mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-23 20:53:53 +08:00
2ee92d46c6
This patch implements SELinux kernel support for DCCP (http://linux-net.osdl.org/index.php/DCCP), which is similar in operation to TCP in terms of connected state between peers. The SELinux support for DCCP is thus modeled on existing handling of TCP. A new DCCP socket class is introduced, to allow protocol differentation. The permissions for this class inherit all of the socket permissions, as well as the current TCP permissions (node_bind, name_bind etc). IPv4 and IPv6 are supported, although labeled networking is not, at this stage. Patches for SELinux userspace are at: http://people.redhat.com/jmorris/selinux/dccp/user/ I've performed some basic testing, and it seems to be working as expected. Adding policy support is similar to TCP, the only real difference being that it's a different protocol. Acked-by: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: James Morris <jmorris@namei.org> Signed-off-by: David S. Miller <davem@davemloft.net>
34 lines
1.7 KiB
C
34 lines
1.7 KiB
C
/* This file is automatically generated. Do not edit. */
|
|
S_(SECCLASS_DIR, file, 0x00020000UL)
|
|
S_(SECCLASS_FILE, file, 0x00020000UL)
|
|
S_(SECCLASS_LNK_FILE, file, 0x00020000UL)
|
|
S_(SECCLASS_CHR_FILE, file, 0x00020000UL)
|
|
S_(SECCLASS_BLK_FILE, file, 0x00020000UL)
|
|
S_(SECCLASS_SOCK_FILE, file, 0x00020000UL)
|
|
S_(SECCLASS_FIFO_FILE, file, 0x00020000UL)
|
|
S_(SECCLASS_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_TCP_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_UDP_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_RAWIP_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_PACKET_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_KEY_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_UNIX_STREAM_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_UNIX_DGRAM_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_IPC, ipc, 0x00000200UL)
|
|
S_(SECCLASS_SEM, ipc, 0x00000200UL)
|
|
S_(SECCLASS_MSGQ, ipc, 0x00000200UL)
|
|
S_(SECCLASS_SHM, ipc, 0x00000200UL)
|
|
S_(SECCLASS_NETLINK_ROUTE_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_FIREWALL_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_TCPDIAG_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_NFLOG_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_XFRM_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_SELINUX_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_AUDIT_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_IP6FW_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_DNRT_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_NETLINK_KOBJECT_UEVENT_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_APPLETALK_SOCKET, socket, 0x00400000UL)
|
|
S_(SECCLASS_DCCP_SOCKET, socket, 0x00400000UL)
|