This patch fixes a bug in the SELinux Netlink message type detection code, where the wrong constant was being used in a case statement. The incorrect value is not valid for this class of object so it would not have been reached, and fallen through to a default handler for all Netlink messages.
Please apply. Signed-off-by: James Morris <[EMAIL PROTECTED]> Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]> --- security/selinux/nlmsgtab.c | 2 +- 1 files changed, 1 insertion(+), 1 deletion(-) diff -urN -X dontdiff linux-2.6.12-rc1-mm4.o/security/selinux/nlmsgtab.c linux-2.6.12-rc1-mm4.w/security/selinux/nlmsgtab.c --- linux-2.6.12-rc1-mm4.o/security/selinux/nlmsgtab.c 2005-03-15 19:17:05.000000000 -0500 +++ linux-2.6.12-rc1-mm4.w/security/selinux/nlmsgtab.c 2005-04-04 18:57:55.000000000 -0400 @@ -126,7 +126,7 @@ break; case SECCLASS_NETLINK_FIREWALL_SOCKET: - case NETLINK_IP6_FW: + case SECCLASS_NETLINK_IP6FW_SOCKET: err = nlmsg_perm(nlmsg_type, perm, nlmsg_firewall_perms, sizeof(nlmsg_firewall_perms)); break; - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/