<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/security/mac, branch release/6.0.0_cvs</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F6.0.0_cvs</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F6.0.0_cvs'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2005-11-03T00:35:26Z</updated>
<entry>
<title>This commit was manufactured by cvs2svn to create tag</title>
<updated>2005-11-03T00:35:26Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2005-11-03T00:35:26Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3640cb54210edbb7edbf1b12ef0127ecfcea967d'/>
<id>urn:sha1:3640cb54210edbb7edbf1b12ef0127ecfcea967d</id>
<content type='text'>
'RELENG_6_0_0_RELEASE'.

This commit was manufactured to restore the state of the 6.0-RELEASE image.
</content>
</entry>
<entry>
<title>Merge init_main.c:1.258, mac_vfs.c:1.110, mac_biba.c:1.89,</title>
<updated>2005-10-05T10:31:05Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-10-05T10:31:05Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=85822579e31e6c6ba3cf0f8eb5d15a6e32798d9c'/>
<id>urn:sha1:85822579e31e6c6ba3cf0f8eb5d15a6e32798d9c</id>
<content type='text'>
mac_lomac.c:1.37, mac_mls.c:1.74, mac_stub.c:1.55, mac_test.c:1.62,
mac.h:1.69, mac_policy.h:1.70 from HEAD to RELENG_6:

  Remove mac_create_root_mount() and mpo_create_root_mount(), which
  provided access to the root file system before the start of the
  init process.  This was used briefly by SEBSD before it knew about
  preloading data in the loader, and using that method to gain
  access to data earlier results in fewer inconsistencies in the
  approach.  Policy modules still have access to the root file system
  creation event through the mac_create_mount() entry point.

  Removed now, and will be removed from RELENG_6, in order to gain
  third party policy dependencies on the entry point for the lifetime
  of the 6.x branch.

  Obtained from: TrustedBSD Project
  Submitted by:  Chris Vance &lt;Christopher dot Vance at SPARTA dot com&gt;

Approved by:	re (scottl)
</content>
</entry>
<entry>
<title>Merge two sets of changes relating to devfs device node cloning from</title>
<updated>2005-08-13T21:24:18Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-08-13T21:24:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7e993ff3bc9140ccccc23d520316c214cdad4ac2'/>
<id>urn:sha1:7e993ff3bc9140ccccc23d520316c214cdad4ac2</id>
<content type='text'>
HEAD to RELENG_6: changes to introduce a credentialed version of the
clone event handler, and then changes to merge the regular and
credentialed versions into a single interface (along with updates to
existing consumers).  With this merge, 6.x and 7.x are in sync.

First batch merges devfs_devs.c:1.37, devfs_vnops.c:1.115,
kern_conf.c:1.187, tty_pty.c:1.138, mac_vfs.c:1.109, mac_biba.c:1.36,
mac_lomac.c:1.36, mac_mls.c:1.73, mac_stub.c:1.53, mac_test.c:1.61,
conf.h:1.223, mac.h:1.68, mac_policy.h:1.67 from HEAD to RELENG_6:

  When devfs cloning takes place, provide access to the credential of the
  process that caused the clone event to take place for the device driver
  creating the device.  This allows cloned device drivers to adapt the
  device node based on security aspects of the process, such as the uid,
  gid, and MAC label.

  - Add a cred reference to struct cdev, so that when a device node is
    instantiated as a vnode, the cloning credential can be exposed to
    MAC.

  - Add make_dev_cred(), a version of make_dev() that additionally
    accepts the credential to stick in the struct cdev.  Implement it and
    make_dev() in terms of a back-end make_dev_credv().

  - Add a new event handler, dev_clone_cred, which can be registered to
    receive the credential instead of dev_clone, if desired.

  - Modify the MAC entry point mac_create_devfs_device() to accept an
    optional credential pointer (may be NULL), so that MAC policies can
    inspect and act on the label or other elements of the credential
    when initializing the skeleton device protections.

  - Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
    so that the pty clone credential is exposed to the MAC Framework.

  While currently primarily focussed on MAC policies, this change is also
  a prerequisite for changes to allow ptys to be instantiated with the UID
  of the process looking up the pty.  This requires further changes to the
  pty driver -- in particular, to immediately recycle pty nodes on last
  close so that the credential-related state can be recreated on next
  lookup.

  Submitted by:   Andrew Reisse &lt;andrew.reisse@sparta.com&gt;
  Obtained from:  TrustedBSD Project
  Sponsored by:   SPAWAR, SPARTA

Second batch merges scsi_target.c:1.68, coda_fbsd.c:1.43,
firewirereg.h:1.38, fwdev.c:1.47, nmdm.c:1.36, snp.c:1.100, dsp.c:1.82,
mixer.c:1.45, vkbd.c:1.9, devfs_vnops.c:1.117, tty_pty.c:1.139,
tty_tty.c:1.57, bpf.c:1.156, if_tap.c:1.56, if_tun.c:1.153,
smb_dev.c:1.28, conf.h:1.224 from HEAD to RELENG_6:

  Merge the dev_clone and dev_clone_cred event handlers into a single
  event handler, dev_clone, which accepts a credential argument.
  Implementors of the event can ignore it if they're not interested,
  and most do.  This avoids having multiple event handler types and
  fall-back/precedence logic in devfs.

  This changes the kernel API for /dev cloning, and may affect third
  party packages containg cloning kernel modules.

