diff options
| author | Robert Watson <rwatson@FreeBSD.org> | 2002-11-26 17:11:57 +0000 |
|---|---|---|
| committer | Robert Watson <rwatson@FreeBSD.org> | 2002-11-26 17:11:57 +0000 |
| commit | 4d10c0ce5fd2ae3de65c683f0650a7323d38f35f (patch) | |
| tree | 06b016e3666e3730782ed81806dfee9447791631 | |
| parent | 229cd60f68f837716e47e6d03758ebd8e4cafc6b (diff) | |
Notes
| -rw-r--r-- | sys/kern/kern_mac.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_framework.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_framework.h | 1 | ||||
| -rw-r--r-- | sys/security/mac/mac_internal.h | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_net.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_pipe.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_process.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_syscalls.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_system.c | 2 | ||||
| -rw-r--r-- | sys/security/mac/mac_vfs.c | 2 | ||||
| -rw-r--r-- | sys/sys/mac.h | 1 |
11 files changed, 11 insertions, 9 deletions
diff --git a/sys/kern/kern_mac.c b/sys/kern/kern_mac.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/kern/kern_mac.c +++ b/sys/kern/kern_mac.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_framework.c b/sys/security/mac/mac_framework.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_framework.c +++ b/sys/security/mac/mac_framework.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_framework.h b/sys/security/mac/mac_framework.h index 89c6efcc0eaf..b03a172507e6 100644 --- a/sys/security/mac/mac_framework.h +++ b/sys/security/mac/mac_framework.h @@ -335,6 +335,7 @@ int mac_setsockopt_label_set(struct ucred *cred, struct socket *so, struct mac *extmac); int mac_pipe_label_set(struct ucred *cred, struct pipe *pipe, struct label *label); +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred); /* * Calls to help various file systems implement labeling functionality diff --git a/sys/security/mac/mac_internal.h b/sys/security/mac/mac_internal.h index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_internal.h +++ b/sys/security/mac/mac_internal.h @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_net.c b/sys/security/mac/mac_net.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_net.c +++ b/sys/security/mac/mac_net.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_pipe.c b/sys/security/mac/mac_pipe.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_pipe.c +++ b/sys/security/mac/mac_pipe.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_process.c b/sys/security/mac/mac_process.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_process.c +++ b/sys/security/mac/mac_process.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_syscalls.c b/sys/security/mac/mac_syscalls.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_syscalls.c +++ b/sys/security/mac/mac_syscalls.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_system.c b/sys/security/mac/mac_system.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_system.c +++ b/sys/security/mac/mac_system.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/security/mac/mac_vfs.c b/sys/security/mac/mac_vfs.c index f9eb44e65404..10fe51de523d 100644 --- a/sys/security/mac/mac_vfs.c +++ b/sys/security/mac/mac_vfs.c @@ -1856,7 +1856,7 @@ mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred, * memory space, and revoke access (in the least surprising ways we * know) when necessary. The process lock is not held here. */ -static void +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred) { diff --git a/sys/sys/mac.h b/sys/sys/mac.h index 89c6efcc0eaf..b03a172507e6 100644 --- a/sys/sys/mac.h +++ b/sys/sys/mac.h @@ -335,6 +335,7 @@ int mac_setsockopt_label_set(struct ucred *cred, struct socket *so, struct mac *extmac); int mac_pipe_label_set(struct ucred *cred, struct pipe *pipe, struct label *label); +void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred); /* * Calls to help various file systems implement labeling functionality |
