18717f69b1
calls. Add MAC Framework entry points and MAC policy entry points for audit(), auditctl(), auditon(), setaudit(), aud setauid(). MAC Framework entry points are only added for audit system calls where additional argument context may be useful for policy decision-making; other audit system calls without arguments may be controlled via the priv(9) entry points. Update various policy modules to implement audit-related checks, and in some cases, other missing system-related checks. Obtained from: TrustedBSD Project Sponsored by: SPARTA, Inc.
2639 lines
66 KiB
C
2639 lines
66 KiB
C
/*-
|
|
* Copyright (c) 1999-2002, 2007 Robert N. M. Watson
|
|
* Copyright (c) 2001-2005 McAfee, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This software was developed by Robert Watson for the TrustedBSD Project.
|
|
*
|
|
* This software was developed for the FreeBSD Project in part by McAfee
|
|
* Research, the Security Research Division of McAfee, Inc. under
|
|
* DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA
|
|
* CHATS research program.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
|
|
/*
|
|
* Developed by the TrustedBSD Project.
|
|
* Generic mandatory access module that does nothing.
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/acl.h>
|
|
#include <sys/kdb.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/ksem.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/module.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/msg.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/vnode.h>
|
|
#include <sys/sem.h>
|
|
#include <sys/shm.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/socketvar.h>
|
|
#include <sys/sx.h>
|
|
#include <sys/sysctl.h>
|
|
|
|
#include <fs/devfs/devfs.h>
|
|
|
|
#include <net/bpfdesc.h>
|
|
#include <net/if.h>
|
|
#include <net/if_types.h>
|
|
#include <net/if_var.h>
|
|
|
|
#include <security/mac/mac_policy.h>
|
|
|
|
SYSCTL_DECL(_security_mac);
|
|
|
|
SYSCTL_NODE(_security_mac, OID_AUTO, test, CTLFLAG_RW, 0,
|
|
"TrustedBSD mac_test policy controls");
|
|
|
|
static int mac_test_enabled = 1;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, enabled, CTLFLAG_RW,
|
|
&mac_test_enabled, 0, "Enforce test policy");
|
|
|
|
#define BPFMAGIC 0xfe1ad1b6
|
|
#define DEVFSMAGIC 0x9ee79c32
|
|
#define IFNETMAGIC 0xc218b120
|
|
#define INPCBMAGIC 0x4440f7bb
|
|
#define IPQMAGIC 0x206188ef
|
|
#define MBUFMAGIC 0xbbefa5bb
|
|
#define MOUNTMAGIC 0xc7c46e47
|
|
#define SOCKETMAGIC 0x9199c6cd
|
|
#define SYSVIPCMSQMAGIC 0xea672391
|
|
#define SYSVIPCMSGMAGIC 0x8bbba61e
|
|
#define SYSVIPCSEMMAGIC 0x896e8a0b
|
|
#define SYSVIPCSHMMAGIC 0x76119ab0
|
|
#define PIPEMAGIC 0xdc6c9919
|
|
#define POSIXSEMMAGIC 0x78ae980c
|
|
#define PROCMAGIC 0x3b4be98f
|
|
#define CREDMAGIC 0x9a5a4987
|
|
#define VNODEMAGIC 0x1a67a45c
|
|
#define EXMAGIC 0x849ba1fd
|
|
|
|
#define SLOT(x) mac_label_get((x), test_slot)
|
|
#define SLOT_SET(x, v) mac_label_set((x), test_slot, (v))
|
|
|
|
#define ASSERT_BPF_LABEL(x) KASSERT(SLOT(x) == BPFMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad BPF label", __func__ ))
|
|
#define ASSERT_DEVFS_LABEL(x) KASSERT(SLOT(x) == DEVFSMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad DEVFS label", __func__ ))
|
|
#define ASSERT_IFNET_LABEL(x) KASSERT(SLOT(x) == IFNETMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad IFNET label", __func__ ))
|
|
#define ASSERT_INPCB_LABEL(x) KASSERT(SLOT(x) == INPCBMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad INPCB label", __func__ ))
|
|
#define ASSERT_IPQ_LABEL(x) KASSERT(SLOT(x) == IPQMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad IPQ label", __func__ ))
|
|
#define ASSERT_MBUF_LABEL(x) KASSERT(x == NULL || \
|
|
SLOT(x) == MBUFMAGIC || SLOT(x) == 0, \
|
|
("%s: Bad MBUF label", __func__ ))
|
|
#define ASSERT_MOUNT_LABEL(x) KASSERT(SLOT(x) == MOUNTMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad MOUNT label", __func__ ))
|
|
#define ASSERT_SOCKET_LABEL(x) KASSERT(SLOT(x) == SOCKETMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad SOCKET label", __func__ ))
|
|
#define ASSERT_SYSVIPCMSQ_LABEL(x) KASSERT(SLOT(x) == SYSVIPCMSQMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad SYSVIPCMSQ label", __func__ ))
|
|
#define ASSERT_SYSVIPCMSG_LABEL(x) KASSERT(SLOT(x) == SYSVIPCMSGMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad SYSVIPCMSG label", __func__ ))
|
|
#define ASSERT_SYSVIPCSEM_LABEL(x) KASSERT(SLOT(x) == SYSVIPCSEMMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad SYSVIPCSEM label", __func__ ))
|
|
#define ASSERT_SYSVIPCSHM_LABEL(x) KASSERT(SLOT(x) == SYSVIPCSHMMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad SYSVIPCSHM label", __func__ ))
|
|
#define ASSERT_PIPE_LABEL(x) KASSERT(SLOT(x) == PIPEMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad PIPE label", __func__ ))
|
|
#define ASSERT_POSIX_LABEL(x) KASSERT(SLOT(x) == POSIXSEMMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad POSIX ksem label", __func__ ))
|
|
#define ASSERT_PROC_LABEL(x) KASSERT(SLOT(x) == PROCMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad PROC label", __func__ ))
|
|
#define ASSERT_CRED_LABEL(x) KASSERT(SLOT(x) == CREDMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad CRED label", __func__ ))
|
|
#define ASSERT_VNODE_LABEL(x) KASSERT(SLOT(x) == VNODEMAGIC || \
|
|
SLOT(x) == 0, ("%s: Bad VNODE label", __func__ ))
|
|
|
|
static int test_slot;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, slot, CTLFLAG_RD,
|
|
&test_slot, 0, "Slot allocated by framework");
|
|
|
|
static int init_count_bpfdesc;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_bpfdesc, CTLFLAG_RD,
|
|
&init_count_bpfdesc, 0, "bpfdesc init calls");
|
|
static int init_count_cred;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_cred, CTLFLAG_RD,
|
|
&init_count_cred, 0, "cred init calls");
|
|
static int init_count_devfsdirent;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_devfsdirent, CTLFLAG_RD,
|
|
&init_count_devfsdirent, 0, "devfsdirent init calls");
|
|
static int init_count_ifnet;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_ifnet, CTLFLAG_RD,
|
|
&init_count_ifnet, 0, "ifnet init calls");
|
|
static int init_count_inpcb;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_inpcb, CTLFLAG_RD,
|
|
&init_count_inpcb, 0, "inpcb init calls");
|
|
static int init_count_sysv_msg;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_sysv_msg, CTLFLAG_RD,
|
|
&init_count_sysv_msg, 0, "ipc_msg init calls");
|
|
static int init_count_sysv_msq;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_sysv_msq, CTLFLAG_RD,
|
|
&init_count_sysv_msq, 0, "ipc_msq init calls");
|
|
static int init_count_sysv_sem;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_sysv_sem, CTLFLAG_RD,
|
|
&init_count_sysv_sem, 0, "ipc_sema init calls");
|
|
static int init_count_sysv_shm;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_sysv_shm, CTLFLAG_RD,
|
|
&init_count_sysv_shm, 0, "ipc_shm init calls");
|
|
static int init_count_ipq;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_ipq, CTLFLAG_RD,
|
|
&init_count_ipq, 0, "ipq init calls");
|
|
static int init_count_mbuf;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_mbuf, CTLFLAG_RD,
|
|
&init_count_mbuf, 0, "mbuf init calls");
|
|
static int init_count_mount;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_mount, CTLFLAG_RD,
|
|
&init_count_mount, 0, "mount init calls");
|
|
static int init_count_mount_fslabel;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_mount_fslabel, CTLFLAG_RD,
|
|
&init_count_mount_fslabel, 0, "mount_fslabel init calls");
|
|
static int init_count_socket;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_socket, CTLFLAG_RD,
|
|
&init_count_socket, 0, "socket init calls");
|
|
static int init_count_socket_peerlabel;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_socket_peerlabel,
|
|
CTLFLAG_RD, &init_count_socket_peerlabel, 0,
|
|
"socket_peerlabel init calls");
|
|
static int init_count_pipe;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_pipe, CTLFLAG_RD,
|
|
&init_count_pipe, 0, "pipe init calls");
