2009-07-31 18:54:11 +02:00
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/security.h>
|
|
|
|
#include <linux/sysctl.h>
|
|
|
|
|
|
|
|
/* amount of vm to protect from userspace access by both DAC and the LSM*/
|
|
|
|
unsigned long mmap_min_addr;
|
|
|
|
/* amount of vm to protect from userspace using CAP_SYS_RAWIO (DAC) */
|
|
|
|
unsigned long dac_mmap_min_addr = CONFIG_DEFAULT_MMAP_MIN_ADDR;
|
|
|
|
/* amount of vm to protect from userspace using the LSM = CONFIG_LSM_MMAP_MIN_ADDR */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Update mmap_min_addr = max(dac_mmap_min_addr, CONFIG_LSM_MMAP_MIN_ADDR)
|
|
|
|
*/
|
|
|
|
static void update_mmap_min_addr(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_LSM_MMAP_MIN_ADDR
|
|
|
|
if (dac_mmap_min_addr > CONFIG_LSM_MMAP_MIN_ADDR)
|
|
|
|
mmap_min_addr = dac_mmap_min_addr;
|
|
|
|
else
|
|
|
|
mmap_min_addr = CONFIG_LSM_MMAP_MIN_ADDR;
|
|
|
|
#else
|
|
|
|
mmap_min_addr = dac_mmap_min_addr;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sysctl handler which just sets dac_mmap_min_addr = the new value and then
|
|
|
|
* calls update_mmap_min_addr() so non MAP_FIXED hints get rounded properly
|
|
|
|
*/
|
2009-09-24 00:57:19 +02:00
|
|
|
int mmap_min_addr_handler(struct ctl_table *table, int write,
|
2009-07-31 18:54:11 +02:00
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2010-04-22 21:19:17 +02:00
|
|
|
if (write && !capable(CAP_SYS_RAWIO))
|
2009-11-08 18:37:00 +01:00
|
|
|
return -EPERM;
|
|
|
|
|
2009-09-24 00:57:19 +02:00
|
|
|
ret = proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
|
2009-07-31 18:54:11 +02:00
|
|
|
|
|
|
|
update_mmap_min_addr();
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-12-16 00:05:12 +01:00
|
|
|
static int __init init_mmap_min_addr(void)
|
2009-07-31 18:54:11 +02:00
|
|
|
{
|
|
|
|
update_mmap_min_addr();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
pure_initcall(init_mmap_min_addr);
|