File linux-2.6-selinux-mprotect-checks.patch of Package kernel
--- linux-2.6.16-rc3/security/selinux/hooks.c 2006-02-13 13:19:09.000000000 -0500
+++ linux-2.6.16-rc3-x/security/selinux/hooks.c 2006-02-14 14:44:48.000000000 -0500
@@ -2365,7 +2365,6 @@ static int selinux_file_ioctl(struct fil
static int file_map_prot_check(struct file *file, unsigned long prot, int shared)
{
-#ifndef CONFIG_PPC32
if ((prot & PROT_EXEC) && (!file || (!shared && (prot & PROT_WRITE)))) {
/*
* We are making executable an anonymous mapping or a
@@ -2376,7 +2375,6 @@ static int file_map_prot_check(struct fi
if (rc)
return rc;
}
-#endif
if (file) {
/* read access is always possible with a mapping */
@@ -2423,7 +2421,6 @@ static int selinux_file_mprotect(struct
if (selinux_checkreqprot)
prot = reqprot;
-#ifndef CONFIG_PPC32
if ((prot & PROT_EXEC) && !(vma->vm_flags & VM_EXEC)) {
rc = 0;
if (vma->vm_start >= vma->vm_mm->start_brk &&
@@ -2448,7 +2445,6 @@ static int selinux_file_mprotect(struct
if (rc)
return rc;
}
-#endif
return file_map_prot_check(vma->vm_file, prot, vma->vm_flags&VM_SHARED);
}