xref: /freebsd/sys/security/mac/mac_system.c (revision a3df768b0440a12b008414eefba89fb8709bb886)
17bc82500SRobert Watson /*-
27bc82500SRobert Watson  * Copyright (c) 1999, 2000, 2001, 2002 Robert N. M. Watson
37bc82500SRobert Watson  * Copyright (c) 2001 Ilmar S. Habibulin
47bc82500SRobert Watson  * Copyright (c) 2001, 2002 Networks Associates Technology, Inc.
57bc82500SRobert Watson  * All rights reserved.
67bc82500SRobert Watson  *
77bc82500SRobert Watson  * This software was developed by Robert Watson and Ilmar Habibulin for the
87bc82500SRobert Watson  * TrustedBSD Project.
97bc82500SRobert Watson  *
106201265bSRobert Watson  * This software was developed for the FreeBSD Project in part by Network
116201265bSRobert Watson  * Associates Laboratories, the Security Research Division of Network
126201265bSRobert Watson  * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
136201265bSRobert Watson  * as part of the DARPA CHATS research program.
147bc82500SRobert Watson  *
157bc82500SRobert Watson  * Redistribution and use in source and binary forms, with or without
167bc82500SRobert Watson  * modification, are permitted provided that the following conditions
177bc82500SRobert Watson  * are met:
187bc82500SRobert Watson  * 1. Redistributions of source code must retain the above copyright
197bc82500SRobert Watson  *    notice, this list of conditions and the following disclaimer.
207bc82500SRobert Watson  * 2. Redistributions in binary form must reproduce the above copyright
217bc82500SRobert Watson  *    notice, this list of conditions and the following disclaimer in the
227bc82500SRobert Watson  *    documentation and/or other materials provided with the distribution.
237bc82500SRobert Watson  *
247bc82500SRobert Watson  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
257bc82500SRobert Watson  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
267bc82500SRobert Watson  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
277bc82500SRobert Watson  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
287bc82500SRobert Watson  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
297bc82500SRobert Watson  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
307bc82500SRobert Watson  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
317bc82500SRobert Watson  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
327bc82500SRobert Watson  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
337bc82500SRobert Watson  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
347bc82500SRobert Watson  * SUCH DAMAGE.
357bc82500SRobert Watson  *
367bc82500SRobert Watson  * $FreeBSD$
377bc82500SRobert Watson  */
387bc82500SRobert Watson /*
397bc82500SRobert Watson  * Developed by the TrustedBSD Project.
407bc82500SRobert Watson  *
417bc82500SRobert Watson  * Framework for extensible kernel access control.  Kernel and userland
427bc82500SRobert Watson  * interface to the framework, policy registration and composition.
437bc82500SRobert Watson  */
447bc82500SRobert Watson 
457bc82500SRobert Watson #include "opt_mac.h"
46328048bcSPoul-Henning Kamp #include "opt_devfs.h"
47f9d0d524SRobert Watson 
487bc82500SRobert Watson #include <sys/param.h>
49a96acd1aSRobert Watson #include <sys/condvar.h>
5095fab37eSRobert Watson #include <sys/extattr.h>
51670cb89bSRobert Watson #include <sys/imgact.h>
5295fab37eSRobert Watson #include <sys/kernel.h>
5395fab37eSRobert Watson #include <sys/lock.h>
54b656366bSBruce Evans #include <sys/malloc.h>
5595fab37eSRobert Watson #include <sys/mutex.h>
5695fab37eSRobert Watson #include <sys/mac.h>
577ba28492SRobert Watson #include <sys/module.h>
5895fab37eSRobert Watson #include <sys/proc.h>
5995fab37eSRobert Watson #include <sys/systm.h>
607bc82500SRobert Watson #include <sys/sysproto.h>
617bc82500SRobert Watson #include <sys/sysent.h>
6295fab37eSRobert Watson #include <sys/vnode.h>
6395fab37eSRobert Watson #include <sys/mount.h>
6495fab37eSRobert Watson #include <sys/file.h>
6595fab37eSRobert Watson #include <sys/namei.h>
6695fab37eSRobert Watson #include <sys/socket.h>
6795fab37eSRobert Watson #include <sys/pipe.h>
6895fab37eSRobert Watson #include <sys/socketvar.h>
6995fab37eSRobert Watson #include <sys/sysctl.h>
7095fab37eSRobert Watson 
7195fab37eSRobert Watson #include <vm/vm.h>
7295fab37eSRobert Watson #include <vm/pmap.h>
7395fab37eSRobert Watson #include <vm/vm_map.h>
7495fab37eSRobert Watson #include <vm/vm_object.h>
7595fab37eSRobert Watson 
7695fab37eSRobert Watson #include <sys/mac_policy.h>
7795fab37eSRobert Watson 
7895fab37eSRobert Watson #include <fs/devfs/devfs.h>
7995fab37eSRobert Watson 
8095fab37eSRobert Watson #include <net/bpfdesc.h>
8195fab37eSRobert Watson #include <net/if.h>
8295fab37eSRobert Watson #include <net/if_var.h>
8395fab37eSRobert Watson 
8495fab37eSRobert Watson #include <netinet/in.h>
8595fab37eSRobert Watson #include <netinet/ip_var.h>
8695fab37eSRobert Watson 
8795fab37eSRobert Watson #ifdef MAC
8895fab37eSRobert Watson 
897ba28492SRobert Watson /*
907ba28492SRobert Watson  * Declare that the kernel provides MAC support, version 1.  This permits
917ba28492SRobert Watson  * modules to refuse to be loaded if the necessary support isn't present,
927ba28492SRobert Watson  * even if it's pre-boot.
937ba28492SRobert Watson  */
947ba28492SRobert Watson MODULE_VERSION(kernel_mac_support, 1);
957ba28492SRobert Watson 
9695fab37eSRobert Watson SYSCTL_DECL(_security);
9795fab37eSRobert Watson 
9895fab37eSRobert Watson SYSCTL_NODE(_security, OID_AUTO, mac, CTLFLAG_RW, 0,
9995fab37eSRobert Watson     "TrustedBSD MAC policy controls");
100b2f0927aSRobert Watson 
10195fab37eSRobert Watson #if MAC_MAX_POLICIES > 32
10295fab37eSRobert Watson #error "MAC_MAX_POLICIES too large"
10395fab37eSRobert Watson #endif
104a13c67daSRobert Watson 
10595fab37eSRobert Watson static unsigned int mac_max_policies = MAC_MAX_POLICIES;
10695fab37eSRobert Watson static unsigned int mac_policy_offsets_free = (1 << MAC_MAX_POLICIES) - 1;
10795fab37eSRobert Watson SYSCTL_UINT(_security_mac, OID_AUTO, max_policies, CTLFLAG_RD,
10895fab37eSRobert Watson     &mac_max_policies, 0, "");
10995fab37eSRobert Watson 
110a67fe518SRobert Watson /*
111a67fe518SRobert Watson  * Has the kernel started generating labeled objects yet?  All read/write
112a67fe518SRobert Watson  * access to this variable is serialized during the boot process.  Following
113a67fe518SRobert Watson  * the end of serialization, we don't update this flag; no locking.
114a67fe518SRobert Watson  */
11595fab37eSRobert Watson static int	mac_late = 0;
11695fab37eSRobert Watson 
117763bbd2fSRobert Watson /*
118763bbd2fSRobert Watson  * Warn about EA transactions only the first time they happen.
119763bbd2fSRobert Watson  * Weak coherency, no locking.
120763bbd2fSRobert Watson  */
121763bbd2fSRobert Watson static int	ea_warn_once = 0;
122763bbd2fSRobert Watson 
12395fab37eSRobert Watson static int	mac_enforce_fs = 1;
12495fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_fs, CTLFLAG_RW,
12595fab37eSRobert Watson     &mac_enforce_fs, 0, "Enforce MAC policy on file system objects");
12695fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_fs", &mac_enforce_fs);
12795fab37eSRobert Watson 
128a3df768bSRobert Watson static int	mac_enforce_kld = 1;
129a3df768bSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_kld, CTLFLAG_RW,
130a3df768bSRobert Watson     &mac_enforce_kld, 0, "Enforce MAC policy on kld operations");
131a3df768bSRobert Watson TUNABLE_INT("security.mac.enforce_kld", &mac_enforce_kld);
132a3df768bSRobert Watson 
13395fab37eSRobert Watson static int	mac_enforce_network = 1;
13495fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_network, CTLFLAG_RW,
13595fab37eSRobert Watson     &mac_enforce_network, 0, "Enforce MAC policy on network packets");
13695fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
13795fab37eSRobert Watson 
138b88c98f6SRobert Watson static int	mac_enforce_pipe = 1;
139b88c98f6SRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
140b88c98f6SRobert Watson     &mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
141c031391bSRobert Watson TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
142b88c98f6SRobert Watson 
14395fab37eSRobert Watson static int	mac_enforce_process = 1;
14495fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
14595fab37eSRobert Watson     &mac_enforce_process, 0, "Enforce MAC policy on inter-process operations");
14695fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_process", &mac_enforce_process);
14795fab37eSRobert Watson 
14895fab37eSRobert Watson static int	mac_enforce_socket = 1;
14995fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_socket, CTLFLAG_RW,
15095fab37eSRobert Watson     &mac_enforce_socket, 0, "Enforce MAC policy on socket operations");
15195fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
15295fab37eSRobert Watson 
1539e913ebdSRobert Watson static int	mac_enforce_system = 1;
1549e913ebdSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_system, CTLFLAG_RW,
1559e913ebdSRobert Watson     &mac_enforce_system, 0, "Enforce MAC policy on system operations");
1569e913ebdSRobert Watson TUNABLE_INT("security.mac.enforce_system", &mac_enforce_system);
157d3fc69eeSRobert Watson 
158ca7850c3SRobert Watson static int	mac_enforce_vm = 1;
159ca7850c3SRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
160ca7850c3SRobert Watson     &mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
161c031391bSRobert Watson TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
162ca7850c3SRobert Watson 
163c0f39905SRobert Watson static int	mac_mmap_revocation = 1;
164c0f39905SRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, mmap_revocation, CTLFLAG_RW,
165c0f39905SRobert Watson     &mac_mmap_revocation, 0, "Revoke mmap access to files on subject "
166c0f39905SRobert Watson     "relabel");
16799fa64f8SRobert Watson static int	mac_mmap_revocation_via_cow = 0;
16895fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, mmap_revocation_via_cow, CTLFLAG_RW,
16995fab37eSRobert Watson     &mac_mmap_revocation_via_cow, 0, "Revoke mmap access to files via "
17095fab37eSRobert Watson     "copy-on-write semantics, or by removing all write access");
17195fab37eSRobert Watson 
172f050add5SRobert Watson #ifdef MAC_DEBUG
1736be0c25eSRobert Watson SYSCTL_NODE(_security_mac, OID_AUTO, debug, CTLFLAG_RW, 0,
1746be0c25eSRobert Watson     "TrustedBSD MAC debug info");
1756be0c25eSRobert Watson 
1766be0c25eSRobert Watson static int	mac_debug_label_fallback = 0;
1776be0c25eSRobert Watson SYSCTL_INT(_security_mac_debug, OID_AUTO, label_fallback, CTLFLAG_RW,
1786be0c25eSRobert Watson     &mac_debug_label_fallback, 0, "Filesystems should fall back to fs label"
1796be0c25eSRobert Watson     "when label is corrupted.");
1806be0c25eSRobert Watson TUNABLE_INT("security.mac.debug_label_fallback",
1816be0c25eSRobert Watson     &mac_debug_label_fallback);
1826be0c25eSRobert Watson 
183b2f0927aSRobert Watson SYSCTL_NODE(_security_mac_debug, OID_AUTO, counters, CTLFLAG_RW, 0,
184b2f0927aSRobert Watson     "TrustedBSD MAC object counters");
185b2f0927aSRobert Watson 
18695fab37eSRobert Watson static unsigned int nmacmbufs, nmaccreds, nmacifnets, nmacbpfdescs,
18795fab37eSRobert Watson     nmacsockets, nmacmounts, nmactemp, nmacvnodes, nmacdevfsdirents,
18895fab37eSRobert Watson     nmacipqs, nmacpipes;
189b2f0927aSRobert Watson 
190b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, mbufs, CTLFLAG_RD,
19195fab37eSRobert Watson     &nmacmbufs, 0, "number of mbufs in use");
192b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, creds, CTLFLAG_RD,
19395fab37eSRobert Watson     &nmaccreds, 0, "number of ucreds in use");
194b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, ifnets, CTLFLAG_RD,
19595fab37eSRobert Watson     &nmacifnets, 0, "number of ifnets in use");
196b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, ipqs, CTLFLAG_RD,
19795fab37eSRobert Watson     &nmacipqs, 0, "number of ipqs in use");
198b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, bpfdescs, CTLFLAG_RD,
19995fab37eSRobert Watson     &nmacbpfdescs, 0, "number of bpfdescs in use");
200b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, sockets, CTLFLAG_RD,
20195fab37eSRobert Watson     &nmacsockets, 0, "number of sockets in use");
202b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, pipes, CTLFLAG_RD,
20395fab37eSRobert Watson     &nmacpipes, 0, "number of pipes in use");
204b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, mounts, CTLFLAG_RD,
20595fab37eSRobert Watson     &nmacmounts, 0, "number of mounts in use");
206b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, temp, CTLFLAG_RD,
20795fab37eSRobert Watson     &nmactemp, 0, "number of temporary labels in use");
208b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, vnodes, CTLFLAG_RD,
20995fab37eSRobert Watson     &nmacvnodes, 0, "number of vnodes in use");
210b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, devfsdirents, CTLFLAG_RD,
21195fab37eSRobert Watson     &nmacdevfsdirents, 0, "number of devfs dirents inuse");
212f050add5SRobert Watson #endif
21395fab37eSRobert Watson 
21495fab37eSRobert Watson static int	error_select(int error1, int error2);
21595fab37eSRobert Watson static int	mac_policy_register(struct mac_policy_conf *mpc);
21695fab37eSRobert Watson static int	mac_policy_unregister(struct mac_policy_conf *mpc);
21795fab37eSRobert Watson 
218e183f80eSRobert Watson static void	mac_check_vnode_mmap_downgrade(struct ucred *cred,
219e183f80eSRobert Watson 		    struct vnode *vp, int *prot);
22095fab37eSRobert Watson static void	mac_cred_mmapped_drop_perms_recurse(struct thread *td,
22195fab37eSRobert Watson 		    struct ucred *cred, struct vm_map *map);
22295fab37eSRobert Watson 
22383985c26SRobert Watson static void	mac_destroy_socket_label(struct label *label);
22483985c26SRobert Watson 
225763bbd2fSRobert Watson static int	mac_setlabel_vnode_extattr(struct ucred *cred,
226763bbd2fSRobert Watson 		    struct vnode *vp, struct label *intlabel);
227763bbd2fSRobert Watson 
22895fab37eSRobert Watson MALLOC_DEFINE(M_MACPIPELABEL, "macpipelabel", "MAC labels for pipes");
229f7b951a8SRobert Watson MALLOC_DEFINE(M_MACTEMP, "mactemp", "MAC temporary label storage");
23095fab37eSRobert Watson 
23195fab37eSRobert Watson /*
232a96acd1aSRobert Watson  * mac_policy_list stores the list of active policies.  A busy count is
233a96acd1aSRobert Watson  * maintained for the list, stored in mac_policy_busy.  The busy count
234a96acd1aSRobert Watson  * is protected by mac_policy_list_lock; the list may be modified only
235a96acd1aSRobert Watson  * while the busy count is 0, requiring that the lock be held to
236a96acd1aSRobert Watson  * prevent new references to the list from being acquired.  For almost
237a96acd1aSRobert Watson  * all operations, incrementing the busy count is sufficient to
238a96acd1aSRobert Watson  * guarantee consistency, as the list cannot be modified while the
239a96acd1aSRobert Watson  * busy count is elevated.  For a few special operations involving a
240a96acd1aSRobert Watson  * change to the list of active policies, the lock itself must be held.
241a96acd1aSRobert Watson  * A condition variable, mac_policy_list_not_busy, is used to signal
242a96acd1aSRobert Watson  * potential exclusive consumers that they should try to acquire the
243a96acd1aSRobert Watson  * lock if a first attempt at exclusive access fails.
24495fab37eSRobert Watson  */
24595fab37eSRobert Watson static struct mtx mac_policy_list_lock;
246a96acd1aSRobert Watson static struct cv mac_policy_list_not_busy;
24795fab37eSRobert Watson static LIST_HEAD(, mac_policy_conf) mac_policy_list;
24895fab37eSRobert Watson static int mac_policy_list_busy;
249a96acd1aSRobert Watson 
250a96acd1aSRobert Watson #define	MAC_POLICY_LIST_LOCKINIT() do {					\
251a96acd1aSRobert Watson 	mtx_init(&mac_policy_list_lock, "mac_policy_list_lock", NULL,	\
252a96acd1aSRobert Watson 	    MTX_DEF);							\
253a96acd1aSRobert Watson 	cv_init(&mac_policy_list_not_busy, "mac_policy_list_not_busy");	\
254a96acd1aSRobert Watson } while (0)
255a96acd1aSRobert Watson 
256a96acd1aSRobert Watson #define	MAC_POLICY_LIST_LOCK() do {					\
257a96acd1aSRobert Watson 	mtx_lock(&mac_policy_list_lock);				\
258a96acd1aSRobert Watson } while (0)
259a96acd1aSRobert Watson 
260a96acd1aSRobert Watson #define	MAC_POLICY_LIST_UNLOCK() do {					\
261a96acd1aSRobert Watson 	mtx_unlock(&mac_policy_list_lock);				\
262a96acd1aSRobert Watson } while (0)
263a96acd1aSRobert Watson 
264a96acd1aSRobert Watson /*
265a96acd1aSRobert Watson  * We manually invoke WITNESS_SLEEP() to allow Witness to generate
266a96acd1aSRobert Watson  * warnings even if we don't end up ever triggering the wait at
267a96acd1aSRobert Watson  * run-time.  The consumer of the exclusive interface must not hold
268a96acd1aSRobert Watson  * any locks (other than potentially Giant) since we may sleep for
269a96acd1aSRobert Watson  * long (potentially indefinite) periods of time waiting for the
270a96acd1aSRobert Watson  * framework to become quiescent so that a policy list change may
271a96acd1aSRobert Watson  * be made.
272a96acd1aSRobert Watson  */
273a96acd1aSRobert Watson #define	MAC_POLICY_LIST_EXCLUSIVE() do {				\
274a96acd1aSRobert Watson 	WITNESS_SLEEP(1, NULL);						\
275a96acd1aSRobert Watson 	mtx_lock(&mac_policy_list_lock);				\
276a96acd1aSRobert Watson 	while (mac_policy_list_busy != 0)				\
277a96acd1aSRobert Watson 		cv_wait(&mac_policy_list_not_busy,			\
278a96acd1aSRobert Watson 		    &mac_policy_list_lock);				\
279a96acd1aSRobert Watson } while (0)
28095fab37eSRobert Watson 
28195fab37eSRobert Watson #define	MAC_POLICY_LIST_BUSY() do {					\
28295fab37eSRobert Watson 	MAC_POLICY_LIST_LOCK();						\
28395fab37eSRobert Watson 	mac_policy_list_busy++;						\
28495fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();					\
28595fab37eSRobert Watson } while (0)
28695fab37eSRobert Watson 
28795fab37eSRobert Watson #define	MAC_POLICY_LIST_UNBUSY() do {					\
28895fab37eSRobert Watson 	MAC_POLICY_LIST_LOCK();						\
28995fab37eSRobert Watson 	mac_policy_list_busy--;						\
290a96acd1aSRobert Watson 	KASSERT(mac_policy_list_busy >= 0, ("MAC_POLICY_LIST_LOCK"));	\
291a96acd1aSRobert Watson 	if (mac_policy_list_busy == 0)					\
292a96acd1aSRobert Watson 		cv_signal(&mac_policy_list_not_busy);			\
29395fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();					\
29495fab37eSRobert Watson } while (0)
29595fab37eSRobert Watson 
29695fab37eSRobert Watson /*
29795fab37eSRobert Watson  * MAC_CHECK performs the designated check by walking the policy
29895fab37eSRobert Watson  * module list and checking with each as to how it feels about the
29995fab37eSRobert Watson  * request.  Note that it returns its value via 'error' in the scope
30095fab37eSRobert Watson  * of the caller.
30195fab37eSRobert Watson  */
30295fab37eSRobert Watson #define	MAC_CHECK(check, args...) do {					\
30395fab37eSRobert Watson 	struct mac_policy_conf *mpc;					\
30495fab37eSRobert Watson 									\
30595fab37eSRobert Watson 	error = 0;							\
30695fab37eSRobert Watson 	MAC_POLICY_LIST_BUSY();						\
30795fab37eSRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {			\
30895fab37eSRobert Watson 		if (mpc->mpc_ops->mpo_ ## check != NULL)		\
30995fab37eSRobert Watson 			error = error_select(				\
31095fab37eSRobert Watson 			    mpc->mpc_ops->mpo_ ## check (args),		\
31195fab37eSRobert Watson 			    error);					\
31295fab37eSRobert Watson 	}								\
31395fab37eSRobert Watson 	MAC_POLICY_LIST_UNBUSY();					\
31495fab37eSRobert Watson } while (0)
31595fab37eSRobert Watson 
31695fab37eSRobert Watson /*
31795fab37eSRobert Watson  * MAC_BOOLEAN performs the designated boolean composition by walking
31895fab37eSRobert Watson  * the module list, invoking each instance of the operation, and
31995fab37eSRobert Watson  * combining the results using the passed C operator.  Note that it
32095fab37eSRobert Watson  * returns its value via 'result' in the scope of the caller, which
32195fab37eSRobert Watson  * should be initialized by the caller in a meaningful way to get
32295fab37eSRobert Watson  * a meaningful result.
