original_kernel/security/selinux/include
David Quigley eb9ae68650 SELinux: Add new labeling type native labels
There currently doesn't exist a labeling type that is adequate for use with
labeled NFS. Since NFS doesn't really support xattrs we can't use the use xattr
labeling behavior. For this we developed a new labeling type. The native
labeling type is used solely by NFS to ensure NFS inodes are labeled at runtime
by the NFS code instead of relying on the SELinux security server on the client
end.

Acked-by: Eric Paris <eparis@redhat.com>
Acked-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: Matthew N. Dodd <Matthew.Dodd@sparta.com>
Signed-off-by: Miguel Rodel Felipe <Rodel_FM@dsi.a-star.edu.sg>
Signed-off-by: Phua Eu Gene <PHUA_Eu_Gene@dsi.a-star.edu.sg>
Signed-off-by: Khin Mi Mi Aung <Mi_Mi_AUNG@dsi.a-star.edu.sg>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2013-06-08 16:20:12 -04:00
..
audit.h
avc.h
avc_ss.h
classmap.h selinux: add the "attach_queue" permission to the "tun_socket" class 2013-01-14 18:16:59 -05:00
conditional.h
initial_sid_to_string.h
netif.h
netlabel.h
netnode.h
netport.h
objsec.h tun: fix LSM/SELinux labeling of tun/tap devices 2013-01-14 18:16:59 -05:00
security.h SELinux: Add new labeling type native labels 2013-06-08 16:20:12 -04:00
xfrm.h