<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/sys/security/mac/mac_process.c, branch release/5.3.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=release%2F5.3.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=release%2F5.3.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2004-02-22T00:33:12Z</updated>
<entry>
<title>Update my personal copyrights and NETA copyrights in the kernel</title>
<updated>2004-02-22T00:33:12Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2004-02-22T00:33:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=f6a4109212fd8fbabc731f07b2dd5c7e07fbec33'/>
<id>urn:sha1:f6a4109212fd8fbabc731f07b2dd5c7e07fbec33</id>
<content type='text'>
to use the "year1-year3" format, as opposed to "year1, year2, year3".
This seems to make lawyers more happy, but also prevents the
lines from getting excessively long as the years start to add up.

Suggested by:	imp
</content>
</entry>
<entry>
<title>Rename mac_create_cred() MAC Framework entry point to mac_copy_cred(),</title>
<updated>2003-12-06T21:48:03Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-12-06T21:48:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=56d9e932072f81ebaa7bb1bf5995a46813bc91c4'/>
<id>urn:sha1:56d9e932072f81ebaa7bb1bf5995a46813bc91c4</id>
<content type='text'>
and the mpo_create_cred() MAC policy entry point to
mpo_copy_cred_label().  This is more consistent with similar entry
points for creation and label copying, as mac_create_cred() was
called from crdup() as opposed to during process creation.  For
a number of policies, this removes the requirement for special
handling when copying credential labels, and improves consistency.

Approved by:	re (scottl)
Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Modify the MAC Framework so that instead of embedding a (struct label)</title>
<updated>2003-11-12T03:14:31Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-11-12T03:14:31Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=eca8a663d442468f64e21ed869817b9048ab5a7b'/>
<id>urn:sha1:eca8a663d442468f64e21ed869817b9048ab5a7b</id>
<content type='text'>
in various kernel objects to represent security data, we embed a
(struct label *) pointer, which now references labels allocated using
a UMA zone (mac_label.c).  This allows the size and shape of struct
label to be varied without changing the size and shape of these kernel
objects, which become part of the frozen ABI with 5-STABLE.  This opens
the door for boot-time selection of the number of label slots, and hence
changes to the bound on the number of simultaneous labeled policies
at boot-time instead of compile-time.  This also makes it easier to
embed label references in new objects as required for locking/caching
with fine-grained network stack locking, such as inpcb structures.

This change also moves us further in the direction of hiding the
structure of kernel objects from MAC policy modules, not to mention
dramatically reducing the number of '&amp;' symbols appearing in both the
MAC Framework and MAC policy modules, and improving readability.

While this results in minimal performance change with MAC enabled, it
will observably shrink the size of a number of critical kernel data
structures for the !MAC case, and should have a small (but measurable)
performance benefit (i.e., struct vnode, struct socket) do to memory
conservation and reduced cost of zeroing memory.

NOTE: Users of MAC must recompile their kernel and all MAC modules as a
result of this change.  Because this is an API change, third party
MAC modules will also need to be updated to make less use of the '&amp;'
symbol.

Suggestions from:	bmilekic
Obtained from:		TrustedBSD Project
Sponsored by:		DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Remove the flags argument from mac_externalize_*_label(), as it's not</title>
<updated>2003-11-06T03:42:43Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-11-06T03:42:43Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=83b7b0edcab422d62d6f847c421006a2a41c4e91'/>
<id>urn:sha1:83b7b0edcab422d62d6f847c421006a2a41c4e91</id>
<content type='text'>
passed into policies or used internally to the MAC Framework.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Make MAC_EXTERNALIZE() and MAC_INTERNALIZE() simply take the object</title>
<updated>2003-10-25T15:28:20Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-10-25T15:28:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=da77b2fa6bf3355ab40ef6047a11108dc1770f77'/>
<id>urn:sha1:da77b2fa6bf3355ab40ef6047a11108dc1770f77</id>
<content type='text'>
type, rather than "object_label" as the first argument.  This reduces
complexity a little for the consumer, and also makes it easier for
use to rename the underlying entry points in struct mac_policy_obj.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Remove non-credential/process-related bits from mac_process.c.  Leave:</title>
<updated>2003-10-22T20:02:04Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-10-22T20:02:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=5a9c1aaac539607c411d89f7557245abf777dc83'/>
<id>urn:sha1:5a9c1aaac539607c411d89f7557245abf777dc83</id>
<content type='text'>
  Enforce_process, enforce_vm access control enforcement twiddles.
  Credential, process label counters.
  VM revocation sysctls/tunables.
  Credential label management, internalization/externalization/relabel
    code.
  Process label management.
  Proc0, proc1 creation, cred creation.
  Thread userret.
  mac_execve_enter(), _exit(), transition at exec-time.
  VM revocation on process label change.
  Process-related access control checks (visibility, debug, signal, sched).

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>If the struct mac copied into the kernel has a negative length, return</title>
<updated>2003-09-29T18:35:17Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-09-29T18:35:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=cc7b13bfe0dc4a881a42519ba6f8a959d0452d4e'/>
<id>urn:sha1:cc7b13bfe0dc4a881a42519ba6f8a959d0452d4e</id>
<content type='text'>
EINVAL rather than failing the following malloc due to the value being
too large.
</content>
</entry>
<entry>
<title>Fix a mac_policy_list reference to be a mac_static_policy_list</title>
<updated>2003-08-26T17:29:02Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-08-26T17:29:02Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a6a65b05d5eea33bf8de07f65eec1e28193f12a3'/>
<id>urn:sha1:a6a65b05d5eea33bf8de07f65eec1e28193f12a3</id>
<content type='text'>
reference: this fixes mac_syscall() for static policies when using
optimized locking.

Obtained from:	TrustedBSD Project
Sponosred by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Introduce two new MAC Framework and MAC policy entry points:</title>
<updated>2003-08-21T18:21:22Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-08-21T18:21:22Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=eb8c7f999290d0cd203ab601aa1ebe613a7822ff'/>
<id>urn:sha1:eb8c7f999290d0cd203ab601aa1ebe613a7822ff</id>
<content type='text'>
  mac_reflect_mbuf_icmp()
  mac_reflect_mbuf_tcp()

These entry points permit MAC policies to do "update in place"
changes to the labels on ICMP and TCP mbuf headers when an ICMP or
TCP response is generated to a packet outside of the context of
an existing socket.  For example, in respond to a ping or a RST
packet to a SYN on a closed port.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Add mac_check_vnode_deleteextattr() and mac_check_vnode_listextattr():</title>
<updated>2003-08-21T13:53:01Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2003-08-21T13:53:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c096756c00f4ec7b2e88bfaa5a0c8fc4941775b9'/>
<id>urn:sha1:c096756c00f4ec7b2e88bfaa5a0c8fc4941775b9</id>
<content type='text'>
explicit access control checks to delete and list extended attributes
on a vnode, rather than implicitly combining with the setextattr and
getextattr checks.  This reflects EA API changes in the kernel made
recently, including the move to explicit VOP's for both of these
operations.

Obtained from:	TrustedBSD PRoject
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
</feed>
