Changeset View
Changeset View
Standalone View
Standalone View
sys/security/mac_read_dir/mac_read_dir.c
- This file was added.
/*- | |||||
* SPDX-License-Identifier: BSD-2-Clause-FreeBSD | |||||
* | |||||
* Copyright (c) 2020 Kyle Evans <kevans@FreeBSD.org> | |||||
* | |||||
* Redistribution and use in source and binary forms, with or without | |||||
* modification, are permitted provided that the following conditions | |||||
* are met: | |||||
* 1. Redistributions of source code must retain the above copyright | |||||
* notice, this list of conditions and the following disclaimer. | |||||
* 2. Redistributions in binary form must reproduce the above copyright | |||||
* notice, this list of conditions and the following disclaimer in the | |||||
* documentation and/or other materials provided with the distribution. | |||||
* | |||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND | |||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |||||
* SUCH DAMAGE. | |||||
* | |||||
* $FreeBSD$ | |||||
*/ | |||||
#include <sys/param.h> | |||||
#include <sys/jail.h> | |||||
#include <sys/kernel.h> | |||||
#include <sys/module.h> | |||||
#include <sys/priv.h> | |||||
#include <sys/sysctl.h> | |||||
#include <sys/ucred.h> | |||||
#include <security/mac/mac_policy.h> | |||||
SYSCTL_DECL(_security_mac); | |||||
static SYSCTL_NODE(_security_mac, OID_AUTO, read_dir, | |||||
CTLFLAG_RW | CTLFLAG_MPSAFE, 0, | |||||
"mac_read_dir policy controls"); | |||||
static int read_dir_enabled = 1; | |||||
SYSCTL_INT(_security_mac_read_dir, OID_AUTO, enabled, CTLFLAG_RWTUN, | |||||
&read_dir_enabled, 0, "Enable mac_read_dir policy"); | |||||
static int read_dir_jail_root; | |||||
SYSCTL_INT(_security_mac_read_dir, OID_AUTO, jail_root, CTLFLAG_RWTUN, | |||||
&read_dir_jail_root, 0, "Allow jailed root to read directories"); | |||||
static int read_dir_all_users; | |||||
SYSCTL_INT(_security_mac_read_dir, OID_AUTO, all_users, CTLFLAG_RWTUN, | |||||
&read_dir_all_users, 0, "Allow all users to read directories"); | |||||
static int | |||||
read_dir_priv_grant(struct ucred *cred, int priv) | |||||
{ | |||||
if (!read_dir_enabled || priv != PRIV_VFS_READ_DIR) | |||||
return (EPERM); | |||||
if (read_dir_all_users) | |||||
return (0); | |||||
if (read_dir_jail_root && jailed(cred) && cred->cr_uid == 0) | |||||
return (0); | |||||
return (EPERM); | |||||
} | |||||
static struct mac_policy_ops read_dir_ops = | |||||
{ | |||||
.mpo_priv_grant = read_dir_priv_grant, | |||||
}; | |||||
MAC_POLICY_SET(&read_dir_ops, mac_read_dir, "MAC/read_dir", | |||||
MPC_LOADTIME_FLAG_UNLOADOK, NULL); |