db4c9641de
Fix the SELinux mprotect checks on executable mappings so that they are not re-applied when the mapping is already executable as well as cleaning up the code. This avoids a situation where e.g. an application is prevented from removing PROT_WRITE on an already executable mapping previously authorized via execmem permission due to an execmod denial. Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: James Morris <jmorris@namei.org> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
---|---|---|
.. | ||
include | ||
ss | ||
avc.c | ||
hooks.c | ||
Kconfig | ||
Makefile | ||
netif.c | ||
netlink.c | ||
nlmsgtab.c | ||
selinuxfs.c | ||
xfrm.c |