+int
+mac_proc_check_expose_task(struct ucred *cred, struct proc *p)
+{
+ int error;
+
+ MAC_CHECK(proc_check_expose_task, cred, p);
+
+ return (error);
+}
+
+int
+mac_proc_check_inherit_ipc_ports(struct proc *p, struct vnode *cur_vp, off_t cur_offset, struct vnode *img_vp, off_t img_offset, struct vnode *scriptvp)
+{
+ int error;
+
+ MAC_CHECK(proc_check_inherit_ipc_ports, p, cur_vp, cur_offset, img_vp, img_offset, scriptvp);
+
+ return (error);
+}
+
+/*
+ * The type of maxprot in proc_check_map_anon must be equivalent to vm_prot_t
+ * (defined in <mach/vm_prot.h>). mac_policy.h does not include any header
+ * files, so cannot use the typedef itself.
+ */
+int
+mac_proc_check_map_anon(proc_t proc, user_addr_t u_addr,
+ user_size_t u_size, int prot, int flags, int *maxprot)
+{
+ kauth_cred_t cred;
+ int error;
+
+#if SECURITY_MAC_CHECK_ENFORCE
+ /* 21167099 - only check if we allow write */
+ if (!mac_vm_enforce)
+ return 0;
+#endif
+ if (!mac_proc_check_enforce(proc))
+ return (0);
+
+ cred = kauth_cred_proc_ref(proc);
+ MAC_CHECK(proc_check_map_anon, proc, cred, u_addr, u_size, prot, flags, maxprot);
+ kauth_cred_unref(&cred);
+
+ return (error);
+}
+