summaryrefslogtreecommitdiffstats
path: root/sys/security
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2002-11-01 20:46:53 +0000
committerrwatson <rwatson@FreeBSD.org>2002-11-01 20:46:53 +0000
commit61ffc1b9bb50dc9c580972208b4348cee6d2ad63 (patch)
tree2efddbff8b3c159870d2afbb85c9b4a531dcf1fe /sys/security
parent78a117472a62ba8826a9d70ed969f873f8d41715 (diff)
downloadFreeBSD-src-61ffc1b9bb50dc9c580972208b4348cee6d2ad63.zip
FreeBSD-src-61ffc1b9bb50dc9c580972208b4348cee6d2ad63.tar.gz
Add MAC checks for various kenv() operations: dump, get, set, unset,
permitting MAC policies to limit access to the kernel environment. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
Diffstat (limited to 'sys/security')
-rw-r--r--sys/security/mac/mac_framework.c52
-rw-r--r--sys/security/mac/mac_framework.h4
-rw-r--r--sys/security/mac/mac_internal.h52
-rw-r--r--sys/security/mac/mac_net.c52
-rw-r--r--sys/security/mac/mac_pipe.c52
-rw-r--r--sys/security/mac/mac_policy.h5
-rw-r--r--sys/security/mac/mac_process.c52
-rw-r--r--sys/security/mac/mac_syscalls.c52
-rw-r--r--sys/security/mac/mac_system.c52
-rw-r--r--sys/security/mac/mac_vfs.c52
10 files changed, 425 insertions, 0 deletions
diff --git a/sys/security/mac/mac_framework.c b/sys/security/mac/mac_framework.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_framework.c
+++ b/sys/security/mac/mac_framework.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_framework.h b/sys/security/mac/mac_framework.h
index 9a6a5f4..e50aaa7 100644
--- a/sys/security/mac/mac_framework.h
+++ b/sys/security/mac/mac_framework.h
@@ -230,6 +230,10 @@ void mac_thread_userret(struct thread *td);
int mac_check_bpfdesc_receive(struct bpf_d *bpf_d, struct ifnet *ifnet);
int mac_check_cred_visible(struct ucred *u1, struct ucred *u2);
int mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *m);
+int mac_check_kenv_dump(struct ucred *cred);
+int mac_check_kenv_get(struct ucred *cred, char *name);
+int mac_check_kenv_set(struct ucred *cred, char *name, char *value);
+int mac_check_kenv_unset(struct ucred *cred, char *name);
int mac_check_mount_stat(struct ucred *cred, struct mount *mp);
int mac_check_pipe_ioctl(struct ucred *cred, struct pipe *pipe,
unsigned long cmd, void *data);
diff --git a/sys/security/mac/mac_internal.h b/sys/security/mac/mac_internal.h
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_internal.h
+++ b/sys/security/mac/mac_internal.h
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_net.c b/sys/security/mac/mac_net.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_net.c
+++ b/sys/security/mac/mac_net.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_pipe.c b/sys/security/mac/mac_pipe.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_pipe.c
+++ b/sys/security/mac/mac_pipe.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_policy.h b/sys/security/mac/mac_policy.h
index bf58634..7be466f 100644
--- a/sys/security/mac/mac_policy.h
+++ b/sys/security/mac/mac_policy.h
@@ -269,6 +269,11 @@ struct mac_policy_ops {
int (*mpo_check_ifnet_transmit)(struct ifnet *ifnet,
struct label *ifnetlabel, struct mbuf *m,
struct label *mbuflabel);
+ int (*mpo_check_kenv_dump)(struct ucred *cred);
+ int (*mpo_check_kenv_get)(struct ucred *cred, char *name);
+ int (*mpo_check_kenv_set)(struct ucred *cred, char *name,
+ char *value);
+ int (*mpo_check_kenv_unset)(struct ucred *cred, char *name);
int (*mpo_check_mount_stat)(struct ucred *cred, struct mount *mp,
struct label *mntlabel);
int (*mpo_check_pipe_ioctl)(struct ucred *cred, struct pipe *pipe,
diff --git a/sys/security/mac/mac_process.c b/sys/security/mac/mac_process.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_process.c
+++ b/sys/security/mac/mac_process.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_syscalls.c b/sys/security/mac/mac_syscalls.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_syscalls.c
+++ b/sys/security/mac/mac_syscalls.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_system.c b/sys/security/mac/mac_system.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_system.c
+++ b/sys/security/mac/mac_system.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
diff --git a/sys/security/mac/mac_vfs.c b/sys/security/mac/mac_vfs.c
index 4882c0f..f4cfa8a 100644
--- a/sys/security/mac/mac_vfs.c
+++ b/sys/security/mac/mac_vfs.c
@@ -2170,6 +2170,58 @@ mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
}
int
+mac_check_kenv_dump(struct ucred *cred)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_dump, cred);
+
+ return (error);
+}
+
+int
+mac_check_kenv_get(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_get, cred, name);
+
+ return (error);
+}
+
+int
+mac_check_kenv_set(struct ucred *cred, char *name, char *value)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_set, cred, name, value);
+
+ return (error);
+}
+
+int
+mac_check_kenv_unset(struct ucred *cred, char *name)
+{
+ int error;
+
+ if (!mac_enforce_system)
+ return (0);
+
+ MAC_CHECK(check_kenv_unset, cred, name);
+
+ return (error);
+}
+
+int
mac_check_mount_stat(struct ucred *cred, struct mount *mount)
{
int error;
OpenPOWER on IntegriCloud