Re: secmark=XXX mapping

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





> One item to note:  xt_SECMARK.c is presently using selinux-specific
> interfaces for mapping the security context string to a sid originally,
> as well as to check permissions, manage refcounts, etc.  So if you use
> the LSM hooks for mapping the secid back to a context, there will be an
> inconsistency in the interface.  Likely they should all be LSM hooks and
> both include/linux/selinux.h and security/selinux/exports.c should go
> away.
>   
I found a way to alter the iptables source to get that information - see 
my own thread on the netfilter mailing list here - 
http://www.spinics.net/lists/netfilter/msg49094.html

Whether the devs responsible for iptables/netfilter would agree to make 
these changes I am not sure - I patched my own iptables and it works!
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux