The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/security/mac/mac_posix_sem.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2003-2005 SPARTA, Inc.
    3  * All rights reserved.
    4  *
    5  * This software was developed for the FreeBSD Project in part by Network
    6  * Associates Laboratories, the Security Research Division of Network
    7  * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
    8  * as part of the DARPA CHATS research program.
    9  *
   10  * Redistribution and use in source and binary forms, with or without
   11  * modification, are permitted provided that the following conditions
   12  * are met:
   13  * 1. Redistributions of source code must retain the above copyright
   14  *    notice, this list of conditions and the following disclaimer.
   15  * 2. Redistributions in binary form must reproduce the above copyright
   16  *    notice, this list of conditions and the following disclaimer in the
   17  *    documentation and/or other materials provided with the distribution.
   18  *
   19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   29  * SUCH DAMAGE.
   30  */
   31 
   32 #include <sys/cdefs.h>
   33 __FBSDID("$FreeBSD$");
   34 
   35 #include "opt_mac.h"
   36 #include "opt_posix.h"
   37 
   38 #include <sys/param.h>
   39 #include <sys/kernel.h>
   40 #include <sys/malloc.h>
   41 #include <sys/mac.h>
   42 #include <sys/module.h>
   43 #include <sys/systm.h>
   44 #include <sys/sysctl.h>
   45 
   46 #include <posix4/ksem.h>
   47 
   48 #include <sys/mac_policy.h>
   49 
   50 #include <security/mac/mac_internal.h>
   51 
   52 static int      mac_enforce_posix_sem = 1;
   53 SYSCTL_INT(_security_mac, OID_AUTO, enforce_posix_sem, CTLFLAG_RW,
   54     &mac_enforce_posix_sem, 0, "Enforce MAC policy on global POSIX semaphores");
   55 TUNABLE_INT("security.mac.enforce_posix_sem", &mac_enforce_posix_sem);
   56 
   57 #ifdef MAC_DEBUG
   58 static unsigned int nmacposixsems;
   59 SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, posix_sems, CTLFLAG_RD,
   60     &nmacposixsems, 0, "number of posix global semaphores inuse");
   61 #endif
   62 
   63 static struct label *
   64 mac_posix_sem_label_alloc(void)
   65 {
   66         struct label *label;
   67 
   68         label = mac_labelzone_alloc(M_WAITOK);
   69         MAC_PERFORM(init_posix_sem_label, label);
   70         MAC_DEBUG_COUNTER_INC(&nmacposixsems);
   71         return (label);
   72 }
   73 
   74 void 
   75 mac_init_posix_sem(struct ksem *ksemptr)
   76 {
   77 
   78         ksemptr->ks_label = mac_posix_sem_label_alloc();
   79 }
   80 
   81 static void
   82 mac_posix_sem_label_free(struct label *label)
   83 {
   84 
   85         MAC_PERFORM(destroy_posix_sem_label, label);
   86         mac_labelzone_free(label);
   87         MAC_DEBUG_COUNTER_DEC(&nmacposixsems);
   88 }
   89 
   90 void
   91 mac_destroy_posix_sem(struct ksem *ksemptr)
   92 {
   93 
   94         mac_posix_sem_label_free(ksemptr->ks_label);
   95         ksemptr->ks_label = NULL;
   96 }
   97 
   98 void 
   99 mac_create_posix_sem(struct ucred *cred, struct ksem *ksemptr)
  100 {
  101 
  102         MAC_PERFORM(create_posix_sem, cred, ksemptr, ksemptr->ks_label);
  103 }
  104 
  105 int
  106 mac_check_posix_sem_destroy(struct ucred *cred, struct ksem *ksemptr)
  107 {
  108         int error;
  109 
  110         if (!mac_enforce_posix_sem)
  111                 return (0);
  112 
  113         MAC_CHECK(check_posix_sem_destroy, cred, ksemptr, ksemptr->ks_label);
  114 
  115         return(error);
  116 }
  117 
  118 int
  119 mac_check_posix_sem_open(struct ucred *cred, struct ksem *ksemptr)
  120 {
  121         int error;
  122 
  123         if (!mac_enforce_posix_sem)
  124                 return (0);
  125 
  126         MAC_CHECK(check_posix_sem_open, cred, ksemptr, ksemptr->ks_label);
  127 
  128         return(error);
  129 }
  130 
  131 int
  132 mac_check_posix_sem_getvalue(struct ucred *cred, struct ksem *ksemptr)
  133 {
  134         int error;
  135 
  136         if (!mac_enforce_posix_sem)
  137                 return (0);
  138 
  139         MAC_CHECK(check_posix_sem_getvalue, cred, ksemptr,
  140             ksemptr->ks_label);
  141 
  142         return(error);
  143 }
  144 
  145 int
  146 mac_check_posix_sem_post(struct ucred *cred, struct ksem *ksemptr)
  147 {
  148         int error;
  149 
  150         if (!mac_enforce_posix_sem)
  151                 return (0);
  152 
  153         MAC_CHECK(check_posix_sem_post, cred, ksemptr, ksemptr->ks_label);
  154 
  155         return(error);
  156 }
  157 
  158 int
  159 mac_check_posix_sem_unlink(struct ucred *cred, struct ksem *ksemptr)
  160 {
  161         int error;
  162 
  163         if (!mac_enforce_posix_sem)
  164                 return (0);
  165 
  166         MAC_CHECK(check_posix_sem_unlink, cred, ksemptr, ksemptr->ks_label);
  167 
  168         return(error);
  169 }
  170 
  171 int
  172 mac_check_posix_sem_wait(struct ucred *cred, struct ksem *ksemptr)
  173 {
  174         int error;
  175 
  176         if (!mac_enforce_posix_sem)
  177                 return (0);
  178 
  179         MAC_CHECK(check_posix_sem_wait, cred, ksemptr, ksemptr->ks_label);
  180 
  181         return(error);
  182 }

Cache object: 4297c86c346b2f319cbb485198b40673


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.