32395fab37eSRobert Watson  */
32495fab37eSRobert Watson #define	MAC_BOOLEAN(operation, composition, args...) do {		\
32595fab37eSRobert Watson 	struct mac_policy_conf *mpc;					\
32695fab37eSRobert Watson 									\
32795fab37eSRobert Watson 	MAC_POLICY_LIST_BUSY();						\
32895fab37eSRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {			\
32995fab37eSRobert Watson 		if (mpc->mpc_ops->mpo_ ## operation != NULL)		\
33095fab37eSRobert Watson 			result = result composition			\
33195fab37eSRobert Watson 			    mpc->mpc_ops->mpo_ ## operation (args);	\
33295fab37eSRobert Watson 	}								\
33395fab37eSRobert Watson 	MAC_POLICY_LIST_UNBUSY();					\
33495fab37eSRobert Watson } while (0)
33595fab37eSRobert Watson 
336f7b951a8SRobert Watson #define	MAC_EXTERNALIZE(type, label, elementlist, outbuf, 		\
337f7b951a8SRobert Watson     outbuflen) do {							\
338f7b951a8SRobert Watson 	char *curptr, *curptr_start, *element_name, *element_temp;	\
339f7b951a8SRobert Watson 	size_t left, left_start, len;					\
340f7b951a8SRobert Watson 	int claimed, first, first_start, ignorenotfound;		\
341f7b951a8SRobert Watson 									\
342f7b951a8SRobert Watson 	error = 0;							\
343f7b951a8SRobert Watson 	element_temp = elementlist;					\
344f7b951a8SRobert Watson 	curptr = outbuf;						\
345f7b951a8SRobert Watson 	curptr[0] = '\0';						\
346f7b951a8SRobert Watson 	left = outbuflen;						\
347f7b951a8SRobert Watson 	first = 1;							\
348f7b951a8SRobert Watson 	while ((element_name = strsep(&element_temp, ",")) != NULL) {	\
349f7b951a8SRobert Watson 		curptr_start = curptr;					\
350f7b951a8SRobert Watson 		left_start = left;					\
351f7b951a8SRobert Watson 		first_start = first;					\
352f7b951a8SRobert Watson 		if (element_name[0] == '?') {				\
353f7b951a8SRobert Watson 			element_name++;					\
354f7b951a8SRobert Watson 			ignorenotfound = 1;				\
355f7b951a8SRobert Watson 		} else							\
356f7b951a8SRobert Watson 			ignorenotfound = 0;				\
357f7b951a8SRobert Watson 		claimed = 0;						\
358f7b951a8SRobert Watson 		if (first) {						\
359f7b951a8SRobert Watson 			len = snprintf(curptr, left, "%s/",		\
360f7b951a8SRobert Watson 			    element_name);				\
361f7b951a8SRobert Watson 			first = 0;					\
362f7b951a8SRobert Watson 		} else							\
363f7b951a8SRobert Watson 			len = snprintf(curptr, left, ",%s/",		\
364f7b951a8SRobert Watson 			    element_name);				\
365f7b951a8SRobert Watson 		if (len >= left) {					\
366f7b951a8SRobert Watson 			error = EINVAL;		/* XXXMAC: E2BIG */	\
367f7b951a8SRobert Watson 			break;						\
368f7b951a8SRobert Watson 		}							\
369f7b951a8SRobert Watson 		curptr += len;						\
370f7b951a8SRobert Watson 		left -= len;						\
371f7b951a8SRobert Watson 									\
372f7b951a8SRobert Watson 		MAC_CHECK(externalize_ ## type, label, element_name,	\
373f7b951a8SRobert Watson 		    curptr, left, &len, &claimed);			\
374f7b951a8SRobert Watson 		if (error)						\
375f7b951a8SRobert Watson 			break;						\
376f7b951a8SRobert Watson 		if (claimed == 1) {					\
377f7b951a8SRobert Watson 			if (len >= outbuflen) {				\
378f7b951a8SRobert Watson 				error = EINVAL;	/* XXXMAC: E2BIG */	\
379f7b951a8SRobert Watson 				break;					\
380f7b951a8SRobert Watson 			}						\
381f7b951a8SRobert Watson 			curptr += len;					\
382f7b951a8SRobert Watson 			left -= len;					\
383f7b951a8SRobert Watson 		} else if (claimed == 0 && ignorenotfound) {		\
384f7b951a8SRobert Watson 			/*						\
385f7b951a8SRobert Watson 			 * Revert addition of the label element		\
386f7b951a8SRobert Watson 			 * name.					\
387f7b951a8SRobert Watson 			 */						\
388f7b951a8SRobert Watson 			curptr = curptr_start;				\
389f7b951a8SRobert Watson 			*curptr = '\0';					\
390f7b951a8SRobert Watson 			left = left_start;				\
391f7b951a8SRobert Watson 			first = first_start;				\
392f7b951a8SRobert Watson 		} else {						\
393f7b951a8SRobert Watson 			error = EINVAL;		/* XXXMAC: ENOLABEL */	\
394f7b951a8SRobert Watson 			break;						\
395f7b951a8SRobert Watson 		}							\
396f7b951a8SRobert Watson 	}								\
397f7b951a8SRobert Watson } while (0)
398f7b951a8SRobert Watson 
399f7b951a8SRobert Watson #define	MAC_INTERNALIZE(type, label, instring) do {			\
400f7b951a8SRobert Watson 	char *element, *element_name, *element_data;			\
401f7b951a8SRobert Watson 	int claimed;							\
402f7b951a8SRobert Watson 									\
403f7b951a8SRobert Watson 	error = 0;							\
404f7b951a8SRobert Watson 	element = instring;						\
405f7b951a8SRobert Watson 	while ((element_name = strsep(&element, ",")) != NULL) {	\
406f7b951a8SRobert Watson 		element_data = element_name;				\
407f7b951a8SRobert Watson 		element_name = strsep(&element_data, "/");		\
408f7b951a8SRobert Watson 		if (element_data == NULL) {				\
409f7b951a8SRobert Watson 			error = EINVAL;					\
410f7b951a8SRobert Watson 			break;						\
411f7b951a8SRobert Watson 		}							\
412f7b951a8SRobert Watson 		claimed = 0;						\
413f7b951a8SRobert Watson 		MAC_CHECK(internalize_ ## type, label, element_name,	\
414f7b951a8SRobert Watson 		    element_data, &claimed);				\
415f7b951a8SRobert Watson 		if (error)						\
416f7b951a8SRobert Watson 			break;						\
417f7b951a8SRobert Watson 		if (claimed != 1) {					\
418f7b951a8SRobert Watson 			/* XXXMAC: Another error here? */		\
419f7b951a8SRobert Watson 			error = EINVAL;					\
420f7b951a8SRobert Watson 			break;						\
421f7b951a8SRobert Watson 		}							\
422f7b951a8SRobert Watson 	}								\
423f7b951a8SRobert Watson } while (0)
424f7b951a8SRobert Watson 
42595fab37eSRobert Watson /*
42695fab37eSRobert Watson  * MAC_PERFORM performs the designated operation by walking the policy
42795fab37eSRobert Watson  * module list and invoking that operation for each policy.
