summaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorRafael J. Wysocki <rjw@sisk.pl>2009-08-18 23:37:37 +0200
committerRafael J. Wysocki <rjw@sisk.pl>2009-08-18 23:37:37 +0200
commitaf15c1addf920d830b030e3489a482456904ca8c (patch)
treedc4adab63d19507f7ac44855ad9920f8fd2dd2f0 /security/selinux/hooks.c
parente6f25a7b2398581a5f96bf9021d0b22c9647acf4 (diff)
parentdcd94dbdaff452b95d4ba11fdbf853b5bda8e6e7 (diff)
downloadkernel-crypto-af15c1addf920d830b030e3489a482456904ca8c.tar.gz
kernel-crypto-af15c1addf920d830b030e3489a482456904ca8c.tar.xz
kernel-crypto-af15c1addf920d830b030e3489a482456904ca8c.zip
Merge branch 'master' into for-linus
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r--security/selinux/hooks.c14
1 files changed, 13 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 1e8cfc4c2ed..8d8b69c5664 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -3030,9 +3030,21 @@ static int selinux_file_mmap(struct file *file, unsigned long reqprot,
int rc = 0;
u32 sid = current_sid();
- if (addr < mmap_min_addr)
+ /*
+ * notice that we are intentionally putting the SELinux check before
+ * the secondary cap_file_mmap check. This is such a likely attempt
+ * at bad behaviour/exploit that we always want to get the AVC, even
+ * if DAC would have also denied the operation.
+ */
+ if (addr < CONFIG_LSM_MMAP_MIN_ADDR) {
rc = avc_has_perm(sid, sid, SECCLASS_MEMPROTECT,
MEMPROTECT__MMAP_ZERO, NULL);
+ if (rc)
+ return rc;
+ }
+
+ /* do DAC check on address space usage */
+ rc = cap_file_mmap(file, reqprot, prot, flags, addr, addr_only);
if (rc || addr_only)
return rc;