]>
Commit | Line | Data |
---|---|---|
6d2010ae | 1 | #include <sys/param.h> |
0a7de745 | 2 | #include <sys/systm.h> /* XXX printf() */ |
6d2010ae A |
3 | |
4 | #include <sys/types.h> | |
5 | #include <sys/fcntl.h> | |
6 | #include <sys/file.h> | |
7 | #include <sys/kauth.h> | |
8 | #include <sys/mount.h> | |
9 | #include <sys/msg.h> | |
10 | #include <sys/proc.h> | |
11 | #include <sys/socketvar.h> | |
12 | #include <sys/vnode.h> | |
13 | #include <security/mac.h> | |
14 | #include <security/mac_policy.h> | |
15 | ||
5ba3f43e | 16 | #include <libkern/section_keywords.h> |
0a7de745 | 17 | #include <libkern/OSDebug.h> /* OSBPrintBacktrace */ |
6d2010ae A |
18 | |
19 | ||
20 | /* forward declaration; see bsd_init.c */ | |
21 | errno_t check_policy_init(int); | |
22 | int get_thread_lock_count(thread_t th); /* forced forward */ | |
23 | ||
24 | /* | |
25 | * Policy flags used when the policy is enabled | |
26 | * | |
27 | * Note: CHECK_POLICY_CHECK is probably not very useful unless you | |
28 | * are kernel debugging and set a breakpoint. | |
29 | */ | |
0a7de745 A |
30 | #define CHECK_POLICY_CHECK 0x00000001 /* Check on calls */ |
31 | #define CHECK_POLICY_FAIL 0x00000002 /* EPERM on fails */ | |
32 | #define CHECK_POLICY_BACKTRACE 0x00000004 /* Show call stack on fails */ | |
33 | #define CHECK_POLICY_PANIC 0x00000008 /* Panic on fails */ | |
34 | #define CHECK_POLICY_PERIODIC 0x00000010 /* Show fails periodically */ | |
6d2010ae A |
35 | |
36 | static int policy_flags = 0; | |
37 | ||
38 | ||
0a7de745 | 39 | #define CHECK_SET_HOOK(x) .mpo_##x = (mpo_##x##_t *)common_hook, |
6d2010ae A |
40 | |
41 | /* | |
42 | * Init; currently, we only print our arrival notice. | |
43 | */ | |
44 | static void | |
45 | hook_policy_init(struct mac_policy_conf *mpc) | |
46 | { | |
47 | printf("Policy '%s' = '%s' ready\n", mpc->mpc_name, mpc->mpc_fullname); | |
48 | } | |
49 | ||
50 | static void | |
51 | hook_policy_initbsd(struct mac_policy_conf *mpc) | |
52 | { | |
53 | /* called with policy_grab_exclusive mutex held; exempt */ | |
54 | printf("hook_policy_initbsd: %s\n", mpc->mpc_name); | |
55 | } | |
56 | ||
57 | ||
58 | /* Implementation */ | |
0a7de745 A |
59 | #define CLASS_PERIOD_LIMIT 10000 |
60 | #define CLASS_PERIOD_MULT 20 | |
6d2010ae A |
61 | |
62 | static int policy_check_event = 1; | |
63 | static int policy_check_period = 1; | |
64 | static int policy_check_next = CLASS_PERIOD_MULT; | |
65 | ||
66 | ||
67 | static int | |
39236c6e | 68 | common_hook(void) |
6d2010ae | 69 | { |
0a7de745 A |
70 | int i; |
71 | int rv = 0; | |
6d2010ae A |
72 | |
73 | if ((i = get_thread_lock_count(current_thread())) != 0) { | |
74 | /* | |
75 | * fail the MACF check if we hold a lock; this assumes a | |
76 | * a non-void (authorization) MACF hook. | |
77 | */ | |
0a7de745 | 78 | if (policy_flags & CHECK_POLICY_FAIL) { |
6d2010ae | 79 | rv = EPERM; |
0a7de745 | 80 | } |
6d2010ae A |
81 | |
82 | /* | |
83 | * display a backtrace if we hold a lock and we are not | |
84 | * going to panic | |
85 | */ | |
86 | if ((policy_flags & (CHECK_POLICY_BACKTRACE | CHECK_POLICY_PANIC)) == CHECK_POLICY_BACKTRACE) { | |
87 | if (policy_flags & CHECK_POLICY_PERIODIC) { | |
0a7de745 A |
88 | /* at exponentially increasing intervals */ |
89 | if (!(policy_check_event % policy_check_period)) { | |
90 | if (policy_check_event <= policy_check_next || policy_check_period == CLASS_PERIOD_LIMIT) { | |
91 | /* | |
92 | * According to Derek, we could | |
93 | * technically get a symbolicated name | |
94 | * here, if we refactered some code | |
95 | * and set the "keepsyms=1" boot | |
96 | * argument... | |
97 | */ | |
98 | OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event); | |
99 | } | |
100 | } else { | |
101 | if (policy_check_period < CLASS_PERIOD_LIMIT) { | |
102 | policy_check_next *= CLASS_PERIOD_MULT; | |
103 | policy_check_period *= CLASS_PERIOD_MULT; | |
104 | } | |
6d2010ae | 105 | } |
6d2010ae A |
106 | } else { |
107 | /* always */ | |
108 | OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event); | |
109 | } | |
110 | } | |
111 | ||
112 | /* Panic */ | |
0a7de745 | 113 | if (policy_flags & CHECK_POLICY_PANIC) { |
6d2010ae | 114 | panic("calling MACF hook with mutex count %d\n", i); |
0a7de745 | 115 | } |
6d2010ae A |
116 | |
117 | /* count for non-fatal tracing */ | |
118 | policy_check_event++; | |
119 | } | |
120 | ||
121 | return rv; | |
122 | } | |
123 | ||
c3c9b80d | 124 | #if (MAC_POLICY_OPS_VERSION != 74) |
39236c6e A |
125 | # error "struct mac_policy_ops doesn't match definition in mac_policy.h" |
126 | #endif | |
6d2010ae A |
127 | /* |
128 | * Policy hooks; one per possible hook | |
39236c6e A |
129 | * |
130 | * Please note that this struct initialization should be kept in sync with | |
131 | * security/mac_policy.h (mac_policy_ops struct definition). | |
6d2010ae | 132 | */ |
5ba3f43e | 133 | const static struct mac_policy_ops policy_ops = { |
39236c6e A |
134 | CHECK_SET_HOOK(audit_check_postselect) |
135 | CHECK_SET_HOOK(audit_check_preselect) | |
136 | ||
f427ee49 A |
137 | .mpo_reserved01 = (mpo_reserved_hook_t *)common_hook, |
138 | .mpo_reserved02 = (mpo_reserved_hook_t *)common_hook, | |
139 | .mpo_reserved03 = (mpo_reserved_hook_t *)common_hook, | |
140 | .mpo_reserved04 = (mpo_reserved_hook_t *)common_hook, | |
39236c6e A |
141 | |
142 | CHECK_SET_HOOK(cred_check_label_update_execve) | |
143 | CHECK_SET_HOOK(cred_check_label_update) | |
144 | CHECK_SET_HOOK(cred_check_visible) | |
145 | CHECK_SET_HOOK(cred_label_associate_fork) | |
146 | CHECK_SET_HOOK(cred_label_associate_kernel) | |
147 | CHECK_SET_HOOK(cred_label_associate) | |
148 | CHECK_SET_HOOK(cred_label_associate_user) | |
149 | CHECK_SET_HOOK(cred_label_destroy) | |
150 | CHECK_SET_HOOK(cred_label_externalize_audit) | |
151 | CHECK_SET_HOOK(cred_label_externalize) | |
152 | CHECK_SET_HOOK(cred_label_init) | |
153 | CHECK_SET_HOOK(cred_label_internalize) | |
154 | CHECK_SET_HOOK(cred_label_update_execve) | |
155 | CHECK_SET_HOOK(cred_label_update) | |
156 | ||
157 | CHECK_SET_HOOK(devfs_label_associate_device) | |
