Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/sys/security/mac/mac_framework.c
39476 views
1
/*-
2
* Copyright (c) 1999-2002, 2006, 2009 Robert N. M. Watson
3
* Copyright (c) 2001 Ilmar S. Habibulin
4
* Copyright (c) 2001-2005 Networks Associates Technology, Inc.
5
* Copyright (c) 2005-2006 SPARTA, Inc.
6
* Copyright (c) 2008-2009 Apple Inc.
7
* All rights reserved.
8
*
9
* This software was developed by Robert Watson and Ilmar Habibulin for the
10
* TrustedBSD Project.
11
*
12
* This software was developed for the FreeBSD Project in part by Network
13
* Associates Laboratories, the Security Research Division of Network
14
* Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
15
* as part of the DARPA CHATS research program.
16
*
17
* This software was enhanced by SPARTA ISSO under SPAWAR contract
18
* N66001-04-C-6019 ("SEFOS").
19
*
20
* This software was developed at the University of Cambridge Computer
21
* Laboratory with support from a grant from Google, Inc.
22
*
23
* Redistribution and use in source and binary forms, with or without
24
* modification, are permitted provided that the following conditions
25
* are met:
26
* 1. Redistributions of source code must retain the above copyright
27
* notice, this list of conditions and the following disclaimer.
28
* 2. Redistributions in binary form must reproduce the above copyright
29
* notice, this list of conditions and the following disclaimer in the
30
* documentation and/or other materials provided with the distribution.
31
*
32
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
33
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
34
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
35
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
36
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
37
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
38
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
40
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
41
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
42
* SUCH DAMAGE.
43
*/
44
45
/*-
46
* Framework for extensible kernel access control. This file contains core
47
* kernel infrastructure for the TrustedBSD MAC Framework, including policy
48
* registration, versioning, locking, error composition operator, and system
49
* calls.
50
*
51
* The MAC Framework implements three programming interfaces:
52
*
53
* - The kernel MAC interface, defined in mac_framework.h, and invoked
54
* throughout the kernel to request security decisions, notify of security
55
* related events, etc.
56
*
57
* - The MAC policy module interface, defined in mac_policy.h, which is
58
* implemented by MAC policy modules and invoked by the MAC Framework to
59
* forward kernel security requests and notifications to policy modules.
60
*
61
* - The user MAC API, defined in mac.h, which allows user programs to query
62
* and set label state on objects.
63
*
64
* The majority of the MAC Framework implementation may be found in
65
* src/sys/security/mac. Sample policy modules may be found in
66
* src/sys/security/mac_*.
67
*/
68
69
#include "opt_mac.h"
70
71
#include <sys/param.h>
72
#include <sys/systm.h>
73
#include <sys/condvar.h>
74
#include <sys/jail.h>
75
#include <sys/kernel.h>
76
#include <sys/lock.h>
77
#include <sys/mac.h>
78
#include <sys/module.h>
79
#include <sys/rmlock.h>
80
#include <sys/sdt.h>
81
#include <sys/sx.h>
82
#include <sys/sysctl.h>
83
#include <sys/vnode.h>
84
85
#include <security/mac/mac_framework.h>
86
#include <security/mac/mac_internal.h>
87
#include <security/mac/mac_policy.h>
88
89
/*
90
* DTrace SDT providers for MAC.
91
*/
92
SDT_PROVIDER_DEFINE(mac);
93
SDT_PROVIDER_DEFINE(mac_framework);
94
95
SDT_PROBE_DEFINE2(mac, , policy, modevent, "int",
96
"struct mac_policy_conf *");
97
SDT_PROBE_DEFINE1(mac, , policy, register,
98
"struct mac_policy_conf *");
99
SDT_PROBE_DEFINE1(mac, , policy, unregister,
100
"struct mac_policy_conf *");
101
102
/*
103
* Root sysctl node for all MAC and MAC policy controls.
104
*/
105
SYSCTL_NODE(_security, OID_AUTO, mac, CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
106
"TrustedBSD MAC policy controls");
107
108
/*
109
* Root sysctl node for MAC modules' jail parameters.
110
*/
111
SYSCTL_JAIL_PARAM_NODE(mac, "Jail parameters for MAC policy controls");
112
113
/*
114
* Declare that the kernel provides a specific version of MAC support.
115
* This permits modules to refuse to be loaded if the necessary support isn't
116
* present, even if it's pre-boot.
117
*/
118
MODULE_VERSION(kernel_mac_support, MAC_VERSION);
119
120
static unsigned int mac_version = MAC_VERSION;
121
SYSCTL_UINT(_security_mac, OID_AUTO, version, CTLFLAG_RD, &mac_version, 0,
122
"");
123
124
/*
125
* Flags for inlined checks. Note this would be best hotpatched at runtime.
126
* The following is a band-aid.
127
*
128
* Use FPFLAG for hooks running in commonly executed paths and FPFLAG_RARE
129
* for the rest.
130
*/
131
#define FPFLAG(f) \
132
bool __read_frequently mac_##f##_fp_flag
133
134
#define FPFLAG_RARE(f) \
135
bool __read_mostly mac_##f##_fp_flag
136
137
FPFLAG(priv_check);
138
FPFLAG(priv_grant);
139
FPFLAG(vnode_check_lookup);
140
FPFLAG(vnode_check_open);
141
FPFLAG(vnode_check_stat);
142
FPFLAG(vnode_check_read);
143
FPFLAG(vnode_check_write);
144
FPFLAG(vnode_check_mmap);
145
FPFLAG_RARE(vnode_check_poll);
146
FPFLAG_RARE(vnode_check_rename_from);
147
FPFLAG_RARE(vnode_check_access);
148
FPFLAG_RARE(vnode_check_readlink);
149
FPFLAG_RARE(pipe_check_stat);
150
FPFLAG_RARE(pipe_check_poll);
151
FPFLAG_RARE(pipe_check_read);
152
FPFLAG_RARE(ifnet_create_mbuf);
153
FPFLAG_RARE(ifnet_check_transmit);
154
155
#undef FPFLAG
156
#undef FPFLAG_RARE
157
158
/*
159
* Labels consist of a indexed set of "slots", which are allocated policies
160
* as required. The MAC Framework maintains a bitmask of slots allocated so
161
* far to prevent reuse. Slots cannot be reused, as the MAC Framework
162
* guarantees that newly allocated slots in labels will be NULL unless
163
* otherwise initialized, and because we do not have a mechanism to garbage
164
* collect slots on policy unload. As labeled policies tend to be statically
165
* loaded during boot, and not frequently unloaded and reloaded, this is not
166
* generally an issue.
167
*/
168
#if MAC_MAX_SLOTS > 32
169
#error "MAC_MAX_SLOTS too large"
170
#endif
171
172
static unsigned int mac_max_slots = MAC_MAX_SLOTS;
173
static unsigned int mac_slot_offsets_free = (1 << MAC_MAX_SLOTS) - 1;
174
SYSCTL_UINT(_security_mac, OID_AUTO, max_slots, CTLFLAG_RD, &mac_max_slots,
175
0, "");
176
177
/*
178
* Has the kernel started generating labeled objects yet? All read/write
179
* access to this variable is serialized during the boot process. Following
180
* the end of serialization, we don't update this flag; no locking.
181
*/
182
static int mac_late = 0;
183
184
/*
185
* Each policy declares a mask of object types requiring labels to be
186
* allocated for them. For convenience, we combine and cache the bitwise or
187
* of the per-policy object flags to track whether we will allocate a label
188
* for an object type at run-time.
189
*/
190
uint64_t mac_labeled;
191
SYSCTL_UQUAD(_security_mac, OID_AUTO, labeled, CTLFLAG_RD, &mac_labeled, 0,
192
"Mask of object types being labeled");
193
194
MALLOC_DEFINE(M_MACTEMP, "mactemp", "MAC temporary label storage");
195
196
/*
197
* MAC policy modules are placed in one of two lists: mac_static_policy_list,
198
* for policies that are loaded early and cannot be unloaded, and
199
* mac_policy_list, which holds policies either loaded later in the boot
200
* cycle or that may be unloaded. The static policy list does not require
201
* locks to iterate over, but the dynamic list requires synchronization.
202
* Support for dynamic policy loading can be compiled out using the
203
* MAC_STATIC kernel option.
204
*
205
* The dynamic policy list is protected by two locks: modifying the list
206
* requires both locks to be held exclusively. One of the locks,
207
* mac_policy_rm, is acquired over policy entry points that will never sleep;
208
* the other, mac_policy_rms, is acquired over policy entry points that may
209
* sleep. The former category will be used when kernel locks may be held
210
* over calls to the MAC Framework, during network processing in ithreads,
211
* etc. The latter will tend to involve potentially blocking memory
212
* allocations, extended attribute I/O, etc.
213
*/
214
#ifndef MAC_STATIC
215
static struct rmlock mac_policy_rm; /* Non-sleeping entry points. */
216
static struct rmslock mac_policy_rms; /* Sleeping entry points. */
217
#endif
218
219
struct mac_policy_list_head mac_policy_list;
220
struct mac_policy_list_head mac_static_policy_list;
221
u_int mac_policy_count; /* Registered policy count. */
222
223
static void mac_policy_xlock(void);
224
static void mac_policy_xlock_assert(void);
225
static void mac_policy_xunlock(void);
226
227
void
228
mac_policy_slock_nosleep(struct rm_priotracker *tracker)
229
{
230
231
#ifndef MAC_STATIC
232
if (!mac_late)
233
return;
234
235
rm_rlock(&mac_policy_rm, tracker);
236
#endif
237
}
238
239
void
240
mac_policy_slock_sleep(void)
241
{
242
243
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
244
"mac_policy_slock_sleep");
245
246
#ifndef MAC_STATIC
247
if (!mac_late)
248
return;
249
250
rms_rlock(&mac_policy_rms);
251
#endif
252
}
253
254
void
255
mac_policy_sunlock_nosleep(struct rm_priotracker *tracker)
256
{
257
258
#ifndef MAC_STATIC
259
if (!mac_late)
260
return;
261
262
rm_runlock(&mac_policy_rm, tracker);
263
#endif
264
}
265
266
void
267
mac_policy_sunlock_sleep(void)
268
{
269
270
#ifndef MAC_STATIC
271
if (!mac_late)
272
return;
273
274
rms_runlock(&mac_policy_rms);
275
#endif
276
}
277
278
static void
279
mac_policy_xlock(void)
280
{
281
282
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
283
"mac_policy_xlock()");
284
285
#ifndef MAC_STATIC
286
if (!mac_late)
287
return;
288
289
rms_wlock(&mac_policy_rms);
290
rm_wlock(&mac_policy_rm);
291
#endif
292
}
293
294
static void
295
mac_policy_xunlock(void)
296
{
297
298
#ifndef MAC_STATIC
299
if (!mac_late)
300
return;
301
302
rm_wunlock(&mac_policy_rm);
303
rms_wunlock(&mac_policy_rms);
304
#endif
305
}
306
307
static void
308
mac_policy_xlock_assert(void)
309
{
310
311
#ifndef MAC_STATIC
312
if (!mac_late)
313
return;
314
315
rm_assert(&mac_policy_rm, RA_WLOCKED);
316
#endif
317
}
318
319
/*
320
* Initialize the MAC subsystem, including appropriate SMP locks.
321
*/
322
static void
323
mac_init(void)
324
{
325
326
LIST_INIT(&mac_static_policy_list);
327
LIST_INIT(&mac_policy_list);
328
mac_labelzone_init();
329
330
#ifndef MAC_STATIC
331
rm_init_flags(&mac_policy_rm, "mac_policy_rm", RM_NOWITNESS |
332
RM_RECURSE);
333
rms_init(&mac_policy_rms, "mac_policy_rms");
334
#endif
335
}
336
337
/*
338
* For the purposes of modules that want to know if they were loaded "early",
339
* set the mac_late flag once we've processed modules either linked into the
340
* kernel, or loaded before the kernel startup.
341
*/
342
static void
343
mac_late_init(void)
344
{
345
346
mac_late = 1;
347
}
348
349
/*
350
* Given a policy, derive from its set of non-NULL label init methods what
351
* object types the policy is interested in.
352
*/
353
static uint64_t
354
mac_policy_getlabeled(struct mac_policy_conf *mpc)
355
{
356
uint64_t labeled;
357
358
#define MPC_FLAG(method, flag) \
359
if (mpc->mpc_ops->mpo_ ## method != NULL) \
360
labeled |= (flag); \
361
362
labeled = 0;
363
MPC_FLAG(cred_init_label, MPC_OBJECT_CRED);
364
MPC_FLAG(proc_init_label, MPC_OBJECT_PROC);
365
MPC_FLAG(vnode_init_label, MPC_OBJECT_VNODE);
366
MPC_FLAG(inpcb_init_label, MPC_OBJECT_INPCB);
367
MPC_FLAG(socket_init_label, MPC_OBJECT_SOCKET);
368
MPC_FLAG(devfs_init_label, MPC_OBJECT_DEVFS);
369
MPC_FLAG(mbuf_init_label, MPC_OBJECT_MBUF);
370
MPC_FLAG(ipq_init_label, MPC_OBJECT_IPQ);
371
MPC_FLAG(ifnet_init_label, MPC_OBJECT_IFNET);
372
MPC_FLAG(bpfdesc_init_label, MPC_OBJECT_BPFDESC);
373
MPC_FLAG(pipe_init_label, MPC_OBJECT_PIPE);
374
MPC_FLAG(mount_init_label, MPC_OBJECT_MOUNT);
375
MPC_FLAG(posixsem_init_label, MPC_OBJECT_POSIXSEM);
376
MPC_FLAG(posixshm_init_label, MPC_OBJECT_POSIXSHM);
377
MPC_FLAG(sysvmsg_init_label, MPC_OBJECT_SYSVMSG);
378
MPC_FLAG(sysvmsq_init_label, MPC_OBJECT_SYSVMSQ);
379
MPC_FLAG(sysvsem_init_label, MPC_OBJECT_SYSVSEM);
380
MPC_FLAG(sysvshm_init_label, MPC_OBJECT_SYSVSHM);
381
MPC_FLAG(syncache_init_label, MPC_OBJECT_SYNCACHE);
382
MPC_FLAG(ip6q_init_label, MPC_OBJECT_IP6Q);
383
384
#undef MPC_FLAG
385
return (labeled);
386
}
387
388
/*
389
* When policies are loaded or unloaded, walk the list of registered policies
390
* and built mac_labeled, a bitmask representing the union of all objects
391
* requiring labels across all policies.
392
*/
393
static void
394
mac_policy_update(void)
395
{
396
struct mac_policy_conf *mpc;
397
398
mac_policy_xlock_assert();
399
400
mac_labeled = 0;
401
mac_policy_count = 0;
402
LIST_FOREACH(mpc, &mac_static_policy_list, mpc_list) {
403
mac_labeled |= mac_policy_getlabeled(mpc);
404
mac_policy_count++;
405
}
406
LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {
407
mac_labeled |= mac_policy_getlabeled(mpc);
408
mac_policy_count++;
409
}
410
411
cache_fast_lookup_enabled_recalc();
412
}
413
414
/*
415
* There are frequently used code paths which check for rarely installed
416
* policies. Gross hack below enables doing it in a cheap manner.
417
*/
418
419
#define FPO(f) (offsetof(struct mac_policy_ops, mpo_##f) / sizeof(uintptr_t))
420
421
struct mac_policy_fastpath_elem {
422
int count;
423
bool *flag;
424
size_t offset;
425
};
426
427
struct mac_policy_fastpath_elem mac_policy_fastpath_array[] = {
428
{ .offset = FPO(priv_check), .flag = &mac_priv_check_fp_flag },
429
{ .offset = FPO(priv_grant), .flag = &mac_priv_grant_fp_flag },
430
{ .offset = FPO(vnode_check_lookup),
431
.flag = &mac_vnode_check_lookup_fp_flag },
432
{ .offset = FPO(vnode_check_readlink),
433
.flag = &mac_vnode_check_readlink_fp_flag },
434
{ .offset = FPO(vnode_check_open),
435
.flag = &mac_vnode_check_open_fp_flag },
436
{ .offset = FPO(vnode_check_stat),
437
.flag = &mac_vnode_check_stat_fp_flag },
438
{ .offset = FPO(vnode_check_read),
439
.flag = &mac_vnode_check_read_fp_flag },
440
{ .offset = FPO(vnode_check_write),
441
.flag = &mac_vnode_check_write_fp_flag },
442
{ .offset = FPO(vnode_check_mmap),
443
.flag = &mac_vnode_check_mmap_fp_flag },
444
{ .offset = FPO(vnode_check_poll),
445
.flag = &mac_vnode_check_poll_fp_flag },
446
{ .offset = FPO(vnode_check_rename_from),
447
.flag = &mac_vnode_check_rename_from_fp_flag },
448
{ .offset = FPO(vnode_check_access),
449
.flag = &mac_vnode_check_access_fp_flag },
450
{ .offset = FPO(pipe_check_stat),
451
.flag = &mac_pipe_check_stat_fp_flag },
452
{ .offset = FPO(pipe_check_poll),
453
.flag = &mac_pipe_check_poll_fp_flag },
454
{ .offset = FPO(pipe_check_read),
455
.flag = &mac_pipe_check_read_fp_flag },
456
{ .offset = FPO(ifnet_create_mbuf),
457
.flag = &mac_ifnet_create_mbuf_fp_flag },
458
{ .offset = FPO(ifnet_check_transmit),
459
.flag = &mac_ifnet_check_transmit_fp_flag },
460
};
461
462
static void
463
mac_policy_fastpath_enable(struct mac_policy_fastpath_elem *mpfe)
464
{
465
466
MPASS(mpfe->count >= 0);
467
mpfe->count++;
468
if (mpfe->count == 1) {
469
MPASS(*mpfe->flag == false);
470
*mpfe->flag = true;
471
}
472
}
473
474
static void
475
mac_policy_fastpath_disable(struct mac_policy_fastpath_elem *mpfe)
476
{
477
478
MPASS(mpfe->count >= 1);
479
mpfe->count--;
480
if (mpfe->count == 0) {
481
MPASS(*mpfe->flag == true);
482
*mpfe->flag = false;
483
}
484
}
485
486
static void
487
mac_policy_fastpath_register(struct mac_policy_conf *mpc)
488
{
489
struct mac_policy_fastpath_elem *mpfe;
490
uintptr_t **ops;
491
int i;
492
493
mac_policy_xlock_assert();
494
495
ops = (uintptr_t **)mpc->mpc_ops;
496
for (i = 0; i < nitems(mac_policy_fastpath_array); i++) {
497
mpfe = &mac_policy_fastpath_array[i];
498
if (ops[mpfe->offset] != NULL)
499
mac_policy_fastpath_enable(mpfe);
500
}
501
}
502
503
static void
504
mac_policy_fastpath_unregister(struct mac_policy_conf *mpc)
505
{
506
struct mac_policy_fastpath_elem *mpfe;
507
uintptr_t **ops;
508
int i;
509
510
mac_policy_xlock_assert();
511
512
ops = (uintptr_t **)mpc->mpc_ops;
513
for (i = 0; i < nitems(mac_policy_fastpath_array); i++) {
514
mpfe = &mac_policy_fastpath_array[i];
515
if (ops[mpfe->offset] != NULL)
516
mac_policy_fastpath_disable(mpfe);
517
}
518
}
519
520
#undef FPO
521
522
static int
523
mac_policy_register(struct mac_policy_conf *mpc)
524
{
525
struct mac_policy_list_head *mpc_list;
526
struct mac_policy_conf *last_mpc, *tmpc;
527
int error, slot, static_entry;
528
529
error = 0;
530
531
/*
532
* We don't technically need exclusive access while !mac_late, but
533
* hold it for assertion consistency.
534
*/
535
mac_policy_xlock();
536
537
/*
538
* If the module can potentially be unloaded, or we're loading late,
539
* we have to stick it in the non-static list and pay an extra
540
* performance overhead. Otherwise, we can pay a light locking cost
541
* and stick it in the static list.
542
*/
543
static_entry = (!mac_late &&
544
!(mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_UNLOADOK));
545
546
mpc_list = (static_entry) ? &mac_static_policy_list :
547
&mac_policy_list;
548
last_mpc = NULL;
549
LIST_FOREACH(tmpc, mpc_list, mpc_list) {
550
last_mpc = tmpc;
551
if (strcmp(tmpc->mpc_name, mpc->mpc_name) == 0) {
552
error = EEXIST;
553
goto out;
554
}
555
}
556
if (mpc->mpc_field_off != NULL) {
557
slot = ffs(mac_slot_offsets_free);
558
if (slot == 0) {
559
error = ENOMEM;
560
goto out;
561
}
562
slot--;
563
mac_slot_offsets_free &= ~(1 << slot);
564
*mpc->mpc_field_off = slot;
565
}
566
mpc->mpc_runtime_flags |= MPC_RUNTIME_FLAG_REGISTERED;
567
568
/*
569
* Some modules may depend on the operations of its dependencies.
570
* Inserting modules in order of registration ensures operations
571
* that work on the module list retain dependency order.
572
*/
573
if (last_mpc == NULL)
574
LIST_INSERT_HEAD(mpc_list, mpc, mpc_list);
575
else
576
LIST_INSERT_AFTER(last_mpc, mpc, mpc_list);
577
/*
578
* Per-policy initialization. Currently, this takes place under the
579
* exclusive lock, so policies must not sleep in their init method.
580
* In the future, we may want to separate "init" from "start", with
581
* "init" occurring without the lock held. Likewise, on tear-down,
582
* breaking out "stop" from "destroy".
583
*/
584
if (mpc->mpc_ops->mpo_init != NULL)
585
(*(mpc->mpc_ops->mpo_init))(mpc);
586
587
mac_policy_fastpath_register(mpc);
588
589
mac_policy_update();
590
591
SDT_PROBE1(mac, , policy, register, mpc);
592
printf("Security policy loaded: %s (%s)\n", mpc->mpc_fullname,
593
mpc->mpc_name);
594
595
out:
596
mac_policy_xunlock();
597
return (error);
598
}
599
600
static int
601
mac_policy_unregister(struct mac_policy_conf *mpc)
602
{
603
604
/*
605
* If we fail the load, we may get a request to unload. Check to see
606
* if we did the run-time registration, and if not, silently succeed.
607
*/
608
mac_policy_xlock();
609
if ((mpc->mpc_runtime_flags & MPC_RUNTIME_FLAG_REGISTERED) == 0) {
610
mac_policy_xunlock();
611
return (0);
612
}
613
#if 0
614
/*
615
* Don't allow unloading modules with private data.
616
*/
617
if (mpc->mpc_field_off != NULL) {
618
mac_policy_xunlock();
619
return (EBUSY);
620
}
621
#endif
622
/*
623
* Only allow the unload to proceed if the module is unloadable by
624
* its own definition.
625
*/
626
if ((mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_UNLOADOK) == 0) {
627
mac_policy_xunlock();
628
return (EBUSY);
629
}
630
631
mac_policy_fastpath_unregister(mpc);
632
633
if (mpc->mpc_ops->mpo_destroy != NULL)
634
(*(mpc->mpc_ops->mpo_destroy))(mpc);
635
636
LIST_REMOVE(mpc, mpc_list);
637
mpc->mpc_runtime_flags &= ~MPC_RUNTIME_FLAG_REGISTERED;
638
mac_policy_update();
639
mac_policy_xunlock();
640
641
SDT_PROBE1(mac, , policy, unregister, mpc);
642
printf("Security policy unload: %s (%s)\n", mpc->mpc_fullname,
643
mpc->mpc_name);
644
645
return (0);
646
}
647
648
/*
649
* Allow MAC policy modules to register during boot, etc.
650
*/
651
int
652
mac_policy_modevent(module_t mod, int type, void *data)
653
{
654
struct mac_policy_conf *mpc;
655
int error;
656
657
error = 0;
658
mpc = (struct mac_policy_conf *) data;
659
660
#ifdef MAC_STATIC
661
if (mac_late) {
662
printf("mac_policy_modevent: MAC_STATIC and late\n");
663
return (EBUSY);
664
}
665
#endif
666
667
SDT_PROBE2(mac, , policy, modevent, type, mpc);
668
switch (type) {
669
case MOD_LOAD:
670
if (mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_NOTLATE &&
671
mac_late) {
672
printf("mac_policy_modevent: can't load %s policy "
673
"after booting\n", mpc->mpc_name);
674
error = EBUSY;
675
break;
676
}
677
error = mac_policy_register(mpc);
678
break;
679
case MOD_UNLOAD:
680
/* Don't unregister the module if it was never registered. */
681
if ((mpc->mpc_runtime_flags & MPC_RUNTIME_FLAG_REGISTERED)
682
!= 0)
683
error = mac_policy_unregister(mpc);
684
else
685
error = 0;
686
break;
687
default:
688
error = EOPNOTSUPP;
689
break;
690
}
691
692
return (error);
693
}
694
695
/*
696
* Define an error value precedence, and given two arguments, selects the
697
* value with the higher precedence.
698
*/
699
int
700
mac_error_select(int error1, int error2)
701
{
702
703
/* Certain decision-making errors take top priority. */
704
if (error1 == EDEADLK || error2 == EDEADLK)
705
return (EDEADLK);
706
707
/* Invalid arguments should be reported where possible. */
708
if (error1 == EINVAL || error2 == EINVAL)
709
return (EINVAL);
710
711
/* Precedence goes to "visibility", with both process and file. */
712
if (error1 == ESRCH || error2 == ESRCH)
713
return (ESRCH);
714
715
if (error1 == ENOENT || error2 == ENOENT)
716
return (ENOENT);
717
718
/* Precedence goes to DAC/MAC protections. */
719
if (error1 == EACCES || error2 == EACCES)
720
return (EACCES);
721
722
/* Precedence goes to privilege. */
723
if (error1 == EPERM || error2 == EPERM)
724
return (EPERM);
725
726
/* Precedence goes to error over success; otherwise, arbitrary. */
727
if (error1 != 0)
728
return (error1);
729
return (error2);
730
}
731
732
int
733
mac_check_structmac_consistent(const struct mac *mac)
734
{
735
/* Require that labels have a non-zero length. */
736
if (mac->m_buflen > MAC_MAX_LABEL_BUF_LEN ||
737
mac->m_buflen <= sizeof(""))
738
return (EINVAL);
739
740
return (0);
741
}
742
743
SYSINIT(mac, SI_SUB_MAC, SI_ORDER_FIRST, mac_init, NULL);
744
SYSINIT(mac_late, SI_SUB_MAC_LATE, SI_ORDER_FIRST, mac_late_init, NULL);
745
746