original_kernel/security/selinux/include
Paul Moore ed6d76e4c3 selinux: Support for the new TUN LSM hooks
Add support for the new TUN LSM hooks: security_tun_dev_create(),
security_tun_dev_post_create() and security_tun_dev_attach().  This includes
the addition of a new object class, tun_socket, which represents the socks
associated with TUN devices.  The _tun_dev_create() and _tun_dev_post_create()
hooks are fairly similar to the standard socket functions but _tun_dev_attach()
is a bit special.  The _tun_dev_attach() is unique because it involves a
domain attaching to an existing TUN device and its associated tun_socket
object, an operation which does not exist with standard sockets and most
closely resembles a relabel operation.

Signed-off-by: Paul Moore <paul.moore@hp.com>
Acked-by: Eric Paris <eparis@parisplace.org>
Signed-off-by: James Morris <jmorris@namei.org>
2009-09-01 08:29:52 +10:00
..
audit.h
av_inherit.h selinux: Support for the new TUN LSM hooks 2009-09-01 08:29:52 +10:00
av_perm_to_string.h
av_permissions.h selinux: Support for the new TUN LSM hooks 2009-09-01 08:29:52 +10:00
avc.h
avc_ss.h
class_to_string.h selinux: Support for the new TUN LSM hooks 2009-09-01 08:29:52 +10:00
common_perm_to_string.h
conditional.h
flask.h selinux: Support for the new TUN LSM hooks 2009-09-01 08:29:52 +10:00
initial_sid_to_string.h
netif.h
netlabel.h
netnode.h
netport.h
objsec.h
security.h
xfrm.h