158 | CHECK_SET_HOOK(devfs_label_associate_directory) | |
159 | CHECK_SET_HOOK(devfs_label_copy) | |
160 | CHECK_SET_HOOK(devfs_label_destroy) | |
161 | CHECK_SET_HOOK(devfs_label_init) | |
162 | CHECK_SET_HOOK(devfs_label_update) | |
163 | ||
164 | CHECK_SET_HOOK(file_check_change_offset) | |
165 | CHECK_SET_HOOK(file_check_create) | |
166 | CHECK_SET_HOOK(file_check_dup) | |
167 | CHECK_SET_HOOK(file_check_fcntl) | |
168 | CHECK_SET_HOOK(file_check_get_offset) | |
169 | CHECK_SET_HOOK(file_check_get) | |
170 | CHECK_SET_HOOK(file_check_inherit) | |
171 | CHECK_SET_HOOK(file_check_ioctl) | |
172 | CHECK_SET_HOOK(file_check_lock) | |
173 | CHECK_SET_HOOK(file_check_mmap_downgrade) | |
174 | CHECK_SET_HOOK(file_check_mmap) | |
175 | CHECK_SET_HOOK(file_check_receive) | |
176 | CHECK_SET_HOOK(file_check_set) | |
177 | CHECK_SET_HOOK(file_label_init) | |
178 | CHECK_SET_HOOK(file_label_destroy) | |
179 | CHECK_SET_HOOK(file_label_associate) | |
f427ee49 A |
180 | CHECK_SET_HOOK(file_notify_close) |
181 | ||
182 | .mpo_reserved06 = (mpo_reserved_hook_t *)common_hook, | |
183 | .mpo_reserved07 = (mpo_reserved_hook_t *)common_hook, | |
184 | .mpo_reserved08 = (mpo_reserved_hook_t *)common_hook, | |
185 | .mpo_reserved09 = (mpo_reserved_hook_t *)common_hook, | |
186 | .mpo_reserved10 = (mpo_reserved_hook_t *)common_hook, | |
187 | .mpo_reserved11 = (mpo_reserved_hook_t *)common_hook, | |
188 | .mpo_reserved12 = (mpo_reserved_hook_t *)common_hook, | |
189 | .mpo_reserved13 = (mpo_reserved_hook_t *)common_hook, | |
190 | .mpo_reserved14 = (mpo_reserved_hook_t *)common_hook, | |
191 | .mpo_reserved15 = (mpo_reserved_hook_t *)common_hook, | |
192 | .mpo_reserved16 = (mpo_reserved_hook_t *)common_hook, | |
193 | .mpo_reserved17 = (mpo_reserved_hook_t *)common_hook, | |
194 | .mpo_reserved18 = (mpo_reserved_hook_t *)common_hook, | |
195 | .mpo_reserved19 = (mpo_reserved_hook_t *)common_hook, | |
196 | .mpo_reserved20 = (mpo_reserved_hook_t *)common_hook, | |
197 | .mpo_reserved21 = (mpo_reserved_hook_t *)common_hook, | |
198 | .mpo_reserved22 = (mpo_reserved_hook_t *)common_hook, | |
199 | .mpo_reserved23 = (mpo_reserved_hook_t *)common_hook, | |
200 | .mpo_reserved24 = (mpo_reserved_hook_t *)common_hook, | |
201 | .mpo_reserved25 = (mpo_reserved_hook_t *)common_hook, | |
202 | .mpo_reserved26 = (mpo_reserved_hook_t *)common_hook, | |
39236c6e | 203 | |
39037602 A |
204 | CHECK_SET_HOOK(file_check_library_validation) |
205 | ||
206 | CHECK_SET_HOOK(vnode_notify_setacl) | |
207 | CHECK_SET_HOOK(vnode_notify_setattrlist) | |
208 | CHECK_SET_HOOK(vnode_notify_setextattr) | |
209 | CHECK_SET_HOOK(vnode_notify_setflags) | |
210 | CHECK_SET_HOOK(vnode_notify_setmode) | |
211 | CHECK_SET_HOOK(vnode_notify_setowner) | |
212 | CHECK_SET_HOOK(vnode_notify_setutimes) | |
213 | CHECK_SET_HOOK(vnode_notify_truncate) | |
39236c6e | 214 | |
f427ee49 A |
215 | .mpo_reserved27 = (mpo_reserved_hook_t *)common_hook, |
216 | .mpo_reserved28 = (mpo_reserved_hook_t *)common_hook, | |
217 | .mpo_reserved29 = (mpo_reserved_hook_t *)common_hook, | |
218 | .mpo_reserved30 = (mpo_reserved_hook_t *)common_hook, | |
219 | .mpo_reserved31 = (mpo_reserved_hook_t *)common_hook, | |
220 | .mpo_reserved32 = (mpo_reserved_hook_t *)common_hook, | |
221 | .mpo_reserved33 = (mpo_reserved_hook_t *)common_hook, | |
222 | .mpo_reserved34 = (mpo_reserved_hook_t *)common_hook, | |
223 | .mpo_reserved35 = (mpo_reserved_hook_t *)common_hook, | |
224 | .mpo_reserved36 = (mpo_reserved_hook_t *)common_hook, | |
225 | .mpo_reserved37 = (mpo_reserved_hook_t *)common_hook, | |
39236c6e A |
226 | |
227 | CHECK_SET_HOOK(mount_check_fsctl) | |
228 | CHECK_SET_HOOK(mount_check_getattr) | |
229 | CHECK_SET_HOOK(mount_check_label_update) | |
230 | CHECK_SET_HOOK(mount_check_mount) | |
231 | CHECK_SET_HOOK(mount_check_remount) | |
232 | CHECK_SET_HOOK(mount_check_setattr) | |
233 | CHECK_SET_HOOK(mount_check_stat) | |
234 | CHECK_SET_HOOK(mount_check_umount) | |
235 | CHECK_SET_HOOK(mount_label_associate) | |
236 | CHECK_SET_HOOK(mount_label_destroy) | |
237 | CHECK_SET_HOOK(mount_label_externalize) | |
238 | CHECK_SET_HOOK(mount_label_init) | |
239 | CHECK_SET_HOOK(mount_label_internalize) | |
240 | ||
c3c9b80d A |
241 | CHECK_SET_HOOK(proc_check_expose_task_with_flavor) |
242 | CHECK_SET_HOOK(proc_check_get_task_with_flavor) | |
243 | CHECK_SET_HOOK(proc_check_task_id_token_get_task) | |
39236c6e A |
244 | |
245 | CHECK_SET_HOOK(pipe_check_ioctl) | |
246 | CHECK_SET_HOOK(pipe_check_kqfilter) | |
f427ee49 | 247 | .mpo_reserved41 = (mpo_reserved_hook_t *)common_hook, |
39236c6e A |
248 | CHECK_SET_HOOK(pipe_check_read) |
249 | CHECK_SET_HOOK(pipe_check_select) | |
250 | CHECK_SET_HOOK(pipe_check_stat) | |
251 | CHECK_SET_HOOK(pipe_check_write) | |
252 | CHECK_SET_HOOK(pipe_label_associate) | |
f427ee49 | 253 | .mpo_reserved42 = (mpo_reserved_hook_t *)common_hook, |
39236c6e | 254 | CHECK_SET_HOOK(pipe_label_destroy) |
f427ee49 | 255 | .mpo_reserved43 = (mpo_reserved_hook_t *)common_hook, |
39236c6e | 256 | CHECK_SET_HOOK(pipe_label_init) |
f427ee49 A |
257 | .mpo_reserved44 = (mpo_reserved_hook_t *)common_hook, |
258 | .mpo_reserved45 = (mpo_reserved_hook_t *)common_hook, | |
39236c6e A |
259 | |
260 | CHECK_SET_HOOK(policy_destroy) | |
261 | /* special hooks for policy init's */ | |
6d2010ae A |
262 | .mpo_policy_init = hook_policy_init, |
263 | .mpo_policy_initbsd = hook_policy_initbsd, | |
39236c6e A |
264 | CHECK_SET_HOOK(policy_syscall) |
265 | ||
fe8ab488 A |
266 | CHECK_SET_HOOK(system_check_sysctlbyname) |
267 | CHECK_SET_HOOK(proc_check_inherit_ipc_ports) | |
268 | CHECK_SET_HOOK(vnode_check_rename) | |
3e170ce0 | 269 | CHECK_SET_HOOK(kext_check_query) |
d9a64523 | 270 | CHECK_SET_HOOK(proc_notify_exec_complete) |
f427ee49 | 271 | CHECK_SET_HOOK(proc_notify_cs_invalidated) |
cb323159 | 272 | CHECK_SET_HOOK(proc_check_syscall_unix) |
3e170ce0 A |
273 | CHECK_SET_HOOK(proc_check_expose_task) |
274 | CHECK_SET_HOOK(proc_check_set_host_special_port) | |
275 | CHECK_SET_HOOK(proc_check_set_host_exception_port) | |
39037602 A |
276 | CHECK_SET_HOOK(exc_action_check_exception_send) |
277 | CHECK_SET_HOOK(exc_action_label_associate) | |
5ba3f43e | 278 | CHECK_SET_HOOK(exc_action_label_populate) |
39037602 A |
279 | CHECK_SET_HOOK(exc_action_label_destroy) |
280 | CHECK_SET_HOOK(exc_action_label_init) | |
281 | CHECK_SET_HOOK(exc_action_label_update) | |
282 | ||
527f9951 | 283 | CHECK_SET_HOOK(vnode_check_trigger_resolve) |
cb323159 | 284 | CHECK_SET_HOOK(mount_check_mount_late) |
ea3f0419 | 285 | CHECK_SET_HOOK(mount_check_snapshot_mount) |
f427ee49 | 286 | CHECK_SET_HOOK(vnode_notify_reclaim) |
5ba3f43e A |
287 | CHECK_SET_HOOK(skywalk_flow_check_connect) |
288 | CHECK_SET_HOOK(skywalk_flow_check_listen) | |
39236c6e A |
289 | |
290 | CHECK_SET_HOOK(posixsem_check_create) | |
291 | CHECK_SET_HOOK(posixsem_check_open) | |
292 | CHECK_SET_HOOK(posixsem_check_post) | |
293 | CHECK_SET_HOOK(posixsem_check_unlink) | |
294 | CHECK_SET_HOOK(posixsem_check_wait) | |
295 | CHECK_SET_HOOK(posixsem_label_associate) | |
296 | CHECK_SET_HOOK(posixsem_label_destroy) | |
297 | CHECK_SET_HOOK(posixsem_label_init) | |
298 | CHECK_SET_HOOK(posixshm_check_create) | |
299 | CHECK_SET_HOOK(posixshm_check_mmap) | |
300 | CHECK_SET_HOOK(posixshm_check_open) | |
301 | CHECK_SET_HOOK(posixshm_check_stat) | |
302 | CHECK_SET_HOOK(posixshm_check_truncate) | |
303 | CHECK_SET_HOOK(posixshm_check_unlink) | |
304 | CHECK_SET_HOOK(posixshm_label_associate) | |
305 | CHECK_SET_HOOK(posixshm_label_destroy) | |
306 | CHECK_SET_HOOK(posixshm_label_init) | |
307 | ||
308 | CHECK_SET_HOOK(proc_check_debug) | |
309 | CHECK_SET_HOOK(proc_check_fork) | |
310 | CHECK_SET_HOOK(proc_check_get_task_name) | |
311 | CHECK_SET_HOOK(proc_check_get_task) | |
312 | CHECK_SET_HOOK(proc_check_getaudit) | |
313 | CHECK_SET_HOOK(proc_check_getauid) | |
314 | CHECK_SET_HOOK(proc_check_getlcid) | |
315 | CHECK_SET_HOOK(proc_check_mprotect) | |
316 | CHECK_SET_HOOK(proc_check_sched) | |
317 | CHECK_SET_HOOK(proc_check_setaudit) | |
318 | CHECK_SET_HOOK(proc_check_setauid) | |
319 | CHECK_SET_HOOK(proc_check_setlcid) | |
320 | CHECK_SET_HOOK(proc_check_signal) | |
321 | CHECK_SET_HOOK(proc_check_wait) | |
c6bf4f31 | 322 | CHECK_SET_HOOK(proc_check_dump_core) |
f427ee49 | 323 | CHECK_SET_HOOK(proc_check_remote_thread_create) |
39236c6e A |
324 | |
325 | CHECK_SET_HOOK(socket_check_accept) | |
326 | CHECK_SET_HOOK(socket_check_accepted) | |
327 | CHECK_SET_HOOK(socket_check_bind) | |
328 | CHECK_SET_HOOK(socket_check_connect) | |
329 | CHECK_SET_HOOK(socket_check_create) | |
f427ee49 A |
330 | .mpo_reserved46 = (mpo_reserved_hook_t *)common_hook, |
331 | .mpo_reserved47 = (mpo_reserved_hook_t *)common_hook, | |
332 | .mpo_reserved48 = (mpo_reserved_hook_t *)common_hook, | |
39236c6e A |
333 | CHECK_SET_HOOK(socket_check_listen) |
334 | CHECK_SET_HOOK(socket_check_receive) | |
335 | CHECK_SET_HOOK(socket_check_received) | |
f427ee49 | 336 | .mpo_reserved49 = (mpo_reserved_hook_t *)common_hook, |
39236c6e A |
337 | CHECK_SET_HOOK(socket_check_send) |
338 | CHECK_SET_HOOK(socket_check_stat) | |
339 | CHECK_SET_HOOK(socket_check_setsockopt) | |
340 | CHECK_SET_HOOK(socket_check_getsockopt) | |
f427ee49 | 341 | |
c3c9b80d A |
342 | CHECK_SET_HOOK(proc_check_get_movable_control_port) |
343 | CHECK_SET_HOOK(proc_check_dyld_process_info_notify_register) | |
f427ee49 A |
344 | .mpo_reserved52 = (mpo_reserved_hook_t *)common_hook, |
345 | .mpo_reserved53 = (mpo_reserved_hook_t *)common_hook, | |
346 | .mpo_reserved54 = (mpo_reserved_hook_t *)common_hook, | |
347 | .mpo_reserved55 = (mpo_reserved_hook_t *)common_hook, | |
348 | .mpo_reserved56 = (mpo_reserved_hook_t *)common_hook, | |
349 | .mpo_reserved57 = (mpo_reserved_hook_t *)common_hook, | |
350 | .mpo_reserved58 = (mpo_reserved_hook_t *)common_hook, | |
351 | .mpo_reserved59 = (mpo_reserved_hook_t *)common_hook, | |
352 | .mpo_reserved60 = (mpo_reserved_hook_t *)common_hook, | |
353 | .mpo_reserved61 = (mpo_reserved_hook_t *)common_hook, | |
c3c9b80d A |
354 | |
355 | CHECK_SET_HOOK(iokit_check_open_service) | |
39236c6e A |
356 | |
357 | CHECK_SET_HOOK(system_check_acct) | |
358 | CHECK_SET_HOOK(system_check_audit) | |
359 | CHECK_SET_HOOK(system_check_auditctl) | |
360 | CHECK_SET_HOOK(system_check_auditon) | |
361 | CHECK_SET_HOOK(system_check_host_priv) | |
362 | CHECK_SET_HOOK(system_check_nfsd) | |
363 | CHECK_SET_HOOK(system_check_reboot) | |
364 | CHECK_SET_HOOK(system_check_settime) | |
365 | CHECK_SET_HOOK(system_check_swapoff) | |
366 | CHECK_SET_HOOK(system_check_swapon) | |
5ba3f43e | 367 | CHECK_SET_HOOK(socket_check_ioctl) |
39236c6e A |
368 | |
369 | CHECK_SET_HOOK(sysvmsg_label_associate) | |
370 | CHECK_SET_HOOK(sysvmsg_label_destroy) | |
371 | CHECK_SET_HOOK(sysvmsg_label_init) | |
372 | CHECK_SET_HOOK(sysvmsg_label_recycle) | |
373 | CHECK_SET_HOOK(sysvmsq_check_enqueue) | |
374 | CHECK_SET_HOOK(sysvmsq_check_msgrcv) | |
375 | CHECK_SET_HOOK(sysvmsq_check_msgrmid) | |
376 | CHECK_SET_HOOK(sysvmsq_check_msqctl) | |
377 | CHECK_SET_HOOK(sysvmsq_check_msqget) | |
378 | CHECK_SET_HOOK(sysvmsq_check_msqrcv) | |
379 | CHECK_SET_HOOK(sysvmsq_check_msqsnd) | |
380 | CHECK_SET_HOOK(sysvmsq_label_associate) | |
381 | CHECK_SET_HOOK(sysvmsq_label_destroy) | |
382 | CHECK_SET_HOOK(sysvmsq_label_init) | |
383 | CHECK_SET_HOOK(sysvmsq_label_recycle) | |
384 | CHECK_SET_HOOK(sysvsem_check_semctl) | |
385 | CHECK_SET_HOOK(sysvsem_check_semget) | |
386 | CHECK_SET_HOOK(sysvsem_check_semop) | |
387 | CHECK_SET_HOOK(sysvsem_label_associate) | |
388 | CHECK_SET_HOOK(sysvsem_label_destroy) | |
389 | CHECK_SET_HOOK(sysvsem_label_init) | |
390 | CHECK_SET_HOOK(sysvsem_label_recycle) | |
391 | CHECK_SET_HOOK(sysvshm_check_shmat) | |
392 | CHECK_SET_HOOK(sysvshm_check_shmctl) | |
393 | CHECK_SET_HOOK(sysvshm_check_shmdt) | |
394 | CHECK_SET_HOOK(sysvshm_check_shmget) | |
395 | CHECK_SET_HOOK(sysvshm_label_associate) | |
396 | CHECK_SET_HOOK(sysvshm_label_destroy) | |
397 | CHECK_SET_HOOK(sysvshm_label_init) | |
398 | CHECK_SET_HOOK(sysvshm_label_recycle) | |
399 | ||
5ba3f43e | 400 | CHECK_SET_HOOK(proc_notify_exit) |
