1 /*-
2  * Copyright (c) 1999-2002, 2007 Robert N. M. Watson
3  * Copyright (c) 2001-2005 Networks Associates Technology, Inc.
4  * Copyright (c) 2005 Tom Rhodes
5  * Copyright (c) 2006 SPARTA, Inc.
6  * All rights reserved.
7  *
8  * This software was developed by Robert Watson for the TrustedBSD Project.
9  * It was later enhanced by Tom Rhodes for the TrustedBSD Project.
10  *
11  * This software was developed for the FreeBSD Project in part by Network
12  * Associates Laboratories, the Security Research Division of Network
13  * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
14  * as part of the DARPA CHATS research program.
15  *
16  * This software was enhanced by SPARTA ISSO under SPAWAR contract
17  * N66001-04-C-6019 ("SEFOS").
18  *
19  * Redistribution and use in source and binary forms, with or without
20  * modification, are permitted provided that the following conditions
21  * are met:
22  * 1. Redistributions of source code must retain the above copyright
23  *    notice, this list of conditions and the following disclaimer.
24  * 2. Redistributions in binary form must reproduce the above copyright
25  *    notice, this list of conditions and the following disclaimer in the
26  *    documentation and/or other materials provided with the distribution.
27  *
28  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
29  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
32  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38  * SUCH DAMAGE.
39  */
40 
41 #include <sys/param.h>
42 #include <sys/acl.h>
43 #include <sys/kernel.h>
44 #include <sys/jail.h>
45 #include <sys/lock.h>
46 #include <sys/malloc.h>
47 #include <sys/module.h>
48 #include <sys/mount.h>
49 #include <sys/mutex.h>
50 #include <sys/priv.h>
51 #include <sys/systm.h>
52 #include <sys/vnode.h>
53 #include <sys/sysctl.h>
54 #include <sys/syslog.h>
55 #include <sys/stat.h>
56 
57 #include <security/mac/mac_policy.h>
58 #include <security/mac_bsdextended/mac_bsdextended.h>
59 #include <security/mac_bsdextended/ugidfw_internal.h>
60 
61 int
62 ugidfw_system_check_acct(struct ucred *cred, struct vnode *vp,
63     struct label *vplabel)
64 {
65 
66 	if (vp != NULL)
67 		return (ugidfw_check_vp(cred, vp, MBI_WRITE));
68 	else
69 		return (0);
70 }
71 
72 int
73 ugidfw_system_check_auditctl(struct ucred *cred, struct vnode *vp,
74     struct label *vplabel)
75 {
76 
77 	if (vp != NULL)
78 		return (ugidfw_check_vp(cred, vp, MBI_WRITE));
79 	else
80 		return (0);
81 }
82 
83 int
84 ugidfw_system_check_swapon(struct ucred *cred, struct vnode *vp,
85     struct label *vplabel)
86 {
87 
88 	return (ugidfw_check_vp(cred, vp, MBI_WRITE));
89 }
90