Research Menu

.
Skip Search Box

SELinux Mailing List

Re: [PATCH] SELinux: Use unknown perm handling to handle unknown netlink msg types

From: James Morris <jmorris_at_namei.org>
Date: Sun, 9 Nov 2008 10:41:18 +1100 (EST)


On Fri, 7 Nov 2008, Stephen Smalley wrote:

> On Wed, 2008-11-05 at 09:34 -0500, Eric Paris wrote:
> > Currently when SELinux has not been updated to handle a netlink message
> > type the operation is denied with EINVAL. This patch will leave the
> > audit/warning message so things get fixed but if policy chose to allow
> > unknowns this will allow the netlink operation.
> >
> > Signed-off-by: Eric Paris <eparis@redhat.com>
>
> Acked-by: Stephen Smalley <sds@tycho.nsa.gov>

Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6#next

-- 
James Morris
<jmorris@namei.org>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Sat 8 Nov 2008 - 18:42:01 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service