forked from luck/tmp_suning_uos_patched
29a395eac4
Secmark implements a new scheme for adding security markings to packets via iptables, as well as changes to SELinux to use these markings for security policy enforcement. The rationale for this scheme is explained and discussed in detail in the original threads: http://thread.gmane.org/gmane.linux.network/34927/ http://thread.gmane.org/gmane.linux.network/35244/ Examples of policy and rulesets, as well as a full archive of patches for iptables and SELinux userland, may be found at: http://people.redhat.com/jmorris/selinux/secmark/ The code has been tested with various compilation options and in several scenarios, including with 'complicated' protocols such as FTP and also with the new generic conntrack code with IPv6 connection tracking. This patch: Add support for a new object class ('packet'), and associated permissions ('send', 'recv', 'relabelto'). These are used to enforce security policy for network packets labeled with SECMARK, and for adding labeling rules. Signed-off-by: James Morris <jmorris@namei.org> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: David S. Miller <davem@davemloft.net>
63 lines
1.3 KiB
C
63 lines
1.3 KiB
C
/* This file is automatically generated. Do not edit. */
|
|
/*
|
|
* Security object class definitions
|
|
*/
|
|
S_("null")
|
|
S_("security")
|
|
S_("process")
|
|
S_("system")
|
|
S_("capability")
|
|
S_("filesystem")
|
|
S_("file")
|
|
S_("dir")
|
|
S_("fd")
|
|
S_("lnk_file")
|
|
S_("chr_file")
|
|
S_("blk_file")
|
|
S_("sock_file")
|
|
S_("fifo_file")
|
|
S_("socket")
|
|
S_("tcp_socket")
|
|
S_("udp_socket")
|
|
S_("rawip_socket")
|
|
S_("node")
|
|
S_("netif")
|
|
S_("netlink_socket")
|
|
S_("packet_socket")
|
|
S_("key_socket")
|
|
S_("unix_stream_socket")
|
|
S_("unix_dgram_socket")
|
|
S_("sem")
|
|
S_("msg")
|
|
S_("msgq")
|
|
S_("shm")
|
|
S_("ipc")
|
|
S_("passwd")
|
|
S_("drawable")
|
|
S_("window")
|
|
S_("gc")
|
|
S_("font")
|
|
S_("colormap")
|
|
S_("property")
|
|
S_("cursor")
|
|
S_("xclient")
|
|
S_("xinput")
|
|
S_("xserver")
|
|
S_("xextension")
|
|
S_("pax")
|
|
S_("netlink_route_socket")
|
|
S_("netlink_firewall_socket")
|
|
S_("netlink_tcpdiag_socket")
|
|
S_("netlink_nflog_socket")
|
|
S_("netlink_xfrm_socket")
|
|
S_("netlink_selinux_socket")
|
|
S_("netlink_audit_socket")
|
|
S_("netlink_ip6fw_socket")
|
|
S_("netlink_dnrt_socket")
|
|
S_("dbus")
|
|
S_("nscd")
|
|
S_("association")
|
|
S_("netlink_kobject_uevent_socket")
|
|
S_("appletalk_socket")
|
|
S_("packet")
|