Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: SELinux Kernel Oops
From: Chris Wright <chris_at_wirex.com>
Date: Wed, 30 Oct 2002 15:29:26 -0800
Hmm, this is an ugly one. Primarily because it touches into the fs specific code. I don't see a good way to do this any differently aside from introducing a wrapper like f_release that just conditionally calls f->release and ->file_free_security... BTW, you missed the DTE instance of init_private_file.
thanks,
-- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Wed 30 Oct 2002 - 18:39:46 EST |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |