557 lines
18 KiB
C
557 lines
18 KiB
C
|
#include <sys/param.h>
|
||
|
#include <sys/systm.h> /* XXX printf() */
|
||
|
|
||
|
#include <sys/types.h>
|
||
|
#include <sys/fcntl.h>
|
||
|
#include <sys/file.h>
|
||
|
#include <sys/kauth.h>
|
||
|
#include <sys/mount.h>
|
||
|
#include <sys/msg.h>
|
||
|
#include <sys/proc.h>
|
||
|
#include <sys/socketvar.h>
|
||
|
#include <sys/vnode.h>
|
||
|
#include <security/mac.h>
|
||
|
#include <security/mac_policy.h>
|
||
|
|
||
|
#include <libkern/section_keywords.h>
|
||
|
#include <libkern/OSDebug.h> /* OSBPrintBacktrace */
|
||
|
|
||
|
|
||
|
/* forward declaration; see bsd_init.c */
|
||
|
errno_t check_policy_init(int);
|
||
|
int get_thread_lock_count(thread_t th); /* forced forward */
|
||
|
|
||
|
/*
|
||
|
* Policy flags used when the policy is enabled
|
||
|
*
|
||
|
* Note: CHECK_POLICY_CHECK is probably not very useful unless you
|
||
|
* are kernel debugging and set a breakpoint.
|
||
|
*/
|
||
|
#define CHECK_POLICY_CHECK 0x00000001 /* Check on calls */
|
||
|
#define CHECK_POLICY_FAIL 0x00000002 /* EPERM on fails */
|
||
|
#define CHECK_POLICY_BACKTRACE 0x00000004 /* Show call stack on fails */
|
||
|
#define CHECK_POLICY_PANIC 0x00000008 /* Panic on fails */
|
||
|
#define CHECK_POLICY_PERIODIC 0x00000010 /* Show fails periodically */
|
||
|
|
||
|
static int policy_flags = 0;
|
||
|
|
||
|
|
||
|
#define CHECK_SET_HOOK(x) .mpo_##x = (mpo_##x##_t *)(void (*)(void))common_hook,
|
||
|
|
||
|
/*
|
||
|
* Init; currently, we only print our arrival notice.
|
||
|
*/
|
||
|
static void
|
||
|
hook_policy_init(struct mac_policy_conf *mpc)
|
||
|
{
|
||
|
printf("Policy '%s' = '%s' ready\n", mpc->mpc_name, mpc->mpc_fullname);
|
||
|
}
|
||
|
|
||
|
static void
|
||
|
hook_policy_initbsd(struct mac_policy_conf *mpc)
|
||
|
{
|
||
|
/* called with policy_grab_exclusive mutex held; exempt */
|
||
|
printf("hook_policy_initbsd: %s\n", mpc->mpc_name);
|
||
|
}
|
||
|
|
||
|
|
||
|
/* Implementation */
|
||
|
#define CLASS_PERIOD_LIMIT 10000
|
||
|
#define CLASS_PERIOD_MULT 20
|
||
|
|
||
|
static int policy_check_event = 1;
|
||
|
static int policy_check_period = 1;
|
||
|
static int policy_check_next = CLASS_PERIOD_MULT;
|
||
|
|
||
|
|
||
|
static int
|
||
|
common_hook(void)
|
||
|
{
|
||
|
int i;
|
||
|
int rv = 0;
|
||
|
|
||
|
if ((i = get_thread_lock_count(current_thread())) != 0) {
|
||
|
/*
|
||
|
* fail the MACF check if we hold a lock; this assumes a
|
||
|
* a non-void (authorization) MACF hook.
|
||
|
*/
|
||
|
if (policy_flags & CHECK_POLICY_FAIL) {
|
||
|
rv = EPERM;
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* display a backtrace if we hold a lock and we are not
|
||
|
* going to panic
|
||
|
*/
|
||
|
if ((policy_flags & (CHECK_POLICY_BACKTRACE | CHECK_POLICY_PANIC)) == CHECK_POLICY_BACKTRACE) {
|
||
|
if (policy_flags & CHECK_POLICY_PERIODIC) {
|
||
|
/* at exponentially increasing intervals */
|
||
|
if (!(policy_check_event % policy_check_period)) {
|
||
|
if (policy_check_event <= policy_check_next || policy_check_period == CLASS_PERIOD_LIMIT) {
|
||
|
/*
|
||
|
* According to Derek, we could
|
||
|
* technically get a symbolicated name
|
||
|
* here, if we refactered some code
|
||
|
* and set the "keepsyms=1" boot
|
||
|
* argument...
