1 1.12 andvar /* $NetBSD: secmodel_keylock.c,v 1.12 2021/12/07 21:45:31 andvar Exp $ */ 2 1.1 mbalmer /*- 3 1.1 mbalmer * Copyright (c) 2009 Marc Balmer <marc (at) msys.ch> 4 1.1 mbalmer * Copyright (c) 2006 Elad Efrat <elad (at) NetBSD.org> 5 1.1 mbalmer * All rights reserved. 6 1.1 mbalmer * 7 1.1 mbalmer * Redistribution and use in source and binary forms, with or without 8 1.1 mbalmer * modification, are permitted provided that the following conditions 9 1.1 mbalmer * are met: 10 1.1 mbalmer * 1. Redistributions of source code must retain the above copyright 11 1.1 mbalmer * notice, this list of conditions and the following disclaimer. 12 1.1 mbalmer * 2. Redistributions in binary form must reproduce the above copyright 13 1.1 mbalmer * notice, this list of conditions and the following disclaimer in the 14 1.1 mbalmer * documentation and/or other materials provided with the distribution. 15 1.1 mbalmer * 3. The name of the author may not be used to endorse or promote products 16 1.1 mbalmer * derived from this software without specific prior written permission. 17 1.1 mbalmer * 18 1.1 mbalmer * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 19 1.1 mbalmer * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 20 1.1 mbalmer * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 21 1.1 mbalmer * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 22 1.1 mbalmer * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 23 1.1 mbalmer * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 24 1.1 mbalmer * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 25 1.1 mbalmer * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 26 1.1 mbalmer * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 27 1.1 mbalmer * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 28 1.1 mbalmer */ 29 1.1 mbalmer 30 1.1 mbalmer /* 31 1.1 mbalmer * This file contains kauth(9) listeners needed to implement an experimental 32 1.1 mbalmer * keylock based security scheme. 33 1.1 mbalmer * 34 1.1 mbalmer * The position of the keylock is a system-global indication on what 35 1.1 mbalmer * operations are allowed or not. It affects all users, including root. 36 1.1 mbalmer * 37 1.1 mbalmer * Rules: 38 1.1 mbalmer * 39 1.1 mbalmer * - If the number of possible keylock positions is 0, assume there is no 40 1.12 andvar * keylock present, do not disallow any action, i.e. do nothing 41 1.1 mbalmer * 42 1.1 mbalmer * - If the number of possible keylock positions is greater than 0, but the 43 1.1 mbalmer * current lock position is 0, assume tampering with the lock and forbid 44 1.1 mbalmer * all actions. 45 1.1 mbalmer * 46 1.1 mbalmer * - If the lock is in the lowest position, assume the system is locked and 47 1.1 mbalmer * forbid most actions. 48 1.1 mbalmer * 49 1.1 mbalmer * - If the lock is in the highest position, assume the system to be open and 50 1.1 mbalmer * forbid nothing. 51 1.1 mbalmer * 52 1.1 mbalmer * - If the security.models.keylock.order sysctl is set to a value != 0, 53 1.1 mbalmer * reverse this order. 54 1.1 mbalmer */ 55 1.1 mbalmer 56 1.1 mbalmer #include <sys/cdefs.h> 57 1.12 andvar __KERNEL_RCSID(0, "$NetBSD: secmodel_keylock.c,v 1.12 2021/12/07 21:45:31 andvar Exp $"); 58 1.1 mbalmer 59 1.1 mbalmer #include <sys/types.h> 60 1.1 mbalmer #include <sys/param.h> 61 1.1 mbalmer #include <sys/kauth.h> 62 1.1 mbalmer 63 1.1 mbalmer #include <sys/conf.h> 64 1.1 mbalmer #include <sys/mount.h> 65 1.1 mbalmer #include <sys/sysctl.h> 66 1.1 mbalmer #include <sys/vnode.h> 67 1.1 mbalmer 68 1.2 mbalmer #include <dev/keylock.h> 69 1.2 mbalmer 70 1.1 mbalmer #include <miscfs/specfs/specdev.h> 71 1.1 mbalmer 72 1.7 jym #include <secmodel/secmodel.h> 73 1.1 mbalmer #include <secmodel/keylock/keylock.h> 74 1.1 mbalmer 75 1.1 mbalmer static kauth_listener_t l_system, l_process, l_network, l_machdep, l_device; 76 1.1 mbalmer 77 1.7 jym static secmodel_t keylock_sm; 78 1.7 jym 79 1.1 mbalmer SYSCTL_SETUP(sysctl_security_keylock_setup, 80 1.1 mbalmer "sysctl security keylock setup") 81 1.1 mbalmer { 82 1.1 mbalmer const struct sysctlnode *rnode; 83 1.1 mbalmer 84 1.1 mbalmer sysctl_createv(clog, 0, NULL, &rnode, 85 1.1 mbalmer CTLFLAG_PERMANENT, 86 1.1 mbalmer CTLTYPE_NODE, "models", NULL, 87 1.1 mbalmer NULL, 0, NULL, 0, 88 1.8 pooka CTL_SECURITY, CTL_CREATE, CTL_EOL); 89 1.1 mbalmer 90 1.1 mbalmer sysctl_createv(clog, 0, &rnode, &rnode, 91 1.1 mbalmer CTLFLAG_PERMANENT, 92 1.1 mbalmer CTLTYPE_NODE, "keylock", 93 1.1 mbalmer SYSCTL_DESCR("Keylock security model"), 94 1.1 mbalmer NULL, 0, NULL, 0, 95 1.1 mbalmer CTL_CREATE, CTL_EOL); 96 1.1 mbalmer 97 1.1 mbalmer sysctl_createv(clog, 0, &rnode, NULL, 98 1.1 mbalmer CTLFLAG_PERMANENT, 99 1.1 mbalmer CTLTYPE_STRING, "name", NULL, 100 1.1 mbalmer NULL, 0, __UNCONST("Keylock"), 0, 101 1.1 mbalmer CTL_CREATE, CTL_EOL); 102 1.1 mbalmer } 103 1.1 mbalmer 104 1.1 mbalmer void 105 1.1 mbalmer secmodel_keylock_init(void) 106 1.1 mbalmer { 107 1.6 jym int error = secmodel_register(&keylock_sm, 108 1.6 jym "org.netbsd.secmodel.keylock", 109 1.6 jym "NetBSD Security Model: Keylock", NULL, NULL, NULL); 110 1.6 jym if (error != 0) 111 1.6 jym printf("secmodel_keylock_init: secmodel_register " 112 1.6 jym "returned %d\n", error); 113 1.1 mbalmer } 114 1.1 mbalmer 115 1.1 mbalmer void 116 1.1 mbalmer secmodel_keylock_start(void) 117 1.1 mbalmer { 118 1.1 mbalmer l_system = kauth_listen_scope(KAUTH_SCOPE_SYSTEM, 119 1.1 mbalmer secmodel_keylock_system_cb, NULL); 120 1.1 mbalmer l_process = kauth_listen_scope(KAUTH_SCOPE_PROCESS, 121 1.1 mbalmer secmodel_keylock_process_cb, NULL); 122 1.1 mbalmer l_network = kauth_listen_scope(KAUTH_SCOPE_NETWORK, 123 1.1 mbalmer secmodel_keylock_network_cb, NULL); 124 1.1 mbalmer l_machdep = kauth_listen_scope(KAUTH_SCOPE_MACHDEP, 125 1.1 mbalmer secmodel_keylock_machdep_cb, NULL); 126 1.1 mbalmer l_device = kauth_listen_scope(KAUTH_SCOPE_DEVICE, 127 1.1 mbalmer secmodel_keylock_device_cb, NULL); 128 1.1 mbalmer } 129 1.1 mbalmer 130 1.1 mbalmer void 131 1.1 mbalmer secmodel_keylock_stop(void) 132 1.1 mbalmer { 133 1.6 jym int error; 134 1.6 jym 135 1.1 mbalmer kauth_unlisten_scope(l_system); 136 1.1 mbalmer kauth_unlisten_scope(l_process); 137 1.1 mbalmer kauth_unlisten_scope(l_network); 138 1.1 mbalmer kauth_unlisten_scope(l_machdep); 139 1.1 mbalmer kauth_unlisten_scope(l_device); 140 1.6 jym 141 1.7 jym error = secmodel_deregister(keylock_sm); 142 1.6 jym if (error != 0) 143 1.6 jym printf("secmodel_keylock_stop: secmodel_deregister " 144 1.6 jym "returned %d\n", error); 145 1.1 mbalmer } 146 1.1 mbalmer 147 1.1 mbalmer /* 148 1.1 mbalmer * kauth(9) listener 149 1.1 mbalmer * 150 1.1 mbalmer * Security model: Multi-position keylock 151 1.1 mbalmer * Scope: System 152 1.1 mbalmer * Responsibility: Keylock 153 1.1 mbalmer */ 154 1.1 mbalmer int 155 1.1 mbalmer secmodel_keylock_system_cb(kauth_cred_t cred, 156 1.1 mbalmer kauth_action_t action, void *cookie, void *arg0, void *arg1, 157 1.1 mbalmer void *arg2, void *arg3) 158 1.1 mbalmer { 159 1.1 mbalmer int result; 160 1.1 mbalmer enum kauth_system_req req; 161 1.1 mbalmer int kstate; 162 1.1 mbalmer 163 1.1 mbalmer kstate = keylock_state(); 164 1.1 mbalmer if (kstate == KEYLOCK_ABSENT) 165 1.1 mbalmer return KAUTH_RESULT_DEFER; 166 1.1 mbalmer else if (kstate == KEYLOCK_TAMPER) 167 1.1 mbalmer return KAUTH_RESULT_DENY; 168 1.1 mbalmer 169 1.1 mbalmer result = KAUTH_RESULT_DEFER; 170 1.10 joerg req = (enum kauth_system_req)(uintptr_t)arg0; 171 1.1 mbalmer 172 1.1 mbalmer switch (action) { 173 1.1 mbalmer case KAUTH_SYSTEM_CHSYSFLAGS: 174 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 175 1.1 mbalmer result = KAUTH_RESULT_DENY; 176 1.1 mbalmer break; 177 1.1 mbalmer 178 1.1 mbalmer case KAUTH_SYSTEM_TIME: 179 1.1 mbalmer switch (req) { 180 1.1 mbalmer case KAUTH_REQ_SYSTEM_TIME_RTCOFFSET: 181 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 182 1.1 mbalmer result = KAUTH_RESULT_DENY; 183 1.1 mbalmer break; 184 1.1 mbalmer 185 1.1 mbalmer case KAUTH_REQ_SYSTEM_TIME_SYSTEM: { 186 1.1 mbalmer struct timespec *ts = arg1; 187 1.1 mbalmer struct timespec *delta = arg2; 188 1.1 mbalmer 189 1.3 elad if (keylock_position() > 1 && time_wraps(ts, delta)) 190 1.1 mbalmer result = KAUTH_RESULT_DENY; 191 1.1 mbalmer break; 192 1.1 mbalmer } 193 1.1 mbalmer default: 194 1.1 mbalmer break; 195 1.1 mbalmer } 196 1.1 mbalmer break; 197 1.1 mbalmer 198 1.1 mbalmer case KAUTH_SYSTEM_MODULE: 199 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 200 1.1 mbalmer result = KAUTH_RESULT_DENY; 201 1.1 mbalmer break; 202 1.1 mbalmer 203 1.1 mbalmer case KAUTH_SYSTEM_MOUNT: 204 1.1 mbalmer switch (req) { 205 1.1 mbalmer case KAUTH_REQ_SYSTEM_MOUNT_NEW: 206 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 207 1.1 mbalmer result = KAUTH_RESULT_DENY; 208 1.1 mbalmer 209 1.1 mbalmer break; 210 1.1 mbalmer 211 1.1 mbalmer case KAUTH_REQ_SYSTEM_MOUNT_UPDATE: 212 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) { 213 1.1 mbalmer struct mount *mp = arg1; 214 1.1 mbalmer u_long flags = (u_long)arg2; 215 1.1 mbalmer 216 1.1 mbalmer /* 217 1.1 mbalmer * Can only degrade from read/write to 218 1.1 mbalmer * read-only. 219 1.1 mbalmer */ 220 1.1 mbalmer if (flags != (mp->mnt_flag | MNT_RDONLY | 221 1.1 mbalmer MNT_RELOAD | MNT_FORCE | MNT_UPDATE)) 222 1.1 mbalmer result = KAUTH_RESULT_DENY; 223 1.1 mbalmer } 224 1.1 mbalmer break; 225 1.1 mbalmer default: 226 1.1 mbalmer break; 227 1.1 mbalmer } 228 1.1 mbalmer 229 1.1 mbalmer break; 230 1.1 mbalmer 231 1.1 mbalmer case KAUTH_SYSTEM_SYSCTL: 232 1.1 mbalmer switch (req) { 233 1.1 mbalmer case KAUTH_REQ_SYSTEM_SYSCTL_ADD: 234 1.1 mbalmer case KAUTH_REQ_SYSTEM_SYSCTL_DELETE: 235 1.1 mbalmer case KAUTH_REQ_SYSTEM_SYSCTL_DESC: 236 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 237 1.1 mbalmer result = KAUTH_RESULT_DENY; 238 1.1 mbalmer break; 239 1.1 mbalmer default: 240 1.1 mbalmer break; 241 1.1 mbalmer } 242 1.1 mbalmer break; 243 1.1 mbalmer 244 1.1 mbalmer case KAUTH_SYSTEM_SETIDCORE: 245 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 246 1.1 mbalmer result = KAUTH_RESULT_DENY; 247 1.1 mbalmer break; 248 1.1 mbalmer 249 1.1 mbalmer case KAUTH_SYSTEM_DEBUG: 250 1.1 mbalmer break; 251 1.1 mbalmer } 252 1.1 mbalmer 253 1.1 mbalmer return result; 254 1.1 mbalmer } 255 1.1 mbalmer 256 1.1 mbalmer /* 257 1.1 mbalmer * kauth(9) listener 258 1.1 mbalmer * 259 1.1 mbalmer * Security model: Multi-position keylock 260 1.1 mbalmer * Scope: Process 261 1.1 mbalmer * Responsibility: Keylock 262 1.1 mbalmer */ 263 1.1 mbalmer int 264 1.1 mbalmer secmodel_keylock_process_cb(kauth_cred_t cred, 265 1.1 mbalmer kauth_action_t action, void *cookie, void *arg0, 266 1.1 mbalmer void *arg1, void *arg2, void *arg3) 267 1.1 mbalmer { 268 1.1 mbalmer struct proc *p; 269 1.1 mbalmer int result, kstate; 270 1.1 mbalmer 271 1.1 mbalmer kstate = keylock_state(); 272 1.1 mbalmer if (kstate == KEYLOCK_ABSENT) 273 1.1 mbalmer return KAUTH_RESULT_DEFER; 274 1.1 mbalmer else if (kstate == KEYLOCK_TAMPER) 275 1.1 mbalmer return KAUTH_RESULT_DENY; 276 1.1 mbalmer 277 1.1 mbalmer result = KAUTH_RESULT_DEFER; 278 1.1 mbalmer p = arg0; 279 1.1 mbalmer 280 1.1 mbalmer switch (action) { 281 1.1 mbalmer case KAUTH_PROCESS_PROCFS: { 282 1.1 mbalmer enum kauth_process_req req; 283 1.1 mbalmer 284 1.10 joerg req = (enum kauth_process_req)(uintptr_t)arg2; 285 1.1 mbalmer switch (req) { 286 1.1 mbalmer case KAUTH_REQ_PROCESS_PROCFS_READ: 287 1.1 mbalmer break; 288 1.1 mbalmer 289 1.1 mbalmer case KAUTH_REQ_PROCESS_PROCFS_RW: 290 1.1 mbalmer case KAUTH_REQ_PROCESS_PROCFS_WRITE: 291 1.1 mbalmer if ((p == initproc) && (kstate != KEYLOCK_OPEN)) 292 1.1 mbalmer result = KAUTH_RESULT_DENY; 293 1.1 mbalmer 294 1.1 mbalmer break; 295 1.1 mbalmer default: 296 1.1 mbalmer break; 297 1.1 mbalmer } 298 1.1 mbalmer 299 1.1 mbalmer break; 300 1.1 mbalmer } 301 1.1 mbalmer 302 1.1 mbalmer case KAUTH_PROCESS_PTRACE: 303 1.1 mbalmer if ((p == initproc) && (kstate != KEYLOCK_OPEN)) 304 1.1 mbalmer result = KAUTH_RESULT_DENY; 305 1.1 mbalmer 306 1.1 mbalmer break; 307 1.1 mbalmer 308 1.1 mbalmer case KAUTH_PROCESS_CORENAME: 309 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 310 1.1 mbalmer result = KAUTH_RESULT_DENY; 311 1.1 mbalmer break; 312 1.1 mbalmer } 313 1.1 mbalmer return result; 314 1.1 mbalmer } 315 1.1 mbalmer 316 1.1 mbalmer /* 317 1.1 mbalmer * kauth(9) listener 318 1.1 mbalmer * 319 1.1 mbalmer * Security model: Multi-position keylock 320 1.1 mbalmer * Scope: Network 321 1.1 mbalmer * Responsibility: Keylock 322 1.1 mbalmer */ 323 1.1 mbalmer int 324 1.1 mbalmer secmodel_keylock_network_cb(kauth_cred_t cred, 325 1.1 mbalmer kauth_action_t action, void *cookie, void *arg0, 326 1.1 mbalmer void *arg1, void *arg2, void *arg3) 327 1.1 mbalmer { 328 1.1 mbalmer int result, kstate; 329 1.1 mbalmer enum kauth_network_req req; 330 1.1 mbalmer 331 1.1 mbalmer kstate = keylock_state(); 332 1.1 mbalmer if (kstate == KEYLOCK_ABSENT) 333 1.1 mbalmer return KAUTH_RESULT_DEFER; 334 1.1 mbalmer else if (kstate == KEYLOCK_TAMPER) 335 1.1 mbalmer return KAUTH_RESULT_DENY; 336 1.1 mbalmer 337 1.1 mbalmer result = KAUTH_RESULT_DEFER; 338 1.10 joerg req = (enum kauth_network_req)(uintptr_t)arg0; 339 1.1 mbalmer 340 1.1 mbalmer switch (action) { 341 1.1 mbalmer case KAUTH_NETWORK_FIREWALL: 342 1.1 mbalmer switch (req) { 343 1.1 mbalmer case KAUTH_REQ_NETWORK_FIREWALL_FW: 344 1.1 mbalmer case KAUTH_REQ_NETWORK_FIREWALL_NAT: 345 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 346 1.1 mbalmer result = KAUTH_RESULT_DENY; 347 1.1 mbalmer break; 348 1.1 mbalmer 349 1.1 mbalmer default: 350 1.1 mbalmer break; 351 1.1 mbalmer } 352 1.1 mbalmer break; 353 1.1 mbalmer 354 1.1 mbalmer case KAUTH_NETWORK_FORWSRCRT: 355 1.1 mbalmer if (kstate != KEYLOCK_OPEN) 356 1.1 mbalmer result = KAUTH_RESULT_DENY; 357 1.1 mbalmer break; 358 1.1 mbalmer } 359 1.1 mbalmer 360 1.1 mbalmer return result; 361 1.1 mbalmer } 362 1.1 mbalmer 363 1.1 mbalmer /* 364 1.1 mbalmer * kauth(9) listener 365 1.1 mbalmer * 366 1.1 mbalmer * Security model: Multi-position keylock 367 1.1 mbalmer * Scope: Machdep 368 1.1 mbalmer * Responsibility: Keylock 369 1.1 mbalmer */ 370 1.1 mbalmer int 371 1.1 mbalmer secmodel_keylock_machdep_cb(kauth_cred_t cred, 372 1.1 mbalmer kauth_action_t action, void *cookie, void *arg0, 373 1.1 mbalmer void *arg1, void *arg2, void *arg3) 374 1.1 mbalmer { 375 1.1 mbalmer int result, kstate; 376 1.1 mbalmer 377 1.1 mbalmer kstate = keylock_state(); 378 1.1 mbalmer if (kstate == KEYLOCK_ABSENT) 379 1.1 mbalmer return KAUTH_RESULT_DEFER; 380 1.1 mbalmer else if (kstate == KEYLOCK_TAMPER) 381 1.1 mbalmer return KAUTH_RESULT_DENY; 382 1.1 mbalmer 383 1.1 mbalmer result = KAUTH_RESULT_DEFER; 384 1.1 mbalmer 385 1.1 mbalmer switch (action) { 386 1.1 mbalmer case KAUTH_MACHDEP_IOPERM_SET: 387 1.1 mbalmer case KAUTH_MACHDEP_IOPL: 388 1.1 mbalmer if (kstate != KEYLOCK_OPEN) 389 1.1 mbalmer result = KAUTH_RESULT_DENY; 390 1.1 mbalmer break; 391 1.1 mbalmer 392 1.1 mbalmer case KAUTH_MACHDEP_UNMANAGEDMEM: 393 1.1 mbalmer if (kstate != KEYLOCK_OPEN) 394 1.1 mbalmer result = KAUTH_RESULT_DENY; 395 1.1 mbalmer break; 396 1.1 mbalmer } 397 1.1 mbalmer 398 1.1 mbalmer return result; 399 1.1 mbalmer } 400 1.1 mbalmer 401 1.1 mbalmer /* 402 1.1 mbalmer * kauth(9) listener 403 1.1 mbalmer * 404 1.1 mbalmer * Security model: Multi-position keylock 405 1.1 mbalmer * Scope: Device 406 1.1 mbalmer * Responsibility: Keylock 407 1.1 mbalmer */ 408 1.1 mbalmer int 409 1.1 mbalmer secmodel_keylock_device_cb(kauth_cred_t cred, 410 1.1 mbalmer kauth_action_t action, void *cookie, void *arg0, 411 1.1 mbalmer void *arg1, void *arg2, void *arg3) 412 1.1 mbalmer { 413 1.5 cegger int result, kstate, error; 414 1.1 mbalmer 415 1.1 mbalmer kstate = keylock_state(); 416 