[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1286923921.5133.84.camel@sifl>
Date: Tue, 12 Oct 2010 18:52:01 -0400
From: Paul Moore <paul.moore@...com>
To: Eric Paris <eparis@...hat.com>
Cc: linux-kernel@...r.kernel.org, netfilter-devel@...r.kernel.org,
netfilter@...r.kernel.org, jmorris@...ei.org,
selinux@...ho.nsa.gov, sds@...ho.nsa.gov, jengelh@...ozas.de,
linux-security-module@...r.kernel.org, mr.dash.four@...glemail.com,
pablo@...filter.org
Subject: Re: [PATCH 1/5] secmark: do not return early if there was no error
On Tue, 2010-10-12 at 11:40 -0400, Eric Paris wrote:
> Commit 4a5a5c73 attempted to pass decent error messages back to userspace for
> netfilter errors. In xt_SECMARK.c however the patch screwed up and returned
> on 0 (aka no error) early and didn't finish setting up secmark. This results
> in a kernel BUG if you use SECMARK.
...
> Signed-off-by: Eric Paris <eparis@...hat.com>
Acked-by: Paul Moore <paul.moore@...com>
> ---
>
> net/netfilter/xt_SECMARK.c | 2 +-
> 1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git a/net/netfilter/xt_SECMARK.c b/net/netfilter/xt_SECMARK.c
> index 23b2d6c..364ad16 100644
> --- a/net/netfilter/xt_SECMARK.c
> +++ b/net/netfilter/xt_SECMARK.c
> @@ -101,7 +101,7 @@ static int secmark_tg_check(const struct xt_tgchk_param *par)
> switch (info->mode) {
> case SECMARK_MODE_SEL:
> err = checkentry_selinux(info);
> - if (err <= 0)
> + if (err)
> return err;
> break;
>
>
--
paul moore
linux @ hp
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists