Your message dated Fri, 13 May 2016 16:07:24 +0200
with message-id <550830de-1388-49a4-a2ac-8b3a12299...@debian.org>
has caused the   report #823184,
regarding umount mounts /proc as a side effect
to be marked as having been forwarded to the upstream software
author(s) Stephen Smalley <s...@tycho.nsa.gov>, Ben Shelton <ben.shel...@ni.com>

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
823184: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823184
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Hey,

Le 16/04/15 à 13:54, Stephen Smalley a écrit :
On 04/15/2015 04:56 PM, Ben Shelton wrote:
In the case where the SELinux security module is not loaded in the
kernel and it's early enough in the boot process that /proc has not yet
been mounted, selinuxfs_exists() will incorrectly return 1, and
selinux_init_load_policy() will print a message like this to the
console:

Mount failed for selinuxfs on /sys/fs/selinux:  No such file or directory

To fix this, mount the procfs before attempting to open
/proc/filesystems, and unmount it when done if it was initially not
mounted.  This is the same thing that selinux_init_load_policy() does
when reading /proc/cmdline.

Signed-off-by: Ben Shelton <ben.shel...@ni.com>
Thanks, applied.

In debian, I've a user complaining about the fact that libselinux is mounting /proc by itself and that it might racy.

What do you think?

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823184

Cheers,

Laurent Bigonville

--- End Message ---
_______________________________________________
SELinux-devel mailing list
SELinux-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/selinux-devel

Reply via email to