Research Menu

.
Skip Search Box

SELinux Mailing List

Re: [RFC][PATCH] collect security labels on user processes generating audit messages

From: Timothy R. Chavez <tinytim_at_us.ibm.com>
Date: Wed, 15 Feb 2006 10:41:13 -0600


On Wed, 2006-02-15 at 11:17 -0500, Stephen Smalley wrote:
> On Wed, 2006-02-15 at 09:49 -0600, Timothy R. Chavez wrote:
> > This makes sense to me. I'll go ahead and make the change. I wouldn't
> > even technically need the function or function call in my patch since
> > selinux_available() simply returns ss_initialized.
>
> Well, I think we want to keep that variable private to the SELinux
> "module". In the future, we'll likely add proper namespace prefixes to
> all non-static SELinux symbols to avoid polluting the kernel namespace.
>

I think maybe I miscommunicated my intentions. If I move the check to determine whether or not SELinux is enabled into selinux_id_to_ctx(), then I can simply use ss_initialized directly rather then calling selinux_available(), as I'll be making the check within the SELinux "module" (selinux/exports.c).

-tim

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Wed 15 Feb 2006 - 11:29:10 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service