summaryrefslogtreecommitdiffstats
path: root/sys/security/mac_seeotheruids/mac_seeotheruids.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2007-04-23 13:15:23 +0000
committerrwatson <rwatson@FreeBSD.org>2007-04-23 13:15:23 +0000
commit7ffc2492aefff9e4350fa66d015e86a00a98f452 (patch)
tree0db2f0a84f3f87dab9a1c320711f201aa8cf85bf /sys/security/mac_seeotheruids/mac_seeotheruids.c
parent19d0863e4a316a5e0fdee76bf46871a721ac383d (diff)
downloadFreeBSD-src-7ffc2492aefff9e4350fa66d015e86a00a98f452.zip
FreeBSD-src-7ffc2492aefff9e4350fa66d015e86a00a98f452.tar.gz
Apply variable name normalization to MAC policies: adopt global conventions
for the naming of variables associated with specific data structures. Obtained from: TrustedBSD Project
Diffstat (limited to 'sys/security/mac_seeotheruids/mac_seeotheruids.c')
-rw-r--r--sys/security/mac_seeotheruids/mac_seeotheruids.c34
1 files changed, 18 insertions, 16 deletions
diff --git a/sys/security/mac_seeotheruids/mac_seeotheruids.c b/sys/security/mac_seeotheruids/mac_seeotheruids.c
index 63278f1..c87c865 100644
--- a/sys/security/mac_seeotheruids/mac_seeotheruids.c
+++ b/sys/security/mac_seeotheruids/mac_seeotheruids.c
@@ -36,6 +36,7 @@
/*
* Developed by the TrustedBSD Project.
+ *
* Prevent processes owned by a particular uid from seeing various transient
* kernel objects associated with other uids.
*/
@@ -92,27 +93,28 @@ SYSCTL_INT(_security_mac_seeotheruids, OID_AUTO, specificgid, CTLFLAG_RW,
&specificgid, 0, "Specific gid to be exempt from seeotheruids policy");
static int
-mac_seeotheruids_check(struct ucred *u1, struct ucred *u2)
+mac_seeotheruids_check(struct ucred *cr1, struct ucred *cr2)
{
if (!mac_seeotheruids_enabled)
return (0);
if (primarygroup_enabled) {
- if (u1->cr_rgid == u2->cr_rgid)
+ if (cr1->cr_rgid == cr2->cr_rgid)
return (0);
}
if (specificgid_enabled) {
- if (u1->cr_rgid == specificgid || groupmember(specificgid, u1))
+ if (cr1->cr_rgid == specificgid ||
+ groupmember(specificgid, cr1))
return (0);
}
- if (u1->cr_ruid == u2->cr_ruid)
+ if (cr1->cr_ruid == cr2->cr_ruid)
return (0);
if (suser_privileged) {
- if (priv_check_cred(u1, PRIV_SEEOTHERUIDS, SUSER_ALLOWJAIL)
+ if (priv_check_cred(cr1, PRIV_SEEOTHERUIDS, SUSER_ALLOWJAIL)
== 0)
return (0);
}
@@ -121,40 +123,40 @@ mac_seeotheruids_check(struct ucred *u1, struct ucred *u2)
}
static int
-mac_seeotheruids_check_cred_visible(struct ucred *u1, struct ucred *u2)
+mac_seeotheruids_check_cred_visible(struct ucred *cr1, struct ucred *cr2)
{
- return (mac_seeotheruids_check(u1, u2));
+ return (mac_seeotheruids_check(cr1, cr2));
}
static int
-mac_seeotheruids_check_proc_signal(struct ucred *cred, struct proc *proc,
+mac_seeotheruids_check_proc_signal(struct ucred *cred, struct proc *p,
int signum)
{
- return (mac_seeotheruids_check(cred, proc->p_ucred));
+ return (mac_seeotheruids_check(cred, p->p_ucred));
}
static int
-mac_seeotheruids_check_proc_sched(struct ucred *cred, struct proc *proc)
+mac_seeotheruids_check_proc_sched(struct ucred *cred, struct proc *p)
{
- return (mac_seeotheruids_check(cred, proc->p_ucred));
+ return (mac_seeotheruids_check(cred, p->p_ucred));
}
static int
-mac_seeotheruids_check_proc_debug(struct ucred *cred, struct proc *proc)
+mac_seeotheruids_check_proc_debug(struct ucred *cred, struct proc *p)
{
- return (mac_seeotheruids_check(cred, proc->p_ucred));
+ return (mac_seeotheruids_check(cred, p->p_ucred));
}
static int
-mac_seeotheruids_check_socket_visible(struct ucred *cred, struct socket *socket,
- struct label *socketlabel)
+mac_seeotheruids_check_socket_visible(struct ucred *cred, struct socket *so,
+ struct label *solabel)
{
- return (mac_seeotheruids_check(cred, socket->so_cred));
+ return (mac_seeotheruids_check(cred, so->so_cred));
}
static struct mac_policy_ops mac_seeotheruids_ops =
OpenPOWER on IntegriCloud