1.1 mbalmer if (kstate == KEYLOCK_ABSENT) 417 1.1 mbalmer return KAUTH_RESULT_DEFER; 418 1.1 mbalmer else if (kstate == KEYLOCK_TAMPER) 419 1.1 mbalmer return KAUTH_RESULT_DENY; 420 1.1 mbalmer 421 1.1 mbalmer result = KAUTH_RESULT_DEFER; 422 1.1 mbalmer 423 1.1 mbalmer switch (action) { 424 1.1 mbalmer case KAUTH_DEVICE_RAWIO_SPEC: { 425 1.4 elad struct vnode *vp; 426 1.1 mbalmer enum kauth_device_req req; 427 1.1 mbalmer 428 1.10 joerg req = (enum kauth_device_req)(uintptr_t)arg0; 429 1.1 mbalmer vp = arg1; 430 1.1 mbalmer 431 1.1 mbalmer KASSERT(vp != NULL); 432 1.1 mbalmer 433 1.1 mbalmer /* Handle /dev/mem and /dev/kmem. */ 434 1.4 elad if (iskmemvp(vp)) { 435 1.1 mbalmer switch (req) { 436 1.1 mbalmer case KAUTH_REQ_DEVICE_RAWIO_SPEC_READ: 437 1.1 mbalmer break; 438 1.1 mbalmer 439 1.1 mbalmer case KAUTH_REQ_DEVICE_RAWIO_SPEC_WRITE: 440 1.1 mbalmer case KAUTH_REQ_DEVICE_RAWIO_SPEC_RW: 441 1.1 mbalmer if (kstate != KEYLOCK_OPEN) 442 1.1 mbalmer result = KAUTH_RESULT_DENY; 443 1.1 mbalmer break; 444 1.1 mbalmer default: 445 1.1 mbalmer break; 446 1.1 mbalmer } 447 1.1 mbalmer break; 448 1.1 mbalmer } 449 1.1 mbalmer 450 1.1 mbalmer switch (req) { 451 1.1 mbalmer case KAUTH_REQ_DEVICE_RAWIO_SPEC_READ: 452 1.1 mbalmer break; 453 1.1 mbalmer 454 1.1 mbalmer case KAUTH_REQ_DEVICE_RAWIO_SPEC_WRITE: 455 1.1 mbalmer case KAUTH_REQ_DEVICE_RAWIO_SPEC_RW: 456 1.4 elad error = rawdev_mounted(vp, NULL); 457 1.1 mbalmer 458 1.4 elad if (error == EINVAL) 459 1.1 mbalmer break; 460 1.1 mbalmer 461 1.4 elad if (error && (kstate != KEYLOCK_OPEN)) 462 1.1 mbalmer break; 463 1.1 mbalmer 464 1.1 mbalmer if (kstate == KEYLOCK_CLOSE) 465 1.1 mbalmer result = KAUTH_RESULT_DENY; 466 1.1 mbalmer 467 1.1 mbalmer break; 468 1.1 mbalmer default: 469 1.1 mbalmer break; 470 1.1 mbalmer } 471 1.1 mbalmer break; 472 1.1 mbalmer } 473 1.1 mbalmer 474 1.1 mbalmer case KAUTH_DEVICE_RAWIO_PASSTHRU: 475 1.1 mbalmer if (kstate != KEYLOCK_OPEN) { 476 1.1 mbalmer u_long bits; 477 1.1 mbalmer 478 1.1 mbalmer bits = (u_long)arg0; 479 1.1 mbalmer 480 1.1 mbalmer KASSERT(bits != 0); 481 1.1 mbalmer KASSERT((bits & ~KAUTH_REQ_DEVICE_RAWIO_PASSTHRU_ALL) 482 1.1 mbalmer == 0); 483 1.1 mbalmer 484 1.1 mbalmer if (bits & ~KAUTH_REQ_DEVICE_RAWIO_PASSTHRU_READCONF) 485 1.1 mbalmer result = KAUTH_RESULT_DENY; 486 1.1 mbalmer } 487 1.1 mbalmer break; 488 1.1 mbalmer 489 1.1 mbalmer case KAUTH_DEVICE_GPIO_PINSET: 490 1.1 mbalmer if (kstate != KEYLOCK_OPEN) 491 1.1 mbalmer result = KAUTH_RESULT_DENY; 492 1.1 mbalmer break; 493 1.1 mbalmer default: 494 1.1 mbalmer break; 495 1.1 mbalmer } 496 1.1 mbalmer return result; 497 1.1 mbalmer } 498