1 /*- 2 * Copyright (c) 2002, 2003 Networks Associates Technology, Inc. 3 * All rights reserved. 4 * 5 * This software was developed for the FreeBSD Project in part by Network 6 * Associates Laboratories, the Security Research Division of Network 7 * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), 8 * as part of the DARPA CHATS research program. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #include <sys/cdefs.h> 33 __FBSDID("$FreeBSD$"); 34 35 #include "opt_mac.h" 36 37 #include <sys/param.h> 38 #include <sys/kernel.h> 39 #include <sys/lock.h> 40 #include <sys/malloc.h> 41 #include <sys/module.h> 42 #include <sys/mutex.h> 43 #include <sys/mac.h> 44 #include <sys/sbuf.h> 45 #include <sys/systm.h> 46 #include <sys/vnode.h> 47 #include <sys/pipe.h> 48 #include <sys/sysctl.h> 49 50 #include <sys/mac_policy.h> 51 52 #include <security/mac/mac_framework.h> 53 #include <security/mac/mac_internal.h> 54 55 static int mac_enforce_pipe = 1; 56 SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW, 57 &mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations"); 58 TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe); 59 60 struct label * 61 mac_pipe_label_alloc(void) 62 { 63 struct label *label; 64 65 label = mac_labelzone_alloc(M_WAITOK); 66 MAC_PERFORM(init_pipe_label, label); 67 return (label); 68 } 69 70 void 71 mac_init_pipe(struct pipepair *pp) 72 { 73 74 pp->pp_label = mac_pipe_label_alloc(); 75 } 76 77 void 78 mac_pipe_label_free(struct label *label) 79 { 80 81 MAC_PERFORM(destroy_pipe_label, label); 82 mac_labelzone_free(label); 83 } 84 85 void 86 mac_destroy_pipe(struct pipepair *pp) 87 { 88 89 mac_pipe_label_free(pp->pp_label); 90 pp->pp_label = NULL; 91 } 92 93 void 94 mac_copy_pipe_label(struct label *src, struct label *dest) 95 { 96 97 MAC_PERFORM(copy_pipe_label, src, dest); 98 } 99 100 int 101 mac_externalize_pipe_label(struct label *label, char *elements, 102 char *outbuf, size_t outbuflen) 103 { 104 int error; 105 106 MAC_EXTERNALIZE(pipe, label, elements, outbuf, outbuflen); 107 108 return (error); 109 } 110 111 int 112 mac_internalize_pipe_label(struct label *label, char *string) 113 { 114 int error; 115 116 MAC_INTERNALIZE(pipe, label, string); 117 118 return (error); 119 } 120 121 void 122 mac_create_pipe(struct ucred *cred, struct pipepair *pp) 123 { 124 125 MAC_PERFORM(create_pipe, cred, pp, pp->pp_label); 126 } 127 128 static void 129 mac_relabel_pipe(struct ucred *cred, struct pipepair *pp, 130 struct label *newlabel) 131 { 132 133 MAC_PERFORM(relabel_pipe, cred, pp, pp->pp_label, newlabel); 134 } 135 136 int 137 mac_check_pipe_ioctl(struct ucred *cred, struct pipepair *pp, 138 unsigned long cmd, void *data) 139 { 140 int error; 141 142 mtx_assert(&pp->pp_mtx, MA_OWNED); 143 144 if (!mac_enforce_pipe) 145 return (0); 146 147 MAC_CHECK(check_pipe_ioctl, cred, pp, pp->pp_label, cmd, data); 148 149 return (error); 150 } 151 152 int 153 mac_check_pipe_poll(struct ucred *cred, struct pipepair *pp) 154 { 155 int error; 156 157 mtx_assert(&pp->pp_mtx, MA_OWNED); 158 159 if (!mac_enforce_pipe) 160 return (0); 161 162 MAC_CHECK(check_pipe_poll, cred, pp, pp->pp_label); 163 164 return (error); 165 } 166 167 int 168 mac_check_pipe_read(struct ucred *cred, struct pipepair *pp) 169 { 170 int error; 171 172 mtx_assert(&pp->pp_mtx, MA_OWNED); 173 174 if (!mac_enforce_pipe) 175 return (0); 176 177 MAC_CHECK(check_pipe_read, cred, pp, pp->pp_label); 178 179 return (error); 180 } 181 182 static int 183 mac_check_pipe_relabel(struct ucred *cred, struct pipepair *pp, 184 struct label *newlabel) 185 { 186 int error; 187 188 mtx_assert(&pp->pp_mtx, MA_OWNED); 189 190 if (!mac_enforce_pipe) 191 return (0); 192 193 MAC_CHECK(check_pipe_relabel, cred, pp, pp->pp_label, newlabel); 194 195 return (error); 196 } 197 198 int 199 mac_check_pipe_stat(struct ucred *cred, struct pipepair *pp) 200 { 201 int error; 202 203 mtx_assert(&pp->pp_mtx, MA_OWNED); 204 205 if (!mac_enforce_pipe) 206 return (0); 207 208 MAC_CHECK(check_pipe_stat, cred, pp, pp->pp_label); 209 210 return (error); 211 } 212 213 int 214 mac_check_pipe_write(struct ucred *cred, struct pipepair *pp) 215 { 216 int error; 217 218 mtx_assert(&pp->pp_mtx, MA_OWNED); 219 220 if (!mac_enforce_pipe) 221 return (0); 222 223 MAC_CHECK(check_pipe_write, cred, pp, pp->pp_label); 224 225 return (error); 226 } 227 228 int 229 mac_pipe_label_set(struct ucred *cred, struct pipepair *pp, 230 struct label *label) 231 { 232 int error; 233 234 mtx_assert(&pp->pp_mtx, MA_OWNED); 235 236 error = mac_check_pipe_relabel(cred, pp, label); 237 if (error) 238 return (error); 239 240 mac_relabel_pipe(cred, pp, label); 241 242 return (0); 243 } 244