Message ID | 20200824131841.55687-3-cgzones@googlemail.com (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | [1/3] libselinux: refactor wrapper in sestatus.c for safe shared memory access | expand |
diff --git a/libselinux/src/sestatus.c b/libselinux/src/sestatus.c index 62a864b1..dcd7f2dc 100644 --- a/libselinux/src/sestatus.c +++ b/libselinux/src/sestatus.c @@ -289,6 +289,7 @@ int selinux_status_open(int fallback) } selinux_status_fd = fd; last_seqno = (uint32_t)(-1); + sestatus_save_access(policyload, last_policyload); /* No need to use avc threads if the kernel status page is available */ avc_using_threads = 0;
If not initialized to the current policyload count, an enforcing change will trigger policyload-callbacks in selinux_status_updated(). Signed-off-by: Christian Göttsche <cgzones@googlemail.com> --- libselinux/src/sestatus.c | 1 + 1 file changed, 1 insertion(+)