kernel_optimize_test/security/selinux/include
Eric Paris cee74f47a6 SELinux: allow userspace to read policy back out of the kernel
There is interest in being able to see what the actual policy is that was
loaded into the kernel.  The patch creates a new selinuxfs file
/selinux/policy which can be read by userspace.  The actual policy that is
loaded into the kernel will be written back out to userspace.

Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
2010-10-21 10:12:58 +11:00
..
audit.h
avc_ss.h selinux: dynamic class/perm discovery 2009-10-07 21:56:42 +11:00
avc.h SELinux: Convert avc_audit to use lsm_audit.h 2009-08-17 08:37:18 +10:00
classmap.h SELinux: allow userspace to read policy back out of the kernel 2010-10-21 10:12:58 +11:00
conditional.h
initial_sid_to_string.h selinux: const strings in tables 2010-03-08 09:33:53 +11:00
netif.h
netlabel.h selinux: always call sk_security_struct sksec 2010-04-08 09:17:02 +10:00
netnode.h
netport.h
objsec.h switch selinux delayed superblock handling to iterate_supers() 2010-05-21 18:31:17 -04:00
security.h SELinux: allow userspace to read policy back out of the kernel 2010-10-21 10:12:58 +11:00
xfrm.h SELinux: Convert avc_audit to use lsm_audit.h 2009-08-17 08:37:18 +10:00