netdev
[Top] [All Lists]

Re: [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using

To: Ross Kendall Axe <ross.axe@xxxxxxxxxxxxxxxx>
Subject: Re: [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using SELinux and SOCK_SEQPACKET
From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
Date: Mon, 15 Nov 2004 08:31:17 -0500
Cc: netdev@xxxxxxxxxxx, lkml <linux-kernel@xxxxxxxxxxxxxxx>
In-reply-to: <4197A037.1020307@xxxxxxxxxxxxxxxx>
Organization: National Security Agency
References: <4197A037.1020307@xxxxxxxxxxxxxxxx>
Sender: netdev-bounce@xxxxxxxxxxx
On Sun, 2004-11-14 at 13:13, Ross Kendall Axe wrote:
> With CONFIG_SECURITY_NETWORK=y and CONFIG_SECURITY_SELINUX=y, using
> SOCK_SEQPACKET unix domain sockets causes an oops in the superfluous(?)
> call to security_unix_may_send in sock_dgram_sendmsg. This patch avoids
> making this call for SOCK_SEQPACKET sockets.

I'd prefer to track down the actual issue in the SELinux code and
correct it than just omit the security hook call entirely.  Do you have
the Oops output and a trivial test case?  Thanks.

-- 
Stephen Smalley <sds@xxxxxxxxxxxxxx>
National Security Agency


<Prev in Thread] Current Thread [Next in Thread>