OpenAFS Master Repository branch, openafs-stable-1_6_x, updated. openafs-stable-1_6_6-25-ga7d8601

Gerrit Code Review
Wed, 12 Feb 2014 11:02:33 -0800 (PST)

The following commit has been merged in the openafs-stable-1_6_x branch:
commit a7d8601253f17943c994dff9be79f00d6d281ff5
Author: Andrew Deason <>
Date:   Tue Dec 17 17:30:26 2013 -0600

    LINUX: Use sock_create_kern where available
    Currently, we use sock_create to create our Rx socket. This means that
    accesses to that socket (sendmsg, recvmsg) are subject to SELinux
    restrictions. For all recvmsg accesses and some sendmsg accesses, this
    doesn't matter, since the access will be performed by one of our
    kernel threads (running as kernel_t or something similar, which is
    unrestricted). Such as: the rx listener, a background daemon, the rx
    event thread, etc.
    However, sometimes we do run in the context of a normal user process.
    For some RPCs like FetchStatus, we tend to run the RPC in the
    accessing user thread, which can result in us sendmsg()ing the data
    packets with the initial arguments in the user thread. We can also
    send delayed ACKs via rx_EndCall, and possibly a variety of other
    In any of these situations when we are sendmsg()ing from a user
    thread, SELinux can prevent us from sending to the socket, if the
    calling user thread context is not able to write to an afs_t
    udp_socket. This will result in packets not being sent immediately,
    but the packets will be resent later, so access will work, but appear
    very slow. This can easily happen for processes that are specifically
    constrained by SELinux; for example, webservers are often constrained,
    even if most of the rest of the system is not. This can be noticed by
    seeing the 'resends' and 'sendFailed' counters rising in 'rxdebug
    -rxstat', as well as noticing SELinux access failures if 'dontaudit'
    rules are ignored.
    To avoid this, use sock_create_kern to create the Rx socket, to
    indicate that this is a socket for use by kernel code, and not
    accessible by a user. This should cause us to bypass any LSM
    restrictions (SELinux, AppArmor, etc). Add a configure check for this,
    since this function has not always existed, according to
    Tested-by: BuildBot <>
    Reviewed-by: Marc Dionne <>
    Reviewed-by: Michael Meffie <>
    Reviewed-by: Derrick Brashear <>
    (cherry picked from commit e988aa45d765c935fef4bcd35585d6a3594cc497)
    Change-Id: Ie04a8ac166dabf9fb8368d47d5624d1f319174bd
    Reviewed-by: Andrew Deason <>
    Reviewed-by: Marc Dionne <>
    Reviewed-by: D Brashear <>
    Reviewed-by: Stephan Wiesand <>
    Reviewed-by: Michael Meffie <>
    Tested-by: BuildBot <>

 acinclude.m4           |    3 +++
 src/rx/LINUX/rx_knet.c |    4 +++-
 2 files changed, 6 insertions(+), 1 deletions(-)

OpenAFS Master Repository