]> git.saurik.com Git - apple/xnu.git/blame - bsd/kern/policy_check.c
xnu-6153.141.1.tar.gz
[apple/xnu.git] / bsd / kern / policy_check.c
CommitLineData
6d2010ae 1#include <sys/param.h>
0a7de745 2#include <sys/systm.h> /* XXX printf() */
6d2010ae
A
3
4#include <sys/types.h>
5#include <sys/fcntl.h>
6#include <sys/file.h>
7#include <sys/kauth.h>
8#include <sys/mount.h>
9#include <sys/msg.h>
10#include <sys/proc.h>
11#include <sys/socketvar.h>
12#include <sys/vnode.h>
13#include <security/mac.h>
14#include <security/mac_policy.h>
15
5ba3f43e 16#include <libkern/section_keywords.h>
0a7de745 17#include <libkern/OSDebug.h> /* OSBPrintBacktrace */
6d2010ae
A
18
19
20/* forward declaration; see bsd_init.c */
21errno_t check_policy_init(int);
22int get_thread_lock_count(thread_t th); /* forced forward */
23
24/*
25 * Policy flags used when the policy is enabled
26 *
27 * Note: CHECK_POLICY_CHECK is probably not very useful unless you
28 * are kernel debugging and set a breakpoint.
29 */
0a7de745
A
30#define CHECK_POLICY_CHECK 0x00000001 /* Check on calls */
31#define CHECK_POLICY_FAIL 0x00000002 /* EPERM on fails */
32#define CHECK_POLICY_BACKTRACE 0x00000004 /* Show call stack on fails */
33#define CHECK_POLICY_PANIC 0x00000008 /* Panic on fails */
34#define CHECK_POLICY_PERIODIC 0x00000010 /* Show fails periodically */
6d2010ae
A
35
36static int policy_flags = 0;
37
38
0a7de745 39#define CHECK_SET_HOOK(x) .mpo_##x = (mpo_##x##_t *)common_hook,
6d2010ae
A
40
41/*
42 * Init; currently, we only print our arrival notice.
43 */
44static void
45hook_policy_init(struct mac_policy_conf *mpc)
46{
47 printf("Policy '%s' = '%s' ready\n", mpc->mpc_name, mpc->mpc_fullname);
48}
49
50static void
51hook_policy_initbsd(struct mac_policy_conf *mpc)
52{
53 /* called with policy_grab_exclusive mutex held; exempt */
54 printf("hook_policy_initbsd: %s\n", mpc->mpc_name);
55}
56
57
58/* Implementation */
0a7de745
A
59#define CLASS_PERIOD_LIMIT 10000
60#define CLASS_PERIOD_MULT 20
6d2010ae
A
61
62static int policy_check_event = 1;
63static int policy_check_period = 1;
64static int policy_check_next = CLASS_PERIOD_MULT;
65
66
67static int
39236c6e 68common_hook(void)
6d2010ae 69{
0a7de745
A
70 int i;
71 int rv = 0;
6d2010ae
A
72
73 if ((i = get_thread_lock_count(current_thread())) != 0) {
74 /*
75 * fail the MACF check if we hold a lock; this assumes a
76 * a non-void (authorization) MACF hook.
77 */
0a7de745 78 if (policy_flags & CHECK_POLICY_FAIL) {
6d2010ae 79 rv = EPERM;
0a7de745 80 }
6d2010ae
A
81
82 /*
83 * display a backtrace if we hold a lock and we are not
84 * going to panic
85 */
86 if ((policy_flags & (CHECK_POLICY_BACKTRACE | CHECK_POLICY_PANIC)) == CHECK_POLICY_BACKTRACE) {
87 if (policy_flags & CHECK_POLICY_PERIODIC) {
0a7de745
A
88 /* at exponentially increasing intervals */
89 if (!(policy_check_event % policy_check_period)) {
90 if (policy_check_event <= policy_check_next || policy_check_period == CLASS_PERIOD_LIMIT) {
91 /*
92 * According to Derek, we could
93 * technically get a symbolicated name
94 * here, if we refactered some code
95 * and set the "keepsyms=1" boot
96 * argument...
