[prev in list] [next in list] [prev in thread] [next in thread]
List: selinux
Subject: Re: Illegal errno from kernel
From: Stephen Smalley <sds () tycho ! nsa ! gov>
Date: 2007-08-14 17:55:54
Message-ID: 1187114154.26008.239.camel () moss-spartans ! epoch ! ncsc ! mil
[Download RAW message or body]
On Tue, 2007-08-14 at 10:51 -0700, Steve G wrote:
> Hi,
>
> In security/selinux/ss/services.c at the selinux_audit_rule_init() function is
> this code:
>
> if (!ss_initialized)
> return -ENOTSUPP;
>
> The audit system sends that to user space, but its a special value that is
> supposed to be internal to the kernel. Should the audit system look for this
> value and change it when it calls the function, or should we change this value in
> the selinux code? And if we change it, what should it be? EINVAL doesn't make
> sense as the syntax of what's being asked to do is correct. Should we define
> something like ENOMAC?
It should likely have been -EOPNOTSUPP in the first place. So I'd just
change it to that.
--
Stephen Smalley
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic