[prev in list] [next in list] [prev in thread] [next in thread]
List: selinux
Subject: Re: Illegal errno from kernel
From: Stephen Smalley <sds () tycho ! nsa ! gov>
Date: 2007-08-14 18:11:43
Message-ID: 1187115103.26008.246.camel () moss-spartans ! epoch ! ncsc ! mil
[Download RAW message or body]
On Tue, 2007-08-14 at 13:55 -0400, Stephen Smalley wrote:
> On Tue, 2007-08-14 at 10:51 -0700, Steve G wrote:
> > Hi,
> >
> > In security/selinux/ss/services.c at the selinux_audit_rule_init() function is
> > this code:
> >
> > if (!ss_initialized)
> > return -ENOTSUPP;
> >
> > The audit system sends that to user space, but its a special value that is
> > supposed to be internal to the kernel. Should the audit system look for this
> > value and change it when it calls the function, or should we change this value in
> > the selinux code? And if we change it, what should it be? EINVAL doesn't make
> > sense as the syntax of what's being asked to do is correct. Should we define
> > something like ENOMAC?
>
> It should likely have been -EOPNOTSUPP in the first place. So I'd just
> change it to that.
...and we already use that elsewhere in the SELinux code.
--
Stephen Smalley
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic