summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* De-gccize CFLAGS by removing it.rwatson2002-08-021-2/+0
| | | | | | NOMAN is no longer required when a man page is not yet present. Submitted by: ru
* Remove an #include <syslog.h>. It's already included conditionallymux2002-08-021-1/+0
| | | | | | above, as it should be. Submitted by: Olivier Houchard <cognet@ci0.org>
* Use a cast to `void *' before casting to a pointer to a structurerobert2002-08-021-5/+8
| | | | | | | to stop GCC emitting warnings about increased alignment requirements which broke the build for sparc64. Approved by: des
* Modernise the cdevsw WRT to (unused) kqueue.markm2002-08-021-0/+2
|
* Remove the last reference to NOUUCP - we don't have UUCP in the basemarkm2002-08-021-1/+1
| | | | system.
* Remove the reference to NOUUCP, ans we no longer have base UUCP.markm2002-08-021-5/+0
|
* There is no more UUCP in the base system, so there is no need tomarkm2002-08-021-1/+0
| | | | prevent its building.
* Modernise and tidy up.markm2002-08-022-162/+131
|
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-023-0/+191
| | | | | | | | | | kernel access control. Provide ugidfw, a utility to manage the ruleset provided by mac_bsdextended. Similar to ipfw, only for uids/gids and files. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Hook up libugidfw to the build.rwatson2002-08-021-2/+2
| | | | | Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-023-0/+785
| | | | | | | | | | | | | | | | | | | kernel access control. Provide a library to manage user file system firewall-like rules supported by the mac_bsdextended.ko security model. The kernel module exports the current rule set using sysctl, and this library provides a front end that includes support for retrieving and setting rules, as well as printing and parsing them. Note: as with other userland components, this is a WIP. However, when used in combination with the soon-to-be-committed ugidfw, it can actually be quite useful in multi-user environments to allow the administrator to limit inter-user file operations without resorting to heavier weight labeled security policies. Obtained form: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-022-1/+5
| | | | | | | | | | | | | | kernel access control. Teach mount(8) to understand the MNT_MULTILABEL flag, which is used to determine whether a file system operates with individual per-vnode labels, or treats the entire file system as a single object with a single (mount) label. The behavior here will probably evolve some now that nmount(2) is available and can more flexibly support mount options. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Install MAC policy include files as part of the normal includesrwatson2002-08-021-2/+2
| | | | | | | install. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Calculate the correct physical block number for files that arescottl2002-08-021-4/+6
| | | | | | | | embedded into their file_entry descriptor. This is more for correctness, since these files cannot be bmap'ed/mmap'ed anyways. Enforce this restriction. Submitted by: tes@sgi.com
* Check for deleted files in udf_lookup(), not just udf_readdir().scottl2002-08-021-1/+6
| | | | Submitted by: tes@sgi.com
* o Lock page queue accesses in nwfs and smbfs.alc2002-08-023-1/+13
| | | | o Assert that the page queues lock is held in vm_page_deactivate().
* o Lock page queue accesses by vm_page_deactivate().alc2002-08-022-6/+30
|
* o Lock page queue accesses by vm_page_deactivate().alc2002-08-022-6/+30
|
* o Lock page queue accesses by vm_page_deactivate().alc2002-08-021-0/+2
|
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-021-0/+11
| | | | | | | | | | | kernel access control. Teach devfs how to respond to pathconf() _POSIX_MAC_PRESENT queries, allowing it to indicate to user processes that individual vnode labels are available. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Prevent out of bounds writting for too many slashes case.ache2002-08-021-14/+10
| | | | | | Replace strnpy + ='\0' with strlcpy MFC after: 1 day
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-0/+6
| | | | | | | | | kernel access control. Create directories for per-policy include files. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Hook up devfs_pathconf() for specfs devfs nodes, not just regularrwatson2002-08-011-0/+1
| | | | | | | devfs nodes. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Demonstrate that MAC modules can also be linked statically asrwatson2002-08-011-0/+1
| | | | | | | | well as loaded as modules by hooking up mac_none if 'options MAC_NONE' is defined. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-015-3/+47
| | | | | | | | | | | | kernel access control. Invoke appropriate MAC entry points for a number of VFS-related operations in the Linux ABI module. In particular, handle uselib in a manner similar to open() (more work is probably needed here), as well as handle statfs(), and linux readdir()-like calls. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Sample loader.conf lines for various MAC modules.rwatson2002-08-011-0/+12
|
* Forgot to commit this.jake2002-08-011-2/+2
| | | | Spotted by: scottl
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-4/+29
| | | | | | | | | | | | kernel access control. Add MAC support for the UDP protocol. Invoke appropriate MAC entry points to label packets that are generated by local UDP sockets, and to authorize delivery of mbufs to local sockets both in the multicast/broadcast case and the unicast case. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-0/+12
| | | | | | | | | | | | kernel access control. Introduce two ioctls, SIOCGIFMAC, SIOCSIFMAC, which permit user processes to manage the MAC labels on network interfaces. Note that this is part of the user process API/ABI that will be revised prior to 5.0-RELEASE. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-0/+17
| | | | | | | | | | | | kernel access control. Add MAC support for if_ppp. Label packets as they are removed from the raw PPP mbuf queue. Preserve the mbuf MAC label across various PPP data-munging and reconstitution operations. Perform access control checks on mbufs to be transmitted via the interface. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-1/+12
| | | | | | | | | | | kernel access control. Label packets generated by the gif virtual interface. Perform access control on packets delivered to gif virtual interfaces. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-012-2/+28
| | | | | | | | | | kernel access control. Invoke appropriate MAC framework entry points to authorize readdir() operations in the native ABI. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Fix a comment.julian2002-08-012-2/+2
|
* Slight cleanup of some comments/whitespace.julian2002-08-014-25/+55
| | | | | | | | | | | | Make idle process state more consistant. Add an assert on thread state. Clean up idleproc/mi_switch() interaction. Use a local instead of referencing curthread 7 times in a row (I've been told curthread can be expensive on some architectures) Remove some commented out code. Add a little commented out code (completion coming soon) Reviewed by: jhb@freebsd.org
* Since we have the struct file data pointer cached in vp, use thatrwatson2002-08-011-1/+1
| | | | instead when invoking VOP_POLL().
* o Acquire the page queues lock before calling vm_page_io_finish().alc2002-08-012-3/+6
| | | | o Assert that the page queues lock is held in vm_page_io_finish().
* Include file cleanup; mac.h and malloc.h at one point had orderingrwatson2002-08-0120-10/+20
| | | | | | relationship requirements, and no longer do. Reminded by: bde
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-019-0/+85
| | | | | | | | | | | | | | | | | | | | kernel access control. Hook up various policy modules to the kernel build. Note that a number of these modules require futher entry point commits in the remainder of the kernel to become fully functional, but enough of the pieces are in place to allow experimentation. Note also that it would be desirable to not build the mac_*.ko modules if 'options MAC' is not defined in the kernel configuration, because the resulting modules are not useful without the kernel option. There doesn't appear to be precedent for a way to do this -- for example, we allow ipfw.ko to be built even if 'options NETINET' isn't defined. Suggests welcomed on the "best" way to do this. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Move even closer to matching behaviour of our old tar(1) wrt preservingsobomax2002-08-011-1/+4
| | | | | | | | | | modes of extracted files. This effectively disables special threating of uid 0 for mode-preserving purposes and should fix problems with pkg_add(1) and probably other things when extracting files/dirs with sticky mode bits set. Pointed out by: bde MFC in: 2 weeks
* Change macop_t to const, use macop_t in MAC policy entry point definitionrwatson2002-08-012-4/+4
| | | | | | | | structure. This prevents a boatload of warnings in the MAC modules, so we can hook them up to the build. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-4/+39
| | | | | | | | | | | | | | | | | kernel access control Invoke appropriate MAC framework entry points to authorize a number of vnode operations, including read, write, stat, poll. This permits MAC policies to revoke access to files following label changes, and to limit information spread about the file to user processes. Note: currently the file cached credential is used for some of these authorization check. We will need to expand some of the MAC entry point APIs to permit multiple creds to be passed to the access control check to allow diverse policy behavior. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Fix the link to the Handbookblackend2002-08-016-6/+6
|
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-11/+21
| | | | | | | | | | | | | | kernel access control. Restructure the vn_open_cred() access control checks to invoke the MAC entry point for open authorization. Note that MAC can reject open requests where existing DAC code skips the open authorization check due to O_CREAT. However, the failure mode here is the same as other failure modes following creation, wherein an empty file may be left behind. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Don't depend on namespace pollution from <netinet/in_pcb.h>.des2002-08-011-0/+2
| | | | Submitted by: bde
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-012-20/+190
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | kernel access control. Invoke appropriate MAC entry points to authorize the following operations: truncate on open() (write) access() (access) readlink() (readlink) chflags(), lchflags(), fchflags() (setflag) chmod(), fchmod(), lchmod() (setmode) chown(), fchown(), lchown() (setowner) utimes(), lutimes(), futimes() (setutimes) truncate(), ftrunfcate() (write) revoke() (revoke) fhopen() (open) truncate on fhopen() (write) extattr_set_fd, extattr_set_file() (setextattr) extattr_get_fd, extattr_get_file() (getextattr) extattr_delete_fd(), extattr_delete_file() (setextattr) These entry points permit MAC policies to enforce a variety of protections on vnodes. More vnode checks to come, especially in non-native ABIs. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* New release note: SA-02:34.bmah2002-08-012-0/+10
|
* Introduce support for Mandatory Access Control and extensiblerwatson2002-08-011-0/+9
| | | | | | | | | | | | | kernel access control. Invoke an appropriate MAC entry point to authorize execution of a file by a process. The check is placed slightly differently than it appears in the trustedbsd_mac tree so that it prevents a little more information leakage about the target of the execve() operation. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
* Move the MAC label init/destroy stuff to more appropriate places so thatbmilekic2002-08-011-10/+20
| | | | | | the inits/destroys are done without the cache locks held even in the persistent-lock calls. I may be cheating a little by using the MAC "already initialized" flag for now.
* Revert previous revision which accidentally snuck in with another commit.jhb2002-08-011-1/+1
| | | | It just removed a comment that doesn't make sense to me personally.
* Revert previous revision which was accidentally committed and has not beenjhb2002-08-011-11/+9
| | | | tested yet.
OpenPOWER on IntegriCloud