|
|
static int init_count_posixsems;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_posixsems, CTLFLAG_RD,
|
|
&init_count_posixsems, 0, "posix sems init calls");
|
|
static int init_count_proc;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_proc, CTLFLAG_RD,
|
|
&init_count_proc, 0, "proc init calls");
|
|
static int init_count_vnode;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, init_count_vnode, CTLFLAG_RD,
|
|
&init_count_vnode, 0, "vnode init calls");
|
|
|
|
static int destroy_count_bpfdesc;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_bpfdesc, CTLFLAG_RD,
|
|
&destroy_count_bpfdesc, 0, "bpfdesc destroy calls");
|
|
static int destroy_count_cred;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_cred, CTLFLAG_RD,
|
|
&destroy_count_cred, 0, "cred destroy calls");
|
|
static int destroy_count_devfsdirent;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_devfsdirent, CTLFLAG_RD,
|
|
&destroy_count_devfsdirent, 0, "devfsdirent destroy calls");
|
|
static int destroy_count_ifnet;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_ifnet, CTLFLAG_RD,
|
|
&destroy_count_ifnet, 0, "ifnet destroy calls");
|
|
static int destroy_count_inpcb;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_inpcb, CTLFLAG_RD,
|
|
&destroy_count_inpcb, 0, "inpcb destroy calls");
|
|
static int destroy_count_sysv_msg;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_sysv_msg, CTLFLAG_RD,
|
|
&destroy_count_sysv_msg, 0, "ipc_msg destroy calls");
|
|
static int destroy_count_sysv_msq;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_sysv_msq, CTLFLAG_RD,
|
|
&destroy_count_sysv_msq, 0, "ipc_msq destroy calls");
|
|
static int destroy_count_sysv_sem;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_sysv_sem, CTLFLAG_RD,
|
|
&destroy_count_sysv_sem, 0, "ipc_sema destroy calls");
|
|
static int destroy_count_sysv_shm;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_sysv_shm, CTLFLAG_RD,
|
|
&destroy_count_sysv_shm, 0, "ipc_shm destroy calls");
|
|
static int destroy_count_ipq;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_ipq, CTLFLAG_RD,
|
|
&destroy_count_ipq, 0, "ipq destroy calls");
|
|
static int destroy_count_mbuf;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_mbuf, CTLFLAG_RD,
|
|
&destroy_count_mbuf, 0, "mbuf destroy calls");
|
|
static int destroy_count_mount;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_mount, CTLFLAG_RD,
|
|
&destroy_count_mount, 0, "mount destroy calls");
|
|
static int destroy_count_mount_fslabel;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_mount_fslabel,
|
|
CTLFLAG_RD, &destroy_count_mount_fslabel, 0,
|
|
"mount_fslabel destroy calls");
|
|
static int destroy_count_socket;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_socket, CTLFLAG_RD,
|
|
&destroy_count_socket, 0, "socket destroy calls");
|
|
static int destroy_count_socket_peerlabel;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_socket_peerlabel,
|
|
CTLFLAG_RD, &destroy_count_socket_peerlabel, 0,
|
|
"socket_peerlabel destroy calls");
|
|
static int destroy_count_pipe;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_pipe, CTLFLAG_RD,
|
|
&destroy_count_pipe, 0, "pipe destroy calls");
|
|
static int destroy_count_posixsems;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_posixsems, CTLFLAG_RD,
|
|
&destroy_count_posixsems, 0, "posix sems destroy calls");
|
|
static int destroy_count_proc;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_proc, CTLFLAG_RD,
|
|
&destroy_count_proc, 0, "proc destroy calls");
|
|
static int destroy_count_vnode;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, destroy_count_vnode, CTLFLAG_RD,
|
|
&destroy_count_vnode, 0, "vnode destroy calls");
|
|
|
|
static int externalize_count;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, externalize_count, CTLFLAG_RD,
|
|
&externalize_count, 0, "Subject/object externalize calls");
|
|
static int internalize_count;
|
|
SYSCTL_INT(_security_mac_test, OID_AUTO, internalize_count, CTLFLAG_RD,
|
|
&internalize_count, 0, "Subject/object internalize calls");
|
|
|
|
#ifdef KDB
|
|
#define DEBUGGER(x) kdb_enter(x)
|
|
#else
|
|
#define DEBUGGER(x) printf("mac_test: %s\n", (x))
|
|
#endif
|
|
|
|
/*
|
|
* Label operations.
|
|
*/
|
|
static void
|
|
mac_test_init_bpfdesc_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, BPFMAGIC);
|
|
atomic_add_int(&init_count_bpfdesc, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_cred_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, CREDMAGIC);
|
|
atomic_add_int(&init_count_cred, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_devfsdirent_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, DEVFSMAGIC);
|
|
atomic_add_int(&init_count_devfsdirent, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_ifnet_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, IFNETMAGIC);
|
|
atomic_add_int(&init_count_ifnet, 1);
|
|
}
|
|
|
|
static int
|
|
mac_test_init_inpcb_label(struct label *label, int flag)
|
|
{
|
|
|
|
if (flag & M_WAITOK)
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
"mac_test_init_inpcb_label() at %s:%d", __FILE__,
|
|
__LINE__);
|
|
|
|
SLOT_SET(label, INPCBMAGIC);
|
|
atomic_add_int(&init_count_inpcb, 1);
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_sysv_msgmsg_label(struct label *label)
|
|
{
|
|
SLOT_SET(label, SYSVIPCMSGMAGIC);
|
|
atomic_add_int(&init_count_sysv_msg, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_sysv_msgqueue_label(struct label *label)
|
|
{
|
|
SLOT_SET(label, SYSVIPCMSQMAGIC);
|
|
atomic_add_int(&init_count_sysv_msq, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_sysv_sem_label(struct label *label)
|
|
{
|
|
SLOT_SET(label, SYSVIPCSEMMAGIC);
|
|
atomic_add_int(&init_count_sysv_sem, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_sysv_shm_label(struct label *label)
|
|
{
|
|
SLOT_SET(label, SYSVIPCSHMMAGIC);
|
|
atomic_add_int(&init_count_sysv_shm, 1);
|
|
}
|
|
|
|
static int
|
|
mac_test_init_ipq_label(struct label *label, int flag)
|
|
{
|
|
|
|
if (flag & M_WAITOK)
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
"mac_test_init_ipq_label() at %s:%d", __FILE__,
|
|
__LINE__);
|
|
|
|
SLOT_SET(label, IPQMAGIC);
|
|
atomic_add_int(&init_count_ipq, 1);
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_init_mbuf_label(struct label *label, int flag)
|
|
{
|
|
|
|
if (flag & M_WAITOK)
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
"mac_test_init_mbuf_label() at %s:%d", __FILE__,
|
|
__LINE__);
|
|
|
|
SLOT_SET(label, MBUFMAGIC);
|
|
atomic_add_int(&init_count_mbuf, 1);
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_mount_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, MOUNTMAGIC);
|
|
atomic_add_int(&init_count_mount, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_mount_fs_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, MOUNTMAGIC);
|
|
atomic_add_int(&init_count_mount_fslabel, 1);
|
|
}
|
|
|
|
static int
|
|
mac_test_init_socket_label(struct label *label, int flag)
|
|
{
|
|
|
|
if (flag & M_WAITOK)
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
"mac_test_init_socket_label() at %s:%d", __FILE__,
|
|
__LINE__);
|
|
|
|
SLOT_SET(label, SOCKETMAGIC);
|
|
atomic_add_int(&init_count_socket, 1);
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_init_socket_peer_label(struct label *label, int flag)
|
|
{
|
|
|
|
if (flag & M_WAITOK)
|
|
WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK, NULL,
|
|
"mac_test_init_socket_peer_label() at %s:%d", __FILE__,
|
|
__LINE__);
|
|
|
|
SLOT_SET(label, SOCKETMAGIC);
|
|
atomic_add_int(&init_count_socket_peerlabel, 1);
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_pipe_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, PIPEMAGIC);
|
|
atomic_add_int(&init_count_pipe, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_posix_sem_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, POSIXSEMMAGIC);
|
|
atomic_add_int(&init_count_posixsems, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_proc_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, PROCMAGIC);
|
|
atomic_add_int(&init_count_proc, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_init_vnode_label(struct label *label)
|
|
{
|
|
|
|
SLOT_SET(label, VNODEMAGIC);
|
|
atomic_add_int(&init_count_vnode, 1);
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_bpfdesc_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == BPFMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_bpfdesc, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_bpfdesc: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_bpfdesc: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_cred_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == CREDMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_cred, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_cred: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_cred: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_devfsdirent_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == DEVFSMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_devfsdirent, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_devfsdirent: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_devfsdirent: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_ifnet_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == IFNETMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_ifnet, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_ifnet: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_ifnet: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_inpcb_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == INPCBMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_inpcb, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_inpcb: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_inpcb: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_sysv_msgmsg_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == SYSVIPCMSGMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_sysv_msg, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_sysv_msgmsg_label: dup destroy");
|
|
} else {
|
|
DEBUGGER(
|
|
"mac_test_destroy_sysv_msgmsg_label: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_sysv_msgqueue_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == SYSVIPCMSQMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_sysv_msq, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_sysv_msgqueue_label: dup destroy");
|
|
} else {
|
|
DEBUGGER(
|
|
"mac_test_destroy_sysv_msgqueue_label: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_sysv_sem_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == SYSVIPCSEMMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_sysv_sem, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_sysv_sem_label: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_sysv_sem_label: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_sysv_shm_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == SYSVIPCSHMMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_sysv_shm, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_sysv_shm_label: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_sysv_shm_label: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_ipq_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == IPQMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_ipq, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_ipq: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_ipq: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_mbuf_label(struct label *label)
|
|
{
|
|
|
|
/*
|
|
* If we're loaded dynamically, there may be mbufs in flight that
|
|
* didn't have label storage allocated for them. Handle this
|
|
* gracefully.
|
|
*/
|
|
if (label == NULL)
|
|
return;
|
|
|
|
if (SLOT(label) == MBUFMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_mbuf, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_mbuf: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_mbuf: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_mount_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == MOUNTMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_mount, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_mount: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_mount: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_mount_fs_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == MOUNTMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_mount_fslabel, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_mount_fslabel: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_mount_fslabel: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_socket_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == SOCKETMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_socket, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_socket: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_socket: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_socket_peer_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == SOCKETMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_socket_peerlabel, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_socket_peerlabel: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_socket_peerlabel: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_pipe_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == PIPEMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_pipe, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_pipe: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_pipe: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_posix_sem_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == POSIXSEMMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_posixsems, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_posix_sem: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_posix_sem: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_proc_label(struct label *label)
|
|
{
|
|
|
|
if ((SLOT(label) == PROCMAGIC || SLOT(label) == 0)) {
|
|
atomic_add_int(&destroy_count_proc, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_proc: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_proc: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_destroy_vnode_label(struct label *label)
|
|
{
|
|
|
|
if (SLOT(label) == VNODEMAGIC || SLOT(label) == 0) {
|
|
atomic_add_int(&destroy_count_vnode, 1);
|
|
SLOT_SET(label, EXMAGIC);
|
|
} else if (SLOT(label) == EXMAGIC) {
|
|
DEBUGGER("mac_test_destroy_vnode: dup destroy");
|
|
} else {
|
|
DEBUGGER("mac_test_destroy_vnode: corrupted label");
|
|
}
|
|
}
|
|
|
|
static void
|
|
mac_test_copy_cred_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(src);
|
|
ASSERT_CRED_LABEL(dest);
|
|
}
|
|
|
|
static void
|
|
mac_test_copy_ifnet_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
ASSERT_IFNET_LABEL(src);
|
|
ASSERT_IFNET_LABEL(dest);
|
|
}
|
|
|
|
static void
|
|
mac_test_copy_mbuf_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(src);
|
|
ASSERT_MBUF_LABEL(dest);
|
|
}
|
|
|
|
static void
|
|
mac_test_copy_pipe_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
ASSERT_PIPE_LABEL(src);
|
|
ASSERT_PIPE_LABEL(dest);
|
|
}
|
|
|
|
static void
|
|
mac_test_copy_socket_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(src);
|
|
ASSERT_SOCKET_LABEL(dest);
|
|
}
|
|
|
|
static void
|
|
mac_test_copy_vnode_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
ASSERT_VNODE_LABEL(src);
|
|
ASSERT_VNODE_LABEL(dest);
|
|
}
|
|
|
|
static int
|
|
mac_test_externalize_label(struct label *label, char *element_name,
|
|
struct sbuf *sb, int *claimed)
|
|
{
|
|
|
|
atomic_add_int(&externalize_count, 1);
|
|
|
|
KASSERT(SLOT(label) != EXMAGIC,
|
|
("mac_test_externalize_label: destroyed label"));
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_internalize_label(struct label *label, char *element_name,
|
|
char *element_data, int *claimed)
|
|
{
|
|
|
|
atomic_add_int(&internalize_count, 1);
|
|
|
|
KASSERT(SLOT(label) != EXMAGIC,
|
|
("mac_test_internalize_label: destroyed label"));
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Labeling event operations: file system objects, and things that look
|
|
* a lot like file system objects.
|
|
*/
|
|
static void
|
|
mac_test_associate_vnode_devfs(struct mount *mp, struct label *fslabel,
|
|
struct devfs_dirent *de, struct label *delabel, struct vnode *vp,
|
|
struct label *vlabel)
|
|
{
|
|
|
|
ASSERT_MOUNT_LABEL(fslabel);
|
|
ASSERT_DEVFS_LABEL(delabel);
|
|
ASSERT_VNODE_LABEL(vlabel);
|
|
}
|
|
|
|
static int
|
|
mac_test_associate_vnode_extattr(struct mount *mp, struct label *fslabel,
|
|
struct vnode *vp, struct label *vlabel)
|
|
{
|
|
|
|
ASSERT_MOUNT_LABEL(fslabel);
|
|
ASSERT_VNODE_LABEL(vlabel);
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_associate_vnode_singlelabel(struct mount *mp,
|
|
struct label *fslabel, struct vnode *vp, struct label *vlabel)
|
|
{
|
|
|
|
ASSERT_MOUNT_LABEL(fslabel);
|
|
ASSERT_VNODE_LABEL(vlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_devfs_device(struct ucred *cred, struct mount *mp,
|
|
struct cdev *dev, struct devfs_dirent *devfs_dirent, struct label *label)
|
|
{
|
|
|
|
if (cred != NULL) {
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
}
|
|
ASSERT_DEVFS_LABEL(label);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_devfs_directory(struct mount *mp, char *dirname,
|
|
int dirnamelen, struct devfs_dirent *devfs_dirent, struct label *label)
|
|
{
|
|
|
|
ASSERT_DEVFS_LABEL(label);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_devfs_symlink(struct ucred *cred, struct mount *mp,
|
|
struct devfs_dirent *dd, struct label *ddlabel, struct devfs_dirent *de,
|
|
struct label *delabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_DEVFS_LABEL(ddlabel);
|
|
ASSERT_DEVFS_LABEL(delabel);
|
|
}
|
|
|
|
static int
|
|
mac_test_create_vnode_extattr(struct ucred *cred, struct mount *mp,
|
|
struct label *fslabel, struct vnode *dvp, struct label *dlabel,
|
|
struct vnode *vp, struct label *vlabel, struct componentname *cnp)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_MOUNT_LABEL(fslabel);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mount(struct ucred *cred, struct mount *mp,
|
|
struct label *mntlabel, struct label *fslabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_MOUNT_LABEL(mntlabel);
|
|
ASSERT_MOUNT_LABEL(fslabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_relabel_vnode(struct ucred *cred, struct vnode *vp,
|
|
struct label *vnodelabel, struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(vnodelabel);
|
|
ASSERT_VNODE_LABEL(label);
|
|
}
|
|
|
|
static int
|
|
mac_test_setlabel_vnode_extattr(struct ucred *cred, struct vnode *vp,
|
|
struct label *vlabel, struct label *intlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(vlabel);
|
|
ASSERT_VNODE_LABEL(intlabel);
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_update_devfsdirent(struct mount *mp,
|
|
struct devfs_dirent *devfs_dirent, struct label *direntlabel,
|
|
struct vnode *vp, struct label *vnodelabel)
|
|
{
|
|
|
|
ASSERT_DEVFS_LABEL(direntlabel);
|
|
ASSERT_VNODE_LABEL(vnodelabel);
|
|
}
|
|
|
|
/*
|
|
* Labeling event operations: IPC object.
|
|
*/
|
|
static void
|
|
mac_test_create_mbuf_from_socket(struct socket *so, struct label *socketlabel,
|
|
struct mbuf *m, struct label *mbuflabel)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_socket(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_pipe(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_posix_sem(struct ucred *cred, struct ksem *ksem,
|
|
struct label *posixlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_POSIX_LABEL(posixlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_socket_from_socket(struct socket *oldsocket,
|
|
struct label *oldsocketlabel, struct socket *newsocket,
|
|
struct label *newsocketlabel)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(oldsocketlabel);
|
|
ASSERT_SOCKET_LABEL(newsocketlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_relabel_socket(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(newlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_relabel_pipe(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
ASSERT_PIPE_LABEL(newlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_set_socket_peer_from_mbuf(struct mbuf *mbuf, struct label *mbuflabel,
|
|
struct socket *socket, struct label *socketpeerlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
ASSERT_SOCKET_LABEL(socketpeerlabel);
|
|
}
|
|
|
|
/*
|
|
* Labeling event operations: network objects.
|
|
*/
|
|
static void
|
|
mac_test_set_socket_peer_from_socket(struct socket *oldsocket,
|
|
struct label *oldsocketlabel, struct socket *newsocket,
|
|
struct label *newsocketpeerlabel)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(oldsocketlabel);
|
|
ASSERT_SOCKET_LABEL(newsocketpeerlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_bpfdesc(struct ucred *cred, struct bpf_d *bpf_d,
|
|
struct label *bpflabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_BPF_LABEL(bpflabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_datagram_from_ipq(struct ipq *ipq, struct label *ipqlabel,
|
|
struct mbuf *datagram, struct label *datagramlabel)
|
|
{
|
|
|
|
ASSERT_IPQ_LABEL(ipqlabel);
|
|
ASSERT_MBUF_LABEL(datagramlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_fragment(struct mbuf *datagram, struct label *datagramlabel,
|
|
struct mbuf *fragment, struct label *fragmentlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(datagramlabel);
|
|
ASSERT_MBUF_LABEL(fragmentlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_ifnet(struct ifnet *ifnet, struct label *ifnetlabel)
|
|
{
|
|
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_inpcb_from_socket(struct socket *so, struct label *solabel,
|
|
struct inpcb *inp, struct label *inplabel)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(solabel);
|
|
ASSERT_INPCB_LABEL(inplabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_sysv_msgmsg(struct ucred *cred, struct msqid_kernel *msqkptr,
|
|
struct label *msqlabel, struct msg *msgptr, struct label *msglabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSG_LABEL(msglabel);
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_sysv_msgqueue(struct ucred *cred,
|
|
struct msqid_kernel *msqkptr, struct label *msqlabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_sysv_sem(struct ucred *cred, struct semid_kernel *semakptr,
|
|
struct label *semalabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCSEM_LABEL(semalabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_sysv_shm(struct ucred *cred, struct shmid_kernel *shmsegptr,
|
|
struct label *shmlabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCSHM_LABEL(shmlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_ipq(struct mbuf *fragment, struct label *fragmentlabel,
|
|
struct ipq *ipq, struct label *ipqlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(fragmentlabel);
|
|
ASSERT_IPQ_LABEL(ipqlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mbuf_from_inpcb(struct inpcb *inp, struct label *inplabel,
|
|
struct mbuf *m, struct label *mlabel)
|
|
{
|
|
|
|
ASSERT_INPCB_LABEL(inplabel);
|
|
ASSERT_MBUF_LABEL(mlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mbuf_linklayer(struct ifnet *ifnet, struct label *ifnetlabel,
|
|
struct mbuf *mbuf, struct label *mbuflabel)
|
|
{
|
|
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mbuf_from_bpfdesc(struct bpf_d *bpf_d, struct label *bpflabel,
|
|
struct mbuf *mbuf, struct label *mbuflabel)
|
|
{
|
|
|
|
ASSERT_BPF_LABEL(bpflabel);
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mbuf_from_ifnet(struct ifnet *ifnet, struct label *ifnetlabel,
|
|
struct mbuf *m, struct label *mbuflabel)
|
|
{
|
|
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mbuf_multicast_encap(struct mbuf *oldmbuf,
|
|
struct label *oldmbuflabel, struct ifnet *ifnet, struct label *ifnetlabel,
|
|
struct mbuf *newmbuf, struct label *newmbuflabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(oldmbuflabel);
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
ASSERT_MBUF_LABEL(newmbuflabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_mbuf_netlayer(struct mbuf *oldmbuf,
|
|
struct label *oldmbuflabel, struct mbuf *newmbuf,
|
|
struct label *newmbuflabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(oldmbuflabel);
|
|
ASSERT_MBUF_LABEL(newmbuflabel);
|
|
}
|
|
|
|
static int
|
|
mac_test_fragment_match(struct mbuf *fragment, struct label *fragmentlabel,
|
|
struct ipq *ipq, struct label *ipqlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(fragmentlabel);
|
|
ASSERT_IPQ_LABEL(ipqlabel);
|
|
|
|
return (1);
|
|
}
|
|
|
|
static void
|
|
mac_test_reflect_mbuf_icmp(struct mbuf *m, struct label *mlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(mlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_reflect_mbuf_tcp(struct mbuf *m, struct label *mlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(mlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_relabel_ifnet(struct ucred *cred, struct ifnet *ifnet,
|
|
struct label *ifnetlabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
ASSERT_IFNET_LABEL(newlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_update_ipq(struct mbuf *fragment, struct label *fragmentlabel,
|
|
struct ipq *ipq, struct label *ipqlabel)
|
|
{
|
|
|
|
ASSERT_MBUF_LABEL(fragmentlabel);
|
|
ASSERT_IPQ_LABEL(ipqlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_inpcb_sosetlabel(struct socket *so, struct label *solabel,
|
|
struct inpcb *inp, struct label *inplabel)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(solabel);
|
|
ASSERT_INPCB_LABEL(inplabel);
|
|
}
|
|
|
|
/*
|
|
* Labeling event operations: processes.
|
|
*/
|
|
static void
|
|
mac_test_execve_transition(struct ucred *old, struct ucred *new,
|
|
struct vnode *vp, struct label *filelabel,
|
|
struct label *interpvnodelabel, struct image_params *imgp,
|
|
struct label *execlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(old->cr_label);
|
|
ASSERT_CRED_LABEL(new->cr_label);
|
|
ASSERT_VNODE_LABEL(filelabel);
|
|
if (interpvnodelabel != NULL) {
|
|
ASSERT_VNODE_LABEL(interpvnodelabel);
|
|
}
|
|
if (execlabel != NULL) {
|
|
ASSERT_CRED_LABEL(execlabel);
|
|
}
|
|
}
|
|
|
|
static int
|
|
mac_test_execve_will_transition(struct ucred *old, struct vnode *vp,
|
|
struct label *filelabel, struct label *interpvnodelabel,
|
|
struct image_params *imgp, struct label *execlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(old->cr_label);
|
|
ASSERT_VNODE_LABEL(filelabel);
|
|
if (interpvnodelabel != NULL) {
|
|
ASSERT_VNODE_LABEL(interpvnodelabel);
|
|
}
|
|
if (execlabel != NULL) {
|
|
ASSERT_CRED_LABEL(execlabel);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_proc0(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
}
|
|
|
|
static void
|
|
mac_test_create_proc1(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
}
|
|
|
|
static void
|
|
mac_test_relabel_cred(struct ucred *cred, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_CRED_LABEL(newlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_thread_userret(struct thread *td)
|
|
{
|
|
|
|
printf("mac_test_thread_userret(process = %d)\n",
|
|
curthread->td_proc->p_pid);
|
|
}
|
|
|
|
/*
|
|
* Label cleanup/flush operations
|
|
*/
|
|
static void
|
|
mac_test_cleanup_sysv_msgmsg(struct label *msglabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSG_LABEL(msglabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_cleanup_sysv_msgqueue(struct label *msqlabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqlabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_cleanup_sysv_sem(struct label *semalabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCSEM_LABEL(semalabel);
|
|
}
|
|
|
|
static void
|
|
mac_test_cleanup_sysv_shm(struct label *shmlabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCSHM_LABEL(shmlabel);
|
|
}
|
|
|
|
/*
|
|
* Access control checks.
|
|
*/
|
|
static int
|
|
mac_test_check_bpfdesc_receive(struct bpf_d *bpf_d, struct label *bpflabel,
|
|
struct ifnet *ifnet, struct label *ifnetlabel)
|
|
{
|
|
|
|
ASSERT_BPF_LABEL(bpflabel);
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_cred_relabel(struct ucred *cred, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_CRED_LABEL(newlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_cred_visible(struct ucred *u1, struct ucred *u2)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(u1->cr_label);
|
|
ASSERT_CRED_LABEL(u2->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_ifnet_relabel(struct ucred *cred, struct ifnet *ifnet,
|
|
struct label *ifnetlabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
ASSERT_IFNET_LABEL(newlabel);
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_ifnet_transmit(struct ifnet *ifnet, struct label *ifnetlabel,
|
|
struct mbuf *m, struct label *mbuflabel)
|
|
{
|
|
|
|
ASSERT_IFNET_LABEL(ifnetlabel);
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_inpcb_deliver(struct inpcb *inp, struct label *inplabel,
|
|
struct mbuf *m, struct label *mlabel)
|
|
{
|
|
|
|
ASSERT_INPCB_LABEL(inplabel);
|
|
ASSERT_MBUF_LABEL(mlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_msgmsq(struct ucred *cred, struct msg *msgptr,
|
|
struct label *msglabel, struct msqid_kernel *msqkptr,
|
|
struct label *msqklabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqklabel);
|
|
ASSERT_SYSVIPCMSG_LABEL(msglabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_msgrcv(struct ucred *cred, struct msg *msgptr,
|
|
struct label *msglabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSG_LABEL(msglabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
|
|
static int
|
|
mac_test_check_sysv_msgrmid(struct ucred *cred, struct msg *msgptr,
|
|
struct label *msglabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSG_LABEL(msglabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_msqget(struct ucred *cred, struct msqid_kernel *msqkptr,
|
|
struct label *msqklabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqklabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_msqsnd(struct ucred *cred, struct msqid_kernel *msqkptr,
|
|
struct label *msqklabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqklabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_msqrcv(struct ucred *cred, struct msqid_kernel *msqkptr,
|
|
struct label *msqklabel)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqklabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_msqctl(struct ucred *cred, struct msqid_kernel *msqkptr,
|
|
struct label *msqklabel, int cmd)
|
|
{
|
|
|
|
ASSERT_SYSVIPCMSQ_LABEL(msqklabel);
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_semctl(struct ucred *cred, struct semid_kernel *semakptr,
|
|
struct label *semaklabel, int cmd)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSEM_LABEL(semaklabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_semget(struct ucred *cred, struct semid_kernel *semakptr,
|
|
struct label *semaklabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSEM_LABEL(semaklabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_semop(struct ucred *cred, struct semid_kernel *semakptr,
|
|
struct label *semaklabel, size_t accesstype)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSEM_LABEL(semaklabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_shmat(struct ucred *cred, struct shmid_kernel *shmsegptr,
|
|
struct label *shmseglabel, int shmflg)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSHM_LABEL(shmseglabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_shmctl(struct ucred *cred, struct shmid_kernel *shmsegptr,
|
|
struct label *shmseglabel, int cmd)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSHM_LABEL(shmseglabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_shmdt(struct ucred *cred, struct shmid_kernel *shmsegptr,
|
|
struct label *shmseglabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSHM_LABEL(shmseglabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysv_shmget(struct ucred *cred, struct shmid_kernel *shmsegptr,
|
|
struct label *shmseglabel, int shmflg)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SYSVIPCSHM_LABEL(shmseglabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kenv_dump(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kenv_get(struct ucred *cred, char *name)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kenv_set(struct ucred *cred, char *name, char *value)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kenv_unset(struct ucred *cred, char *name)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kld_load(struct ucred *cred, struct vnode *vp,
|
|
struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kld_stat(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_kld_unload(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_mount_stat(struct ucred *cred, struct mount *mp,
|
|
struct label *mntlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_MOUNT_LABEL(mntlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_pipe_ioctl(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel, unsigned long cmd, void /* caddr_t */ *data)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_pipe_poll(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_pipe_read(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_pipe_relabel(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
ASSERT_PIPE_LABEL(newlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_pipe_stat(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_pipe_write(struct ucred *cred, struct pipepair *pp,
|
|
struct label *pipelabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_PIPE_LABEL(pipelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_posix_sem(struct ucred *cred, struct ksem *ksemptr,
|
|
struct label *ks_label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_POSIX_LABEL(ks_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_debug(struct ucred *cred, struct proc *proc)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_CRED_LABEL(proc->p_ucred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_sched(struct ucred *cred, struct proc *proc)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_CRED_LABEL(proc->p_ucred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_signal(struct ucred *cred, struct proc *proc, int signum)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_CRED_LABEL(proc->p_ucred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setaudit(struct ucred *cred, struct auditinfo *ai)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setauid(struct ucred *cred, uid_t auid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setuid(struct ucred *cred, uid_t uid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_seteuid(struct ucred *cred, uid_t euid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setgid(struct ucred *cred, gid_t gid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setegid(struct ucred *cred, gid_t egid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setgroups(struct ucred *cred, int ngroups,
|
|
gid_t *gidset)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setreuid(struct ucred *cred, uid_t ruid, uid_t euid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setregid(struct ucred *cred, gid_t rgid, gid_t egid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setresuid(struct ucred *cred, uid_t ruid, uid_t euid,
|
|
uid_t suid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_setresgid(struct ucred *cred, gid_t rgid, gid_t egid,
|
|
gid_t sgid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_proc_wait(struct ucred *cred, struct proc *proc)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_CRED_LABEL(proc->p_ucred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_accept(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_bind(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel, struct sockaddr *sockaddr)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_connect(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel, struct sockaddr *sockaddr)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_deliver(struct socket *socket, struct label *socketlabel,
|
|
struct mbuf *m, struct label *mbuflabel)
|
|
{
|
|
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
ASSERT_MBUF_LABEL(mbuflabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_listen(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_poll(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_receive(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_relabel(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
ASSERT_SOCKET_LABEL(newlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_send(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_stat(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_socket_visible(struct ucred *cred, struct socket *socket,
|
|
struct label *socketlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_SOCKET_LABEL(socketlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_sysarch_ioperm(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_acct(struct ucred *cred, struct vnode *vp,
|
|
struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
if (label != NULL) {
|
|
ASSERT_VNODE_LABEL(label);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_audit(struct ucred *cred, void *record, int length)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_auditctl(struct ucred *cred, struct vnode *vp,
|
|
struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
if (label != NULL) {
|
|
ASSERT_VNODE_LABEL(label);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_auditon(struct ucred *cred, int cmd)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_reboot(struct ucred *cred, int how)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_settime(struct ucred *cred)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_swapoff(struct ucred *cred, struct vnode *vp,
|
|
struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_swapon(struct ucred *cred, struct vnode *vp,
|
|
struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_system_sysctl(struct ucred *cred, struct sysctl_oid *oidp,
|
|
void *arg1, int arg2, struct sysctl_req *req)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_access(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, int acc_mode)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_chdir(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_chroot(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_create(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel, struct componentname *cnp, struct vattr *vap)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_delete(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel, struct vnode *vp, struct label *label,
|
|
struct componentname *cnp)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_deleteacl(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, acl_type_t type)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_deleteextattr(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, int attrnamespace, const char *name)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_exec(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, struct image_params *imgp,
|
|
struct label *execlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
if (execlabel != NULL) {
|
|
ASSERT_CRED_LABEL(execlabel);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_getacl(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, acl_type_t type)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_getextattr(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, int attrnamespace, const char *name, struct uio *uio)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_link(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel, struct vnode *vp, struct label *label,
|
|
struct componentname *cnp)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_listextattr(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, int attrnamespace)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_lookup(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel, struct componentname *cnp)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_mmap(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, int prot, int flags)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_open(struct ucred *cred, struct vnode *vp,
|
|
struct label *filelabel, int acc_mode)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(filelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_poll(struct ucred *active_cred, struct ucred *file_cred,
|
|
struct vnode *vp, struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(active_cred->cr_label);
|
|
ASSERT_CRED_LABEL(file_cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_read(struct ucred *active_cred, struct ucred *file_cred,
|
|
struct vnode *vp, struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(active_cred->cr_label);
|
|
if (file_cred != NULL) {
|
|
ASSERT_CRED_LABEL(file_cred->cr_label);
|
|
}
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_readdir(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_readlink(struct ucred *cred, struct vnode *vp,
|
|
