SELinux hooks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



To cut the long story short - I need to find out what part of the source code in a given application/process triggers the need for a particular SELinux permission - process:setsched, capability:setpcap or capability:net_admin for example.

I am guessing this is all done via appropriate SELInux hooks, but I need to find a way to trace that back (stack trace?) to the originating code/process, which triggers this. Is there a way I could do that?
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux



[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux