freebsd-dev/sys/security/mac
Robert Watson bea2b56b26 When allocation of a socket peer label fails, scrub what was
successfully initialized in the label as a socket peer label, not a
socket label.  For current policy modules, this didn't make a
difference, but if a policy module had label data in the peer label
that was to be GC'd in a different way than the normal socket label,
it might have been a problem.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
2003-11-07 22:31:27 +00:00
..
mac_framework.c Remove the flags argument from mac_externalize_*_label(), as it's not 2003-11-06 03:42:43 +00:00
mac_framework.h Use __BEGIN_DECLS and __END_DECLS around userland function prototypes 2003-10-02 03:07:51 +00:00
mac_internal.h Trim trailing whitespace. 2003-11-07 04:48:24 +00:00
mac_net.c When allocation of a socket peer label fails, scrub what was 2003-11-07 22:31:27 +00:00
mac_pipe.c Remove the flags argument from mac_externalize_*_label(), as it's not 2003-11-06 03:42:43 +00:00
mac_policy.h Introduce two new MAC Framework and MAC policy entry points: 2003-08-21 18:21:22 +00:00
mac_process.c Remove the flags argument from mac_externalize_*_label(), as it's not 2003-11-06 03:42:43 +00:00
mac_syscalls.c Remove the flags argument from mac_externalize_*_label(), as it's not 2003-11-06 03:42:43 +00:00
mac_system.c Remove non-system bits from mac_system.c. Leave: 2003-10-22 20:09:12 +00:00
mac_vfs.c Remove the flags argument from mac_externalize_*_label(), as it's not 2003-11-06 03:42:43 +00:00