struct label *vnodelabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(vnodelabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_relabel(struct ucred *cred, struct vnode *vp,
|
|
struct label *vnodelabel, struct label *newlabel)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(vnodelabel);
|
|
ASSERT_VNODE_LABEL(newlabel);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_rename_from(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel, struct vnode *vp, struct label *label,
|
|
struct componentname *cnp)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_rename_to(struct ucred *cred, struct vnode *dvp,
|
|
struct label *dlabel, struct vnode *vp, struct label *label, int samedir,
|
|
struct componentname *cnp)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(dlabel);
|
|
|
|
if (vp != NULL) {
|
|
ASSERT_VNODE_LABEL(label);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_revoke(struct ucred *cred, struct vnode *vp,
|
|
struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_setacl(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, acl_type_t type, struct acl *acl)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_setextattr(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, int attrnamespace, const char *name, struct uio *uio)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_setflags(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, u_long flags)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_setmode(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, mode_t mode)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_setowner(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, uid_t uid, gid_t gid)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_setutimes(struct ucred *cred, struct vnode *vp,
|
|
struct label *label, struct timespec atime, struct timespec mtime)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(cred->cr_label);
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_stat(struct ucred *active_cred, struct ucred *file_cred,
|
|
struct vnode *vp, struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(active_cred->cr_label);
|
|
if (file_cred != NULL) {
|
|
ASSERT_CRED_LABEL(file_cred->cr_label);
|
|
}
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
mac_test_check_vnode_write(struct ucred *active_cred,
|
|
struct ucred *file_cred, struct vnode *vp, struct label *label)
|
|
{
|
|
|
|
ASSERT_CRED_LABEL(active_cred->cr_label);
|
|
if (file_cred != NULL) {
|
|
ASSERT_CRED_LABEL(file_cred->cr_label);
|
|
}
|
|
ASSERT_VNODE_LABEL(label);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static struct mac_policy_ops mac_test_ops =
|
|
{
|
|
.mpo_init_bpfdesc_label = mac_test_init_bpfdesc_label,
|
|
.mpo_init_cred_label = mac_test_init_cred_label,
|
|
.mpo_init_devfsdirent_label = mac_test_init_devfsdirent_label,
|
|
.mpo_init_ifnet_label = mac_test_init_ifnet_label,
|
|
.mpo_init_sysv_msgmsg_label = mac_test_init_sysv_msgmsg_label,
|
|
.mpo_init_sysv_msgqueue_label = mac_test_init_sysv_msgqueue_label,
|
|
.mpo_init_sysv_sem_label = mac_test_init_sysv_sem_label,
|
|
.mpo_init_sysv_shm_label = mac_test_init_sysv_shm_label,
|
|
.mpo_init_inpcb_label = mac_test_init_inpcb_label,
|
|
.mpo_init_ipq_label = mac_test_init_ipq_label,
|
|
.mpo_init_mbuf_label = mac_test_init_mbuf_label,
|
|
.mpo_init_mount_label = mac_test_init_mount_label,
|
|
.mpo_init_mount_fs_label = mac_test_init_mount_fs_label,
|
|
.mpo_init_pipe_label = mac_test_init_pipe_label,
|
|
.mpo_init_posix_sem_label = mac_test_init_posix_sem_label,
|
|
.mpo_init_proc_label = mac_test_init_proc_label,
|
|
.mpo_init_socket_label = mac_test_init_socket_label,
|
|
.mpo_init_socket_peer_label = mac_test_init_socket_peer_label,
|
|
.mpo_init_vnode_label = mac_test_init_vnode_label,
|
|
.mpo_destroy_bpfdesc_label = mac_test_destroy_bpfdesc_label,
|
|
.mpo_destroy_cred_label = mac_test_destroy_cred_label,
|
|
.mpo_destroy_devfsdirent_label = mac_test_destroy_devfsdirent_label,
|
|
.mpo_destroy_ifnet_label = mac_test_destroy_ifnet_label,
|
|
.mpo_destroy_sysv_msgmsg_label = mac_test_destroy_sysv_msgmsg_label,
|
|
.mpo_destroy_sysv_msgqueue_label =
|
|
mac_test_destroy_sysv_msgqueue_label,
|
|
.mpo_destroy_sysv_sem_label = mac_test_destroy_sysv_sem_label,
|
|
.mpo_destroy_sysv_shm_label = mac_test_destroy_sysv_shm_label,
|
|
.mpo_destroy_inpcb_label = mac_test_destroy_inpcb_label,
|
|
.mpo_destroy_ipq_label = mac_test_destroy_ipq_label,
|
|
.mpo_destroy_mbuf_label = mac_test_destroy_mbuf_label,
|
|
.mpo_destroy_mount_label = mac_test_destroy_mount_label,
|
|
.mpo_destroy_mount_fs_label = mac_test_destroy_mount_fs_label,
|
|
.mpo_destroy_pipe_label = mac_test_destroy_pipe_label,
|
|
.mpo_destroy_posix_sem_label = mac_test_destroy_posix_sem_label,
|
|
.mpo_destroy_proc_label = mac_test_destroy_proc_label,
|
|
.mpo_destroy_socket_label = mac_test_destroy_socket_label,
|
|
.mpo_destroy_socket_peer_label = mac_test_destroy_socket_peer_label,
|
|
.mpo_destroy_vnode_label = mac_test_destroy_vnode_label,
|
|
.mpo_copy_cred_label = mac_test_copy_cred_label,
|
|
.mpo_copy_ifnet_label = mac_test_copy_ifnet_label,
|
|
.mpo_copy_mbuf_label = mac_test_copy_mbuf_label,
|
|
.mpo_copy_pipe_label = mac_test_copy_pipe_label,
|
|
.mpo_copy_socket_label = mac_test_copy_socket_label,
|
|
.mpo_copy_vnode_label = mac_test_copy_vnode_label,
|
|
.mpo_externalize_cred_label = mac_test_externalize_label,
|
|
.mpo_externalize_ifnet_label = mac_test_externalize_label,
|
|
.mpo_externalize_pipe_label = mac_test_externalize_label,
|
|
.mpo_externalize_socket_label = mac_test_externalize_label,
|
|
.mpo_externalize_socket_peer_label = mac_test_externalize_label,
|
|
.mpo_externalize_vnode_label = mac_test_externalize_label,
|
|
.mpo_internalize_cred_label = mac_test_internalize_label,
|
|
.mpo_internalize_ifnet_label = mac_test_internalize_label,
|
|
.mpo_internalize_pipe_label = mac_test_internalize_label,
|
|
.mpo_internalize_socket_label = mac_test_internalize_label,
|
|
.mpo_internalize_vnode_label = mac_test_internalize_label,
|
|
.mpo_associate_vnode_devfs = mac_test_associate_vnode_devfs,
|
|
.mpo_associate_vnode_extattr = mac_test_associate_vnode_extattr,
|
|
.mpo_associate_vnode_singlelabel = mac_test_associate_vnode_singlelabel,
|
|
.mpo_create_devfs_device = mac_test_create_devfs_device,
|
|
.mpo_create_devfs_directory = mac_test_create_devfs_directory,
|
|
.mpo_create_devfs_symlink = mac_test_create_devfs_symlink,
|
|
.mpo_create_vnode_extattr = mac_test_create_vnode_extattr,
|
|
.mpo_create_mount = mac_test_create_mount,
|
|
.mpo_relabel_vnode = mac_test_relabel_vnode,
|
|
.mpo_setlabel_vnode_extattr = mac_test_setlabel_vnode_extattr,
|
|
.mpo_update_devfsdirent = mac_test_update_devfsdirent,
|
|
.mpo_create_mbuf_from_socket = mac_test_create_mbuf_from_socket,
|
|
.mpo_create_pipe = mac_test_create_pipe,
|
|
.mpo_create_posix_sem = mac_test_create_posix_sem,
|
|
.mpo_create_socket = mac_test_create_socket,
|
|
.mpo_create_socket_from_socket = mac_test_create_socket_from_socket,
|
|
.mpo_relabel_pipe = mac_test_relabel_pipe,
|
|
.mpo_relabel_socket = mac_test_relabel_socket,
|
|
.mpo_set_socket_peer_from_mbuf = mac_test_set_socket_peer_from_mbuf,
|
|
.mpo_set_socket_peer_from_socket = mac_test_set_socket_peer_from_socket,
|
|
.mpo_create_bpfdesc = mac_test_create_bpfdesc,
|
|
.mpo_create_ifnet = mac_test_create_ifnet,
|
|
.mpo_create_inpcb_from_socket = mac_test_create_inpcb_from_socket,
|
|
.mpo_create_sysv_msgmsg = mac_test_create_sysv_msgmsg,
|
|
.mpo_create_sysv_msgqueue = mac_test_create_sysv_msgqueue,
|
|
.mpo_create_sysv_sem = mac_test_create_sysv_sem,
|
|
.mpo_create_sysv_shm = mac_test_create_sysv_shm,
|
|
.mpo_create_datagram_from_ipq = mac_test_create_datagram_from_ipq,
|
|
.mpo_create_fragment = mac_test_create_fragment,
|
|
.mpo_create_ipq = mac_test_create_ipq,
