Your message dated Fri, 13 May 2016 16:07:24 +0200
with message-id <550830de-1388-49a4-a2ac-8b3a12299...@debian.org>
has caused the report #823184,
regarding umount mounts /proc as a side effect
to be marked as having been forwarded to the upstream software
author(s) Stephen Smalley <s...@tycho.nsa.gov>, Ben Shelton <ben.shel...@ni.com>
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
823184: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823184
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Hey,
Le 16/04/15 à 13:54, Stephen Smalley a écrit :
On 04/15/2015 04:56 PM, Ben Shelton wrote:
In the case where the SELinux security module is not loaded in the
kernel and it's early enough in the boot process that /proc has not yet
been mounted, selinuxfs_exists() will incorrectly return 1, and
selinux_init_load_policy() will print a message like this to the
console:
Mount failed for selinuxfs on /sys/fs/selinux: No such file or directory
To fix this, mount the procfs before attempting to open
/proc/filesystems, and unmount it when done if it was initially not
mounted. This is the same thing that selinux_init_load_policy() does
when reading /proc/cmdline.
Signed-off-by: Ben Shelton <ben.shel...@ni.com>
Thanks, applied.
In debian, I've a user complaining about the fact that libselinux is
mounting /proc by itself and that it might racy.
What do you think?
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823184
Cheers,
Laurent Bigonville
--- End Message ---
_______________________________________________
SELinux-devel mailing list
SELinux-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/selinux-devel