The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/security/mac/mac_pipe.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2002-2003 Networks Associates Technology, Inc.
    3  * Copyright (c) 2006 SPARTA, Inc.
    4  * Copyright (c) 2009 Robert N. M. Watson
    5  * All rights reserved.
    6  *
    7  * This software was developed for the FreeBSD Project in part by Network
    8  * Associates Laboratories, the Security Research Division of Network
    9  * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
   10  * as part of the DARPA CHATS research program.
   11  *
   12  * This software was enhanced by SPARTA ISSO under SPAWAR contract
   13  * N66001-04-C-6019 ("SEFOS").
   14  *
   15  * This software was developed at the University of Cambridge Computer
   16  * Laboratory with support from a grant from Google, Inc. 
   17  *
   18  * Redistribution and use in source and binary forms, with or without
   19  * modification, are permitted provided that the following conditions
   20  * are met:
   21  * 1. Redistributions of source code must retain the above copyright
   22  *    notice, this list of conditions and the following disclaimer.
   23  * 2. Redistributions in binary form must reproduce the above copyright
   24  *    notice, this list of conditions and the following disclaimer in the
   25  *    documentation and/or other materials provided with the distribution.
   26  *
   27  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   28  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   29  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   30  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   31  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   32  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   33  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   34  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   35  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   36  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   37  * SUCH DAMAGE.
   38  */
   39 
   40 #include <sys/cdefs.h>
   41 __FBSDID("$FreeBSD: releng/8.0/sys/security/mac/mac_pipe.c 191731 2009-05-01 21:05:40Z rwatson $");
   42 
   43 #include "opt_kdtrace.h"
   44 #include "opt_mac.h"
   45 
   46 #include <sys/param.h>
   47 #include <sys/kernel.h>
   48 #include <sys/lock.h>
   49 #include <sys/malloc.h>
   50 #include <sys/module.h>
   51 #include <sys/mutex.h>
   52 #include <sys/sbuf.h>
   53 #include <sys/sdt.h>
   54 #include <sys/systm.h>
   55 #include <sys/vnode.h>
   56 #include <sys/pipe.h>
   57 #include <sys/sysctl.h>
   58 
   59 #include <security/mac/mac_framework.h>
   60 #include <security/mac/mac_internal.h>
   61 #include <security/mac/mac_policy.h>
   62 
   63 struct label *
   64 mac_pipe_label_alloc(void)
   65 {
   66         struct label *label;
   67 
   68         label = mac_labelzone_alloc(M_WAITOK);
   69         MAC_POLICY_PERFORM(pipe_init_label, label);
   70         return (label);
   71 }
   72 
   73 void
   74 mac_pipe_init(struct pipepair *pp)
   75 {
   76 
   77         if (mac_labeled & MPC_OBJECT_PIPE)
   78                 pp->pp_label = mac_pipe_label_alloc();
   79         else
   80                 pp->pp_label = NULL;
   81 }
   82 
   83 void
   84 mac_pipe_label_free(struct label *label)
   85 {
   86 
   87         MAC_POLICY_PERFORM_NOSLEEP(pipe_destroy_label, label);
   88         mac_labelzone_free(label);
   89 }
   90 
   91 void
   92 mac_pipe_destroy(struct pipepair *pp)
   93 {
   94 
   95         if (pp->pp_label != NULL) {
   96                 mac_pipe_label_free(pp->pp_label);
   97                 pp->pp_label = NULL;
   98         }
   99 }
  100 
  101 void
  102 mac_pipe_copy_label(struct label *src, struct label *dest)
  103 {
  104 
  105         MAC_POLICY_PERFORM_NOSLEEP(pipe_copy_label, src, dest);
  106 }
  107 
  108 int
  109 mac_pipe_externalize_label(struct label *label, char *elements,
  110     char *outbuf, size_t outbuflen)
  111 {
  112         int error;
  113 
  114         MAC_POLICY_EXTERNALIZE(pipe, label, elements, outbuf, outbuflen);
  115 
  116         return (error);
  117 }
  118 
  119 int
  120 mac_pipe_internalize_label(struct label *label, char *string)
  121 {
  122         int error;
  123 
  124         MAC_POLICY_INTERNALIZE(pipe, label, string);
  125 
  126         return (error);
  127 }
  128 
  129 void
  130 mac_pipe_create(struct ucred *cred, struct pipepair *pp)
  131 {
  132 
  133         MAC_POLICY_PERFORM_NOSLEEP(pipe_create, cred, pp, pp->pp_label);
  134 }
  135 
  136 static void
  137 mac_pipe_relabel(struct ucred *cred, struct pipepair *pp,
  138     struct label *newlabel)
  139 {
  140 
  141         MAC_POLICY_PERFORM_NOSLEEP(pipe_relabel, cred, pp, pp->pp_label,
  142             newlabel);
  143 }
  144 
  145 MAC_CHECK_PROBE_DEFINE4(pipe_check_ioctl, "struct ucred *",
  146     "struct pipepair *", "unsigned long", "void *");
  147 
  148 int
  149 mac_pipe_check_ioctl(struct ucred *cred, struct pipepair *pp,
  150     unsigned long cmd, void *data)
  151 {
  152         int error;
  153 
  154         mtx_assert(&pp->pp_mtx, MA_OWNED);
  155 
  156         MAC_POLICY_CHECK_NOSLEEP(pipe_check_ioctl, cred, pp, pp->pp_label,
  157             cmd, data);
  158         MAC_CHECK_PROBE4(pipe_check_ioctl, error, cred, pp, cmd, data);
  159 
  160         return (error);
  161 }
  162 
  163 MAC_CHECK_PROBE_DEFINE2(pipe_check_poll, "struct ucred *",
  164     "struct pipepair *");
  165 
  166 int
  167 mac_pipe_check_poll(struct ucred *cred, struct pipepair *pp)
  168 {
  169         int error;
  170 
  171         mtx_assert(&pp->pp_mtx, MA_OWNED);
  172 
  173         MAC_POLICY_CHECK_NOSLEEP(pipe_check_poll, cred, pp, pp->pp_label);
  174         MAC_CHECK_PROBE2(pipe_check_poll, error, cred, pp);
  175 
  176         return (error);
  177 }
  178 
  179 MAC_CHECK_PROBE_DEFINE2(pipe_check_read, "struct ucred *",
  180     "struct pipepair *");
  181 
  182 int
  183 mac_pipe_check_read(struct ucred *cred, struct pipepair *pp)
  184 {
  185         int error;
  186 
  187         mtx_assert(&pp->pp_mtx, MA_OWNED);
  188 
  189         MAC_POLICY_CHECK_NOSLEEP(pipe_check_read, cred, pp, pp->pp_label);
  190         MAC_CHECK_PROBE2(pipe_check_read, error, cred, pp);
  191 
  192         return (error);
  193 }
  194 
  195 MAC_CHECK_PROBE_DEFINE3(pipe_check_relabel, "struct ucred *",
  196     "struct pipepair *", "struct label *");
  197 
  198 static int
  199 mac_pipe_check_relabel(struct ucred *cred, struct pipepair *pp,
  200     struct label *newlabel)
  201 {
  202         int error;
  203 
  204         mtx_assert(&pp->pp_mtx, MA_OWNED);
  205 
  206         MAC_POLICY_CHECK_NOSLEEP(pipe_check_relabel, cred, pp, pp->pp_label,
  207             newlabel);
  208         MAC_CHECK_PROBE3(pipe_check_relabel, error, cred, pp, newlabel);
  209 
  210         return (error);
  211 }
  212 
  213 MAC_CHECK_PROBE_DEFINE2(pipe_check_stat, "struct ucred *",
  214     "struct pipepair *");
  215 
  216 int
  217 mac_pipe_check_stat(struct ucred *cred, struct pipepair *pp)
  218 {
  219         int error;
  220 
  221         mtx_assert(&pp->pp_mtx, MA_OWNED);
  222 
  223         MAC_POLICY_CHECK_NOSLEEP(pipe_check_stat, cred, pp, pp->pp_label);
  224         MAC_CHECK_PROBE2(pipe_check_stat, error, cred, pp);
  225 
  226         return (error);
  227 }
  228 
  229 MAC_CHECK_PROBE_DEFINE2(pipe_check_write, "struct ucred *",
  230     "struct pipepair *");
  231 
  232 int
  233 mac_pipe_check_write(struct ucred *cred, struct pipepair *pp)
  234 {
  235         int error;
  236 
  237         mtx_assert(&pp->pp_mtx, MA_OWNED);
  238 
  239         MAC_POLICY_CHECK_NOSLEEP(pipe_check_write, cred, pp, pp->pp_label);
  240         MAC_CHECK_PROBE2(pipe_check_write, error, cred, pp);
  241 
  242         return (error);
  243 }
  244 
  245 int
  246 mac_pipe_label_set(struct ucred *cred, struct pipepair *pp,
  247     struct label *label)
  248 {
  249         int error;
  250 
  251         mtx_assert(&pp->pp_mtx, MA_OWNED);
  252 
  253         error = mac_pipe_check_relabel(cred, pp, label);
  254         if (error)
  255                 return (error);
  256 
  257         mac_pipe_relabel(cred, pp, label);
  258 
  259         return (0);
  260 }

Cache object: fed1b5780cf7de052d83419b7e6f8dda


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.