kernel_optimize_test/security/selinux/include
Paul Moore d621d35e57 SELinux: Enable dynamic enable/disable of the network access checks
This patch introduces a mechanism for checking when labeled IPsec or SECMARK
are in use by keeping introducing a configuration reference counter for each
subsystem.  In the case of labeled IPsec, whenever a labeled SA or SPD entry
is created the labeled IPsec/XFRM reference count is increased and when the
entry is removed it is decreased.  In the case of SECMARK, when a SECMARK
target is created the reference count is increased and later decreased when the
target is removed.  These reference counters allow SELinux to quickly determine
if either of these subsystems are enabled.

NetLabel already has a similar mechanism which provides the netlbl_enabled()
function.

This patch also renames the selinux_relabel_packet_permission() function to
selinux_secmark_relabel_packet_permission() as the original name and
description were misleading in that they referenced a single packet label which
is not the case.

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: James Morris <jmorris@namei.org>
2008-01-30 08:17:26 +11:00
..
av_inherit.h
av_perm_to_string.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
av_permissions.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
avc_ss.h
avc.h SELinux: Only store the network interface's ifindex 2008-01-30 08:17:22 +11:00
class_to_string.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
common_perm_to_string.h
conditional.h
flask.h SELinux: Add a new peer class and permissions to the Flask definitions 2008-01-30 08:17:24 +11:00
initial_sid_to_string.h
netif.h SELinux: Convert the netif code to use ifindex values 2008-01-30 08:17:21 +11:00
netlabel.h SELinux: Better integration between peer labeling subsystems 2008-01-30 08:17:25 +11:00
netnode.h SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions 2008-01-30 08:17:23 +11:00
objsec.h SELinux: Better integration between peer labeling subsystems 2008-01-30 08:17:25 +11:00
security.h SELinux: Better integration between peer labeling subsystems 2008-01-30 08:17:25 +11:00
xfrm.h SELinux: Enable dynamic enable/disable of the network access checks 2008-01-30 08:17:26 +11:00