kernel_optimize_test/security/selinux/ss
paul.moore@hp.com ffb733c650 NetLabel: fix a cache race condition
Testing revealed a problem with the NetLabel cache where a cached entry could
be freed while in use by the LSM layer causing an oops and other problems.
This patch fixes that problem by introducing a reference counter to the cache
entry so that it is only freed when it is no longer in use.

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: James Morris <jmorris@namei.org>
2006-10-11 23:59:29 -07:00
..
avtab.c
avtab.h
conditional.c
conditional.h
constraint.h
context.h
ebitmap.c [NetLabel]: Cleanup ebitmap_import() 2006-09-22 15:18:37 -07:00
ebitmap.h [NetLabel]: SELinux support 2006-09-22 14:53:36 -07:00
hashtab.c
hashtab.h
Makefile
mls_types.h
mls.c [PATCH] selinux: add support for range transitions on object classes 2006-09-26 08:48:52 -07:00
mls.h [NetLabel]: SELinux support 2006-09-22 14:53:36 -07:00
policydb.c [PATCH] selinux: add support for range transitions on object classes 2006-09-26 08:48:52 -07:00
policydb.h [PATCH] selinux: add support for range transitions on object classes 2006-09-26 08:48:52 -07:00
services.c NetLabel: fix a cache race condition 2006-10-11 23:59:29 -07:00
services.h
sidtab.c
sidtab.h
symtab.c
symtab.h