Update my personal copyrights and NETA copyrights in the kernelto use the "year1-year3" format, as opposed to "year1, year2, year3".This seems to make lawyers more happy, but also prevents theline
Update my personal copyrights and NETA copyrights in the kernelto use the "year1-year3" format, as opposed to "year1, year2, year3".This seems to make lawyers more happy, but also prevents thelines from getting excessively long as the years start to add up.Suggested by: imp
show more ...
Rename mac_create_cred() MAC Framework entry point to mac_copy_cred(),and the mpo_create_cred() MAC policy entry point tompo_copy_cred_label(). This is more consistent with similar entrypoints fo
Rename mac_create_cred() MAC Framework entry point to mac_copy_cred(),and the mpo_create_cred() MAC policy entry point tompo_copy_cred_label(). This is more consistent with similar entrypoints for creation and label copying, as mac_create_cred() wascalled from crdup() as opposed to during process creation. Fora number of policies, this removes the requirement for specialhandling when copying credential labels, and improves consistency.Approved by: re (scottl)Obtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
Modify the MAC Framework so that instead of embedding a (struct label)in various kernel objects to represent security data, we embed a(struct label *) pointer, which now references labels allocated
Modify the MAC Framework so that instead of embedding a (struct label)in various kernel objects to represent security data, we embed a(struct label *) pointer, which now references labels allocated usinga UMA zone (mac_label.c). This allows the size and shape of structlabel to be varied without changing the size and shape of these kernelobjects, which become part of the frozen ABI with 5-STABLE. This opensthe door for boot-time selection of the number of label slots, and hencechanges to the bound on the number of simultaneous labeled policiesat boot-time instead of compile-time. This also makes it easier toembed label references in new objects as required for locking/cachingwith fine-grained network stack locking, such as inpcb structures.This change also moves us further in the direction of hiding thestructure of kernel objects from MAC policy modules, not to mentiondramatically reducing the number of '&' symbols appearing in both theMAC Framework and MAC policy modules, and improving readability.While this results in minimal performance change with MAC enabled, itwill observably shrink the size of a number of critical kernel datastructures for the !MAC case, and should have a small (but measurable)performance benefit (i.e., struct vnode, struct socket) do to memoryconservation and reduced cost of zeroing memory.NOTE: Users of MAC must recompile their kernel and all MAC modules as aresult of this change. Because this is an API change, third partyMAC modules will also need to be updated to make less use of the '&'symbol.Suggestions from: bmilekicObtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
Redesign the externalization APIs from the MAC Framework tothe MAC policy modules to improve robustness against C stringbugs and vulnerabilities. Following these revisions, allstring construction
Redesign the externalization APIs from the MAC Framework tothe MAC policy modules to improve robustness against C stringbugs and vulnerabilities. Following these revisions, allstring construction of labels for export to userspace (orelsewhere) is performed using the sbuf API, which preventsthe consumer from having to perform laborious and intricatepointer and buffer checks. This substantially simplifiesthe externalization logic, both at the MAC Framework level,and in individual policies; this becomes especially usefulwhen policies export more complex label data, such as withcompartments in Biba and MLS.Bundled in here are some other minor fixes associated withexternalization: including avoiding malloc while holding theprocess mutex in mac_lomac, and hence avoid a failure modewhen printing labels during a downgrade operation due tothe removal of the M_NOWAIT case.This has been running in the MAC development tree for aboutthree weeks without problems.Obtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
Trim "trustedbsd_" from the front of the policy module "short names";the vendor is only included in the long name currently, reducingverbosity when modules are registered and unregistered.Obtaine
Trim "trustedbsd_" from the front of the policy module "short names";the vendor is only included in the long name currently, reducingverbosity when modules are registered and unregistered.Obtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
Update MAC modules for changes in arguments for exec MAC policyentry points to include an explicit execlabel.Approved by: reObtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associat
Update MAC modules for changes in arguments for exec MAC policyentry points to include an explicit execlabel.Approved by: reObtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
License and wording updates: NAI has authorized the removal of clausethree from their BSD-style license. Also, s/NAI Labs/Network AssociatesLaboratories/.
Change privilege model for mac_partition such that BSD superuser can changethe partition once a partition has been set. This is required for correctoperation of sendmail between partitions.Obtai
Change privilege model for mac_partition such that BSD superuser can changethe partition once a partition has been set. This is required for correctoperation of sendmail between partitions.Obtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
Move to C99 sparse structure initialization for the mac_policy_opsstructure definition, rather than using an operation vectorwe translate into the structure. Originally, we used a vectorfor two r
Move to C99 sparse structure initialization for the mac_policy_opsstructure definition, rather than using an operation vectorwe translate into the structure. Originally, we used a vectorfor two reasons:(1) We wanted to define the structure sparsely, which wasn't supported by the C compiler for structures. For a policy with five entry points, you don't want to have to stick in a few hundred NULL function pointers.(2) We thought it would improve ABI compatibility allowing modules to work with kernels that had a superset of the entry points defined in the module, even if the kernel had changed its entry point set.Both of these no longer apply:(1) C99 gives us a way to sparsely define a static structure.(2) The ABI problems existed anyway, due to enumeration numbers, argument changes, and semantic mismatches. Since the going rule for FreeBSD is that you really need your modules to pretty closely match your kernel, it's not worth the complexity.This submit eliminates the operation vector, dynamic allocationof the operation structure, copying of the vector to thestructure, and redoes the vectors in each policy to directstructure definitions. One enourmous benefit of this changeis that we now get decent type checking on policy entry pointimplementation arguments.Obtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
Provide a simple sample labeled access control policy, mac_partition.This policy can be loaded dynamically, and assigns each process apartition number, as well as permitting processes to operate ou
Provide a simple sample labeled access control policy, mac_partition.This policy can be loaded dynamically, and assigns each process apartition number, as well as permitting processes to operate outsidethe partition. Processes contained in a partition can only "see"processes inside the same partition, so it's a little like jail.The partition of a user can be set using the label mechanisms inlogin.conf. This sample policy is a good starting point for developerswanting to learn about how to produce labeled policies, as it labelsonly one kernel object, the process credential.Obtained from: TrustedBSD ProjectSponsored by: DARPA, Network Associates Laboratories
12