xref: /xnu-8020.140.41/bsd/sys/guarded.h (revision 27b03b360a988dfd3dfdf34262bb0042026747cc)
1 /*
2  * Copyright (c) 2018 Apple Inc. All rights reserved.
3  *
4  * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5  *
6  * This file contains Original Code and/or Modifications of Original Code
7  * as defined in and that are subject to the Apple Public Source License
8  * Version 2.0 (the 'License'). You may not use this file except in
9  * compliance with the License. The rights granted to you under the License
10  * may not be used to create, or enable the creation or redistribution of,
11  * unlawful or unlicensed copies of an Apple operating system, or to
12  * circumvent, violate, or enable the circumvention or violation of, any
13  * terms of an Apple operating system software license agreement.
14  *
15  * Please obtain a copy of the License at
16  * http://www.opensource.apple.com/apsl/ and read it before using this file.
17  *
18  * The Original Code and all software distributed under the License are
19  * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20  * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21  * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22  * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23  * Please see the License for the specific language governing rights and
24  * limitations under the License.
25  *
26  * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27  */
28 
29 #ifndef _SYS_GUARDED_H_
30 #define _SYS_GUARDED_H_
31 
32 #include <sys/types.h>
33 #include <sys/cdefs.h>
34 
35 #include <sys/_types/_iovec_t.h>
36 #ifdef PRIVATE
37 
38 __BEGIN_DECLS
39 
40 #if !defined(_POSIX_C_SOURCE) || defined(_DARWIN_C_SOURCE)
41 
42 #ifndef _GUARDID_T
43 #define _GUARDID_T
44 typedef __uint64_t guardid_t;
45 #endif /* _GUARDID_T */
46 
47 #if !defined(KERNEL)
48 extern int guarded_open_np(const char *path,
49     const guardid_t *guard, u_int guardflags, int flags, ...);
50 extern int guarded_open_dprotected_np(const char *path,
51     const guardid_t *guard, u_int guardflags, int flags,
52     int dpclass, int dpflags, ...);
53 extern int guarded_kqueue_np(const guardid_t *guard, u_int guardflags);
54 extern int guarded_close_np(int fd, const guardid_t *guard);
55 extern int change_fdguard_np(int fd, const guardid_t *guard, u_int guardflags,
56     const guardid_t *nguard, u_int nguardflags, int *fdflagsp);
57 extern ssize_t guarded_write_np(int fd, const guardid_t *guard, const void *buf, size_t nbyte);
58 extern ssize_t guarded_pwrite_np(int fd, const guardid_t *guard, const void *buf, size_t nbyte, off_t offset);
59 extern ssize_t guarded_writev_np(int fd, const guardid_t *guard, const struct iovec *iovp, int iovcnt);
60 #endif /* KERNEL */
61 
62 #ifndef GUARD_TYPE_FD
63 /* temporary source compat: use <kern/exc_guard.h> instead */
64 #define GUARD_TYPE_FD           0x2
65 #endif
66 
67 /*
68  * File descriptor guard flavors.
69  */
70 
71 /*
72  * Forbid close(2), and the implicit close() that a dup2(2) may do.
73  * Forces close-on-fork to be set immutably too.
74  */
75 #define GUARD_CLOSE             (1u << 0)
76 
77 /*
78  * Forbid dup(2), dup2(2), and fcntl(2) subcodes F_DUPFD, F_DUPFD_CLOEXEC
79  * on a guarded fd. Also forbids open's of a guarded fd via /dev/fd/
80  * (an implicit dup.)
81  */
82 #define GUARD_DUP               (1u << 1)
83 
84 /*
85  * Forbid sending a guarded fd via a socket
86  */
87 #define GUARD_SOCKET_IPC        (1u << 2)
88 
89 /*
90  * Forbid creating a fileport from a guarded fd
91  */
92 #define GUARD_FILEPORT          (1u << 3)
93 
94 /*
95  * Forbid writes on a guarded fd
96  */
97 #define GUARD_WRITE             (1u << 4)
98 
99 /*
100  * Violating a guard results in an error (EPERM), and potentially
101  * an exception with one or more of the following bits set.
102  */
103 enum guard_fd_exception_codes {
104 	kGUARD_EXC_CLOSE        = 1u << 0,      /* close of a guarded fd */
105 	kGUARD_EXC_DUP          = 1u << 1,      /* dup of a guarded fd */
106 	kGUARD_EXC_NOCLOEXEC    = 1u << 2,      /* clear close-on-exec */
107 	kGUARD_EXC_SOCKET_IPC   = 1u << 3,      /* sendmsg of a guarded fd */
108 	kGUARD_EXC_FILEPORT     = 1u << 4,      /* fileport_makeport .. */
109 	kGUARD_EXC_MISMATCH     = 1u << 5,      /* wrong guard for guarded fd */
110 	kGUARD_EXC_WRITE        = 1u << 6       /* write on a guarded fd */
111 };
112 
113 /*
114  * Experimental guarded vnode support
115  */
116 #define VNG_RENAME_TO           (1u << 0)
117 #define VNG_RENAME_FROM         (1u << 1)
118 #define VNG_UNLINK              (1u << 2)
119 #define VNG_WRITE_OTHER         (1u << 3)
120 #define VNG_TRUNC_OTHER         (1u << 4)
121 #define VNG_LINK                (1u << 5)
122 #define VNG_EXCHDATA            (1u << 6)
123 
124 #define VNG_ALL \
125 	(VNG_RENAME_TO | VNG_RENAME_FROM | VNG_UNLINK | VNG_LINK | \
126 	 VNG_WRITE_OTHER | VNG_TRUNC_OTHER | VNG_EXCHDATA)
127 
128 struct vnguard_set {
129 	int vns_fd;
130 	unsigned vns_attrs;
131 	guardid_t vns_guard;
132 };
133 
134 struct vnguard_getattr {
135 	int vga_fd;             /* in */
136 	unsigned vga_attrs;     /* out */
137 	guardid_t vga_guard;    /* in */
138 };
139 
140 #define VNG_SYSC_PING           0
141 #define VNG_SYSC_SET_GUARD      1
142 #define VNG_SYSC_GET_ATTR       2
143 
144 #define VNG_POLICY_NAME         "vnguard"
145 
146 /*
147  * Violating a guard may result in an error (EPERM), and potentially
148  * an exception with one or more of the following bits set.
149  */
150 enum guard_vn_exception_codes {
151 	kGUARD_EXC_RENAME_TO    = VNG_RENAME_TO,
152 	kGUARD_EXC_RENAME_FROM  = VNG_RENAME_FROM,
153 	kGUARD_EXC_UNLINK       = VNG_UNLINK,
154 	kGUARD_EXC_WRITE_OTHER  = VNG_WRITE_OTHER,
155 	kGUARD_EXC_TRUNC_OTHER  = VNG_TRUNC_OTHER,
156 	kGUARD_EXC_LINK         = VNG_LINK,
157 	kGUARD_EXC_EXCHDATA     = VNG_EXCHDATA,
158 };
159 
160 /* Guard violation behaviors: not all combinations make sense */
161 
162 #define kVNG_POLICY_LOGMSG      (1u << 0)
163 #define kVNG_POLICY_EPERM       (1u << 1)
164 #define kVNG_POLICY_EXC         (1u << 2)
165 #define kVNG_POLICY_EXC_CORPSE  (1u << 3)
166 #define kVNG_POLICY_SIGKILL     (1u << 4)
167 #define kVNG_POLICY_UPRINTMSG   (1u << 5)
168 
169 #if BSD_KERNEL_PRIVATE
170 struct fileglob;
171 extern int vnguard_exceptions_active(void);
172 extern void vnguard_policy_init(void);
173 #if CONFIG_MACF && CONFIG_VNGUARD
174 extern void vng_file_label_destroy(struct fileglob *fg);
175 #endif /* CONFIG_MACF && CONFIG_VNGUARD */
176 #endif /* BSD_KERNEL_PRIVATE */
177 
178 #endif /* (!_POSIX_C_SOURCE || _DARWIN_C_SOURCE) */
179 
180 __END_DECLS
181 
182 #endif /* PRIVATE */
183 
184 #endif /* !_SYS_GUARDED_H_ */
185