![IBM Novell 10 SP1 EAL4 Скачать руководство пользователя страница 93](http://html1.mh-extra.com/html/ibm/novell-10-sp1-eal4/novell-10-sp1-eal4_design-manual_4190246093.webp)
Similarly, for UNIX domain sockets,
bind()
invokes
unix_bind()
.
unix_bind()
creates an entry in
the regular ext3 file system space. This process of creating an entry for a socket in the regular file system
space has to undergo all file system access control restrictions. The socket exists in the regular ext3 file
system space, and honors DAC policies of the ext3 file system.
bind()
may perform additional access
control checks by calling the
security_socket_bind()
LSM hook, but the SLES kernel does not use
this LSM hook.
bind()
does not create any data objects that are accessible to users, so there are no object
reuse issues to handle.
5.4.5.3 listen()
listen()
indicates a willingness to accept incoming connections on a particular socket. A queue limit for
the number of incoming connections is specified with
listen()
. Other than checking the queue limit,
listen()
does not perform DAC. It may perform additional access control checks by calling the
security_socket_listen()
LSM hook but the SLES kernel does not use this hook.
listen()
does not create any data objects that are accessible to users, so there are no object reuse issues to handle.
Only TCP sockets support the
listen()
system call.
5.4.5.4 accept()
accept()
accepts a connection on a socket.
accept()
does not perform any access control.
accept()
does not create any data objects that are accessible to users and therefore there are no object reuse issues to
handle. Only TCP sockets support
accept()
system call.
5.4.5.5 connect()
connect()
initiates a connection on a socket. The socket must be listening for connections; otherwise, the
system call returns an error. Depending upon the type of the socket (stream for TCP or datagram for UDP),
connect()
invokes the appropriate domain type specific connection function.
connect()
does not
perform DAC. It may perform additional access control checks by calling the
security_socket_connect()
LSM hook, but the SLES kernel does not use this hook.
connect()
does not create any data objects that are accessible to users, so there are no object reuse issues to handle.
81
Figure 5-21: bind() function for UNIX domain TCP socket
Содержание Novell 10 SP1 EAL4
Страница 1: ...SUSE Linux Enterprise Server 10 SP1 EAL4 High Level Design Version 1 2 1...
Страница 23: ...11...
Страница 29: ...17...
Страница 43: ...31...
Страница 54: ...42 Figure 5 8 New data blocks are allocated and initialized for an ext3 field...
Страница 117: ...105 Figure 5 48 Page Address Translation and access control...
Страница 125: ...113 Figure 5 54 31 bit Dynamic Address Translation with page table protection...
Страница 126: ...114 Figure 5 55 64 bit Dynamic Address Translation with page table protection...
Страница 172: ...160 Figure 5 79 System x SLES boot sequence...
Страница 214: ...202...