Venkat Yekkirala wrote:
>>@@ -3672,16 +3674,20 @@ static int selinux_skb_flow_in(struct sk
>> if (err)
>> goto out;
>>
>>- if (xfrm_sid) {
>>- err = security_transition_sid(xfrm_sid, skb->secmark,
>>-
>>SECCLASS_PACKET, &trans_sid);
>>- if (err)
>>- goto out;
>>+ if (xfrm_sid)
>>+ skb->secmark = xfrm_sid;
>>
>>- skb->secmark = trans_sid;
>>- }
>>+ err = selinux_netlbl_skb_sid(skb, skb->secmark, &nlbl_sid);
>
>
> I take it nlbl_sid here will be 0 if netlabel is NOT configured
> for the traffic correct?
That would be the desired behavior yes, however, in verifying this
against the
patch I posted I noticed that the dummy function in
security/selinux/include/selinux_netlabel.h is wrong - it should be replaced
with the following (I mistakenly set it to SECINITSID_UNLABELED):
static inline int selinux_netlbl_skb_sid(struct sk_buff *skb,
u32 base_sid,
u32 *sid)
{
*sid = 0;
return 0;
}
>>--- net-2.6.orig/security/selinux/ss/mls.c
>>+++ net-2.6/security/selinux/ss/mls.c
>>@@ -547,7 +547,7 @@ int mls_compute_sid(struct context *scon
>>
>
> &rtr->target_range);
>
>> }
>> }
>>- else if (tclass == SECCLASS_PACKET)
>>+ if (tclass == SECCLASS_PACKET)
>
>
> What's the purpose of getting rid of "else" above?
Fix a compile problem - the braces above the else belong to a for loop.
Feel free to disregard this, it was one of the changes I had to make to
your patch to get it to compile against the latest net-2.6 tree.
> I haven't reviewed the netlbl native changes, but the hooks.c changes
> seem ok to me.
Okay, if you have any other questions you know where to find me.
--
paul moore
linux security @ hp
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html