On Mon, 26 Nov 2007, Eric Paris wrote: > On a kernel with CONFIG_SECURITY but without an LSM which implements > security_file_mmap it is impossible for an application to mmap addresses > lower than mmap_min_addr. Based on a suggestion from a developer in the > openwall community this patch adds a check for CAP_SYS_RAWIO. It is > assumed that any process with this capability can harm the system a lot > more easily than writing some stuff on the zero page and then trying to > get the kernel to trip over itself. It also means that programs like X > on i686 which use vm86 emulation can work even with mmap_min_addr set. > > Signed-off-by: Eric Paris <eparis@xxxxxxxxxx> Applied to git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-akpm If nobody hollers, I'll push it to Linus when the next merge window opens. - James -- James Morris <jmorris@xxxxxxxxx> -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.