97 */
98 OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event);
99 }
100 } else {
101 if (policy_check_period < CLASS_PERIOD_LIMIT) {
102 policy_check_next *= CLASS_PERIOD_MULT;
103 policy_check_period *= CLASS_PERIOD_MULT;
104 }
6d2010ae 105 }
6d2010ae
A
106 } else {
107 /* always */
108 OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event);
109 }
110 }
111
112 /* Panic */
0a7de745 113 if (policy_flags & CHECK_POLICY_PANIC) {
6d2010ae 114 panic("calling MACF hook with mutex count %d\n", i);
0a7de745 115 }
6d2010ae
A
116
117 /* count for non-fatal tracing */
118 policy_check_event++;
119 }
120
121 return rv;
122}
123
ea3f0419 124#if (MAC_POLICY_OPS_VERSION != 62)
39236c6e
A
125# error "struct mac_policy_ops doesn't match definition in mac_policy.h"
126#endif
6d2010ae
A
127/*
128 * Policy hooks; one per possible hook
39236c6e
A
129 *
130 * Please note that this struct initialization should be kept in sync with
131 * security/mac_policy.h (mac_policy_ops struct definition).
6d2010ae 132 */
5ba3f43e 133const static struct mac_policy_ops policy_ops = {
39236c6e
A
134 CHECK_SET_HOOK(audit_check_postselect)
135 CHECK_SET_HOOK(audit_check_preselect)
136
137 CHECK_SET_HOOK(bpfdesc_label_associate)
138 CHECK_SET_HOOK(bpfdesc_label_destroy)
139 CHECK_SET_HOOK(bpfdesc_label_init)
140 CHECK_SET_HOOK(bpfdesc_check_receive)
141
142 CHECK_SET_HOOK(cred_check_label_update_execve)
143 CHECK_SET_HOOK(cred_check_label_update)
144 CHECK_SET_HOOK(cred_check_visible)
145 CHECK_SET_HOOK(cred_label_associate_fork)
146 CHECK_SET_HOOK(cred_label_associate_kernel)
147 CHECK_SET_HOOK(cred_label_associate)
148 CHECK_SET_HOOK(cred_label_associate_user)
149 CHECK_SET_HOOK(cred_label_destroy)
150 CHECK_SET_HOOK(cred_label_externalize_audit)
151 CHECK_SET_HOOK(cred_label_externalize)
152 CHECK_SET_HOOK(cred_label_init)
153 CHECK_SET_HOOK(cred_label_internalize)
154 CHECK_SET_HOOK(cred_label_update_execve)
155 CHECK_SET_HOOK(cred_label_update)
156
157 CHECK_SET_HOOK(devfs_label_associate_device)
158 CHECK_SET_HOOK(devfs_label_associate_directory)
159 CHECK_SET_HOOK(devfs_label_copy)
160 CHECK_SET_HOOK(devfs_label_destroy)
161 CHECK_SET_HOOK(devfs_label_init)
162 CHECK_SET_HOOK(devfs_label_update)
163
164 CHECK_SET_HOOK(file_check_change_offset)
165 CHECK_SET_HOOK(file_check_create)
166 CHECK_SET_HOOK(file_check_dup)
167 CHECK_SET_HOOK(file_check_fcntl)
168 CHECK_SET_HOOK(file_check_get_offset)
169 CHECK_SET_HOOK(file_check_get)
170 CHECK_SET_HOOK(file_check_inherit)
171 CHECK_SET_HOOK(file_check_ioctl)
172 CHECK_SET_HOOK(file_check_lock)
173 CHECK_SET_HOOK(file_check_mmap_downgrade)
174 CHECK_SET_HOOK(file_check_mmap)
175 CHECK_SET_HOOK(file_check_receive)
176 CHECK_SET_HOOK(file_check_set)
177 CHECK_SET_HOOK(file_label_init)
178 CHECK_SET_HOOK(file_label_destroy)
