diff options
author | rwatson <rwatson@FreeBSD.org> | 2002-07-31 00:39:19 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2002-07-31 00:39:19 +0000 |
commit | 3c013fb68e162162384e0900dc108bed7fae50db (patch) | |
tree | 099eb02ff54e13a2095d603a65d2a44439b035df /sys/kern/init_main.c | |
parent | 382f0fd0af41b69c546af8aab5fccf64a8fa1d0a (diff) | |
download | FreeBSD-src-3c013fb68e162162384e0900dc108bed7fae50db.zip FreeBSD-src-3c013fb68e162162384e0900dc108bed7fae50db.tar.gz |
Introduce support for Mandatory Access Control and extensible
kernel access control.
Invoke the necessary MAC entry points to maintain labels on
process credentials. In particular, invoke entry points for
the initialization and destruction of struct ucred, the copying
of struct ucred, and permit the initial labels to be set for
both process 0 (parent of all kernel processes) and process 1
(parent of all user processes).
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
Diffstat (limited to 'sys/kern/init_main.c')
-rw-r--r-- | sys/kern/init_main.c | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/sys/kern/init_main.c b/sys/kern/init_main.c index aa87a18..d43d52f 100644 --- a/sys/kern/init_main.c +++ b/sys/kern/init_main.c @@ -43,6 +43,7 @@ */ #include "opt_init_path.h" +#include "opt_mac.h" #include <sys/param.h> #include <sys/kernel.h> @@ -50,6 +51,7 @@ #include <sys/filedesc.h> #include <sys/ktr.h> #include <sys/lock.h> +#include <sys/mac.h> #include <sys/mount.h> #include <sys/mutex.h> #include <sys/sysctl.h> @@ -362,6 +364,9 @@ KASSERT((ke->ke_kgrlist.tqe_next != ke), ("linked to self!")); p->p_ucred->cr_uidinfo = uifind(0); p->p_ucred->cr_ruidinfo = uifind(0); p->p_ucred->cr_prison = NULL; /* Don't jail it. */ +#ifdef MAC + mac_create_proc0(p->p_ucred); +#endif td->td_ucred = crhold(p->p_ucred); /* Create procsig. */ @@ -657,6 +662,9 @@ create_init(const void *udata __unused) initproc->p_flag |= P_SYSTEM; oldcred = initproc->p_ucred; crcopy(newcred, oldcred); +#ifdef MAC + mac_create_proc1(newcred); +#endif initproc->p_ucred = newcred; PROC_UNLOCK(initproc); crfree(oldcred); |