Re: [patch 1/2] selinux: add executable stack check

From: Stephen Smalley
Date: Wed Jun 22 2005 - 06:42:28 EST


On Wed, 2005-06-22 at 03:51 +0200, Lorenzo HernÃndez GarcÃa-Hierro
wrote:
> This patch adds an execstack permission check that controls the
> ability to make the main process stack executable so that attempts to
> make the stack executable can still be prevented even if the process is
> allowed the existing execmem permission in order to e.g. perform runtime
> code generation. Note that this does not yet address thread stacks.
> Note also that unlike the execmem check, the execstack check is only
> applied on mprotect calls, not mmap calls, as the current
> security_file_mmap hook is not passed the necessary information
> presently.

> Signed-off-by: Lorenzo Hernandez Garcia-Hierro <lorenzo@xxxxxxx>
> ---
>
> security/selinux/hooks.c | 10 ++++++++++
> security/selinux/include/av_perm_to_string.h | 1 +
> security/selinux/include/av_permissions.h | 1 +
> 3 files changed, 12 insertions(+)

Acked-by: Stephen Smalley <sds@xxxxxxxxxxxxx>

--
Stephen Smalley
National Security Agency

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/