On Tue, 10.11.15 22:53, Igor Zhbanov (izh1...@gmail.com) wrote:

> Hi!
> 
> I see lots of messages (with systemd debug enabled) on the kernel with
> selinux disabled:
> systemd[1]: Failed to determine peer security context: Protocol not available
> 
> As I understand, this happen because getsockopt() returns ENOPROTOOPT,
> and systemd
> checks for EOPNOTSUPP.

Hmm, how did you disable selinux/smack here? disabled at compile-time?
or at runtime via a kernel cmldine option like selinux=0?

> 
>         /* Get the peer for socketpair() sockets */
>         b->ucred_valid = getpeercred(b->input_fd, &b->ucred) >= 0;
> 
>         /* Get the SELinux context of the peer */
>         r = getpeersec(b->input_fd, &b->label);
>         if (r < 0 && r != -EOPNOTSUPP)
>                 log_debug_errno(r, "Failed to determine peer security
> context: %m");

I figure we should wrap this in a mac_selinux_use() check like we do
for the other cases, otherwise we'd mistake a SMACK label for an
selinux one... That would solve the issue at hand.

Will fix.

Lennart

-- 
Lennart Poettering, Red Hat
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to