mac_set_file
,
mac_set_fd
, mac_set_proc
— set the MAC label for a file or process
Standard C Library (libc, -lc)
#include
<sys/mac.h>
int
mac_set_file
(const
char *path, mac_t
label);
int
mac_set_link
(const
char *path, mac_t
label);
int
mac_set_fd
(int
fd, mac_t
label);
int
mac_set_proc
(mac_t
label);
The
mac_set_file
()
and
mac_set_fd
()
functions associate a MAC label specified by label to
the file referenced to by path_p, or to the file
descriptor fd, respectively. Note that when a file
descriptor references a socket, label operations on the file descriptor act
on the socket, not on the file that may have been used as a rendezvous when
binding the socket. The
mac_set_link
()
function is the same as mac_set_file
(), except that
it does not follow symlinks.
The
mac_set_proc
()
function associates the MAC label specified by label
to the calling process.
A process is allowed to set a label for a file only if it has MAC
write access to the file, and its effective user ID is equal to the owner of
the file, or has appropriate privileges.
The mac_set_fd
(),
mac_set_file
(),
mac_set_link
(), and
mac_set_proc
() functions return the value 0
if successful; otherwise the value -1 is returned and the global
variable errno is set to indicate the error.
- [
EACCES
]
- MAC write access to the file is denied.
- [
EBADF
]
- The fd argument is not a valid file descriptor.
- [
EINVAL
]
- The label argument is not a valid MAC label, or the
object referenced by fd is not appropriate for label
operations.
- [
EOPNOTSUPP
]
- Setting MAC labels is not supported by the file referenced by
fd.
- [
EPERM
]
- The calling process had insufficient privilege to change the MAC
label.
- [
EROFS
]
- File system for the object being modified is read only.
- [
ENAMETOOLONG
]
- The length of the pathname in path_p exceeds
PATH_MAX
, or a component of the pathname is longer
than NAME_MAX
.
- [
ENOENT
]
- The file referenced by path_p does not exist.
- [
ENOTDIR
]
- A component of the pathname referenced by path_p is
not a directory.
Support for Mandatory Access Control was introduced in
FreeBSD 5.0 as part of the TrustedBSD Project.