179 CHECK_SET_HOOK(file_label_associate)
180
181 CHECK_SET_HOOK(ifnet_check_label_update)
182 CHECK_SET_HOOK(ifnet_check_transmit)
183 CHECK_SET_HOOK(ifnet_label_associate)
184 CHECK_SET_HOOK(ifnet_label_copy)
185 CHECK_SET_HOOK(ifnet_label_destroy)
186 CHECK_SET_HOOK(ifnet_label_externalize)
187 CHECK_SET_HOOK(ifnet_label_init)
188 CHECK_SET_HOOK(ifnet_label_internalize)
189 CHECK_SET_HOOK(ifnet_label_update)
190 CHECK_SET_HOOK(ifnet_label_recycle)
191
192 CHECK_SET_HOOK(inpcb_check_deliver)
193 CHECK_SET_HOOK(inpcb_label_associate)
194 CHECK_SET_HOOK(inpcb_label_destroy)
195 CHECK_SET_HOOK(inpcb_label_init)
196 CHECK_SET_HOOK(inpcb_label_recycle)
197 CHECK_SET_HOOK(inpcb_label_update)
198
199 CHECK_SET_HOOK(iokit_check_device)
200
201 CHECK_SET_HOOK(ipq_label_associate)
202 CHECK_SET_HOOK(ipq_label_compare)
203 CHECK_SET_HOOK(ipq_label_destroy)
204 CHECK_SET_HOOK(ipq_label_init)
205 CHECK_SET_HOOK(ipq_label_update)
206
39037602
A
207 CHECK_SET_HOOK(file_check_library_validation)
208
209 CHECK_SET_HOOK(vnode_notify_setacl)
210 CHECK_SET_HOOK(vnode_notify_setattrlist)
211 CHECK_SET_HOOK(vnode_notify_setextattr)
212 CHECK_SET_HOOK(vnode_notify_setflags)
213 CHECK_SET_HOOK(vnode_notify_setmode)
214 CHECK_SET_HOOK(vnode_notify_setowner)
215 CHECK_SET_HOOK(vnode_notify_setutimes)
216 CHECK_SET_HOOK(vnode_notify_truncate)
39236c6e
A
217
218 CHECK_SET_HOOK(mbuf_label_associate_bpfdesc)
219 CHECK_SET_HOOK(mbuf_label_associate_ifnet)
220 CHECK_SET_HOOK(mbuf_label_associate_inpcb)
221 CHECK_SET_HOOK(mbuf_label_associate_ipq)
222 CHECK_SET_HOOK(mbuf_label_associate_linklayer)
223 CHECK_SET_HOOK(mbuf_label_associate_multicast_encap)
224 CHECK_SET_HOOK(mbuf_label_associate_netlayer)
225 CHECK_SET_HOOK(mbuf_label_associate_socket)
226 CHECK_SET_HOOK(mbuf_label_copy)
227 CHECK_SET_HOOK(mbuf_label_destroy)
228 CHECK_SET_HOOK(mbuf_label_init)
229
230 CHECK_SET_HOOK(mount_check_fsctl)
231 CHECK_SET_HOOK(mount_check_getattr)
232 CHECK_SET_HOOK(mount_check_label_update)
233 CHECK_SET_HOOK(mount_check_mount)
234 CHECK_SET_HOOK(mount_check_remount)
235 CHECK_SET_HOOK(mount_check_setattr)
236 CHECK_SET_HOOK(mount_check_stat)
237 CHECK_SET_HOOK(mount_check_umount)
238 CHECK_SET_HOOK(mount_label_associate)
239 CHECK_SET_HOOK(mount_label_destroy)
240 CHECK_SET_HOOK(mount_label_externalize)
241 CHECK_SET_HOOK(mount_label_init)
242 CHECK_SET_HOOK(mount_label_internalize)
243
244 CHECK_SET_HOOK(netinet_fragment)
245 CHECK_SET_HOOK(netinet_icmp_reply)
246 CHECK_SET_HOOK(netinet_tcp_reply)
247
248 CHECK_SET_HOOK(pipe_check_ioctl)
249 CHECK_SET_HOOK(pipe_check_kqfilter)
250 CHECK_SET_HOOK(pipe_check_label_update)
251 CHECK_SET_HOOK(pipe_check_read)
252 CHECK_SET_HOOK(pipe_check_select)
253 CHECK_SET_HOOK(pipe_check_stat)
254 CHECK_SET_HOOK(pipe_check_write)
255 CHECK_SET_HOOK(pipe_label_associate)