813fb2f6 | 401 | CHECK_SET_HOOK(mount_check_snapshot_revert) |
743345f9 | 402 | CHECK_SET_HOOK(vnode_check_getattr) |
39037602 A |
403 | CHECK_SET_HOOK(mount_check_snapshot_create) |
404 | CHECK_SET_HOOK(mount_check_snapshot_delete) | |
405 | CHECK_SET_HOOK(vnode_check_clone) | |
7e41aa88 A |
406 | CHECK_SET_HOOK(proc_check_get_cs_info) |
407 | CHECK_SET_HOOK(proc_check_set_cs_info) | |
39236c6e A |
408 | |
409 | CHECK_SET_HOOK(iokit_check_hid_control) | |
410 | ||
411 | CHECK_SET_HOOK(vnode_check_access) | |
412 | CHECK_SET_HOOK(vnode_check_chdir) | |
413 | CHECK_SET_HOOK(vnode_check_chroot) | |
414 | CHECK_SET_HOOK(vnode_check_create) | |
415 | CHECK_SET_HOOK(vnode_check_deleteextattr) | |
416 | CHECK_SET_HOOK(vnode_check_exchangedata) | |
417 | CHECK_SET_HOOK(vnode_check_exec) | |
418 | CHECK_SET_HOOK(vnode_check_getattrlist) | |
419 | CHECK_SET_HOOK(vnode_check_getextattr) | |
420 | CHECK_SET_HOOK(vnode_check_ioctl) | |
421 | CHECK_SET_HOOK(vnode_check_kqfilter) | |
422 | CHECK_SET_HOOK(vnode_check_label_update) | |
423 | CHECK_SET_HOOK(vnode_check_link) | |
424 | CHECK_SET_HOOK(vnode_check_listextattr) | |
425 | CHECK_SET_HOOK(vnode_check_lookup) | |
426 | CHECK_SET_HOOK(vnode_check_open) | |
427 | CHECK_SET_HOOK(vnode_check_read) | |
428 | CHECK_SET_HOOK(vnode_check_readdir) | |
429 | CHECK_SET_HOOK(vnode_check_readlink) | |
430 | CHECK_SET_HOOK(vnode_check_rename_from) | |
431 | CHECK_SET_HOOK(vnode_check_rename_to) | |
432 | CHECK_SET_HOOK(vnode_check_revoke) | |
433 | CHECK_SET_HOOK(vnode_check_select) | |
434 | CHECK_SET_HOOK(vnode_check_setattrlist) | |
435 | CHECK_SET_HOOK(vnode_check_setextattr) | |
436 | CHECK_SET_HOOK(vnode_check_setflags) | |
437 | CHECK_SET_HOOK(vnode_check_setmode) | |
438 | CHECK_SET_HOOK(vnode_check_setowner) | |
439 | CHECK_SET_HOOK(vnode_check_setutimes) | |
440 | CHECK_SET_HOOK(vnode_check_stat) | |
441 | CHECK_SET_HOOK(vnode_check_truncate) | |
442 | CHECK_SET_HOOK(vnode_check_unlink) | |
443 | CHECK_SET_HOOK(vnode_check_write) | |
444 | CHECK_SET_HOOK(vnode_label_associate_devfs) | |
445 | CHECK_SET_HOOK(vnode_label_associate_extattr) | |
446 | CHECK_SET_HOOK(vnode_label_associate_file) | |
447 | CHECK_SET_HOOK(vnode_label_associate_pipe) | |
448 | CHECK_SET_HOOK(vnode_label_associate_posixsem) | |
449 | CHECK_SET_HOOK(vnode_label_associate_posixshm) | |
450 | CHECK_SET_HOOK(vnode_label_associate_singlelabel) | |
451 | CHECK_SET_HOOK(vnode_label_associate_socket) | |
452 | CHECK_SET_HOOK(vnode_label_copy) | |
453 | CHECK_SET_HOOK(vnode_label_destroy) | |
454 | CHECK_SET_HOOK(vnode_label_externalize_audit) | |
455 | CHECK_SET_HOOK(vnode_label_externalize) | |
456 | CHECK_SET_HOOK(vnode_label_init) | |
457 | CHECK_SET_HOOK(vnode_label_internalize) | |
458 | CHECK_SET_HOOK(vnode_label_recycle) | |
459 | CHECK_SET_HOOK(vnode_label_store) | |
460 | CHECK_SET_HOOK(vnode_label_update_extattr) | |
461 | CHECK_SET_HOOK(vnode_label_update) | |
462 | CHECK_SET_HOOK(vnode_notify_create) | |
463 | CHECK_SET_HOOK(vnode_check_signature) | |
464 | CHECK_SET_HOOK(vnode_check_uipc_bind) | |
