Deleted Added
full compact
mac_framework.h (122527) mac_framework.h (122807)
1/*-
2 * Copyright (c) 1999, 2000, 2001, 2002 Robert N. M. Watson
3 * Copyright (c) 2001, 2002, 2003 Networks Associates Technology, Inc.
4 * All rights reserved.
5 *
6 * This software was developed by Robert Watson for the TrustedBSD Project.
7 *
8 * This software was developed for the FreeBSD Project in part by Network

--- 17 unchanged lines hidden (view full) ---

26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 *
1/*-
2 * Copyright (c) 1999, 2000, 2001, 2002 Robert N. M. Watson
3 * Copyright (c) 2001, 2002, 2003 Networks Associates Technology, Inc.
4 * All rights reserved.
5 *
6 * This software was developed by Robert Watson for the TrustedBSD Project.
7 *
8 * This software was developed for the FreeBSD Project in part by Network

--- 17 unchanged lines hidden (view full) ---

26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 *
34 * $FreeBSD: head/sys/security/mac/mac_framework.h 122527 2003-11-12 03:33:43Z rwatson $
34 * $FreeBSD: head/sys/security/mac/mac_framework.h 122807 2003-11-16 18:25:20Z rwatson $
35 */
36/*
37 * Userland/kernel interface for Mandatory Access Control.
38 *
39 * The POSIX.1e implementation page may be reached at:
40 * http://www.trustedbsd.org/
41 */
42#ifndef _SYS_MAC_H

--- 284 unchanged lines hidden (view full) ---

327int mac_check_vnode_setowner(struct ucred *cred, struct vnode *vp,
328 uid_t uid, gid_t gid);
329int mac_check_vnode_setutimes(struct ucred *cred, struct vnode *vp,
330 struct timespec atime, struct timespec mtime);
331int mac_check_vnode_stat(struct ucred *active_cred,
332 struct ucred *file_cred, struct vnode *vp);
333int mac_check_vnode_write(struct ucred *active_cred,
334 struct ucred *file_cred, struct vnode *vp);
35 */
36/*
37 * Userland/kernel interface for Mandatory Access Control.
38 *
39 * The POSIX.1e implementation page may be reached at:
40 * http://www.trustedbsd.org/
41 */
42#ifndef _SYS_MAC_H

--- 284 unchanged lines hidden (view full) ---

327int mac_check_vnode_setowner(struct ucred *cred, struct vnode *vp,
328 uid_t uid, gid_t gid);
329int mac_check_vnode_setutimes(struct ucred *cred, struct vnode *vp,
330 struct timespec atime, struct timespec mtime);
331int mac_check_vnode_stat(struct ucred *active_cred,
332 struct ucred *file_cred, struct vnode *vp);
333int mac_check_vnode_write(struct ucred *active_cred,
334 struct ucred *file_cred, struct vnode *vp);
335int mac_getsockopt_label_get(struct ucred *cred, struct socket *so,
335int mac_getsockopt_label(struct ucred *cred, struct socket *so,
336 struct mac *extmac);
336 struct mac *extmac);
337int mac_getsockopt_peerlabel_get(struct ucred *cred, struct socket *so,
337int mac_getsockopt_peerlabel(struct ucred *cred, struct socket *so,
338 struct mac *extmac);
339int mac_ioctl_ifnet_get(struct ucred *cred, struct ifreq *ifr,
340 struct ifnet *ifnet);
341int mac_ioctl_ifnet_set(struct ucred *cred, struct ifreq *ifr,
342 struct ifnet *ifnet);
338 struct mac *extmac);
339int mac_ioctl_ifnet_get(struct ucred *cred, struct ifreq *ifr,
340 struct ifnet *ifnet);
341int mac_ioctl_ifnet_set(struct ucred *cred, struct ifreq *ifr,
342 struct ifnet *ifnet);
343int mac_setsockopt_label_set(struct ucred *cred, struct socket *so,
343int mac_setsockopt_label(struct ucred *cred, struct socket *so,
344 struct mac *extmac);
345int mac_pipe_label_set(struct ucred *cred, struct pipe *pipe,
346 struct label *label);
347void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred);
348
349/*
350 * Calls to help various file systems implement labeling functionality
351 * using their existing EA implementation.
352 */
353int vop_stdsetlabel_ea(struct vop_setlabel_args *ap);
354
355#endif /* !_KERNEL */
356
357#endif /* !_SYS_MAC_H */
344 struct mac *extmac);
345int mac_pipe_label_set(struct ucred *cred, struct pipe *pipe,
346 struct label *label);
347void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred);
348
349/*
350 * Calls to help various file systems implement labeling functionality
351 * using their existing EA implementation.
352 */
353int vop_stdsetlabel_ea(struct vop_setlabel_args *ap);
354
355#endif /* !_KERNEL */
356
357#endif /* !_SYS_MAC_H */