Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: [PATCH] security/selinux/netif.c has a serious problem
From: Kaigai Kohei <kaigai_at_ak.jp.nec.com>
Date: Thu, 7 Oct 2004 11:28:41 +0900
Thu, Oct 07, 2004 5:12 AM
Indeed, I agree it doesn't need to return the reference of 'netif' object. For example, should the function prototype be replaced as follows?
If it's so, we can hide rcu_read_lock()/unlock() in netif.c. In my previous patch, caller is under the rcu_read_lock() when sel_netif_lookup() returns success. I don't think it's a significant issue, because it's like XXXX_trylock(). But Stephen's suggestion is better. Thanks. Kai Gai <kaigai@ak.jp.nec.com> -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Wed 6 Oct 2004 - 22:47:58 EDT |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |