Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 Jul 2002 20:03:22 -0700 (PDT)
From:      Robert Watson <rwatson@FreeBSD.org>
To:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/sys/kern uipc_socket.c uipc_socket2.c uipc_usrreq.c
Message-ID:  <200207310303.g6V33MEg032282@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
rwatson     2002/07/30 20:03:22 PDT

  Modified files:
    sys/kern             uipc_socket.c uipc_socket2.c 
                         uipc_usrreq.c 
  Log:
  Introduce support for Mandatory Access Control and extensible
  kernel access control.
  
  Invoke the necessary MAC entry points to maintain labels on sockets.
  In particular, invoke entry points during socket allocation and
  destruction, as well as creation by a process or during an
  accept-scenario (sonewconn).  For UNIX domain sockets, also assign
  a peer label.  As the socket code isn't locked down yet, locking
  interactions are not yet clear.  Various protocol stack socket
  operations (such as peer label assignment for IPv4) will follow.
  
  Obtained from:  TrustedBSD Project
  Sponsored by:   DARPA, NAI Labs
  
  Revision  Changes    Path
  1.127     +11 -0     src/sys/kern/uipc_socket.c
  1.100     +6 -0      src/sys/kern/uipc_socket2.c
  1.94      +6 -0      src/sys/kern/uipc_usrreq.c

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200207310303.g6V33MEg032282>