Exclude loopback interface for setting secmark to 'System' 56/127056/1 accepted/tizen_3.0_common accepted/tizen_3.0_ivi accepted/tizen/3.0/common/20170508.153032 accepted/tizen/3.0/ivi/20170508.050341 accepted/tizen/3.0/mobile/20170508.050314 accepted/tizen/3.0/tv/20170508.050327 accepted/tizen/3.0/wearable/20170508.050336 accepted/tizen/unified/20170426.200024 submit/tizen/20170426.070401 submit/tizen_3.0-common/20170508.080135 submit/tizen_3.0-common/20170508.081301 submit/tizen_3.0-common/20170508.091535 submit/tizen_3.0/20170426.070355 submit/tizen_3.0_common/20170508.091735 tizen_4.0.m1_release
authorjin-gyu.kim <jin-gyu.kim@samsung.com>
Wed, 26 Apr 2017 04:47:03 +0000 (13:47 +0900)
committerjin-gyu.kim <jin-gyu.kim@samsung.com>
Wed, 26 Apr 2017 04:47:08 +0000 (13:47 +0900)
commit215e5d35d5100bbc900b1f7f678fefeba84d7aab
treef3ed3770509a898d7c144d6ade64cdbe6c3dc62e
parent5dada764fb379138dcd968f8133b83ebafbd4784
Exclude loopback interface for setting secmark to 'System'

We gave secmark as 'System' as default.
Due to this, inter processes can send and receive with loopback
interface, without checking smack rules.
Therefore, we need to take loopback interface as the exception.

Change-Id: Ic7990521eba75e5204dd915f733eda3460501e3c
conf/nether.rules
conf/nether_ipv6.rules