256 CHECK_SET_HOOK(pipe_label_copy)
257 CHECK_SET_HOOK(pipe_label_destroy)
258 CHECK_SET_HOOK(pipe_label_externalize)
259 CHECK_SET_HOOK(pipe_label_init)
260 CHECK_SET_HOOK(pipe_label_internalize)
261 CHECK_SET_HOOK(pipe_label_update)
262
263 CHECK_SET_HOOK(policy_destroy)
264 /* special hooks for policy init's */
6d2010ae
A
265 .mpo_policy_init = hook_policy_init,
266 .mpo_policy_initbsd = hook_policy_initbsd,
39236c6e
A
267 CHECK_SET_HOOK(policy_syscall)
268
fe8ab488
A
269 CHECK_SET_HOOK(system_check_sysctlbyname)
270 CHECK_SET_HOOK(proc_check_inherit_ipc_ports)
271 CHECK_SET_HOOK(vnode_check_rename)
3e170ce0 272 CHECK_SET_HOOK(kext_check_query)
d9a64523 273 CHECK_SET_HOOK(proc_notify_exec_complete)
cb323159
A
274 .mpo_reserved4 = (mpo_reserved_hook_t *)common_hook,
275 CHECK_SET_HOOK(proc_check_syscall_unix)
3e170ce0
A
276 CHECK_SET_HOOK(proc_check_expose_task)
277 CHECK_SET_HOOK(proc_check_set_host_special_port)
278 CHECK_SET_HOOK(proc_check_set_host_exception_port)
39037602
A
279 CHECK_SET_HOOK(exc_action_check_exception_send)
280 CHECK_SET_HOOK(exc_action_label_associate)
5ba3f43e 281 CHECK_SET_HOOK(exc_action_label_populate)
39037602
A
282 CHECK_SET_HOOK(exc_action_label_destroy)
283 CHECK_SET_HOOK(exc_action_label_init)
284 CHECK_SET_HOOK(exc_action_label_update)
285
527f9951 286 CHECK_SET_HOOK(vnode_check_trigger_resolve)
cb323159 287 CHECK_SET_HOOK(mount_check_mount_late)
ea3f0419 288 CHECK_SET_HOOK(mount_check_snapshot_mount)
743345f9 289 .mpo_reserved2 = (mpo_reserved_hook_t *)common_hook,
5ba3f43e
A
290 CHECK_SET_HOOK(skywalk_flow_check_connect)
291 CHECK_SET_HOOK(skywalk_flow_check_listen)
39236c6e
A
292
293 CHECK_SET_HOOK(posixsem_check_create)
294 CHECK_SET_HOOK(posixsem_check_open)
295 CHECK_SET_HOOK(posixsem_check_post)
296 CHECK_SET_HOOK(posixsem_check_unlink)
297 CHECK_SET_HOOK(posixsem_check_wait)
298 CHECK_SET_HOOK(posixsem_label_associate)
299 CHECK_SET_HOOK(posixsem_label_destroy)
300 CHECK_SET_HOOK(posixsem_label_init)
301 CHECK_SET_HOOK(posixshm_check_create)
302 CHECK_SET_HOOK(posixshm_check_mmap)
303 CHECK_SET_HOOK(posixshm_check_open)
304 CHECK_SET_HOOK(posixshm_check_stat)
305 CHECK_SET_HOOK(posixshm_check_truncate)
306 CHECK_SET_HOOK(posixshm_check_unlink)
307 CHECK_SET_HOOK(posixshm_label_associate)
308 CHECK_SET_HOOK(posixshm_label_destroy)
309 CHECK_SET_HOOK(posixshm_label_init)
310
311 CHECK_SET_HOOK(proc_check_debug)
312 CHECK_SET_HOOK(proc_check_fork)
313 CHECK_SET_HOOK(proc_check_get_task_name)
314 CHECK_SET_HOOK(proc_check_get_task)
315 CHECK_SET_HOOK(proc_check_getaudit)
316 CHECK_SET_HOOK(proc_check_getauid)
317 CHECK_SET_HOOK(proc_check_getlcid)
318 CHECK_SET_HOOK(proc_check_mprotect)
319 CHECK_SET_HOOK(proc_check_sched)
320 CHECK_SET_HOOK(proc_check_setaudit)
321 CHECK_SET_HOOK(proc_check_setauid)
322 CHECK_SET_HOOK(proc_check_setlcid)
323 CHECK_SET_HOOK(proc_check_signal)
324 CHECK_SET_HOOK(proc_check_wait)
c6bf4f31 325 CHECK_SET_HOOK(proc_check_dump_core)
cb323159
A
326
327 .mpo_reserved5 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
328
329 CHECK_SET_HOOK(socket_check_accept)
330 CHECK_SET_HOOK(socket_check_accepted)
331 CHECK_SET_HOOK(socket_check_bind)
332 CHECK_SET_HOOK(socket_check_connect)
333 CHECK_SET_HOOK(socket_check_create)
334 CHECK_SET_HOOK(socket_check_deliver)
335 CHECK_SET_HOOK(socket_check_kqfilter)
336 CHECK_SET_HOOK(socket_check_label_update)
337 CHECK_SET_HOOK(socket_check_listen)
338 CHECK_SET_HOOK(socket_check_receive)
339 CHECK_SET_HOOK(socket_check_received)
340 CHECK_SET_HOOK(socket_check_select)
341 CHECK_SET_HOOK(socket_check_send)
342 CHECK_SET_HOOK(socket_check_stat)
343 CHECK_SET_HOOK(socket_check_setsockopt)
344 CHECK_SET_HOOK(socket_check_getsockopt)
345 CHECK_SET_HOOK(socket_label_associate_accept)
346 CHECK_SET_HOOK(socket_label_associate)
347 CHECK_SET_HOOK(socket_label_copy)
348 CHECK_SET_HOOK(socket_label_destroy)
349 CHECK_SET_HOOK(socket_label_externalize)
350 CHECK_SET_HOOK(socket_label_init)
351 CHECK_SET_HOOK(socket_label_internalize)
352 CHECK_SET_HOOK(socket_label_update)
353
354 CHECK_SET_HOOK(socketpeer_label_associate_mbuf)
355 CHECK_SET_HOOK(socketpeer_label_associate_socket)
356 CHECK_SET_HOOK(socketpeer_label_destroy)
357 CHECK_SET_HOOK(socketpeer_label_externalize)
358 CHECK_SET_HOOK(socketpeer_label_init)
359
360 CHECK_SET_HOOK(system_check_acct)
361 CHECK_SET_HOOK(system_check_audit)
362 CHECK_SET_HOOK(system_check_auditctl)
363 CHECK_SET_HOOK(system_check_auditon)
364 CHECK_SET_HOOK(system_check_host_priv)
365 CHECK_SET_HOOK(system_check_nfsd)
366 CHECK_SET_HOOK(system_check_reboot)
367 CHECK_SET_HOOK(system_check_settime)
368 CHECK_SET_HOOK(system_check_swapoff)
369 CHECK_SET_HOOK(system_check_swapon)
5ba3f43e 370 CHECK_SET_HOOK(socket_check_ioctl)
39236c6e
A
371
372 CHECK_SET_HOOK(sysvmsg_label_associate)
373 CHECK_SET_HOOK(sysvmsg_label_destroy)
374 CHECK_SET_HOOK(sysvmsg_label_init)
375 CHECK_SET_HOOK(sysvmsg_label_recycle)
376 CHECK_SET_HOOK(sysvmsq_check_enqueue)
377 CHECK_SET_HOOK(sysvmsq_check_msgrcv)
378 CHECK_SET_HOOK(sysvmsq_check_msgrmid)
379 CHECK_SET_HOOK(sysvmsq_check_msqctl)
380 CHECK_SET_HOOK(sysvmsq_check_msqget)
381 CHECK_SET_HOOK(sysvmsq_check_msqrcv)
382 CHECK_SET_HOOK(sysvmsq_check_msqsnd)
383 CHECK_SET_HOOK(sysvmsq_label_associate)
384 CHECK_SET_HOOK(sysvmsq_label_destroy)
385 CHECK_SET_HOOK(sysvmsq_label_init)
386 CHECK_SET_HOOK(sysvmsq_label_recycle)
387 CHECK_SET_HOOK(sysvsem_check_semctl)
388 CHECK_SET_HOOK(sysvsem_check_semget)
389 CHECK_SET_HOOK(sysvsem_check_semop)
390 CHECK_SET_HOOK(sysvsem_label_associate)
391 CHECK_SET_HOOK(sysvsem_label_destroy)
392 CHECK_SET_HOOK(sysvsem_label_init)
