| To: | James Morris <jmorris@xxxxxxxxxx> |
|---|---|
| Subject: | Re: [RFC] SO_PEERSEC - security credentials for Unix stream sockets |
| From: | Chris Wright <chrisw@xxxxxxxx> |
| Date: | Mon, 15 Dec 2003 17:32:41 -0800 |
| Cc: | "David S. Miller" <davem@xxxxxxxxxx>, kuznet@xxxxxxxxxxxxx, netdev@xxxxxxxxxxx, linux-security-module@xxxxxxxxx, Stephen Smalley <sds@xxxxxxxxxxxxxx> |
| In-reply-to: | <Xine.LNX.4.44.0312122219530.4813-100000@thoron.boston.redhat.com>; from jmorris@redhat.com on Fri, Dec 12, 2003 at 10:44:24PM -0500 |
| References: | <20031212161617.C24246@osdlab.pdx.osdl.net> <Xine.LNX.4.44.0312122219530.4813-100000@thoron.boston.redhat.com> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Mutt/1.2.5i |
* James Morris (jmorris@xxxxxxxxxx) wrote: > I'm not sure how this would be a namespace issue -- do you mean a data > format issue? I just mean, applications are coded for specific security module. > Yep, allowing the security module to update the returned length is now > implemented. > > > Perhaps buffer is too small, can len be vector for that info? > > I would not advise updating len on error -- it's a bad idea in general to > interpret any returned data from failed syscalls except the error number. Right, in some cases a NULL buffer or 0 buflen is a probe for size. thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: 2.6.0-test9 : bridge freezes, David S. Miller |
|---|---|
| Next by Date: | Re: [BUG] can't unload network device's if IPV6 is loaded, YOSHIFUJI Hideaki / 吉藤英明 |
| Previous by Thread: | Re: [RFC] SO_PEERSEC - security credentials for Unix stream sockets, James Morris |
| Next by Thread: | Re: [RFC] SO_PEERSEC - security credentials for Unix stream sockets, James Morris |
| Indexes: | [Date] [Thread] [Top] [All Lists] |