mirror of https://gitee.com/openkylin/linux.git
db4c9641de
Fix the SELinux mprotect checks on executable mappings so that they are not re-applied when the mapping is already executable as well as cleaning up the code. This avoids a situation where e.g. an application is prevented from removing PROT_WRITE on an already executable mapping previously authorized via execmem permission due to an execmod denial. Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: James Morris <jmorris@namei.org> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
---|---|---|
.. | ||
keys | ||
selinux | ||
Kconfig | ||
Makefile | ||
capability.c | ||
commoncap.c | ||
dummy.c | ||
inode.c | ||
root_plug.c | ||
seclvl.c | ||
security.c |