diff options
author | Stephen Smalley <sds@tycho.nsa.gov> | 2019-12-13 15:28:38 -0500 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2019-12-18 21:26:06 -0500 |
commit | 5c108d4e18f80be01965792726c81b105fbd677a (patch) | |
tree | 5232e3ccd8383887072b4f8f3f7587e8ff237c99 /security/selinux/ss/policydb.h | |
parent | 6c5a682e6497cb1f7a67303ce098462a36bed362 (diff) | |
download | kernel_replicant_linux-5c108d4e18f80be01965792726c81b105fbd677a.tar.gz kernel_replicant_linux-5c108d4e18f80be01965792726c81b105fbd677a.tar.bz2 kernel_replicant_linux-5c108d4e18f80be01965792726c81b105fbd677a.zip |
selinux: randomize layout of key structures
Randomize the layout of key selinux data structures.
Initially this is applied to the selinux_state, selinux_ss,
policydb, and task_security_struct data structures.
NB To test/use this mechanism, one must install the
necessary build-time dependencies, e.g. gcc-plugin-devel on Fedora,
and enable CONFIG_GCC_PLUGIN_RANDSTRUCT in the kernel configuration.
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Reviewed-by: Kees Cook <keescook@chromium.org>
[PM: double semi-colon fixed]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/selinux/ss/policydb.h')
-rw-r--r-- | security/selinux/ss/policydb.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/ss/policydb.h b/security/selinux/ss/policydb.h index bc56b14e2216..69b24191fa38 100644 --- a/security/selinux/ss/policydb.h +++ b/security/selinux/ss/policydb.h @@ -307,7 +307,7 @@ struct policydb { u16 process_class; u32 process_trans_perms; -}; +} __randomize_layout; extern void policydb_destroy(struct policydb *p); extern int policydb_load_isids(struct policydb *p, struct sidtab *s); |