42895fab37eSRobert Watson  */
42995fab37eSRobert Watson #define	MAC_PERFORM(operation, args...) do {				\
43095fab37eSRobert Watson 	struct mac_policy_conf *mpc;					\
43195fab37eSRobert Watson 									\
43295fab37eSRobert Watson 	MAC_POLICY_LIST_BUSY();						\
43395fab37eSRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {			\
43495fab37eSRobert Watson 		if (mpc->mpc_ops->mpo_ ## operation != NULL)		\
43595fab37eSRobert Watson 			mpc->mpc_ops->mpo_ ## operation (args);		\
43695fab37eSRobert Watson 	}								\
43795fab37eSRobert Watson 	MAC_POLICY_LIST_UNBUSY();					\
43895fab37eSRobert Watson } while (0)
43995fab37eSRobert Watson 
44095fab37eSRobert Watson /*
44195fab37eSRobert Watson  * Initialize the MAC subsystem, including appropriate SMP locks.
44295fab37eSRobert Watson  */
44395fab37eSRobert Watson static void
44495fab37eSRobert Watson mac_init(void)
44595fab37eSRobert Watson {
44695fab37eSRobert Watson 
44795fab37eSRobert Watson 	LIST_INIT(&mac_policy_list);
44895fab37eSRobert Watson 	MAC_POLICY_LIST_LOCKINIT();
44995fab37eSRobert Watson }
45095fab37eSRobert Watson 
45195fab37eSRobert Watson /*
45295fab37eSRobert Watson  * For the purposes of modules that want to know if they were loaded
45395fab37eSRobert Watson  * "early", set the mac_late flag once we've processed modules either
45495fab37eSRobert Watson  * linked into the kernel, or loaded before the kernel startup.
45595fab37eSRobert Watson  */
45695fab37eSRobert Watson static void
45795fab37eSRobert Watson mac_late_init(void)
45895fab37eSRobert Watson {
45995fab37eSRobert Watson 
46095fab37eSRobert Watson 	mac_late = 1;
46195fab37eSRobert Watson }
46295fab37eSRobert Watson 
46395fab37eSRobert Watson /*
46495fab37eSRobert Watson  * Allow MAC policy modules to register during boot, etc.
46595fab37eSRobert Watson  */
46695fab37eSRobert Watson int
46795fab37eSRobert Watson mac_policy_modevent(module_t mod, int type, void *data)
46895fab37eSRobert Watson {
46995fab37eSRobert Watson 	struct mac_policy_conf *mpc;
47095fab37eSRobert Watson 	int error;
47195fab37eSRobert Watson 
47295fab37eSRobert Watson 	error = 0;
47395fab37eSRobert Watson 	mpc = (struct mac_policy_conf *) data;
47495fab37eSRobert Watson 
47595fab37eSRobert Watson 	switch (type) {
47695fab37eSRobert Watson 	case MOD_LOAD:
47795fab37eSRobert Watson 		if (mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_NOTLATE &&
47895fab37eSRobert Watson 		    mac_late) {
47995fab37eSRobert Watson 			printf("mac_policy_modevent: can't load %s policy "
48095fab37eSRobert Watson 			    "after booting\n", mpc->mpc_name);
48195fab37eSRobert Watson 			error = EBUSY;
48295fab37eSRobert Watson 			break;
48395fab37eSRobert Watson 		}
48495fab37eSRobert Watson 		error = mac_policy_register(mpc);
48595fab37eSRobert Watson 		break;
48695fab37eSRobert Watson 	case MOD_UNLOAD:
48795fab37eSRobert Watson 		/* Don't unregister the module if it was never registered. */
48895fab37eSRobert Watson 		if ((mpc->mpc_runtime_flags & MPC_RUNTIME_FLAG_REGISTERED)
48995fab37eSRobert Watson 		    != 0)
49095fab37eSRobert Watson 			error = mac_policy_unregister(mpc);
49195fab37eSRobert Watson 		else
49295fab37eSRobert Watson 			error = 0;
