Commit 5c108d4e authored by Stephen Smalley's avatar Stephen Smalley Committed by Paul Moore
Browse files

selinux: randomize layout of key structures



Randomize the layout of key selinux data structures.
Initially this is applied to the selinux_state, selinux_ss,
policydb, and task_security_struct data structures.

NB To test/use this mechanism, one must install the
necessary build-time dependencies, e.g. gcc-plugin-devel on Fedora,
and enable CONFIG_GCC_PLUGIN_RANDSTRUCT in the kernel configuration.

Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
Reviewed-by: default avatarKees Cook <keescook@chromium.org>
[PM: double semi-colon fixed]
Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
parent 6c5a682e
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -35,7 +35,7 @@ struct task_security_struct {
	u32 create_sid;		/* fscreate SID */
	u32 keycreate_sid;	/* keycreate SID */
	u32 sockcreate_sid;	/* fscreate SID */
};
} __randomize_layout;

enum label_initialized {
	LABEL_INVALID,		/* invalid or not initialized */
+1 −1
Original line number Diff line number Diff line
@@ -110,7 +110,7 @@ struct selinux_state {
	bool policycap[__POLICYDB_CAPABILITY_MAX];
	struct selinux_avc *avc;
	struct selinux_ss *ss;
};
} __randomize_layout;

void selinux_ss_init(struct selinux_ss **ss);
void selinux_avc_init(struct selinux_avc **avc);
+1 −1
Original line number Diff line number Diff line
@@ -307,7 +307,7 @@ struct policydb {

	u16 process_class;
	u32 process_trans_perms;
};
} __randomize_layout;

extern void policydb_destroy(struct policydb *p);
extern int policydb_load_isids(struct policydb *p, struct sidtab *s);
+1 −1
Original line number Diff line number Diff line
@@ -31,7 +31,7 @@ struct selinux_ss {
	struct selinux_map map;
	struct page *status_page;
	struct mutex status_lock;
};
} __randomize_layout;

void services_compute_xperms_drivers(struct extended_perms *xperms,
				struct avtab_node *node);