summaryrefslogtreecommitdiffstats
path: root/sys/security/mac_test/mac_test.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2007-04-22 15:31:22 +0000
committerrwatson <rwatson@FreeBSD.org>2007-04-22 15:31:22 +0000
commitd1196975a07260e588b5270931563e7fe7d7e672 (patch)
tree1c8d3b15d3ba425f41f9ad0bc9e628b32aba6083 /sys/security/mac_test/mac_test.c
parentdb8dcec8015c6fbc747411dcd0f933d6e0a5f81e (diff)
downloadFreeBSD-src-d1196975a07260e588b5270931563e7fe7d7e672.zip
FreeBSD-src-d1196975a07260e588b5270931563e7fe7d7e672.tar.gz
Remove MAC Framework access control check entry points made redundant with
the introduction of priv(9) and MAC Framework entry points for privilege checking/granting. These entry points exactly aligned with privileges and provided no additional security context: - mac_check_sysarch_ioperm() - mac_check_kld_unload() - mac_check_settime() - mac_check_system_nfsd() Add mpo_priv_check() implementations to Biba and LOMAC policies, which, for each privilege, determine if they can be granted to processes considered unprivileged by those two policies. These mostly, but not entirely, align with the set of privileges granted in jails. Obtained from: TrustedBSD Project
Diffstat (limited to 'sys/security/mac_test/mac_test.c')
-rw-r--r--sys/security/mac_test/mac_test.c36
1 files changed, 0 insertions, 36 deletions
diff --git a/sys/security/mac_test/mac_test.c b/sys/security/mac_test/mac_test.c
index d3cf5c6..5c53b15 100644
--- a/sys/security/mac_test/mac_test.c
+++ b/sys/security/mac_test/mac_test.c
@@ -1536,17 +1536,6 @@ mac_test_check_kld_stat(struct ucred *cred)
return (0);
}
-COUNTER_DECL(check_kld_unload);
-static int
-mac_test_check_kld_unload(struct ucred *cred)
-{
-
- LABEL_CHECK(cred->cr_label, MAGIC_CRED);
- COUNTER_INC(check_kld_unload);
-
- return (0);
-}
-
COUNTER_DECL(check_mount_stat);
static int
mac_test_check_mount_stat(struct ucred *cred, struct mount *mp,
@@ -1968,17 +1957,6 @@ mac_test_check_socket_visible(struct ucred *cred, struct socket *socket,
return (0);
}
-COUNTER_DECL(check_sysarch_ioperm);
-static int
-mac_test_check_sysarch_ioperm(struct ucred *cred)
-{
-
- LABEL_CHECK(cred->cr_label, MAGIC_CRED);
- COUNTER_INC(check_sysarch_ioperm);
-
- return (0);
-}
-
COUNTER_DECL(check_system_acct);
static int
mac_test_check_system_acct(struct ucred *cred, struct vnode *vp,
@@ -2038,17 +2016,6 @@ mac_test_check_system_reboot(struct ucred *cred, int how)
return (0);
}
-COUNTER_DECL(check_system_settime);
-static int
-mac_test_check_system_settime(struct ucred *cred)
-{
-
- LABEL_CHECK(cred->cr_label, MAGIC_CRED);
- COUNTER_INC(check_system_settime);
-
- return (0);
-}
-
COUNTER_DECL(check_system_swapoff);
static int
mac_test_check_system_swapoff(struct ucred *cred, struct vnode *vp,
@@ -2645,7 +2612,6 @@ static struct mac_policy_ops mac_test_ops =
.mpo_check_kenv_unset = mac_test_check_kenv_unset,
.mpo_check_kld_load = mac_test_check_kld_load,
.mpo_check_kld_stat = mac_test_check_kld_stat,
- .mpo_check_kld_unload = mac_test_check_kld_unload,
.mpo_check_mount_stat = mac_test_check_mount_stat,
.mpo_check_pipe_ioctl = mac_test_check_pipe_ioctl,
.mpo_check_pipe_poll = mac_test_check_pipe_poll,
@@ -2685,13 +2651,11 @@ static struct mac_policy_ops mac_test_ops =
.mpo_check_socket_send = mac_test_check_socket_send,
.mpo_check_socket_stat = mac_test_check_socket_stat,
.mpo_check_socket_visible = mac_test_check_socket_visible,
- .mpo_check_sysarch_ioperm = mac_test_check_sysarch_ioperm,
.mpo_check_system_acct = mac_test_check_system_acct,
.mpo_check_system_audit = mac_test_check_system_audit,
.mpo_check_system_auditctl = mac_test_check_system_auditctl,
.mpo_check_system_auditon = mac_test_check_system_auditon,
.mpo_check_system_reboot = mac_test_check_system_reboot,
- .mpo_check_system_settime = mac_test_check_system_settime,
.mpo_check_system_swapoff = mac_test_check_system_swapoff,
.mpo_check_system_swapon = mac_test_check_system_swapon,
.mpo_check_system_sysctl = mac_test_check_system_sysctl,
OpenPOWER on IntegriCloud