]> git.saurik.com Git - apple/xnu.git/blame - bsd/kern/policy_check.c
xnu-7195.101.1.tar.gz
[apple/xnu.git] / bsd / kern / policy_check.c
CommitLineData
6d2010ae 1#include <sys/param.h>
0a7de745 2#include <sys/systm.h> /* XXX printf() */
6d2010ae
A
3
4#include <sys/types.h>
5#include <sys/fcntl.h>
6#include <sys/file.h>
7#include <sys/kauth.h>
8#include <sys/mount.h>
9#include <sys/msg.h>
10#include <sys/proc.h>
11#include <sys/socketvar.h>
12#include <sys/vnode.h>
13#include <security/mac.h>
14#include <security/mac_policy.h>
15
5ba3f43e 16#include <libkern/section_keywords.h>
0a7de745 17#include <libkern/OSDebug.h> /* OSBPrintBacktrace */
6d2010ae
A
18
19
20/* forward declaration; see bsd_init.c */
21errno_t check_policy_init(int);
22int get_thread_lock_count(thread_t th); /* forced forward */
23
24/*
25 * Policy flags used when the policy is enabled
26 *
27 * Note: CHECK_POLICY_CHECK is probably not very useful unless you
28 * are kernel debugging and set a breakpoint.
29 */
0a7de745
A
30#define CHECK_POLICY_CHECK 0x00000001 /* Check on calls */
31#define CHECK_POLICY_FAIL 0x00000002 /* EPERM on fails */
32#define CHECK_POLICY_BACKTRACE 0x00000004 /* Show call stack on fails */
33#define CHECK_POLICY_PANIC 0x00000008 /* Panic on fails */
34#define CHECK_POLICY_PERIODIC 0x00000010 /* Show fails periodically */
6d2010ae
A
35
36static int policy_flags = 0;
37
38
0a7de745 39#define CHECK_SET_HOOK(x) .mpo_##x = (mpo_##x##_t *)common_hook,
6d2010ae
A
40
41/*
42 * Init; currently, we only print our arrival notice.
43 */
44static void
45hook_policy_init(struct mac_policy_conf *mpc)
46{
47 printf("Policy '%s' = '%s' ready\n", mpc->mpc_name, mpc->mpc_fullname);
48}
49
50static void
51hook_policy_initbsd(struct mac_policy_conf *mpc)
52{
53 /* called with policy_grab_exclusive mutex held; exempt */
54 printf("hook_policy_initbsd: %s\n", mpc->mpc_name);
55}
56
57
58/* Implementation */
0a7de745
A
59#define CLASS_PERIOD_LIMIT 10000
60#define CLASS_PERIOD_MULT 20
6d2010ae
A
61
62static int policy_check_event = 1;
63static int policy_check_period = 1;
64static int policy_check_next = CLASS_PERIOD_MULT;
65
66
67static int
39236c6e 68common_hook(void)
6d2010ae 69{
0a7de745
A
70 int i;
71 int rv = 0;
6d2010ae
A
72
73 if ((i = get_thread_lock_count(current_thread())) != 0) {
74 /*
75 * fail the MACF check if we hold a lock; this assumes a
76 * a non-void (authorization) MACF hook.
77 */
0a7de745 78 if (policy_flags & CHECK_POLICY_FAIL) {
6d2010ae 79 rv = EPERM;
0a7de745 80 }
6d2010ae
A
81
82 /*
83 * display a backtrace if we hold a lock and we are not
84 * going to panic
85 */
86 if ((policy_flags & (CHECK_POLICY_BACKTRACE | CHECK_POLICY_PANIC)) == CHECK_POLICY_BACKTRACE) {
87 if (policy_flags & CHECK_POLICY_PERIODIC) {
0a7de745
A
88 /* at exponentially increasing intervals */
89 if (!(policy_check_event % policy_check_period)) {
90 if (policy_check_event <= policy_check_next || policy_check_period == CLASS_PERIOD_LIMIT) {
91 /*
92 * According to Derek, we could
93 * technically get a symbolicated name
94 * here, if we refactered some code
95 * and set the "keepsyms=1" boot
96 * argument...
97 */
98 OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event);
99 }
100 } else {
101 if (policy_check_period < CLASS_PERIOD_LIMIT) {
102 policy_check_next *= CLASS_PERIOD_MULT;
103 policy_check_period *= CLASS_PERIOD_MULT;
104 }
6d2010ae 105 }
6d2010ae
A
106 } else {
107 /* always */
108 OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event);
109 }
110 }
111
112 /* Panic */
0a7de745 113 if (policy_flags & CHECK_POLICY_PANIC) {
6d2010ae 114 panic("calling MACF hook with mutex count %d\n", i);
0a7de745 115 }
6d2010ae
A
116
117 /* count for non-fatal tracing */
118 policy_check_event++;
119 }
120
121 return rv;
122}
123
c3c9b80d 124#if (MAC_POLICY_OPS_VERSION != 74)
39236c6e
A
125# error "struct mac_policy_ops doesn't match definition in mac_policy.h"
126#endif
6d2010ae
A
127/*
128 * Policy hooks; one per possible hook
39236c6e
A
129 *
130 * Please note that this struct initialization should be kept in sync with
131 * security/mac_policy.h (mac_policy_ops struct definition).
6d2010ae 132 */
5ba3f43e 133const static struct mac_policy_ops policy_ops = {
39236c6e
A
134 CHECK_SET_HOOK(audit_check_postselect)
135 CHECK_SET_HOOK(audit_check_preselect)
136
f427ee49
A
137 .mpo_reserved01 = (mpo_reserved_hook_t *)common_hook,
138 .mpo_reserved02 = (mpo_reserved_hook_t *)common_hook,
139 .mpo_reserved03 = (mpo_reserved_hook_t *)common_hook,
140 .mpo_reserved04 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
141
142 CHECK_SET_HOOK(cred_check_label_update_execve)
143 CHECK_SET_HOOK(cred_check_label_update)
144 CHECK_SET_HOOK(cred_check_visible)
145 CHECK_SET_HOOK(cred_label_associate_fork)
146 CHECK_SET_HOOK(cred_label_associate_kernel)
147 CHECK_SET_HOOK(cred_label_associate)
148 CHECK_SET_HOOK(cred_label_associate_user)
149 CHECK_SET_HOOK(cred_label_destroy)
150 CHECK_SET_HOOK(cred_label_externalize_audit)
151 CHECK_SET_HOOK(cred_label_externalize)
152 CHECK_SET_HOOK(cred_label_init)
153 CHECK_SET_HOOK(cred_label_internalize)
154 CHECK_SET_HOOK(cred_label_update_execve)
155 CHECK_SET_HOOK(cred_label_update)
156
157 CHECK_SET_HOOK(devfs_label_associate_device)
158 CHECK_SET_HOOK(devfs_label_associate_directory)
159 CHECK_SET_HOOK(devfs_label_copy)
160 CHECK_SET_HOOK(devfs_label_destroy)
161 CHECK_SET_HOOK(devfs_label_init)
162 CHECK_SET_HOOK(devfs_label_update)
163
164 CHECK_SET_HOOK(file_check_change_offset)
165 CHECK_SET_HOOK(file_check_create)
166 CHECK_SET_HOOK(file_check_dup)
167 CHECK_SET_HOOK(file_check_fcntl)
168 CHECK_SET_HOOK(file_check_get_offset)
169 CHECK_SET_HOOK(file_check_get)
170 CHECK_SET_HOOK(file_check_inherit)
171 CHECK_SET_HOOK(file_check_ioctl)
172 CHECK_SET_HOOK(file_check_lock)
173 CHECK_SET_HOOK(file_check_mmap_downgrade)
174 CHECK_SET_HOOK(file_check_mmap)
175 CHECK_SET_HOOK(file_check_receive)
176 CHECK_SET_HOOK(file_check_set)
177 CHECK_SET_HOOK(file_label_init)
178 CHECK_SET_HOOK(file_label_destroy)
179 CHECK_SET_HOOK(file_label_associate)
f427ee49
A
180 CHECK_SET_HOOK(file_notify_close)
181
182 .mpo_reserved06 = (mpo_reserved_hook_t *)common_hook,
183 .mpo_reserved07 = (mpo_reserved_hook_t *)common_hook,
184 .mpo_reserved08 = (mpo_reserved_hook_t *)common_hook,
185 .mpo_reserved09 = (mpo_reserved_hook_t *)common_hook,
186 .mpo_reserved10 = (mpo_reserved_hook_t *)common_hook,
187 .mpo_reserved11 = (mpo_reserved_hook_t *)common_hook,
188 .mpo_reserved12 = (mpo_reserved_hook_t *)common_hook,
189 .mpo_reserved13 = (mpo_reserved_hook_t *)common_hook,
190 .mpo_reserved14 = (mpo_reserved_hook_t *)common_hook,
191 .mpo_reserved15 = (mpo_reserved_hook_t *)common_hook,
192 .mpo_reserved16 = (mpo_reserved_hook_t *)common_hook,
193 .mpo_reserved17 = (mpo_reserved_hook_t *)common_hook,
194 .mpo_reserved18 = (mpo_reserved_hook_t *)common_hook,
195 .mpo_reserved19 = (mpo_reserved_hook_t *)common_hook,
196 .mpo_reserved20 = (mpo_reserved_hook_t *)common_hook,
197 .mpo_reserved21 = (mpo_reserved_hook_t *)common_hook,
198 .mpo_reserved22 = (mpo_reserved_hook_t *)common_hook,
199 .mpo_reserved23 = (mpo_reserved_hook_t *)common_hook,
200 .mpo_reserved24 = (mpo_reserved_hook_t *)common_hook,
201 .mpo_reserved25 = (mpo_reserved_hook_t *)common_hook,
202 .mpo_reserved26 = (mpo_reserved_hook_t *)common_hook,
39236c6e 203
39037602
A
204 CHECK_SET_HOOK(file_check_library_validation)
205
206 CHECK_SET_HOOK(vnode_notify_setacl)
207 CHECK_SET_HOOK(vnode_notify_setattrlist)
208 CHECK_SET_HOOK(vnode_notify_setextattr)
209 CHECK_SET_HOOK(vnode_notify_setflags)
210 CHECK_SET_HOOK(vnode_notify_setmode)
211 CHECK_SET_HOOK(vnode_notify_setowner)
212 CHECK_SET_HOOK(vnode_notify_setutimes)
213 CHECK_SET_HOOK(vnode_notify_truncate)
39236c6e 214
f427ee49
A
215 .mpo_reserved27 = (mpo_reserved_hook_t *)common_hook,
216 .mpo_reserved28 = (mpo_reserved_hook_t *)common_hook,
217 .mpo_reserved29 = (mpo_reserved_hook_t *)common_hook,
218 .mpo_reserved30 = (mpo_reserved_hook_t *)common_hook,
219 .mpo_reserved31 = (mpo_reserved_hook_t *)common_hook,
220 .mpo_reserved32 = (mpo_reserved_hook_t *)common_hook,
221 .mpo_reserved33 = (mpo_reserved_hook_t *)common_hook,
222 .mpo_reserved34 = (mpo_reserved_hook_t *)common_hook,
223 .mpo_reserved35 = (mpo_reserved_hook_t *)common_hook,
224 .mpo_reserved36 = (mpo_reserved_hook_t *)common_hook,
225 .mpo_reserved37 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
226
227 CHECK_SET_HOOK(mount_check_fsctl)
228 CHECK_SET_HOOK(mount_check_getattr)
229 CHECK_SET_HOOK(mount_check_label_update)
230 CHECK_SET_HOOK(mount_check_mount)
231 CHECK_SET_HOOK(mount_check_remount)
232 CHECK_SET_HOOK(mount_check_setattr)
233 CHECK_SET_HOOK(mount_check_stat)
234 CHECK_SET_HOOK(mount_check_umount)
235 CHECK_SET_HOOK(mount_label_associate)
236 CHECK_SET_HOOK(mount_label_destroy)
237 CHECK_SET_HOOK(mount_label_externalize)
238 CHECK_SET_HOOK(mount_label_init)
239 CHECK_SET_HOOK(mount_label_internalize)
240
c3c9b80d
A
241 CHECK_SET_HOOK(proc_check_expose_task_with_flavor)
242 CHECK_SET_HOOK(proc_check_get_task_with_flavor)
243 CHECK_SET_HOOK(proc_check_task_id_token_get_task)
39236c6e
A
244
245 CHECK_SET_HOOK(pipe_check_ioctl)
246 CHECK_SET_HOOK(pipe_check_kqfilter)
f427ee49 247 .mpo_reserved41 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
248 CHECK_SET_HOOK(pipe_check_read)
249 CHECK_SET_HOOK(pipe_check_select)
250 CHECK_SET_HOOK(pipe_check_stat)
251 CHECK_SET_HOOK(pipe_check_write)
252 CHECK_SET_HOOK(pipe_label_associate)
f427ee49 253 .mpo_reserved42 = (mpo_reserved_hook_t *)common_hook,
39236c6e 254 CHECK_SET_HOOK(pipe_label_destroy)
f427ee49 255 .mpo_reserved43 = (mpo_reserved_hook_t *)common_hook,
39236c6e 256 CHECK_SET_HOOK(pipe_label_init)
f427ee49
A
257 .mpo_reserved44 = (mpo_reserved_hook_t *)common_hook,
258 .mpo_reserved45 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
259
260 CHECK_SET_HOOK(policy_destroy)
261 /* special hooks for policy init's */
6d2010ae
A
262 .mpo_policy_init = hook_policy_init,
263 .mpo_policy_initbsd = hook_policy_initbsd,
39236c6e
A
264 CHECK_SET_HOOK(policy_syscall)
265
fe8ab488
A
266 CHECK_SET_HOOK(system_check_sysctlbyname)
267 CHECK_SET_HOOK(proc_check_inherit_ipc_ports)
268 CHECK_SET_HOOK(vnode_check_rename)
3e170ce0 269 CHECK_SET_HOOK(kext_check_query)
d9a64523 270 CHECK_SET_HOOK(proc_notify_exec_complete)
f427ee49 271 CHECK_SET_HOOK(proc_notify_cs_invalidated)
cb323159 272 CHECK_SET_HOOK(proc_check_syscall_unix)
3e170ce0
A
273 CHECK_SET_HOOK(proc_check_expose_task)
274 CHECK_SET_HOOK(proc_check_set_host_special_port)
275 CHECK_SET_HOOK(proc_check_set_host_exception_port)
39037602
A
276 CHECK_SET_HOOK(exc_action_check_exception_send)
277 CHECK_SET_HOOK(exc_action_label_associate)
5ba3f43e 278 CHECK_SET_HOOK(exc_action_label_populate)
39037602
A
279 CHECK_SET_HOOK(exc_action_label_destroy)
280 CHECK_SET_HOOK(exc_action_label_init)
281 CHECK_SET_HOOK(exc_action_label_update)
282
527f9951 283 CHECK_SET_HOOK(vnode_check_trigger_resolve)
cb323159 284 CHECK_SET_HOOK(mount_check_mount_late)
ea3f0419 285 CHECK_SET_HOOK(mount_check_snapshot_mount)
f427ee49 286 CHECK_SET_HOOK(vnode_notify_reclaim)
5ba3f43e
A
287 CHECK_SET_HOOK(skywalk_flow_check_connect)
288 CHECK_SET_HOOK(skywalk_flow_check_listen)
39236c6e
A
289
290 CHECK_SET_HOOK(posixsem_check_create)
291 CHECK_SET_HOOK(posixsem_check_open)
292 CHECK_SET_HOOK(posixsem_check_post)
293 CHECK_SET_HOOK(posixsem_check_unlink)
294 CHECK_SET_HOOK(posixsem_check_wait)
295 CHECK_SET_HOOK(posixsem_label_associate)
296 CHECK_SET_HOOK(posixsem_label_destroy)
297 CHECK_SET_HOOK(posixsem_label_init)
298 CHECK_SET_HOOK(posixshm_check_create)
299 CHECK_SET_HOOK(posixshm_check_mmap)
300 CHECK_SET_HOOK(posixshm_check_open)
301 CHECK_SET_HOOK(posixshm_check_stat)
302 CHECK_SET_HOOK(posixshm_check_truncate)
303 CHECK_SET_HOOK(posixshm_check_unlink)
304 CHECK_SET_HOOK(posixshm_label_associate)
305 CHECK_SET_HOOK(posixshm_label_destroy)
306 CHECK_SET_HOOK(posixshm_label_init)
307
308 CHECK_SET_HOOK(proc_check_debug)
309 CHECK_SET_HOOK(proc_check_fork)
310 CHECK_SET_HOOK(proc_check_get_task_name)
311 CHECK_SET_HOOK(proc_check_get_task)
312 CHECK_SET_HOOK(proc_check_getaudit)
313 CHECK_SET_HOOK(proc_check_getauid)
314 CHECK_SET_HOOK(proc_check_getlcid)
315 CHECK_SET_HOOK(proc_check_mprotect)
316 CHECK_SET_HOOK(proc_check_sched)
317 CHECK_SET_HOOK(proc_check_setaudit)
318 CHECK_SET_HOOK(proc_check_setauid)
319 CHECK_SET_HOOK(proc_check_setlcid)
320 CHECK_SET_HOOK(proc_check_signal)
321 CHECK_SET_HOOK(proc_check_wait)
c6bf4f31 322 CHECK_SET_HOOK(proc_check_dump_core)
f427ee49 323 CHECK_SET_HOOK(proc_check_remote_thread_create)
39236c6e
A
324
325 CHECK_SET_HOOK(socket_check_accept)
326 CHECK_SET_HOOK(socket_check_accepted)
327 CHECK_SET_HOOK(socket_check_bind)
328 CHECK_SET_HOOK(socket_check_connect)
329 CHECK_SET_HOOK(socket_check_create)
f427ee49
A
330 .mpo_reserved46 = (mpo_reserved_hook_t *)common_hook,
331 .mpo_reserved47 = (mpo_reserved_hook_t *)common_hook,
332 .mpo_reserved48 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
333 CHECK_SET_HOOK(socket_check_listen)
334 CHECK_SET_HOOK(socket_check_receive)
335 CHECK_SET_HOOK(socket_check_received)
f427ee49 336 .mpo_reserved49 = (mpo_reserved_hook_t *)common_hook,
39236c6e
A
337 CHECK_SET_HOOK(socket_check_send)
338 CHECK_SET_HOOK(socket_check_stat)
339 CHECK_SET_HOOK(socket_check_setsockopt)
340 CHECK_SET_HOOK(socket_check_getsockopt)
f427ee49 341
c3c9b80d
A
342 CHECK_SET_HOOK(proc_check_get_movable_control_port)
343 CHECK_SET_HOOK(proc_check_dyld_process_info_notify_register)
f427ee49
A
344 .mpo_reserved52 = (mpo_reserved_hook_t *)common_hook,
345 .mpo_reserved53 = (mpo_reserved_hook_t *)common_hook,
346 .mpo_reserved54 = (mpo_reserved_hook_t *)common_hook,
347 .mpo_reserved55 = (mpo_reserved_hook_t *)common_hook,
348 .mpo_reserved56 = (mpo_reserved_hook_t *)common_hook,
349 .mpo_reserved57 = (mpo_reserved_hook_t *)common_hook,
350 .mpo_reserved58 = (mpo_reserved_hook_t *)common_hook,
351 .mpo_reserved59 = (mpo_reserved_hook_t *)common_hook,
352 .mpo_reserved60 = (mpo_reserved_hook_t *)common_hook,
353 .mpo_reserved61 = (mpo_reserved_hook_t *)common_hook,
c3c9b80d
A
354
355 CHECK_SET_HOOK(iokit_check_open_service)
39236c6e
A
356
357 CHECK_SET_HOOK(system_check_acct)
358 CHECK_SET_HOOK(system_check_audit)
359 CHECK_SET_HOOK(system_check_auditctl)
360 CHECK_SET_HOOK(system_check_auditon)
361 CHECK_SET_HOOK(system_check_host_priv)
362 CHECK_SET_HOOK(system_check_nfsd)
363 CHECK_SET_HOOK(system_check_reboot)
364 CHECK_SET_HOOK(system_check_settime)
365 CHECK_SET_HOOK(system_check_swapoff)
366 CHECK_SET_HOOK(system_check_swapon)
5ba3f43e 367 CHECK_SET_HOOK(socket_check_ioctl)
39236c6e
A
368
369 CHECK_SET_HOOK(sysvmsg_label_associate)
370 CHECK_SET_HOOK(sysvmsg_label_destroy)
371 CHECK_SET_HOOK(sysvmsg_label_init)
372 CHECK_SET_HOOK(sysvmsg_label_recycle)
373 CHECK_SET_HOOK(sysvmsq_check_enqueue)
374 CHECK_SET_HOOK(sysvmsq_check_msgrcv)
375 CHECK_SET_HOOK(sysvmsq_check_msgrmid)
376 CHECK_SET_HOOK(sysvmsq_check_msqctl)
377 CHECK_SET_HOOK(sysvmsq_check_msqget)
378 CHECK_SET_HOOK(sysvmsq_check_msqrcv)
379 CHECK_SET_HOOK(sysvmsq_check_msqsnd)
380 CHECK_SET_HOOK(sysvmsq_label_associate)
381 CHECK_SET_HOOK(sysvmsq_label_destroy)
382 CHECK_SET_HOOK(sysvmsq_label_init)
383 CHECK_SET_HOOK(sysvmsq_label_recycle)
384 CHECK_SET_HOOK(sysvsem_check_semctl)
385 CHECK_SET_HOOK(sysvsem_check_semget)
386 CHECK_SET_HOOK(sysvsem_check_semop)
387 CHECK_SET_HOOK(sysvsem_label_associate)
388 CHECK_SET_HOOK(sysvsem_label_destroy)
389 CHECK_SET_HOOK(sysvsem_label_init)
390 CHECK_SET_HOOK(sysvsem_label_recycle)
391 CHECK_SET_HOOK(sysvshm_check_shmat)
392 CHECK_SET_HOOK(sysvshm_check_shmctl)
393 CHECK_SET_HOOK(sysvshm_check_shmdt)
394 CHECK_SET_HOOK(sysvshm_check_shmget)
395 CHECK_SET_HOOK(sysvshm_label_associate)
396 CHECK_SET_HOOK(sysvshm_label_destroy)
397 CHECK_SET_HOOK(sysvshm_label_init)
398 CHECK_SET_HOOK(sysvshm_label_recycle)
399
5ba3f43e 400 CHECK_SET_HOOK(proc_notify_exit)
813fb2f6 401 CHECK_SET_HOOK(mount_check_snapshot_revert)
743345f9 402 CHECK_SET_HOOK(vnode_check_getattr)
39037602
A
403 CHECK_SET_HOOK(mount_check_snapshot_create)
404 CHECK_SET_HOOK(mount_check_snapshot_delete)
405 CHECK_SET_HOOK(vnode_check_clone)
7e41aa88
A
406 CHECK_SET_HOOK(proc_check_get_cs_info)
407 CHECK_SET_HOOK(proc_check_set_cs_info)
39236c6e
A
408
409 CHECK_SET_HOOK(iokit_check_hid_control)
410
411 CHECK_SET_HOOK(vnode_check_access)
412 CHECK_SET_HOOK(vnode_check_chdir)
413 CHECK_SET_HOOK(vnode_check_chroot)
414 CHECK_SET_HOOK(vnode_check_create)
415 CHECK_SET_HOOK(vnode_check_deleteextattr)
416 CHECK_SET_HOOK(vnode_check_exchangedata)
417 CHECK_SET_HOOK(vnode_check_exec)
418 CHECK_SET_HOOK(vnode_check_getattrlist)
419 CHECK_SET_HOOK(vnode_check_getextattr)
420 CHECK_SET_HOOK(vnode_check_ioctl)
421 CHECK_SET_HOOK(vnode_check_kqfilter)
422 CHECK_SET_HOOK(vnode_check_label_update)
423 CHECK_SET_HOOK(vnode_check_link)
424 CHECK_SET_HOOK(vnode_check_listextattr)
425 CHECK_SET_HOOK(vnode_check_lookup)
426 CHECK_SET_HOOK(vnode_check_open)
427 CHECK_SET_HOOK(vnode_check_read)
428 CHECK_SET_HOOK(vnode_check_readdir)
429 CHECK_SET_HOOK(vnode_check_readlink)
430 CHECK_SET_HOOK(vnode_check_rename_from)
431 CHECK_SET_HOOK(vnode_check_rename_to)
432 CHECK_SET_HOOK(vnode_check_revoke)
433 CHECK_SET_HOOK(vnode_check_select)
434 CHECK_SET_HOOK(vnode_check_setattrlist)
435 CHECK_SET_HOOK(vnode_check_setextattr)
436 CHECK_SET_HOOK(vnode_check_setflags)
437 CHECK_SET_HOOK(vnode_check_setmode)
438 CHECK_SET_HOOK(vnode_check_setowner)
439 CHECK_SET_HOOK(vnode_check_setutimes)
440 CHECK_SET_HOOK(vnode_check_stat)
441 CHECK_SET_HOOK(vnode_check_truncate)
442 CHECK_SET_HOOK(vnode_check_unlink)
443 CHECK_SET_HOOK(vnode_check_write)
444 CHECK_SET_HOOK(vnode_label_associate_devfs)
445 CHECK_SET_HOOK(vnode_label_associate_extattr)
446 CHECK_SET_HOOK(vnode_label_associate_file)
447 CHECK_SET_HOOK(vnode_label_associate_pipe)
448 CHECK_SET_HOOK(vnode_label_associate_posixsem)
449 CHECK_SET_HOOK(vnode_label_associate_posixshm)
450 CHECK_SET_HOOK(vnode_label_associate_singlelabel)
451 CHECK_SET_HOOK(vnode_label_associate_socket)
452 CHECK_SET_HOOK(vnode_label_copy)
453 CHECK_SET_HOOK(vnode_label_destroy)
454 CHECK_SET_HOOK(vnode_label_externalize_audit)
455 CHECK_SET_HOOK(vnode_label_externalize)
456 CHECK_SET_HOOK(vnode_label_init)
457 CHECK_SET_HOOK(vnode_label_internalize)
458 CHECK_SET_HOOK(vnode_label_recycle)
459 CHECK_SET_HOOK(vnode_label_store)
460 CHECK_SET_HOOK(vnode_label_update_extattr)
461 CHECK_SET_HOOK(vnode_label_update)
462 CHECK_SET_HOOK(vnode_notify_create)
463 CHECK_SET_HOOK(vnode_check_signature)
464 CHECK_SET_HOOK(vnode_check_uipc_bind)
465 CHECK_SET_HOOK(vnode_check_uipc_connect)
466
3e170ce0 467 CHECK_SET_HOOK(proc_check_run_cs_invalid)
39236c6e
A
468 CHECK_SET_HOOK(proc_check_suspend_resume)
469
470 CHECK_SET_HOOK(thread_userret)
471
472 CHECK_SET_HOOK(iokit_check_set_properties)
473
f427ee49 474 CHECK_SET_HOOK(vnode_check_supplemental_signature)
cb323159 475
39236c6e
A
476 CHECK_SET_HOOK(vnode_check_searchfs)
477
478 CHECK_SET_HOOK(priv_check)
479 CHECK_SET_HOOK(priv_grant)
480
481 CHECK_SET_HOOK(proc_check_map_anon)
482
483 CHECK_SET_HOOK(vnode_check_fsgetpath)
484
485 CHECK_SET_HOOK(iokit_check_open)
486
487 CHECK_SET_HOOK(proc_check_ledger)
488
489 CHECK_SET_HOOK(vnode_notify_rename)
490
39037602
A
491 CHECK_SET_HOOK(vnode_check_setacl)
492
493 CHECK_SET_HOOK(vnode_notify_deleteextattr)
39236c6e
A
494
495 CHECK_SET_HOOK(system_check_kas_info)
496
5ba3f43e 497 CHECK_SET_HOOK(vnode_check_lookup_preflight)
39236c6e
A
498
499 CHECK_SET_HOOK(vnode_notify_open)
500
501 CHECK_SET_HOOK(system_check_info)
502
503 CHECK_SET_HOOK(pty_notify_grant)
504 CHECK_SET_HOOK(pty_notify_close)
505
506 CHECK_SET_HOOK(vnode_find_sigs)
507
39236c6e
A
508 CHECK_SET_HOOK(kext_check_load)
509 CHECK_SET_HOOK(kext_check_unload)
510
511 CHECK_SET_HOOK(proc_check_proc_info)
512
513 CHECK_SET_HOOK(vnode_notify_link)
514
fe8ab488
A
515 CHECK_SET_HOOK(iokit_check_filter_properties)
516 CHECK_SET_HOOK(iokit_check_get_property)
6d2010ae
A
517};
518
519/*
520 * Policy definition
521 */
5ba3f43e 522static SECURITY_READ_ONLY_LATE(struct mac_policy_conf) policy_conf = {
6d2010ae
A
523 .mpc_name = "CHECK",
524 .mpc_fullname = "Check Assumptions Policy",
0a7de745
A
525 .mpc_field_off = NULL, /* no label slot */
526 .mpc_labelnames = NULL, /* no policy label names */
527 .mpc_labelname_count = 0, /* count of label names is 0 */
528 .mpc_ops = &policy_ops, /* policy operations */
6d2010ae
A
529 .mpc_loadtime_flags = 0,
530 .mpc_runtime_flags = 0,
531};
532
5ba3f43e 533static SECURITY_READ_ONLY_LATE(mac_policy_handle_t) policy_handle;
6d2010ae
A
534
535/*
536 * Init routine; for a loadable policy, this would be called during the KEXT
537 * initialization; we're going to call this from bsd_init() if the boot
538 * argument for checking is present.
539 */
540errno_t
541check_policy_init(int flags)
542{
543 /* Only instantiate the module if we have been asked to do checking */
0a7de745 544 if (!flags) {
6d2010ae 545 return 0;
0a7de745 546 }
6d2010ae
A
547
548 policy_flags = flags;
549
550 return mac_policy_register(&policy_conf, &policy_handle, NULL);
551}