465 | CHECK_SET_HOOK(vnode_check_uipc_connect) | |
466 | ||
3e170ce0 | 467 | CHECK_SET_HOOK(proc_check_run_cs_invalid) |
39236c6e A |
468 | CHECK_SET_HOOK(proc_check_suspend_resume) |
469 | ||
470 | CHECK_SET_HOOK(thread_userret) | |
471 | ||
472 | CHECK_SET_HOOK(iokit_check_set_properties) | |
473 | ||
f427ee49 | 474 | CHECK_SET_HOOK(vnode_check_supplemental_signature) |
cb323159 | 475 | |
39236c6e A |
476 | CHECK_SET_HOOK(vnode_check_searchfs) |
477 | ||
478 | CHECK_SET_HOOK(priv_check) | |
479 | CHECK_SET_HOOK(priv_grant) | |
480 | ||
481 | CHECK_SET_HOOK(proc_check_map_anon) | |
482 | ||
483 | CHECK_SET_HOOK(vnode_check_fsgetpath) | |
484 | ||
485 | CHECK_SET_HOOK(iokit_check_open) | |
486 | ||
487 | CHECK_SET_HOOK(proc_check_ledger) | |
488 | ||
489 | CHECK_SET_HOOK(vnode_notify_rename) | |
490 | ||
39037602 A |
491 | CHECK_SET_HOOK(vnode_check_setacl) |
492 | ||
493 | CHECK_SET_HOOK(vnode_notify_deleteextattr) | |
39236c6e A |
494 | |
495 | CHECK_SET_HOOK(system_check_kas_info) | |
496 | ||
5ba3f43e | 497 | CHECK_SET_HOOK(vnode_check_lookup_preflight) |
39236c6e A |
498 | |
499 | CHECK_SET_HOOK(vnode_notify_open) | |
500 | ||
501 | CHECK_SET_HOOK(system_check_info) | |
502 | ||
503 | CHECK_SET_HOOK(pty_notify_grant) | |
504 | CHECK_SET_HOOK(pty_notify_close) | |
505 | ||
506 | CHECK_SET_HOOK(vnode_find_sigs) | |
507 | ||
39236c6e A |
508 | CHECK_SET_HOOK(kext_check_load) |
509 | CHECK_SET_HOOK(kext_check_unload) | |
510 | ||
511 | CHECK_SET_HOOK(proc_check_proc_info) | |
512 | ||
513 | CHECK_SET_HOOK(vnode_notify_link) | |
514 | ||
fe8ab488 A |
515 | CHECK_SET_HOOK(iokit_check_filter_properties) |
516 | CHECK_SET_HOOK(iokit_check_get_property) | |
6d2010ae A |
517 | }; |
518 | ||
519 | /* | |
520 | * Policy definition | |
521 | */ | |
5ba3f43e | 522 | static SECURITY_READ_ONLY_LATE(struct mac_policy_conf) policy_conf = { |
6d2010ae A |
523 | .mpc_name = "CHECK", |
524 | .mpc_fullname = "Check Assumptions Policy", | |
0a7de745 A |
525 | .mpc_field_off = NULL, /* no label slot */ |
526 | .mpc_labelnames = NULL, /* no policy label names */ | |
527 | .mpc_labelname_count = 0, /* count of label names is 0 */ | |
528 | .mpc_ops = &policy_ops, /* policy operations */ | |
6d2010ae A |
529 | .mpc_loadtime_flags = 0, |
530 | .mpc_runtime_flags = 0, | |
531 | }; | |
532 | ||
5ba3f43e | 533 | static SECURITY_READ_ONLY_LATE(mac_policy_handle_t) policy_handle; |
6d2010ae A |
534 | |
535 | /* | |
536 | * Init routine; for a loadable policy, this would be called during the KEXT | |
537 | * initialization; we're going to call this from bsd_init() if the boot | |
538 | * argument for checking is present. | |
539 | */ | |
540 | errno_t | |
541 | check_policy_init(int flags) | |
542 | { | |
543 | /* Only instantiate the module if we have been asked to do checking */ | |
0a7de745 | 544 | if (!flags) { |
6d2010ae | 545 | return 0; |
0a7de745 | 546 | } |
6d2010ae A |
547 | |
548 | policy_flags = flags; | |
549 | ||
550 | return mac_policy_register(&policy_conf, &policy_handle, NULL); | |
551 | } |