Date: Tue, 30 Jul 2002 20:03:22 -0700 (PDT) From: Robert Watson <rwatson@FreeBSD.org> To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/kern uipc_socket.c uipc_socket2.c uipc_usrreq.c Message-ID: <200207310303.g6V33MEg032282@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
rwatson 2002/07/30 20:03:22 PDT
Modified files:
sys/kern uipc_socket.c uipc_socket2.c
uipc_usrreq.c
Log:
Introduce support for Mandatory Access Control and extensible
kernel access control.
Invoke the necessary MAC entry points to maintain labels on sockets.
In particular, invoke entry points during socket allocation and
destruction, as well as creation by a process or during an
accept-scenario (sonewconn). For UNIX domain sockets, also assign
a peer label. As the socket code isn't locked down yet, locking
interactions are not yet clear. Various protocol stack socket
operations (such as peer label assignment for IPv4) will follow.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
Revision Changes Path
1.127 +11 -0 src/sys/kern/uipc_socket.c
1.100 +6 -0 src/sys/kern/uipc_socket2.c
1.94 +6 -0 src/sys/kern/uipc_usrreq.c
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200207310303.g6V33MEg032282>
