Date: Wed, 31 Jul 2002 12:06:49 -0700 (PDT) From: Robert Watson <rwatson@FreeBSD.org> To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/netinet tcp_input.c tcp_output.c tcp_subr.c tcp_syncache.c Message-ID: <200207311906.g6VJ6nC5030551@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
rwatson 2002/07/31 12:06:49 PDT
Modified files:
sys/netinet tcp_input.c tcp_output.c tcp_subr.c
tcp_syncache.c
Log:
Introduce support for Mandatory Access Control and extensible
kernel access control.
Instrument the TCP socket code for packet generation and delivery:
label outgoing mbufs with the label of the socket, and check socket and
mbuf labels before permitting delivery to a socket. Assign labels
to newly accepted connections when the syncache/cookie code has done
its business. Also set peer labels as convenient. Currently,
MAC policies cannot influence the PCB matching algorithm, so cannot
implement polyinstantiation. Note that there is at least one case
where a PCB is not available due to the TCP packet not being associated
with any socket, so we don't label in that case, but need to handle
it in a special manner.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
Revision Changes Path
1.167 +13 -0 src/sys/netinet/tcp_input.c
1.66 +5 -0 src/sys/netinet/tcp_output.c
1.139 +17 -0 src/sys/netinet/tcp_subr.c
1.24 +8 -0 src/sys/netinet/tcp_syncache.c
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200207311906.g6VJ6nC5030551>