393 CHECK_SET_HOOK(sysvsem_label_recycle)
394 CHECK_SET_HOOK(sysvshm_check_shmat)
395 CHECK_SET_HOOK(sysvshm_check_shmctl)
396 CHECK_SET_HOOK(sysvshm_check_shmdt)
397 CHECK_SET_HOOK(sysvshm_check_shmget)
398 CHECK_SET_HOOK(sysvshm_label_associate)
399 CHECK_SET_HOOK(sysvshm_label_destroy)
400 CHECK_SET_HOOK(sysvshm_label_init)
401 CHECK_SET_HOOK(sysvshm_label_recycle)
402
5ba3f43e 403 CHECK_SET_HOOK(proc_notify_exit)
813fb2f6 404 CHECK_SET_HOOK(mount_check_snapshot_revert)
743345f9 405 CHECK_SET_HOOK(vnode_check_getattr)
39037602
A
406 CHECK_SET_HOOK(mount_check_snapshot_create)
407 CHECK_SET_HOOK(mount_check_snapshot_delete)
408 CHECK_SET_HOOK(vnode_check_clone)
7e41aa88
A
409 CHECK_SET_HOOK(proc_check_get_cs_info)
410 CHECK_SET_HOOK(proc_check_set_cs_info)
39236c6e
A
411
412 CHECK_SET_HOOK(iokit_check_hid_control)
413
414 CHECK_SET_HOOK(vnode_check_access)
415 CHECK_SET_HOOK(vnode_check_chdir)
416 CHECK_SET_HOOK(vnode_check_chroot)
417 CHECK_SET_HOOK(vnode_check_create)
418 CHECK_SET_HOOK(vnode_check_deleteextattr)
419 CHECK_SET_HOOK(vnode_check_exchangedata)
420 CHECK_SET_HOOK(vnode_check_exec)
421 CHECK_SET_HOOK(vnode_check_getattrlist)
422 CHECK_SET_HOOK(vnode_check_getextattr)
423 CHECK_SET_HOOK(vnode_check_ioctl)
424 CHECK_SET_HOOK(vnode_check_kqfilter)
425 CHECK_SET_HOOK(vnode_check_label_update)
426 CHECK_SET_HOOK(vnode_check_link)
427 CHECK_SET_HOOK(vnode_check_listextattr)
428 CHECK_SET_HOOK(vnode_check_lookup)
429 CHECK_SET_HOOK(vnode_check_open)
430 CHECK_SET_HOOK(vnode_check_read)
431 CHECK_SET_HOOK(vnode_check_readdir)
432 CHECK_SET_HOOK(vnode_check_readlink)
433 CHECK_SET_HOOK(vnode_check_rename_from)
434 CHECK_SET_HOOK(vnode_check_rename_to)
435 CHECK_SET_HOOK(vnode_check_revoke)
436 CHECK_SET_HOOK(vnode_check_select)
437 CHECK_SET_HOOK(vnode_check_setattrlist)
438 CHECK_SET_HOOK(vnode_check_setextattr)
439 CHECK_SET_HOOK(vnode_check_setflags)
440 CHECK_SET_HOOK(vnode_check_setmode)
441 CHECK_SET_HOOK(vnode_check_setowner)
442 CHECK_SET_HOOK(vnode_check_setutimes)
443 CHECK_SET_HOOK(vnode_check_stat)
444 CHECK_SET_HOOK(vnode_check_truncate)
445 CHECK_SET_HOOK(vnode_check_unlink)
446 CHECK_SET_HOOK(vnode_check_write)
447 CHECK_SET_HOOK(vnode_label_associate_devfs)
448 CHECK_SET_HOOK(vnode_label_associate_extattr)
449 CHECK_SET_HOOK(vnode_label_associate_file)
450 CHECK_SET_HOOK(vnode_label_associate_pipe)
451 CHECK_SET_HOOK(vnode_label_associate_posixsem)
452 CHECK_SET_HOOK(vnode_label_associate_posixshm)
453 CHECK_SET_HOOK(vnode_label_associate_singlelabel)
454 CHECK_SET_HOOK(vnode_label_associate_socket)
455 CHECK_SET_HOOK(vnode_label_copy)
456 CHECK_SET_HOOK(vnode_label_destroy)
457 CHECK_SET_HOOK(vnode_label_externalize_audit)
458 CHECK_SET_HOOK(vnode_label_externalize)
459 CHECK_SET_HOOK(vnode_label_init)
460 CHECK_SET_HOOK(vnode_label_internalize)
