/freebsd/sys/security/mac/ |
H A D | mac_system.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_pipe.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_process.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_vfs.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_internal.h | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_net.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_syscalls.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|
H A D | mac_framework.c | e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs e5cb5e37 Mon Aug 19 20:26:32 GMT 2002 Robert Watson <rwatson@FreeBSD.org> Close a race in process label changing opened due to dropping the proc locking when revoking access to mmaps. Instead, perform this later once we've changed the process label (hold onto a reference to the new cred so that we don't lose it when we release the process lock if another thread changes the credential).
Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
|