netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* RE: [PATCH 0/3] Fix for IPsec leakage with SELinux enabled - V.03
@ 2006-10-05 21:07 Venkat Yekkirala
  2006-10-05 21:43 ` David Miller
  0 siblings, 1 reply; 8+ messages in thread
From: Venkat Yekkirala @ 2006-10-05 21:07 UTC (permalink / raw)
  To: David Miller, Venkat Yekkirala
  Cc: netdev, selinux, jmorris, sds, eparis, johnpol, herbert

> > This version takes into account David Miller's comments
> > regarding treatment of security layer errors in the case
> > of socket policies. Specifically, these errors will be
> > treated like how these kind of errors are treated for
> > the main/sub policies, which is to return a full lookup
> > failure.
> 
> I only have patches "1" and "3" in my inbox, did you forget
> to send the second one out or are they simply misnumbered?
> 

My apologies. The second one is also numbered 1, but has the
following distinct subject line:
[PATCH 1/3] Fix for IPsec leakage with SELinux enabled - V.03: Fix xfrm code

^ permalink raw reply	[flat|nested] 8+ messages in thread
* RE: [PATCH 0/3] Fix for IPsec leakage with SELinux enabled - V.03
@ 2006-10-09 15:42 Venkat Yekkirala
  0 siblings, 0 replies; 8+ messages in thread
From: Venkat Yekkirala @ 2006-10-09 15:42 UTC (permalink / raw)
  To: David Miller, Venkat Yekkirala
  Cc: netdev, selinux, jmorris, sds, eparis, johnpol, herbert

> > My apologies. The second one is also numbered 1, but has the
> > following distinct subject line:
> > [PATCH 1/3] Fix for IPsec leakage with SELinux enabled - 
> V.03: Fix xfrm code
> 
> I definitely deleted one of them, since I usually get N copies
> of very single patch posting and two of them looked identical:)

I guess this is probably the reason why I don't see the fix in net-2.6.git
yet :) I will resend the patchset with the subject titles fixed up since
it needs to be in 2.6.19.

^ permalink raw reply	[flat|nested] 8+ messages in thread
* RE: [PATCH 0/3] Fix for IPsec leakage with SELinux enabled - V.03
@ 2006-10-05 21:21 Venkat Yekkirala
  0 siblings, 0 replies; 8+ messages in thread
From: Venkat Yekkirala @ 2006-10-05 21:21 UTC (permalink / raw)
  To: Venkat Yekkirala, 'David Miller'
  Cc: 'netdev@vger.kernel.org', 'selinux@tycho.nsa.gov',
	'jmorris@namei.org', 'sds@tycho.nsa.gov',
	'eparis@redhat.com', 'johnpol@2ka.mipt.ru',
	'herbert@gondor.apana.org.au'

> > > This version takes into account David Miller's comments
> > > regarding treatment of security layer errors in the case
> > > of socket policies. Specifically, these errors will be
> > > treated like how these kind of errors are treated for
> > > the main/sub policies, which is to return a full lookup
> > > failure.
> > 
> > I only have patches "1" and "3" in my inbox, did you forget
> > to send the second one out or are they simply misnumbered?
> > 
> 
> My apologies. The second one is also numbered 1, but has the
> following distinct subject line:
> [PATCH 1/3] Fix for IPsec leakage with SELinux enabled - 
> V.03: Fix xfrm code

In actuality, patch 2 in the series has the following subject line:

[PATCH 1/3] Fix for IPsec leakage with SELinux enabled - V.03

^ permalink raw reply	[flat|nested] 8+ messages in thread
* [PATCH 0/3] Fix for IPsec leakage with SELinux enabled - V.03
@ 2006-10-05 20:42 Venkat Yekkirala
  2006-10-05 21:05 ` David Miller
                   ` (2 more replies)
  0 siblings, 3 replies; 8+ messages in thread
From: Venkat Yekkirala @ 2006-10-05 20:42 UTC (permalink / raw)
  To: netdev; +Cc: selinux, jmorris, sds, eparis, johnpol, herbert

This version takes into account David Miller's comments
regarding treatment of security layer errors in the case
of socket policies. Specifically, these errors will be
treated like how these kind of errors are treated for
the main/sub policies, which is to return a full lookup
failure.

 include/linux/security.h        |   24 ++-----
 include/net/flow.h              |    2 
 include/net/xfrm.h              |    3 
 net/core/flow.c                 |   42 ++++++++----
 net/ipv4/xfrm4_policy.c         |    2 
 net/ipv6/xfrm6_policy.c         |    2 
 net/key/af_key.c                |    5 -
 net/xfrm/xfrm_policy.c          |  101 ++++++++++++++++++++++--------
 net/xfrm/xfrm_user.c            |    9 --
 security/dummy.c                |    3 
 security/selinux/include/xfrm.h |    3 
 security/selinux/xfrm.c         |   53 ++++++++++++---
 12 files changed, 162 insertions(+), 87 deletions(-)

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2006-10-09 15:42 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-05 21:07 [PATCH 0/3] Fix for IPsec leakage with SELinux enabled - V.03 Venkat Yekkirala
2006-10-05 21:43 ` David Miller
  -- strict thread matches above, loose matches on Subject: below --
2006-10-09 15:42 Venkat Yekkirala
2006-10-05 21:21 Venkat Yekkirala
2006-10-05 20:42 Venkat Yekkirala
2006-10-05 21:05 ` David Miller
2006-10-06  2:50 ` James Morris
2006-10-08 10:35 ` Evgeniy Polyakov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).