461 CHECK_SET_HOOK(vnode_label_recycle)
462 CHECK_SET_HOOK(vnode_label_store)
463 CHECK_SET_HOOK(vnode_label_update_extattr)
464 CHECK_SET_HOOK(vnode_label_update)
465 CHECK_SET_HOOK(vnode_notify_create)
466 CHECK_SET_HOOK(vnode_check_signature)
467 CHECK_SET_HOOK(vnode_check_uipc_bind)
468 CHECK_SET_HOOK(vnode_check_uipc_connect)
469
3e170ce0 470 CHECK_SET_HOOK(proc_check_run_cs_invalid)
39236c6e
A
471 CHECK_SET_HOOK(proc_check_suspend_resume)
472
473 CHECK_SET_HOOK(thread_userret)
474
475 CHECK_SET_HOOK(iokit_check_set_properties)
476
cb323159
A
477 .mpo_reserved3 = (mpo_reserved_hook_t *)common_hook,
478
39236c6e
A
479 CHECK_SET_HOOK(vnode_check_searchfs)
480
481 CHECK_SET_HOOK(priv_check)
482 CHECK_SET_HOOK(priv_grant)
483
484 CHECK_SET_HOOK(proc_check_map_anon)
485
486 CHECK_SET_HOOK(vnode_check_fsgetpath)
487
488 CHECK_SET_HOOK(iokit_check_open)
489
490 CHECK_SET_HOOK(proc_check_ledger)
491
492 CHECK_SET_HOOK(vnode_notify_rename)
493
39037602
A
494 CHECK_SET_HOOK(vnode_check_setacl)
495
496 CHECK_SET_HOOK(vnode_notify_deleteextattr)
39236c6e
A
497
498 CHECK_SET_HOOK(system_check_kas_info)
499
5ba3f43e 500 CHECK_SET_HOOK(vnode_check_lookup_preflight)
39236c6e
A
501
502 CHECK_SET_HOOK(vnode_notify_open)
503
504 CHECK_SET_HOOK(system_check_info)
505
506 CHECK_SET_HOOK(pty_notify_grant)
507 CHECK_SET_HOOK(pty_notify_close)
508
509 CHECK_SET_HOOK(vnode_find_sigs)
510
511
512 CHECK_SET_HOOK(kext_check_load)
513 CHECK_SET_HOOK(kext_check_unload)
514
515 CHECK_SET_HOOK(proc_check_proc_info)
516
517 CHECK_SET_HOOK(vnode_notify_link)
518
fe8ab488
A
519 CHECK_SET_HOOK(iokit_check_filter_properties)
520 CHECK_SET_HOOK(iokit_check_get_property)
6d2010ae
A
521};
522
523/*
524 * Policy definition
525 */
5ba3f43e 526static SECURITY_READ_ONLY_LATE(struct mac_policy_conf) policy_conf = {
6d2010ae
A
527 .mpc_name = "CHECK",
528 .mpc_fullname = "Check Assumptions Policy",
0a7de745
A
529 .mpc_field_off = NULL, /* no label slot */
530 .mpc_labelnames = NULL, /* no policy label names */
531 .mpc_labelname_count = 0, /* count of label names is 0 */
532 .mpc_ops = &policy_ops, /* policy operations */
6d2010ae
A
533 .mpc_loadtime_flags = 0,
534 .mpc_runtime_flags = 0,
535};
536
5ba3f43e 537static SECURITY_READ_ONLY_LATE(mac_policy_handle_t) policy_handle;
6d2010ae
A
538
539/*
540 * Init routine; for a loadable policy, this would be called during the KEXT
541 * initialization; we're going to call this from bsd_init() if the boot
542 * argument for checking is present.
543 */
544errno_t
545check_policy_init(int flags)
546{
547 /* Only instantiate the module if we have been asked to do checking */
0a7de745 548 if (!flags) {
6d2010ae 549 return 0;
0a7de745 550 }
6d2010ae
A
551
552 policy_flags = flags;
553
554 return mac_policy_register(&policy_conf, &policy_handle, NULL);
555}