android_kernel_xiaomi_sm8350/security/selinux/include
Paul Moore 014ab19a69 selinux: Set socket NetLabel based on connection endpoint
Previous work enabled the use of address based NetLabel selectors, which while
highly useful, brought the potential for additional per-packet overhead when
used.  This patch attempts to solve that by applying NetLabel socket labels
when sockets are connect()'d.  This should alleviate the per-packet NetLabel
labeling for all connected sockets (yes, it even works for connected DGRAM
sockets).

Signed-off-by: Paul Moore <paul.moore@hp.com>
Reviewed-by: James Morris <jmorris@namei.org>
2008-10-10 10:16:33 -04:00
..
audit.h SELinux: keep the code clean formating and syntax 2008-07-14 15:01:36 +10:00
av_inherit.h
av_perm_to_string.h SELinux: create new open permission 2008-04-18 20:26:06 +10:00
av_permissions.h SELinux: create new open permission 2008-04-18 20:26:06 +10:00
avc_ss.h SELinux: avc_ss.h whitespace, syntax, and other cleanups 2008-04-28 09:28:58 +10:00
avc.h SELinux: keep the code clean formating and syntax 2008-07-14 15:01:36 +10:00
class_to_string.h
common_perm_to_string.h
conditional.h
flask.h
initial_sid_to_string.h
netif.h
netlabel.h selinux: Set socket NetLabel based on connection endpoint 2008-10-10 10:16:33 -04:00
netnode.h
netport.h SELinux: add netport.[ch] 2008-04-18 20:26:17 +10:00
objsec.h selinux: Set socket NetLabel based on connection endpoint 2008-10-10 10:16:33 -04:00
security.h Revert "SELinux: allow fstype unknown to policy to use xattrs if present" 2008-07-15 18:32:49 +10:00
xfrm.h LSM: Make the Labeled IPsec hooks more stack friendly 2008-04-12 19:07:52 -07:00