* [PATCH 0/9] secid reconciliation-v04: Repost patchset with updates
@ 2006-10-01 21:26 Venkat Yekkirala
0 siblings, 0 replies; only message in thread
From: Venkat Yekkirala @ 2006-10-01 21:26 UTC (permalink / raw)
To: netdev; +Cc: selinux, jmorris, sds, paul.moore, eparis
This patchset is relative to davem's net-2.6.git
The following are the changes included in this patchset since the previous post:
- Create IPSec SAs to be acquired with the creating sock's context as opposed
to that of the matching SPD rule, resulting in a simpler SPD as well as policy.
- Set peer_sid on tcp sockets to the reconciled secmark so trusted applications
can retrieve and service the data at the appropriate context. Also return secmark
when security is queried for a UDP packet.
- Fix minor things from James Morris' review.
Paul, please spin a new patch to bring NetLabel into the reconciliation path
as well as to address any NetLabel changes needed in regard to the above.
Please consider for inclusion in 2.6.19.
include/linux/security.h | 51 ++++-
include/linux/skbuff.h | 49 +++++
include/net/ip.h | 31 +++
include/net/request_sock.h | 18 ++
include/net/xfrm.h | 45 ++---
net/dccp/ipv4.c | 5
net/ipv4/icmp.c | 4
net/ipv4/ip_output.c | 6
net/ipv4/tcp_ipv4.c | 1
net/ipv6/ip6_output.c | 5
net/ipv6/netfilter/ip6t_REJECT.c | 2
net/netfilter/xt_CONNSECMARK.c | 72 ++++++--
net/netfilter/xt_SECMARK.c | 45 ++++-
security/dummy.c | 13 +
security/selinux/hooks.c | 148 +++++++++++++----
security/selinux/include/av_perm_to_string.h | 2
security/selinux/include/av_permissions.h | 2
security/selinux/include/xfrm.h | 11 -
security/selinux/xfrm.c | 66 +++----
19 files changed, 450 insertions(+), 126 deletions(-)
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2006-10-01 21:26 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-01 21:26 [PATCH 0/9] secid reconciliation-v04: Repost patchset with updates Venkat Yekkirala
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).