| To: | Ross Kendall Axe <ross.axe@xxxxxxxxxxxxxxxx> |
|---|---|
| Subject: | Re: [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using SELinux and SOCK_SEQPACKET |
| From: | Stephen Smalley <sds@xxxxxxxxxxxxxx> |
| Date: | Mon, 15 Nov 2004 08:31:17 -0500 |
| Cc: | netdev@xxxxxxxxxxx, lkml <linux-kernel@xxxxxxxxxxxxxxx> |
| In-reply-to: | <4197A037.1020307@xxxxxxxxxxxxxxxx> |
| Organization: | National Security Agency |
| References: | <4197A037.1020307@xxxxxxxxxxxxxxxx> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
On Sun, 2004-11-14 at 13:13, Ross Kendall Axe wrote: > With CONFIG_SECURITY_NETWORK=y and CONFIG_SECURITY_SELINUX=y, using > SOCK_SEQPACKET unix domain sockets causes an oops in the superfluous(?) > call to security_unix_may_send in sock_dgram_sendmsg. This patch avoids > making this call for SOCK_SEQPACKET sockets. I'd prefer to track down the actual issue in the SELinux code and correct it than just omit the security hook call entirely. Do you have the Oops output and a trivial test case? Thanks. -- Stephen Smalley <sds@xxxxxxxxxxxxxx> National Security Agency |
| Previous by Date: | pxuzqemrwqcvt, jgarzik |
|---|---|
| Next by Date: | Re: 2.6.10-rc2: still no ipv6 link-local addresses, Meelis Roos |
| Previous by Thread: | [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using SELinux and SOCK_SEQPACKET, Ross Kendall Axe |
| Next by Thread: | Re: [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using SELinux and SOCK_SEQPACKET, Chris Wright |
| Indexes: | [Date] [Thread] [Top] [All Lists] |