The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/security/mac/mac_posix_shm.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2003-2006 SPARTA, Inc.
    3  * Copyright (c) 2009-2011 Robert N. M. Watson
    4  * All rights reserved.
    5  *
    6  * This software was developed for the FreeBSD Project in part by Network
    7  * Associates Laboratories, the Security Research Division of Network
    8  * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
    9  * as part of the DARPA CHATS research program.
   10  *
   11  * This software was enhanced by SPARTA ISSO under SPAWAR contract
   12  * N66001-04-C-6019 ("SEFOS"). *
   13  *
   14  * This software was developed at the University of Cambridge Computer
   15  * Laboratory with support from a grant from Google, Inc. 
   16  *
   17  * Redistribution and use in source and binary forms, with or without
   18  * modification, are permitted provided that the following conditions
   19  * are met:
   20  * 1. Redistributions of source code must retain the above copyright
   21  *    notice, this list of conditions and the following disclaimer.
   22  * 2. Redistributions in binary form must reproduce the above copyright
   23  *    notice, this list of conditions and the following disclaimer in the
   24  *    documentation and/or other materials provided with the distribution.
   25  *
   26  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   27  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   28  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   29  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   30  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   31  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   32  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   33  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   34  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   35  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   36  * SUCH DAMAGE.
   37  */
   38 
   39 #include <sys/cdefs.h>
   40 __FBSDID("$FreeBSD: releng/9.1/sys/security/mac/mac_posix_shm.c 225344 2011-09-02 17:40:39Z rwatson $");
   41 
   42 #include "opt_kdtrace.h"
   43 #include "opt_mac.h"
   44 
   45 #include <sys/param.h>
   46 #include <sys/kernel.h>
   47 #include <sys/mman.h>
   48 #include <sys/malloc.h>
   49 #include <sys/module.h>
   50 #include <sys/sdt.h>
   51 #include <sys/systm.h>
   52 #include <sys/sysctl.h>
   53 
   54 #include <security/mac/mac_framework.h>
   55 #include <security/mac/mac_internal.h>
   56 #include <security/mac/mac_policy.h>
   57 
   58 static struct label *
   59 mac_posixshm_label_alloc(void)
   60 {
   61         struct label *label;
   62 
   63         label = mac_labelzone_alloc(M_WAITOK);
   64         MAC_POLICY_PERFORM(posixshm_init_label, label);
   65         return (label);
   66 }
   67 
   68 void
   69 mac_posixshm_init(struct shmfd *shmfd)
   70 {
   71 
   72         if (mac_labeled & MPC_OBJECT_POSIXSHM)
   73                 shmfd->shm_label = mac_posixshm_label_alloc();
   74         else
   75                 shmfd->shm_label = NULL;
   76 }
   77 
   78 static void
   79 mac_posixshm_label_free(struct label *label)
   80 {
   81 
   82         MAC_POLICY_PERFORM_NOSLEEP(posixshm_destroy_label, label);
   83         mac_labelzone_free(label);
   84 }
   85 
   86 void
   87 mac_posixshm_destroy(struct shmfd *shmfd)
   88 {
   89 
   90         if (shmfd->shm_label != NULL) {
   91                 mac_posixshm_label_free(shmfd->shm_label);
   92                 shmfd->shm_label = NULL;
   93         }
   94 }
   95 
   96 void
   97 mac_posixshm_create(struct ucred *cred, struct shmfd *shmfd)
   98 {
   99 
  100         MAC_POLICY_PERFORM_NOSLEEP(posixshm_create, cred, shmfd,
  101             shmfd->shm_label);
  102 }
  103 
  104 MAC_CHECK_PROBE_DEFINE2(posixshm_check_create, "struct ucred *",
  105     "const char *");
  106 
  107 int
  108 mac_posixshm_check_create(struct ucred *cred, const char *path)
  109 {
  110         int error;
  111 
  112         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_create, cred, path);
  113         MAC_CHECK_PROBE2(posixshm_check_create, error, cred, path);
  114 
  115         return (error);
  116 }
  117 
  118 MAC_CHECK_PROBE_DEFINE4(posixshm_check_mmap, "struct ucred *",
  119     "struct shmfd *", "int", "int");
  120 
  121 int
  122 mac_posixshm_check_mmap(struct ucred *cred, struct shmfd *shmfd, int prot,
  123     int flags)
  124 {
  125         int error;
  126 
  127         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_mmap, cred, shmfd,
  128             shmfd->shm_label, prot, flags);
  129         MAC_CHECK_PROBE4(posixshm_check_mmap, error, cred, shmfd, prot,
  130             flags);
  131 
  132         return (error);
  133 }
  134 
  135 MAC_CHECK_PROBE_DEFINE3(posixshm_check_open, "struct ucred *",
  136     "struct shmfd *", "accmode_t accmode");
  137 
  138 int
  139 mac_posixshm_check_open(struct ucred *cred, struct shmfd *shmfd,
  140     accmode_t accmode)
  141 {
  142         int error;
  143 
  144         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_open, cred, shmfd,
  145             shmfd->shm_label, accmode);
  146         MAC_CHECK_PROBE3(posixshm_check_open, error, cred, shmfd, accmode);
  147 
  148         return (error);
  149 }
  150 
  151 MAC_CHECK_PROBE_DEFINE3(posixshm_check_stat, "struct ucred *",
  152     "struct ucred *", "struct shmfd *");
  153 
  154 int
  155 mac_posixshm_check_stat(struct ucred *active_cred, struct ucred *file_cred,
  156     struct shmfd *shmfd)
  157 {
  158         int error;
  159 
  160         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_stat, active_cred, file_cred,
  161             shmfd, shmfd->shm_label);
  162         MAC_CHECK_PROBE3(posixshm_check_stat, error, active_cred, file_cred,
  163             shmfd);
  164 
  165         return (error);
  166 }
  167 
  168 MAC_CHECK_PROBE_DEFINE3(posixshm_check_truncate, "struct ucred *",
  169     "struct ucred *", "struct shmfd *");
  170 
  171 int
  172 mac_posixshm_check_truncate(struct ucred *active_cred, struct ucred *file_cred,
  173     struct shmfd *shmfd)
  174 {
  175         int error;
  176 
  177         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_truncate, active_cred,
  178             file_cred, shmfd, shmfd->shm_label);
  179         MAC_CHECK_PROBE3(posixshm_check_truncate, error, active_cred,
  180             file_cred, shmfd);
  181 
  182         return (error);
  183 }
  184 
  185 MAC_CHECK_PROBE_DEFINE2(posixshm_check_unlink, "struct ucred *",
  186     "struct shmfd *");
  187 
  188 int
  189 mac_posixshm_check_unlink(struct ucred *cred, struct shmfd *shmfd)
  190 {
  191         int error;
  192 
  193         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_unlink, cred, shmfd,
  194             shmfd->shm_label);
  195         MAC_CHECK_PROBE2(posixshm_check_unlink, error, cred, shmfd);
  196 
  197         return (error);
  198 }
  199 
  200 MAC_CHECK_PROBE_DEFINE3(posixshm_check_setmode, "struct ucred *",
  201     "struct shmfd *", "mode_t");
  202 
  203 int
  204 mac_posixshm_check_setmode(struct ucred *cred, struct shmfd *shmfd, mode_t mode)
  205 {
  206         int error;
  207 
  208         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_setmode, cred, shmfd,
  209             shmfd->shm_label, mode);
  210         MAC_CHECK_PROBE3(posixshm_check_setmode, error, cred, shmfd, mode);
  211 
  212         return (error);
  213 }
  214 
  215 MAC_CHECK_PROBE_DEFINE4(posixshm_check_setowner, "struct ucred *",
  216     "struct shmfd *", "uid_t", "gid_t");
  217 
  218 int
  219 mac_posixshm_check_setowner(struct ucred *cred, struct shmfd *shmfd, uid_t uid,
  220     gid_t gid)
  221 {
  222         int error;
  223 
  224         MAC_POLICY_CHECK_NOSLEEP(posixshm_check_setowner, cred, shmfd,
  225             shmfd->shm_label, uid, gid);
  226         MAC_CHECK_PROBE4(posixshm_check_setowner, error, cred, shmfd,
  227             uid, gid);
  228 
  229         return (error);
  230 }

Cache object: 15448f1224bdd32cf9530730ba176265


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.