aboutsummaryrefslogtreecommitdiff
path: root/sys/security/mac/mac_sysv_shm.c
diff options
context:
space:
mode:
authorRobert Watson <rwatson@FreeBSD.org>2007-10-24 19:04:04 +0000
committerRobert Watson <rwatson@FreeBSD.org>2007-10-24 19:04:04 +0000
commit30d239bc4c510432e65a84fa1c14ed67a3ab1c92 (patch)
treefea282db79628eed98808fd38cc46445b2f97ca5 /sys/security/mac/mac_sysv_shm.c
parent21439626472b5a6d5317cc38b361bc2368f97d93 (diff)
downloadsrc-30d239bc4c510432e65a84fa1c14ed67a3ab1c92.tar.gz
src-30d239bc4c510432e65a84fa1c14ed67a3ab1c92.zip
Merge first in a series of TrustedBSD MAC Framework KPI changes
from Mac OS X Leopard--rationalize naming for entry points to the following general forms: mac_<object>_<method/action> mac_<object>_check_<method/action> The previous naming scheme was inconsistent and mostly reversed from the new scheme. Also, make object types more consistent and remove spaces from object types that contain multiple parts ("posix_sem" -> "posixsem") to make mechanical parsing easier. Introduce a new "netinet" object type for certain IPv4/IPv6-related methods. Also simplify, slightly, some entry point names. All MAC policy modules will need to be recompiled, and modules not updates as part of this commit will need to be modified to conform to the new KPI. Sponsored by: SPARTA (original patches against Mac OS X) Obtained from: TrustedBSD Project, Apple Computer
Notes
Notes: svn path=/head/; revision=172930
Diffstat (limited to 'sys/security/mac/mac_sysv_shm.c')
-rw-r--r--sys/security/mac/mac_sysv_shm.c36
1 files changed, 20 insertions, 16 deletions
diff --git a/sys/security/mac/mac_sysv_shm.c b/sys/security/mac/mac_sysv_shm.c
index 6cabeb42397e..05ec1e1a3260 100644
--- a/sys/security/mac/mac_sysv_shm.c
+++ b/sys/security/mac/mac_sysv_shm.c
@@ -1,5 +1,6 @@
/*-
* Copyright (c) 2003-2004 Networks Associates Technology, Inc.
+ * Copyright (c) 2006 SPARTA, Inc.
* All rights reserved.
*
* This software was developed for the FreeBSD Project in part by Network
@@ -7,6 +8,9 @@
* Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
* as part of the DARPA CHATS research program.
*
+ * This software was enhanced by SPARTA ISSO under SPAWAR contract
+ * N66001-04-C-6019 ("SEFOS").
+ *
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
@@ -58,12 +62,12 @@ mac_sysv_shm_label_alloc(void)
struct label *label;
label = mac_labelzone_alloc(M_WAITOK);
- MAC_PERFORM(init_sysv_shm_label, label);
+ MAC_PERFORM(sysvshm_init_label, label);
return (label);
}
void
-mac_init_sysv_shm(struct shmid_kernel *shmsegptr)
+mac_sysvshm_init(struct shmid_kernel *shmsegptr)
{
shmsegptr->label = mac_sysv_shm_label_alloc();
@@ -73,12 +77,12 @@ static void
mac_sysv_shm_label_free(struct label *label)
{
- MAC_PERFORM(destroy_sysv_shm_label, label);
+ MAC_PERFORM(sysvshm_destroy_label, label);
mac_labelzone_free(label);
}
void
-mac_destroy_sysv_shm(struct shmid_kernel *shmsegptr)
+mac_sysvshm_destroy(struct shmid_kernel *shmsegptr)
{
mac_sysv_shm_label_free(shmsegptr->label);
@@ -86,60 +90,60 @@ mac_destroy_sysv_shm(struct shmid_kernel *shmsegptr)
}
void
-mac_create_sysv_shm(struct ucred *cred, struct shmid_kernel *shmsegptr)
+mac_sysvshm_create(struct ucred *cred, struct shmid_kernel *shmsegptr)
{
- MAC_PERFORM(create_sysv_shm, cred, shmsegptr, shmsegptr->label);
+ MAC_PERFORM(sysvshm_create, cred, shmsegptr, shmsegptr->label);
}
void
-mac_cleanup_sysv_shm(struct shmid_kernel *shmsegptr)
+mac_sysvshm_cleanup(struct shmid_kernel *shmsegptr)
{
- MAC_PERFORM(cleanup_sysv_shm, shmsegptr->label);
+ MAC_PERFORM(sysvshm_cleanup, shmsegptr->label);
}
int
-mac_check_sysv_shmat(struct ucred *cred, struct shmid_kernel *shmsegptr,
+mac_sysvshm_check_shmat(struct ucred *cred, struct shmid_kernel *shmsegptr,
int shmflg)
{
int error;
- MAC_CHECK(check_sysv_shmat, cred, shmsegptr, shmsegptr->label,
+ MAC_CHECK(sysvshm_check_shmat, cred, shmsegptr, shmsegptr->label,
shmflg);
return (error);
}
int
-mac_check_sysv_shmctl(struct ucred *cred, struct shmid_kernel *shmsegptr,
+mac_sysvshm_check_shmctl(struct ucred *cred, struct shmid_kernel *shmsegptr,
int cmd)
{
int error;
- MAC_CHECK(check_sysv_shmctl, cred, shmsegptr, shmsegptr->label,
+ MAC_CHECK(sysvshm_check_shmctl, cred, shmsegptr, shmsegptr->label,
cmd);
return (error);
}
int
-mac_check_sysv_shmdt(struct ucred *cred, struct shmid_kernel *shmsegptr)
+mac_sysvshm_check_shmdt(struct ucred *cred, struct shmid_kernel *shmsegptr)
{
int error;
- MAC_CHECK(check_sysv_shmdt, cred, shmsegptr, shmsegptr->label);
+ MAC_CHECK(sysvshm_check_shmdt, cred, shmsegptr, shmsegptr->label);
return (error);
}
int
-mac_check_sysv_shmget(struct ucred *cred, struct shmid_kernel *shmsegptr,
+mac_sysvshm_check_shmget(struct ucred *cred, struct shmid_kernel *shmsegptr,
int shmflg)
{
int error;
- MAC_CHECK(check_sysv_shmget, cred, shmsegptr, shmsegptr->label,
+ MAC_CHECK(sysvshm_check_shmget, cred, shmsegptr, shmsegptr->label,
shmflg);
return (error);