From mboxrd@z Thu Jan 1 00:00:00 1970 From: "David S. Miller" Subject: Re: [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using SELinux and SOCK_SEQPACKET Date: Thu, 18 Nov 2004 14:34:51 -0800 Message-ID: <20041118143451.3dae3ffb.davem@davemloft.net> References: Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: chrisw@osdl.org, ross.axe@blueyonder.co.uk, netdev@oss.sgi.com, sds@epoch.ncsc.mil, linux-kernel@vger.kernel.org Return-path: To: James Morris In-Reply-To: Sender: netdev-bounce@oss.sgi.com Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org On Thu, 18 Nov 2004 12:25:21 -0500 (EST) James Morris wrote: > Updated patch below (with Chris Wright's wrapper idea). > > This now fixes both issues. > > 1) Don't call security_unix_may_send() hook during sendmsg() for > SOCK_SEQPACKET, and ensure that sendmsg() can only be called on a > connected socket so as not to bypass the security_unix_stream_connect() > hook. > > 2) Return -EINVAL if sendto() is called on SOCK_SEQPACKET with an address > supplied. > > Please review and apply if ok. > > > Signed-off-by: James Morris Looks good, applied thanks James.