mac_framework.h (122527) | mac_framework.h (122807) |
---|---|
1/*- 2 * Copyright (c) 1999, 2000, 2001, 2002 Robert N. M. Watson 3 * Copyright (c) 2001, 2002, 2003 Networks Associates Technology, Inc. 4 * All rights reserved. 5 * 6 * This software was developed by Robert Watson for the TrustedBSD Project. 7 * 8 * This software was developed for the FreeBSD Project in part by Network --- 17 unchanged lines hidden (view full) --- 26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 * SUCH DAMAGE. 33 * | 1/*- 2 * Copyright (c) 1999, 2000, 2001, 2002 Robert N. M. Watson 3 * Copyright (c) 2001, 2002, 2003 Networks Associates Technology, Inc. 4 * All rights reserved. 5 * 6 * This software was developed by Robert Watson for the TrustedBSD Project. 7 * 8 * This software was developed for the FreeBSD Project in part by Network --- 17 unchanged lines hidden (view full) --- 26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 * SUCH DAMAGE. 33 * |
34 * $FreeBSD: head/sys/security/mac/mac_framework.h 122527 2003-11-12 03:33:43Z rwatson $ | 34 * $FreeBSD: head/sys/security/mac/mac_framework.h 122807 2003-11-16 18:25:20Z rwatson $ |
35 */ 36/* 37 * Userland/kernel interface for Mandatory Access Control. 38 * 39 * The POSIX.1e implementation page may be reached at: 40 * http://www.trustedbsd.org/ 41 */ 42#ifndef _SYS_MAC_H --- 284 unchanged lines hidden (view full) --- 327int mac_check_vnode_setowner(struct ucred *cred, struct vnode *vp, 328 uid_t uid, gid_t gid); 329int mac_check_vnode_setutimes(struct ucred *cred, struct vnode *vp, 330 struct timespec atime, struct timespec mtime); 331int mac_check_vnode_stat(struct ucred *active_cred, 332 struct ucred *file_cred, struct vnode *vp); 333int mac_check_vnode_write(struct ucred *active_cred, 334 struct ucred *file_cred, struct vnode *vp); | 35 */ 36/* 37 * Userland/kernel interface for Mandatory Access Control. 38 * 39 * The POSIX.1e implementation page may be reached at: 40 * http://www.trustedbsd.org/ 41 */ 42#ifndef _SYS_MAC_H --- 284 unchanged lines hidden (view full) --- 327int mac_check_vnode_setowner(struct ucred *cred, struct vnode *vp, 328 uid_t uid, gid_t gid); 329int mac_check_vnode_setutimes(struct ucred *cred, struct vnode *vp, 330 struct timespec atime, struct timespec mtime); 331int mac_check_vnode_stat(struct ucred *active_cred, 332 struct ucred *file_cred, struct vnode *vp); 333int mac_check_vnode_write(struct ucred *active_cred, 334 struct ucred *file_cred, struct vnode *vp); |
335int mac_getsockopt_label_get(struct ucred *cred, struct socket *so, | 335int mac_getsockopt_label(struct ucred *cred, struct socket *so, |
336 struct mac *extmac); | 336 struct mac *extmac); |
337int mac_getsockopt_peerlabel_get(struct ucred *cred, struct socket *so, | 337int mac_getsockopt_peerlabel(struct ucred *cred, struct socket *so, |
338 struct mac *extmac); 339int mac_ioctl_ifnet_get(struct ucred *cred, struct ifreq *ifr, 340 struct ifnet *ifnet); 341int mac_ioctl_ifnet_set(struct ucred *cred, struct ifreq *ifr, 342 struct ifnet *ifnet); | 338 struct mac *extmac); 339int mac_ioctl_ifnet_get(struct ucred *cred, struct ifreq *ifr, 340 struct ifnet *ifnet); 341int mac_ioctl_ifnet_set(struct ucred *cred, struct ifreq *ifr, 342 struct ifnet *ifnet); |
343int mac_setsockopt_label_set(struct ucred *cred, struct socket *so, | 343int mac_setsockopt_label(struct ucred *cred, struct socket *so, |
344 struct mac *extmac); 345int mac_pipe_label_set(struct ucred *cred, struct pipe *pipe, 346 struct label *label); 347void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred); 348 349/* 350 * Calls to help various file systems implement labeling functionality 351 * using their existing EA implementation. 352 */ 353int vop_stdsetlabel_ea(struct vop_setlabel_args *ap); 354 355#endif /* !_KERNEL */ 356 357#endif /* !_SYS_MAC_H */ | 344 struct mac *extmac); 345int mac_pipe_label_set(struct ucred *cred, struct pipe *pipe, 346 struct label *label); 347void mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred); 348 349/* 350 * Calls to help various file systems implement labeling functionality 351 * using their existing EA implementation. 352 */ 353int vop_stdsetlabel_ea(struct vop_setlabel_args *ap); 354 355#endif /* !_KERNEL */ 356 357#endif /* !_SYS_MAC_H */ |