of low memory. Signed-off-by: Eric Paris <eparis@redhat.com> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'include/linux/xfrm.h')
0 files changed, 0 insertions, 0 deletions