|
||
|
*/
|
||
|
OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event);
|
||
|
}
|
||
|
} else {
|
||
|
if (policy_check_period < CLASS_PERIOD_LIMIT) {
|
||
|
policy_check_next *= CLASS_PERIOD_MULT;
|
||
|
policy_check_period *= CLASS_PERIOD_MULT;
|
||
|
}
|
||
|
}
|
||
|
} else {
|
||
|
/* always */
|
||
|
OSReportWithBacktrace("calling MACF hook with mutex count %d (event %d) ", i, policy_check_event);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* Panic */
|
||
|
if (policy_flags & CHECK_POLICY_PANIC) {
|
||
|
panic("calling MACF hook with mutex count %d", i);
|
||
|
}
|
||
|
|
||
|
/* count for non-fatal tracing */
|
||
|
policy_check_event++;
|
||
|
}
|
||
|
|
||
|
return rv;
|
||
|
}
|
||
|
|
||
|
#if (MAC_POLICY_OPS_VERSION != 84)
|
||
|
# error "struct mac_policy_ops doesn't match definition in mac_policy.h"
|
||
|
#endif
|
||
|
/*
|
||
|
* Policy hooks; one per possible hook
|
||
|
*
|
||
|
* Please note that this struct initialization should be kept in sync with
|
||
|
* security/mac_policy.h (mac_policy_ops struct definition).
|
||
|
*/
|
||
|
const static struct mac_policy_ops policy_ops = {
|
||
|
CHECK_SET_HOOK(audit_check_postselect)
|
||
|
CHECK_SET_HOOK(audit_check_preselect)
|
||
|
|
||
|
.mpo_reserved01 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved02 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved03 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved04 = (mpo_reserved_hook_t *)common_hook,
|
||
|
|
||
|
CHECK_SET_HOOK(cred_check_label_update_execve)
|
||
|
CHECK_SET_HOOK(cred_check_label_update)
|
||
|
CHECK_SET_HOOK(cred_check_visible)
|
||
|
CHECK_SET_HOOK(cred_label_associate_fork)
|
||
|
CHECK_SET_HOOK(cred_label_associate_kernel)
|
||
|
CHECK_SET_HOOK(cred_label_associate)
|
||
|
CHECK_SET_HOOK(cred_label_associate_user)
|
||
|
CHECK_SET_HOOK(cred_label_destroy)
|
||
|
CHECK_SET_HOOK(cred_label_externalize_audit)
|
||
|
CHECK_SET_HOOK(cred_label_externalize)
|
||
|
CHECK_SET_HOOK(cred_label_init)
|
||
|
CHECK_SET_HOOK(cred_label_internalize)
|
||
|
CHECK_SET_HOOK(cred_label_update_execve)
|
||
|
CHECK_SET_HOOK(cred_label_update)
|
||
|
|
||
|
CHECK_SET_HOOK(devfs_label_associate_device)
|
||
|
CHECK_SET_HOOK(devfs_label_associate_directory)
|
||
|
CHECK_SET_HOOK(devfs_label_copy)
|
||
|
CHECK_SET_HOOK(devfs_label_destroy)
|
||
|
CHECK_SET_HOOK(devfs_label_init)
|
||
|
CHECK_SET_HOOK(devfs_label_update)
|
||
|
|
||
|
CHECK_SET_HOOK(file_check_change_offset)
|
||
|
CHECK_SET_HOOK(file_check_create)
|
||
|
CHECK_SET_HOOK(file_check_dup)
|
||
|
CHECK_SET_HOOK(file_check_fcntl)
|
||
|
CHECK_SET_HOOK(file_check_get_offset)
|
||
|
CHECK_SET_HOOK(file_check_get)
|
||
|
CHECK_SET_HOOK(file_check_inherit)
|
||
|
CHECK_SET_HOOK(file_check_ioctl)
|
||
|
CHECK_SET_HOOK(file_check_lock)
|
||
|
CHECK_SET_HOOK(file_check_mmap_downgrade)
|
||
|
CHECK_SET_HOOK(file_check_mmap)
|
||
|
CHECK_SET_HOOK(file_check_receive)
|
||
|
CHECK_SET_HOOK(file_check_set)
|
||
|
CHECK_SET_HOOK(file_label_init)
|
||
|
CHECK_SET_HOOK(file_label_destroy)
|
||
|
CHECK_SET_HOOK(file_label_associate)
|
||
|
CHECK_SET_HOOK(file_notify_close)
|
||
|
CHECK_SET_HOOK(proc_check_launch_constraints)
|
||
|
CHECK_SET_HOOK(proc_notify_service_port_derive)
|
||
|
|
||
|
.mpo_reserved08 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved09 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved10 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved11 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved12 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved13 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved14 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved15 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved16 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved17 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved18 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved19 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved20 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved21 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved22 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved23 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved24 = (mpo_reserved_hook_t *)common_hook,
|
||
|
|
||
|
CHECK_SET_HOOK(necp_check_open)
|
||
|
CHECK_SET_HOOK(necp_check_client_action)
|
||
|
|
||
|
CHECK_SET_HOOK(file_check_library_validation)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_notify_setacl)
|
||
|
CHECK_SET_HOOK(vnode_notify_setattrlist)
|
||
|
CHECK_SET_HOOK(vnode_notify_setextattr)
|
||
|
CHECK_SET_HOOK(vnode_notify_setflags)
|
||
|
CHECK_SET_HOOK(vnode_notify_setmode)
|
||
|
CHECK_SET_HOOK(vnode_notify_setowner)
|
||
|
CHECK_SET_HOOK(vnode_notify_setutimes)
|
||
|
CHECK_SET_HOOK(vnode_notify_truncate)
|
||
|
CHECK_SET_HOOK(vnode_check_getattrlistbulk)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_get_task_special_port)
|
||
|
CHECK_SET_HOOK(proc_check_set_task_special_port)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_notify_swap)
|
||
|
CHECK_SET_HOOK(vnode_notify_unlink)
|
||
|
|
||
|
.mpo_reserved32 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved33 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved34 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved35 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(vnode_check_copyfile)
|
||
|
|
||
|
CHECK_SET_HOOK(mount_check_quotactl)
|
||
|
CHECK_SET_HOOK(mount_check_fsctl)
|
||
|
CHECK_SET_HOOK(mount_check_getattr)
|
||
|
CHECK_SET_HOOK(mount_check_label_update)
|
||
|
CHECK_SET_HOOK(mount_check_mount)
|
||
|
CHECK_SET_HOOK(mount_check_remount)
|
||
|
CHECK_SET_HOOK(mount_check_setattr)
|
||
|
CHECK_SET_HOOK(mount_check_stat)
|
||
|
CHECK_SET_HOOK(mount_check_umount)
|
||
|
CHECK_SET_HOOK(mount_label_associate)
|
||
|
CHECK_SET_HOOK(mount_label_destroy)
|
||
|
CHECK_SET_HOOK(mount_label_externalize)
|
||
|
CHECK_SET_HOOK(mount_label_init)
|
||
|
CHECK_SET_HOOK(mount_label_internalize)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_expose_task_with_flavor)
|
||
|
CHECK_SET_HOOK(proc_check_get_task_with_flavor)
|
||
|
CHECK_SET_HOOK(proc_check_task_id_token_get_task)
|
||
|
|
||
|
CHECK_SET_HOOK(pipe_check_ioctl)
|
||
|
CHECK_SET_HOOK(pipe_check_kqfilter)
|
||
|
.mpo_reserved41 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(pipe_check_read)
|
||
|
CHECK_SET_HOOK(pipe_check_select)
|
||
|
CHECK_SET_HOOK(pipe_check_stat)
|
||
|
CHECK_SET_HOOK(pipe_check_write)
|
||
|
CHECK_SET_HOOK(pipe_label_associate)
|
||
|
.mpo_reserved42 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(pipe_label_destroy)
|
||
|
.mpo_reserved43 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(pipe_label_init)
|
||
|
.mpo_reserved44 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(proc_check_syscall_mac)
|
||
|
|
||
|
CHECK_SET_HOOK(policy_destroy)
|
||
|
/* special hooks for policy init's */
|
||
|
.mpo_policy_init = hook_policy_init,
|
||
|
.mpo_policy_initbsd = hook_policy_initbsd,
|
||
|
CHECK_SET_HOOK(policy_syscall)
|
||
|
|
||
|
CHECK_SET_HOOK(system_check_sysctlbyname)
|
||
|
CHECK_SET_HOOK(proc_check_inherit_ipc_ports)
|
||
|
CHECK_SET_HOOK(vnode_check_rename)
|
||
|
CHECK_SET_HOOK(kext_check_query)
|
||
|
CHECK_SET_HOOK(proc_notify_exec_complete)
|
||
|
CHECK_SET_HOOK(proc_notify_cs_invalidated)
|
||
|
CHECK_SET_HOOK(proc_check_syscall_unix)
|
||
|
.mpo_reserved45 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(proc_check_set_host_special_port)
|
||
|
CHECK_SET_HOOK(proc_check_set_host_exception_port)
|
||
|
CHECK_SET_HOOK(exc_action_check_exception_send)
|
||
|
CHECK_SET_HOOK(exc_action_label_associate)
|
||
|
CHECK_SET_HOOK(exc_action_label_populate)
|
||
|
CHECK_SET_HOOK(exc_action_label_destroy)
|
||
|
CHECK_SET_HOOK(exc_action_label_init)
|
||
|
CHECK_SET_HOOK(exc_action_label_update)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_trigger_resolve)
|
||
|
CHECK_SET_HOOK(mount_check_mount_late)
|
||
|
CHECK_SET_HOOK(mount_check_snapshot_mount)
|
||
|
CHECK_SET_HOOK(vnode_notify_reclaim)
|
||
|
CHECK_SET_HOOK(skywalk_flow_check_connect)
|
||
|
CHECK_SET_HOOK(skywalk_flow_check_listen)
|
||
|
|
||
|
CHECK_SET_HOOK(posixsem_check_create)
|
||
|
CHECK_SET_HOOK(posixsem_check_open)
|
||
|
CHECK_SET_HOOK(posixsem_check_post)
|
||
|
CHECK_SET_HOOK(posixsem_check_unlink)
|
||
|
CHECK_SET_HOOK(posixsem_check_wait)
|
||
|
CHECK_SET_HOOK(posixsem_label_associate)
|
||
|
CHECK_SET_HOOK(posixsem_label_destroy)
|
||
|
CHECK_SET_HOOK(posixsem_label_init)
|
||
|
CHECK_SET_HOOK(posixshm_check_create)
|
||
|
CHECK_SET_HOOK(posixshm_check_mmap)
|
||
|
CHECK_SET_HOOK(posixshm_check_open)
|
||
|
CHECK_SET_HOOK(posixshm_check_stat)
|
||
|
CHECK_SET_HOOK(posixshm_check_truncate)
|
||
|
CHECK_SET_HOOK(posixshm_check_unlink)
|
||
|
CHECK_SET_HOOK(posixshm_label_associate)
|
||
|
CHECK_SET_HOOK(posixshm_label_destroy)
|
||
|
CHECK_SET_HOOK(posixshm_label_init)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_debug)
|
||
|
CHECK_SET_HOOK(proc_check_fork)
|
||
|
.mpo_reserved61 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved62 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(proc_check_getaudit)
|
||
|
CHECK_SET_HOOK(proc_check_getauid)
|
||
|
.mpo_reserved63 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(proc_check_mprotect)
|
||
|
CHECK_SET_HOOK(proc_check_sched)
|
||
|
CHECK_SET_HOOK(proc_check_setaudit)
|
||
|
CHECK_SET_HOOK(proc_check_setauid)
|
||
|
.mpo_reserved64 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(proc_check_signal)
|
||
|
CHECK_SET_HOOK(proc_check_wait)
|
||
|
CHECK_SET_HOOK(proc_check_dump_core)
|
||
|
CHECK_SET_HOOK(proc_check_remote_thread_create)
|
||
|
|
||
|
CHECK_SET_HOOK(socket_check_accept)
|
||
|
CHECK_SET_HOOK(socket_check_accepted)
|
||
|
CHECK_SET_HOOK(socket_check_bind)
|
||
|
CHECK_SET_HOOK(socket_check_connect)
|
||
|
CHECK_SET_HOOK(socket_check_create)
|
||
|
.mpo_reserved46 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved47 = (mpo_reserved_hook_t *)common_hook,
|
||
|
.mpo_reserved48 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(socket_check_listen)
|
||
|
CHECK_SET_HOOK(socket_check_receive)
|
||
|
CHECK_SET_HOOK(socket_check_received)
|
||
|
.mpo_reserved49 = (mpo_reserved_hook_t *)common_hook,
|
||
|
CHECK_SET_HOOK(socket_check_send)
|
||
|
CHECK_SET_HOOK(socket_check_stat)
|
||
|
CHECK_SET_HOOK(socket_check_setsockopt)
|
||
|
CHECK_SET_HOOK(socket_check_getsockopt)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_get_movable_control_port)
|
||
|
CHECK_SET_HOOK(proc_check_dyld_process_info_notify_register)
|
||
|
CHECK_SET_HOOK(proc_check_setuid)
|
||
|
CHECK_SET_HOOK(proc_check_seteuid)
|
||
|
CHECK_SET_HOOK(proc_check_setreuid)
|
||
|
CHECK_SET_HOOK(proc_check_setgid)
|
||
|
CHECK_SET_HOOK(proc_check_setegid)
|
||
|
CHECK_SET_HOOK(proc_check_setregid)
|
||
|
CHECK_SET_HOOK(proc_check_settid)
|
||
|
CHECK_SET_HOOK(proc_check_memorystatus_control)
|
||
|
|
||
|
.mpo_reserved60 = (mpo_reserved_hook_t *)common_hook,
|
||
|
|
||
|
CHECK_SET_HOOK(thread_telemetry)
|
||
|
|
||
|
CHECK_SET_HOOK(iokit_check_open_service)
|
||
|
|
||
|
CHECK_SET_HOOK(system_check_acct)
|
||
|
CHECK_SET_HOOK(system_check_audit)
|
||
|
CHECK_SET_HOOK(system_check_auditctl)
|
||
|
CHECK_SET_HOOK(system_check_auditon)
|
||
|
CHECK_SET_HOOK(system_check_host_priv)
|
||
|
CHECK_SET_HOOK(system_check_nfsd)
|
||
|
CHECK_SET_HOOK(system_check_reboot)
|
||
|
CHECK_SET_HOOK(system_check_settime)
|
||
|
CHECK_SET_HOOK(system_check_swapoff)
|
||
|
CHECK_SET_HOOK(system_check_swapon)
|
||
|
CHECK_SET_HOOK(socket_check_ioctl)
|
||
|
|
||
|
CHECK_SET_HOOK(sysvmsg_label_associate)
|
||
|
CHECK_SET_HOOK(sysvmsg_label_destroy)
|
||
|
CHECK_SET_HOOK(sysvmsg_label_init)
|
||
|
CHECK_SET_HOOK(sysvmsg_label_recycle)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_enqueue)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_msgrcv)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_msgrmid)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_msqctl)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_msqget)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_msqrcv)
|
||
|
CHECK_SET_HOOK(sysvmsq_check_msqsnd)
|
||
|
CHECK_SET_HOOK(sysvmsq_label_associate)
|
||
|
CHECK_SET_HOOK(sysvmsq_label_destroy)
|
||
|
CHECK_SET_HOOK(sysvmsq_label_init)
|
||
|
CHECK_SET_HOOK(sysvmsq_label_recycle)
|
||
|
CHECK_SET_HOOK(sysvsem_check_semctl)
|
||
|
CHECK_SET_HOOK(sysvsem_check_semget)
|
||
|
CHECK_SET_HOOK(sysvsem_check_semop)
|
||
|
CHECK_SET_HOOK(sysvsem_label_associate)
|
||
|
CHECK_SET_HOOK(sysvsem_label_destroy)
|
||
|
CHECK_SET_HOOK(sysvsem_label_init)
|
||
|
CHECK_SET_HOOK(sysvsem_label_recycle)
|
||
|
CHECK_SET_HOOK(sysvshm_check_shmat)
|
||
|
CHECK_SET_HOOK(sysvshm_check_shmctl)
|
||
|
CHECK_SET_HOOK(sysvshm_check_shmdt)
|
||
|
CHECK_SET_HOOK(sysvshm_check_shmget)
|
||
|
CHECK_SET_HOOK(sysvshm_label_associate)
|
||
|
CHECK_SET_HOOK(sysvshm_label_destroy)
|
||
|
CHECK_SET_HOOK(sysvshm_label_init)
|
||
|
CHECK_SET_HOOK(sysvshm_label_recycle)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_notify_exit)
|
||
|
CHECK_SET_HOOK(mount_check_snapshot_revert)
|
||
|
CHECK_SET_HOOK(vnode_check_getattr)
|
||
|
CHECK_SET_HOOK(mount_check_snapshot_create)
|
||
|
CHECK_SET_HOOK(mount_check_snapshot_delete)
|
||
|
CHECK_SET_HOOK(vnode_check_clone)
|
||
|
CHECK_SET_HOOK(proc_check_get_cs_info)
|
||
|
CHECK_SET_HOOK(proc_check_set_cs_info)
|
||
|
|
||
|
CHECK_SET_HOOK(iokit_check_hid_control)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_access)
|
||
|
CHECK_SET_HOOK(vnode_check_chdir)
|
||
|
CHECK_SET_HOOK(vnode_check_chroot)
|
||
|
CHECK_SET_HOOK(vnode_check_create)
|
||
|
CHECK_SET_HOOK(vnode_check_deleteextattr)
|
||
|
CHECK_SET_HOOK(vnode_check_exchangedata)
|
||
|
CHECK_SET_HOOK(vnode_check_exec)
|
||
|
CHECK_SET_HOOK(vnode_check_getattrlist)
|
||
|
CHECK_SET_HOOK(vnode_check_getextattr)
|
||
|
CHECK_SET_HOOK(vnode_check_ioctl)
|
||
|
CHECK_SET_HOOK(vnode_check_kqfilter)
|
||
|
CHECK_SET_HOOK(vnode_check_label_update)
|
||
|
CHECK_SET_HOOK(vnode_check_link)
|
||
|
CHECK_SET_HOOK(vnode_check_listextattr)
|
||
|
CHECK_SET_HOOK(vnode_check_lookup)
|
||
|
CHECK_SET_HOOK(vnode_check_open)
|
||
|
CHECK_SET_HOOK(vnode_check_read)
|
||
|
CHECK_SET_HOOK(vnode_check_readdir)
|
||
|
CHECK_SET_HOOK(vnode_check_readlink)
|
||
|
CHECK_SET_HOOK(vnode_check_rename_from)
|
||
|
CHECK_SET_HOOK(vnode_check_rename_to)
|
||
|
CHECK_SET_HOOK(vnode_check_revoke)
|
||
|
CHECK_SET_HOOK(vnode_check_select)
|
||
|
CHECK_SET_HOOK(vnode_check_setattrlist)
|
||
|
CHECK_SET_HOOK(vnode_check_setextattr)
|
||
|
CHECK_SET_HOOK(vnode_check_setflags)
|
||
|
CHECK_SET_HOOK(vnode_check_setmode)
|
||
|
CHECK_SET_HOOK(vnode_check_setowner)
|
||
|
CHECK_SET_HOOK(vnode_check_setutimes)
|
||
|
CHECK_SET_HOOK(vnode_check_stat)
|
||
|
CHECK_SET_HOOK(vnode_check_truncate)
|
||
|
CHECK_SET_HOOK(vnode_check_unlink)
|
||
|
CHECK_SET_HOOK(vnode_check_write)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_devfs)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_extattr)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_file)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_pipe)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_posixsem)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_posixshm)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_singlelabel)
|
||
|
CHECK_SET_HOOK(vnode_label_associate_socket)
|
||
|
CHECK_SET_HOOK(vnode_label_copy)
|
||
|
CHECK_SET_HOOK(vnode_label_destroy)
|
||
|
CHECK_SET_HOOK(vnode_label_externalize_audit)
|
||
|
CHECK_SET_HOOK(vnode_label_externalize)
|
||
|
CHECK_SET_HOOK(vnode_label_init)
|
||
|
CHECK_SET_HOOK(vnode_label_internalize)
|
||
|
CHECK_SET_HOOK(vnode_label_recycle)
|
||
|
CHECK_SET_HOOK(vnode_label_store)
|
||
|
CHECK_SET_HOOK(vnode_label_update_extattr)
|
||
|
CHECK_SET_HOOK(vnode_label_update)
|
||
|
CHECK_SET_HOOK(vnode_notify_create)
|
||
|
CHECK_SET_HOOK(vnode_check_signature)
|
||
|
CHECK_SET_HOOK(vnode_check_uipc_bind)
|
||
|
CHECK_SET_HOOK(vnode_check_uipc_connect)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_run_cs_invalid)
|
||
|
CHECK_SET_HOOK(proc_check_suspend_resume)
|
||
|
|
||
|
CHECK_SET_HOOK(thread_userret)
|
||
|
|
||
|
CHECK_SET_HOOK(iokit_check_set_properties)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_supplemental_signature)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_searchfs)
|
||
|
|
||
|
CHECK_SET_HOOK(priv_check)
|
||
|
CHECK_SET_HOOK(priv_grant)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_map_anon)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_fsgetpath)
|
||
|
|
||
|
CHECK_SET_HOOK(iokit_check_open)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_ledger)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_notify_rename)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_setacl)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_notify_deleteextattr)
|
||
|
|
||
|
CHECK_SET_HOOK(system_check_kas_info)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_check_lookup_preflight)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_notify_open)
|
||
|
|
||
|
CHECK_SET_HOOK(system_check_info)
|
||
|
|
||
|
CHECK_SET_HOOK(pty_notify_grant)
|
||
|
CHECK_SET_HOOK(pty_notify_close)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_find_sigs)
|
||
|
|
||
|
CHECK_SET_HOOK(kext_check_load)
|
||
|
CHECK_SET_HOOK(kext_check_unload)
|
||
|
|
||
|
CHECK_SET_HOOK(proc_check_proc_info)
|
||
|
|
||
|
CHECK_SET_HOOK(vnode_notify_link)
|
||
|
|
||
|
CHECK_SET_HOOK(iokit_check_filter_properties)
|
||
|
CHECK_SET_HOOK(iokit_check_get_property)
|
||
|
};
|
||
|
|
||
|
/*
|
||
|
* Policy definition
|
||
|
*/
|
||
|
static SECURITY_READ_ONLY_LATE(struct mac_policy_conf) policy_conf = {
|
||
|
.mpc_name = "CHECK",
|
||
|
.mpc_fullname = "Check Assumptions Policy",
|
||
|
.mpc_field_off = NULL, /* no label slot */
|
||
|
.mpc_labelnames = NULL, /* no policy label names */
|
||
|
.mpc_labelname_count = 0, /* count of label names is 0 */
|
||
|
.mpc_ops = &policy_ops, /* policy operations */
|
||
|
.mpc_loadtime_flags = 0,
|
||
|
.mpc_runtime_flags = 0,
|
||
|
};
|
||
|
|
||
|
static SECURITY_READ_ONLY_LATE(mac_policy_handle_t) policy_handle;
|
||
|
|
||
|
/*
|
||
|
* Init routine; for a loadable policy, this would be called during the KEXT
|
||
|
* initialization; we're going to call this from bsd_init() if the boot
|
||
|
* argument for checking is present.
|
||
|
*/
|
||
|
errno_t
|
||
|
check_policy_init(int flags)
|
||
|
{
|
||
|
/* Only instantiate the module if we have been asked to do checking */
|
||
|
if (!flags) {
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
policy_flags = flags;
|
||
|
|
||
|
return mac_policy_register(&policy_conf, &policy_handle, NULL);
|
||
|
}
|