  Requested by:   phk

These changes modifies the kernel device driver API for device cloning,
and might require minor modifications to third party device drivers that
make use of devfs cloning.  It will not be merged to RELENG_5.

Approved by:	re (scottl)
</content>
</entry>
<entry>
<title>This commit was manufactured by cvs2svn to create branch 'RELENG_6'.</title>
<updated>2005-07-11T04:14:43Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2005-07-11T04:14:43Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6ac68e81ff340e851cccd941b1ed36e2391039d9'/>
<id>urn:sha1:6ac68e81ff340e851cccd941b1ed36e2391039d9</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Eliminate MAC entry point mac_create_mbuf_from_mbuf(), which is</title>
<updated>2005-07-05T23:39:51Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-07-05T23:39:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3c308b091fa7576dfb1b4dc97220d0ee02bdec4e'/>
<id>urn:sha1:3c308b091fa7576dfb1b4dc97220d0ee02bdec4e</id>
<content type='text'>
redundant with respect to existing mbuf copy label routines.  Expose
a new mac_copy_mbuf() routine at the top end of the Framework and
use that; use the existing mpo_copy_mbuf_label() routine on the
bottom end.

Obtained from:	TrustedBSD Project
Sponsored by:	SPARTA, SPAWAR
Approved by:	re (scottl)
</content>
</entry>
<entry>
<title>Add MAC Framework and MAC policy entry point mac_check_socket_create(),</title>
<updated>2005-07-05T22:49:10Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-07-05T22:49:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6758f88ea476f8a5d8c956d2b4ab41a2c0aa6bd6'/>
<id>urn:sha1:6758f88ea476f8a5d8c956d2b4ab41a2c0aa6bd6</id>
<content type='text'>
which is invoked from socket() and socketpair(), permitting MAC
policy modules to control the creation of sockets by domain, type, and
protocol.

Obtained from:	TrustedBSD Project
Sponsored by:	SPARTA, SPAWAR
Approved by:	re (scottl)
Requested by:	SCC
</content>
</entry>
<entry>
<title>Correct grammar error in comment</title>
<updated>2005-06-10T04:44:38Z</updated>
<author>
<name>Christian S.J. Peron</name>
<email>csjp@FreeBSD.org</email>
</author>
<published>2005-06-10T04:44:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=578994bbd73c7fd0630b13d89c23ca1f7fcb4f71'/>
<id>urn:sha1:578994bbd73c7fd0630b13d89c23ca1f7fcb4f71</id>
<content type='text'>
MFC after:	3 days
</content>
</entry>
<entry>
<title>Gratuitous renaming of four System V Semaphore MAC Framework entry</title>
<updated>2005-06-07T05:03:28Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-06-07T05:03:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3831e7d7f5547decd48f5f3a0c8d311243b0e1f3'/>
<id>urn:sha1:3831e7d7f5547decd48f5f3a0c8d311243b0e1f3</id>
<content type='text'>
points to convert _sema() to _sem() for consistency purposes with
respect to the other semaphore-related entry points:

mac_init_sysv_sema() -&gt; mac_init_sysv_sem()
mac_destroy_sysv_sem() -&gt; mac_destroy_sysv_sem()
mac_create_sysv_sema() -&gt; mac_create_sysv_sem()
mac_cleanup_sysv_sema() -&gt; mac_cleanup_sysv_sem()

Congruent changes are made to the policy interface to support this.

Obtained from:	TrustedBSD Project
Sponsored by:	SPAWAR, SPARTA
</content>
</entry>
<entry>
<title>Introduce MAC Framework and MAC Policy entry points to label and control</title>
<updated>2005-05-04T10:39:15Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-05-04T10:39:15Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=5264841183cc5312cd097028c7cb00b39f56874b'/>
<id>urn:sha1:5264841183cc5312cd097028c7cb00b39f56874b</id>
<content type='text'>
access to POSIX Semaphores:

mac_init_posix_sem()            Initialize label for POSIX semaphore
mac_create_posix_sem()          Create POSIX semaphore
mac_destroy_posix_sem()         Destroy POSIX semaphore
mac_check_posix_sem_destroy()   Check whether semaphore may be destroyed
mac_check_posix_sem_getvalue()  Check whether semaphore may be queried
mac_check_possix_sem_open()     Check whether semaphore may be opened
mac_check_posix_sem_post()      Check whether semaphore may be posted to
mac_check_posix_sem_unlink()    Check whether semaphore may be unlinked
mac_check_posix_sem_wait()      Check whether may wait on semaphore

Update Biba, MLS, Stub, and Test policies to implement these entry points.
For information flow policies, most semaphore operations are effectively
read/write.

Submitted by:	Dandekar Hrishikesh &lt;rishi_dandekar at sbcglobal dot net&gt;
Sponsored by:	DARPA, McAfee, SPARTA
Obtained from:	TrustedBSD Project
</content>
</entry>
<entry>
<title>Get the directory structure correct in a comment.</title>
<updated>2005-04-22T19:09:12Z</updated>
<author>
<name>Tom Rhodes</name>
<email>trhodes@FreeBSD.org</email>
</author>
<published>2005-04-22T19:09:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=498693053c8087c41ae0f8162f35913d11e277ad'/>
<id>urn:sha1:498693053c8087c41ae0f8162f35913d11e277ad</id>
<content type='text'>
Submitted by:	Samy Al Bahra
</content>
</entry>
</feed>
