On Fri, 2007-12-21 at 12:09 -0500, Paul Moore wrote:
> Add additional Flask definitions to support the new "peer" object class and
> additional permissions to the netif and node object classes.
>
> Signed-off-by: Paul Moore <[EMAIL PROTECTED]>
Not an obstacle to merging, but need to get this reserved in policy too.
> ---
>
> security/selinux/include/av_perm_to_string.h | 5 +++++
> security/selinux/include/av_permissions.h | 5 +++++
> security/selinux/include/class_to_string.h | 7 +++++++
> security/selinux/include/flask.h | 1 +
> 4 files changed, 18 insertions(+), 0 deletions(-)
>
> diff --git a/security/selinux/include/av_perm_to_string.h
> b/security/selinux/include/av_perm_to_string.h
> index 049bf69..caa0634 100644
> --- a/security/selinux/include/av_perm_to_string.h
> +++ b/security/selinux/include/av_perm_to_string.h
> @@ -37,6 +37,8 @@
> S_(SECCLASS_NODE, NODE__ENFORCE_DEST, "enforce_dest")
> S_(SECCLASS_NODE, NODE__DCCP_RECV, "dccp_recv")
> S_(SECCLASS_NODE, NODE__DCCP_SEND, "dccp_send")
> + S_(SECCLASS_NODE, NODE__RECVFROM, "recvfrom")
> + S_(SECCLASS_NODE, NODE__SENDTO, "sendto")
> S_(SECCLASS_NETIF, NETIF__TCP_RECV, "tcp_recv")
> S_(SECCLASS_NETIF, NETIF__TCP_SEND, "tcp_send")
> S_(SECCLASS_NETIF, NETIF__UDP_RECV, "udp_recv")
> @@ -45,6 +47,8 @@
> S_(SECCLASS_NETIF, NETIF__RAWIP_SEND, "rawip_send")
> S_(SECCLASS_NETIF, NETIF__DCCP_RECV, "dccp_recv")
> S_(SECCLASS_NETIF, NETIF__DCCP_SEND, "dccp_send")
> + S_(SECCLASS_NETIF, NETIF__INGRESS, "ingress")
> + S_(SECCLASS_NETIF, NETIF__EGRESS, "egress")
> S_(SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__CONNECTTO,
> "connectto")
> S_(SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__NEWCONN, "newconn")
> S_(SECCLASS_UNIX_STREAM_SOCKET, UNIX_STREAM_SOCKET__ACCEPTFROM,
> "acceptfrom")
> @@ -159,3 +163,4 @@
> S_(SECCLASS_DCCP_SOCKET, DCCP_SOCKET__NODE_BIND, "node_bind")
> S_(SECCLASS_DCCP_SOCKET, DCCP_SOCKET__NAME_CONNECT, "name_connect")
> S_(SECCLASS_MEMPROTECT, MEMPROTECT__MMAP_ZERO, "mmap_zero")
> + S_(SECCLASS_PEER, PEER__RECV, "recv")
> diff --git a/security/selinux/include/av_permissions.h
> b/security/selinux/include/av_permissions.h
> index eda89a2..c2b5bb2 100644
> --- a/security/selinux/include/av_permissions.h
> +++ b/security/selinux/include/av_permissions.h
> @@ -292,6 +292,8 @@
> #define NODE__ENFORCE_DEST 0x00000040UL
> #define NODE__DCCP_RECV 0x00000080UL
> #define NODE__DCCP_SEND 0x00000100UL
> +#define NODE__RECVFROM 0x00000200UL
> +#define NODE__SENDTO 0x00000400UL
> #define NETIF__TCP_RECV 0x00000001UL
> #define NETIF__TCP_SEND 0x00000002UL
> #define NETIF__UDP_RECV 0x00000004UL
> @@ -300,6 +302,8 @@
> #define NETIF__RAWIP_SEND 0x00000020UL
> #define NETIF__DCCP_RECV 0x00000040UL
> #define NETIF__DCCP_SEND 0x00000080UL
> +#define NETIF__INGRESS 0x00000100UL
> +#define NETIF__EGRESS 0x00000200UL
> #define NETLINK_SOCKET__IOCTL 0x00000001UL
> #define NETLINK_SOCKET__READ 0x00000002UL
> #define NETLINK_SOCKET__WRITE 0x00000004UL
> @@ -824,3 +828,4 @@
> #define DCCP_SOCKET__NODE_BIND 0x00400000UL
> #define DCCP_SOCKET__NAME_CONNECT 0x00800000UL
> #define MEMPROTECT__MMAP_ZERO 0x00000001UL
> +#define PEER__RECV 0x00000001UL
> diff --git a/security/selinux/include/class_to_string.h
> b/security/selinux/include/class_to_string.h
> index e77de0e..b1b0d1d 100644
> --- a/security/selinux/include/class_to_string.h
> +++ b/security/selinux/include/class_to_string.h
> @@ -64,3 +64,10 @@
> S_(NULL)
> S_("dccp_socket")
> S_("memprotect")
> + S_(NULL)
> + S_(NULL)
> + S_(NULL)
> + S_(NULL)
> + S_(NULL)
> + S_(NULL)
> + S_("peer")
> diff --git a/security/selinux/include/flask.h
> b/security/selinux/include/flask.h
> index a9c2b20..09e9dd2 100644
> --- a/security/selinux/include/flask.h
> +++ b/security/selinux/include/flask.h
> @@ -50,6 +50,7 @@
> #define SECCLASS_KEY 58
> #define SECCLASS_DCCP_SOCKET 60
> #define SECCLASS_MEMPROTECT 61
> +#define SECCLASS_PEER 68
>
> /*
> * Security identifier indices for initial entities
>
>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to [EMAIL PROTECTED] with
> the words "unsubscribe selinux" without quotes as the message.
--
Stephen Smalley
National Security Agency
-
To unsubscribe from this list: send the line "unsubscribe
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html