Venkat Yekkirala wrote: >>@@ -3672,16 +3674,20 @@ static int selinux_skb_flow_in(struct sk >> if (err) >> goto out; >> >>- if (xfrm_sid) { >>- err = security_transition_sid(xfrm_sid, skb->secmark, >>- >>SECCLASS_PACKET, &trans_sid); >>- if (err) >>- goto out; >>+ if (xfrm_sid) >>+ skb->secmark = xfrm_sid; >> >>- skb->secmark = trans_sid; >>- } >>+ err = selinux_netlbl_skb_sid(skb, skb->secmark, &nlbl_sid); > > > I take it nlbl_sid here will be 0 if netlabel is NOT configured > for the traffic correct?
That would be the desired behavior yes, however, in verifying this against the patch I posted I noticed that the dummy function in security/selinux/include/selinux_netlabel.h is wrong - it should be replaced with the following (I mistakenly set it to SECINITSID_UNLABELED): static inline int selinux_netlbl_skb_sid(struct sk_buff *skb, u32 base_sid, u32 *sid) { *sid = 0; return 0; } >>--- net-2.6.orig/security/selinux/ss/mls.c >>+++ net-2.6/security/selinux/ss/mls.c >>@@ -547,7 +547,7 @@ int mls_compute_sid(struct context *scon >> > > &rtr->target_range); > >> } >> } >>- else if (tclass == SECCLASS_PACKET) >>+ if (tclass == SECCLASS_PACKET) > > > What's the purpose of getting rid of "else" above? Fix a compile problem - the braces above the else belong to a for loop. Feel free to disregard this, it was one of the changes I had to make to your patch to get it to compile against the latest net-2.6 tree. > I haven't reviewed the netlbl native changes, but the hooks.c changes > seem ok to me. Okay, if you have any other questions you know where to find me. -- paul moore linux security @ hp - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html