|
|
.mpo_create_mbuf_from_inpcb = mac_test_create_mbuf_from_inpcb,
|
|
.mpo_create_mbuf_linklayer = mac_test_create_mbuf_linklayer,
|
|
.mpo_create_mbuf_from_bpfdesc = mac_test_create_mbuf_from_bpfdesc,
|
|
.mpo_create_mbuf_from_ifnet = mac_test_create_mbuf_from_ifnet,
|
|
.mpo_create_mbuf_multicast_encap = mac_test_create_mbuf_multicast_encap,
|
|
.mpo_create_mbuf_netlayer = mac_test_create_mbuf_netlayer,
|
|
.mpo_fragment_match = mac_test_fragment_match,
|
|
.mpo_reflect_mbuf_icmp = mac_test_reflect_mbuf_icmp,
|
|
.mpo_reflect_mbuf_tcp = mac_test_reflect_mbuf_tcp,
|
|
.mpo_relabel_ifnet = mac_test_relabel_ifnet,
|
|
.mpo_update_ipq = mac_test_update_ipq,
|
|
.mpo_inpcb_sosetlabel = mac_test_inpcb_sosetlabel,
|
|
.mpo_execve_transition = mac_test_execve_transition,
|
|
.mpo_execve_will_transition = mac_test_execve_will_transition,
|
|
.mpo_create_proc0 = mac_test_create_proc0,
|
|
.mpo_create_proc1 = mac_test_create_proc1,
|
|
.mpo_relabel_cred = mac_test_relabel_cred,
|
|
.mpo_thread_userret = mac_test_thread_userret,
|
|
.mpo_cleanup_sysv_msgmsg = mac_test_cleanup_sysv_msgmsg,
|
|
.mpo_cleanup_sysv_msgqueue = mac_test_cleanup_sysv_msgqueue,
|
|
.mpo_cleanup_sysv_sem = mac_test_cleanup_sysv_sem,
|
|
.mpo_cleanup_sysv_shm = mac_test_cleanup_sysv_shm,
|
|
.mpo_check_bpfdesc_receive = mac_test_check_bpfdesc_receive,
|
|
.mpo_check_cred_relabel = mac_test_check_cred_relabel,
|
|
.mpo_check_cred_visible = mac_test_check_cred_visible,
|
|
.mpo_check_ifnet_relabel = mac_test_check_ifnet_relabel,
|
|
.mpo_check_ifnet_transmit = mac_test_check_ifnet_transmit,
|
|
.mpo_check_inpcb_deliver = mac_test_check_inpcb_deliver,
|
|
.mpo_check_sysv_msgmsq = mac_test_check_sysv_msgmsq,
|
|
.mpo_check_sysv_msgrcv = mac_test_check_sysv_msgrcv,
|
|
.mpo_check_sysv_msgrmid = mac_test_check_sysv_msgrmid,
|
|
.mpo_check_sysv_msqget = mac_test_check_sysv_msqget,
|
|
.mpo_check_sysv_msqsnd = mac_test_check_sysv_msqsnd,
|
|
.mpo_check_sysv_msqrcv = mac_test_check_sysv_msqrcv,
|
|
.mpo_check_sysv_msqctl = mac_test_check_sysv_msqctl,
|
|
.mpo_check_sysv_semctl = mac_test_check_sysv_semctl,
|
|
.mpo_check_sysv_semget = mac_test_check_sysv_semget,
|
|
.mpo_check_sysv_semop = mac_test_check_sysv_semop,
|
|
.mpo_check_sysv_shmat = mac_test_check_sysv_shmat,
|
|
.mpo_check_sysv_shmctl = mac_test_check_sysv_shmctl,
|
|
.mpo_check_sysv_shmdt = mac_test_check_sysv_shmdt,
|
|
.mpo_check_sysv_shmget = mac_test_check_sysv_shmget,
|
|
.mpo_check_kenv_dump = mac_test_check_kenv_dump,
|
|
.mpo_check_kenv_get = mac_test_check_kenv_get,
|
|
.mpo_check_kenv_set = mac_test_check_kenv_set,
|
|
.mpo_check_kenv_unset = mac_test_check_kenv_unset,
|
|
.mpo_check_kld_load = mac_test_check_kld_load,
|
|
.mpo_check_kld_stat = mac_test_check_kld_stat,
|
|
.mpo_check_kld_unload = mac_test_check_kld_unload,
|
|
.mpo_check_mount_stat = mac_test_check_mount_stat,
|
|
.mpo_check_pipe_ioctl = mac_test_check_pipe_ioctl,
|
|
.mpo_check_pipe_poll = mac_test_check_pipe_poll,
|
|
.mpo_check_pipe_read = mac_test_check_pipe_read,
|
|
.mpo_check_pipe_relabel = mac_test_check_pipe_relabel,
|
|
.mpo_check_pipe_stat = mac_test_check_pipe_stat,
|
|
.mpo_check_pipe_write = mac_test_check_pipe_write,
|
|
.mpo_check_posix_sem_destroy = mac_test_check_posix_sem,
|
|
.mpo_check_posix_sem_getvalue = mac_test_check_posix_sem,
|
|
.mpo_check_posix_sem_open = mac_test_check_posix_sem,
|
|
.mpo_check_posix_sem_post = mac_test_check_posix_sem,
|
|
.mpo_check_posix_sem_unlink = mac_test_check_posix_sem,
|
|
.mpo_check_posix_sem_wait = mac_test_check_posix_sem,
|
|
.mpo_check_proc_debug = mac_test_check_proc_debug,
|
|
.mpo_check_proc_sched = mac_test_check_proc_sched,
|
|
.mpo_check_proc_setaudit = mac_test_check_proc_setaudit,
|
|
.mpo_check_proc_setauid = mac_test_check_proc_setauid,
|
|
.mpo_check_proc_setuid = mac_test_check_proc_setuid,
|
|
.mpo_check_proc_seteuid = mac_test_check_proc_seteuid,
|
|
.mpo_check_proc_setgid = mac_test_check_proc_setgid,
|
|
.mpo_check_proc_setegid = mac_test_check_proc_setegid,
|
|
.mpo_check_proc_setgroups = mac_test_check_proc_setgroups,
|
|
.mpo_check_proc_setreuid = mac_test_check_proc_setreuid,
|
|
.mpo_check_proc_setregid = mac_test_check_proc_setregid,
|
|
.mpo_check_proc_setresuid = mac_test_check_proc_setresuid,
|
|
.mpo_check_proc_setresgid = mac_test_check_proc_setresgid,
|
|
.mpo_check_proc_signal = mac_test_check_proc_signal,
|
|
.mpo_check_proc_wait = mac_test_check_proc_wait,
|
|
.mpo_check_socket_accept = mac_test_check_socket_accept,
|
|
.mpo_check_socket_bind = mac_test_check_socket_bind,
|
|
.mpo_check_socket_connect = mac_test_check_socket_connect,
|
|
.mpo_check_socket_deliver = mac_test_check_socket_deliver,
|
|
.mpo_check_socket_listen = mac_test_check_socket_listen,
|
|
.mpo_check_socket_poll = mac_test_check_socket_poll,
|
|
.mpo_check_socket_receive = mac_test_check_socket_receive,
|
|
.mpo_check_socket_relabel = mac_test_check_socket_relabel,
|
|
.mpo_check_socket_send = mac_test_check_socket_send,
|
|
.mpo_check_socket_stat = mac_test_check_socket_stat,
|
|
.mpo_check_socket_visible = mac_test_check_socket_visible,
|
|
.mpo_check_sysarch_ioperm = mac_test_check_sysarch_ioperm,
|
|
.mpo_check_system_acct = mac_test_check_system_acct,
|
|
.mpo_check_system_audit = mac_test_check_system_audit,
|
|
.mpo_check_system_auditctl = mac_test_check_system_auditctl,
|
|
.mpo_check_system_auditon = mac_test_check_system_auditon,
|
|
.mpo_check_system_reboot = mac_test_check_system_reboot,
|
|
.mpo_check_system_settime = mac_test_check_system_settime,
|
|
.mpo_check_system_swapoff = mac_test_check_system_swapoff,
|
|
.mpo_check_system_swapon = mac_test_check_system_swapon,
|
|
.mpo_check_system_sysctl = mac_test_check_system_sysctl,
|
|
.mpo_check_vnode_access = mac_test_check_vnode_access,
|
|
.mpo_check_vnode_chdir = mac_test_check_vnode_chdir,
|
|
.mpo_check_vnode_chroot = mac_test_check_vnode_chroot,
|
|
.mpo_check_vnode_create = mac_test_check_vnode_create,
|
|
.mpo_check_vnode_delete = mac_test_check_vnode_delete,
|
|
.mpo_check_vnode_deleteacl = mac_test_check_vnode_deleteacl,
|
|
.mpo_check_vnode_deleteextattr = mac_test_check_vnode_deleteextattr,
|
|
.mpo_check_vnode_exec = mac_test_check_vnode_exec,
|
|
.mpo_check_vnode_getacl = mac_test_check_vnode_getacl,
|
|
.mpo_check_vnode_getextattr = mac_test_check_vnode_getextattr,
|
|
.mpo_check_vnode_link = mac_test_check_vnode_link,
|
|
.mpo_check_vnode_listextattr = mac_test_check_vnode_listextattr,
|
|
.mpo_check_vnode_lookup = mac_test_check_vnode_lookup,
|
|
.mpo_check_vnode_mmap = mac_test_check_vnode_mmap,
|
|
.mpo_check_vnode_open = mac_test_check_vnode_open,
|
|
.mpo_check_vnode_poll = mac_test_check_vnode_poll,
|
|
.mpo_check_vnode_read = mac_test_check_vnode_read,
|
|
.mpo_check_vnode_readdir = mac_test_check_vnode_readdir,
|
|
.mpo_check_vnode_readlink = mac_test_check_vnode_readlink,
|
|
.mpo_check_vnode_relabel = mac_test_check_vnode_relabel,
|
|
.mpo_check_vnode_rename_from = mac_test_check_vnode_rename_from,
|
|
.mpo_check_vnode_rename_to = mac_test_check_vnode_rename_to,
|
|
.mpo_check_vnode_revoke = mac_test_check_vnode_revoke,
|
|
.mpo_check_vnode_setacl = mac_test_check_vnode_setacl,
|
|
.mpo_check_vnode_setextattr = mac_test_check_vnode_setextattr,
|
|
.mpo_check_vnode_setflags = mac_test_check_vnode_setflags,
|
|
.mpo_check_vnode_setmode = mac_test_check_vnode_setmode,
|
|
.mpo_check_vnode_setowner = mac_test_check_vnode_setowner,
|
|
.mpo_check_vnode_setutimes = mac_test_check_vnode_setutimes,
|
|
.mpo_check_vnode_stat = mac_test_check_vnode_stat,
|
|
.mpo_check_vnode_write = mac_test_check_vnode_write,
|
|
};
|
|
|
|
MAC_POLICY_SET(&mac_test_ops, mac_test, "TrustedBSD MAC/Test",
|
|
MPC_LOADTIME_FLAG_UNLOADOK | MPC_LOADTIME_FLAG_LABELMBUFS, &test_slot);
|