Home
last modified time | relevance | path

Searched hist:e5cb5e37 (Results 1 – 8 of 8) sorted by relevance

/freebsd/sys/security/mac/
H A Dmac_system.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_pipe.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_process.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_vfs.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_internal.he5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_net.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_syscalls.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
H A Dmac_framework.ce5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the
proc locking when revoking access to mmaps. Instead, perform this
later once we've changed the process label (hold onto a reference
to the new cred so that we don't lose it when we release the
process lock if another thread changes the credential).

Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs