freebsd-dev/sys/security/mac
Robert Watson e5cb5e37d4 Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps.  Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, NAI Labs
2002-08-19 20:26:32 +00:00
..
mac_framework.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_framework.h Pass active_cred and file_cred into the MAC framework explicitly 2002-08-19 19:04:53 +00:00
mac_internal.h Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_net.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_pipe.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_policy.h Pass active_cred and file_cred into the MAC framework explicitly 2002-08-19 19:04:53 +00:00
mac_process.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_syscalls.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_system.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00
mac_vfs.c Close a race in process label changing opened due to dropping the 2002-08-19 20:26:32 +00:00