Remove $FreeBSD$: one-line sh patternRemove /^\s*#[#!]?\s*\$FreeBSD\$.*$\n/
Remove $FreeBSD$: two-line .h patternRemove /^\s*\*\n \*\s+\$FreeBSD\$$\n/
Fix LDADD/DPADD that should be LIBADD.Sponsored by: EMC / Isilon Storage Division
Use src.opts.mk in preference to bsd.own.mk except where we need stufffrom the latter.
errx prepends the program name to the message; don't do it by hand.
Make the priv test program exit with non-zero if any failures are detected.And, mind you, this already returns a failure :-/
Use MAN= instead of NO_MAN=For some reason it still tries to install a priv.1 when using NO_MAN,even though there isn't one yet.
Spelling fixes for tools/Add some $FreeBSD$ tags so svn will allow the commit.
Always assign WARNS using ?=- fix some nearby style bugs- include Makefile.inc where it makes sense and reduces duplicationApproved by: ed (co-mentor)
Start respecting WITHOUT_INET6.Make regression/priv compile again after the multi-IP jailchanges. Note that we are still using the legacy jail(2)rather than the jail_set(2)/jail(3) syscall.Add
Start respecting WITHOUT_INET6.Make regression/priv compile again after the multi-IP jailchanges. Note that we are still using the legacy jail(2)rather than the jail_set(2)/jail(3) syscall.Add an IPv4, and an IPv6 loopback address in case we compilewith INET6 enabled.Make the priv_vfs_extattr_system compile on amd64 as well using theproper length modifier to printf(3) for ssize_t.Reviewed by: rwatsonApproved by: re (kib)
show more ...
Remove empty setup and cleanup functions for the pfkey test.Add regression tests for privileged and supposedly unprivilegedIP_IPSEC_POLICY,IPV6_IPSEC_POLICY setsockopt cases.We may need to revie
Remove empty setup and cleanup functions for the pfkey test.Add regression tests for privileged and supposedly unprivilegedIP_IPSEC_POLICY,IPV6_IPSEC_POLICY setsockopt cases.We may need to review the current 'good' results to makesure they reflect what we really want.Discussed with: rwatsonReviewed by: rwatson
In sys/netipsec/keysock.c rev. 1.19 a missing priv check was added.Before that non-su users were able to open pfkey sockets as well.Add a regression test so we can detect such problems in an autom
In sys/netipsec/keysock.c rev. 1.19 a missing priv check was added.Before that non-su users were able to open pfkey sockets as well.Add a regression test so we can detect such problems in an automated wayin the future.
Enhance and expand kernel privilege regression tests in support ofwork present in FreeBSD 7.0 to refine the kernel privilege model:- Introduce support for jail as a testing variable, in order to
Enhance and expand kernel privilege regression tests in support ofwork present in FreeBSD 7.0 to refine the kernel privilege model:- Introduce support for jail as a testing variable, in order to confirm that privileges are properly restricted in the jail environment.- Restructure overall testing approach so that privilege and jail conditions are set in the testing infrastructure before tests are invoked, and done so in a custom-created process to isolate the impact of tests from each other in a more consistent way.- Tests now provide setup and cleanup hooks that occur before and after the test runs.- New privilege tests are now present for several audit privileges, several credential management privileges, dmesg buffer reading privilege, and netinet raw socket creation.- Other existing tests are restructured and generally improved as a result of better framework structure and jail as a variable. For exampe, we now test that certain sysctls are writable only outside jail, while others are writable within jail. On a similar note, privileges relating to setting UFS file flags are now better exercised, as with the right to chmod and utimes files.Approved by: re (bmah)Obtained from: TrustedBSD Project
dd a series of regression tests to validate that privilege requirements areimplemented properly for a number of kernel subsystems. In general, theytry to exercise the privilege first as the root u
dd a series of regression tests to validate that privilege requirements areimplemented properly for a number of kernel subsystems. In general, theytry to exercise the privilege first as the root user, then as a test user,in order to determine when privilege is being checked.Currently, these tests do not compare inside/outside jail, and probablyshould be enhanced to do that.Sponsored by: nCircle Network Security, Inc.Obtained from: TrustedBSD Project