linux-stable-rt/security/selinux/include
Paul Moore 5dbe1eb0cf SELinux: Allow NetLabel to directly cache SIDs
Now that the SELinux NetLabel "base SID" is always the netmsg initial SID we
can do a big optimization - caching the SID and not just the MLS attributes.
This not only saves a lot of per-packet memory allocations and copies but it
has a nice side effect of removing a chunk of code.

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: James Morris <jmorris@namei.org>
2008-01-30 08:17:27 +11:00
..
av_inherit.h
av_perm_to_string.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
av_permissions.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
avc.h SELinux: Only store the network interface's ifindex 2008-01-30 08:17:22 +11:00
avc_ss.h
class_to_string.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
common_perm_to_string.h
conditional.h
flask.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
initial_sid_to_string.h
netif.h SELinux: Convert the netif code to use ifindex values 2008-01-30 08:17:21 +11:00
netlabel.h SELinux: Allow NetLabel to directly cache SIDs 2008-01-30 08:17:27 +11:00
netnode.h SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions 2008-01-30 08:17:23 +11:00
objsec.h SELinux: Better integration between peer labeling subsystems 2008-01-30 08:17:25 +11:00
security.h SELinux: Allow NetLabel to directly cache SIDs 2008-01-30 08:17:27 +11:00
xfrm.h SELinux: Enable dynamic enable/disable of the network access checks 2008-01-30 08:17:26 +11:00