Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S266288AbUANAV5 (ORCPT ); Tue, 13 Jan 2004 19:21:57 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S266289AbUANAV4 (ORCPT ); Tue, 13 Jan 2004 19:21:56 -0500 Received: from pizda.ninka.net ([216.101.162.242]:10959 "EHLO pizda.ninka.net") by vger.kernel.org with ESMTP id S266288AbUANAVy (ORCPT ); Tue, 13 Jan 2004 19:21:54 -0500 Date: Tue, 13 Jan 2004 16:12:57 -0800 From: "David S. Miller" To: James Morris Cc: akpm@osdl.org, linux-kernel@vger.kernel.org, sds@epoch.ncsc.mil, selinux@tycho.nsa.gov Subject: Re: [PATCH][SELINUX] 6/7 Add SO_PEERSEC socket option and getpeersec LSM hook. Message-Id: <20040113161257.40f1ff16.davem@redhat.com> In-Reply-To: References: X-Mailer: Sylpheed version 0.9.7 (GTK+ 1.2.6; sparc-unknown-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 809 Lines: 18 On Fri, 9 Jan 2004 10:42:09 -0500 (EST) James Morris wrote: > This patch against 2.6.1-mm1 adds a new option for Unix sockets, > SO_PEERSEC, and an associated LSM hook, getpeersec. The SELinux handler > is also included. > > The purpose of this is to allow applications to obtain each others > security credentials, analagously to the existing SO_PEERCRED option. I'm totally fine with this patch but I cannot apply it as it will not go in cleanly without your previous SELINUX bits applied, please resend to me when that stuff goes in. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/