Date: Tue, 30 Jul 2002 20:03:22 -0700 (PDT) From: Robert Watson <rwatson@FreeBSD.org> To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/kern uipc_socket.c uipc_socket2.c uipc_usrreq.c Message-ID: <200207310303.g6V33MEg032282@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
rwatson 2002/07/30 20:03:22 PDT Modified files: sys/kern uipc_socket.c uipc_socket2.c uipc_usrreq.c Log: Introduce support for Mandatory Access Control and extensible kernel access control. Invoke the necessary MAC entry points to maintain labels on sockets. In particular, invoke entry points during socket allocation and destruction, as well as creation by a process or during an accept-scenario (sonewconn). For UNIX domain sockets, also assign a peer label. As the socket code isn't locked down yet, locking interactions are not yet clear. Various protocol stack socket operations (such as peer label assignment for IPv4) will follow. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs Revision Changes Path 1.127 +11 -0 src/sys/kern/uipc_socket.c 1.100 +6 -0 src/sys/kern/uipc_socket2.c 1.94 +6 -0 src/sys/kern/uipc_usrreq.c To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200207310303.g6V33MEg032282>