49395fab37eSRobert Watson 		break;
49495fab37eSRobert Watson 	default:
49595fab37eSRobert Watson 		break;
49695fab37eSRobert Watson 	}
49795fab37eSRobert Watson 
49895fab37eSRobert Watson 	return (error);
49995fab37eSRobert Watson }
50095fab37eSRobert Watson 
50195fab37eSRobert Watson static int
50295fab37eSRobert Watson mac_policy_register(struct mac_policy_conf *mpc)
50395fab37eSRobert Watson {
50495fab37eSRobert Watson 	struct mac_policy_conf *tmpc;
50595fab37eSRobert Watson 	int slot;
50695fab37eSRobert Watson 
507a96acd1aSRobert Watson 	MAC_POLICY_LIST_EXCLUSIVE();
50895fab37eSRobert Watson 	LIST_FOREACH(tmpc, &mac_policy_list, mpc_list) {
50995fab37eSRobert Watson 		if (strcmp(tmpc->mpc_name, mpc->mpc_name) == 0) {
51095fab37eSRobert Watson 			MAC_POLICY_LIST_UNLOCK();
51195fab37eSRobert Watson 			return (EEXIST);
51295fab37eSRobert Watson 		}
51395fab37eSRobert Watson 	}
51495fab37eSRobert Watson 	if (mpc->mpc_field_off != NULL) {
51595fab37eSRobert Watson 		slot = ffs(mac_policy_offsets_free);
51695fab37eSRobert Watson 		if (slot == 0) {
51795fab37eSRobert Watson 			MAC_POLICY_LIST_UNLOCK();
51895fab37eSRobert Watson 			return (ENOMEM);
51995fab37eSRobert Watson 		}
52095fab37eSRobert Watson 		slot--;
52195fab37eSRobert Watson 		mac_policy_offsets_free &= ~(1 << slot);
52295fab37eSRobert Watson 		*mpc->mpc_field_off = slot;
52395fab37eSRobert Watson 	}
52495fab37eSRobert Watson 	mpc->mpc_runtime_flags |= MPC_RUNTIME_FLAG_REGISTERED;
52595fab37eSRobert Watson 	LIST_INSERT_HEAD(&mac_policy_list, mpc, mpc_list);
52695fab37eSRobert Watson 
52795fab37eSRobert Watson 	/* Per-policy initialization. */
52895fab37eSRobert Watson 	if (mpc->mpc_ops->mpo_init != NULL)
52995fab37eSRobert Watson 		(*(mpc->mpc_ops->mpo_init))(mpc);
53095fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();
53195fab37eSRobert Watson 
53295fab37eSRobert Watson 	printf("Security policy loaded: %s (%s)\n", mpc->mpc_fullname,
53395fab37eSRobert Watson 	    mpc->mpc_name);
53495fab37eSRobert Watson 
53595fab37eSRobert Watson 	return (0);
53695fab37eSRobert Watson }
53795fab37eSRobert Watson 
53895fab37eSRobert Watson static int
53995fab37eSRobert Watson mac_policy_unregister(struct mac_policy_conf *mpc)
54095fab37eSRobert Watson {
54195fab37eSRobert Watson 
542ea599aa0SRobert Watson 	/*
543ea599aa0SRobert Watson 	 * If we fail the load, we may get a request to unload.  Check
544ea599aa0SRobert Watson 	 * to see if we did the run-time registration, and if not,
545ea599aa0SRobert Watson 	 * silently succeed.
546ea599aa0SRobert Watson 	 */
547a96acd1aSRobert Watson 	MAC_POLICY_LIST_EXCLUSIVE();
548ea599aa0SRobert Watson 	if ((mpc->mpc_runtime_flags & MPC_RUNTIME_FLAG_REGISTERED) == 0) {
549ea599aa0SRobert Watson 		MAC_POLICY_LIST_UNLOCK();
550ea599aa0SRobert Watson 		return (0);
551ea599aa0SRobert Watson 	}
55295fab37eSRobert Watson #if 0
55395fab37eSRobert Watson 	/*
55495fab37eSRobert Watson 	 * Don't allow unloading modules with private data.
55595fab37eSRobert Watson 	 */
556ea599aa0SRobert Watson 	if (mpc->mpc_field_off != NULL) {
557ea599aa0SRobert Watson 		MAC_POLICY_LIST_UNLOCK();
55895fab37eSRobert Watson 		return (EBUSY);
559ea599aa0SRobert Watson 	}
56095fab37eSRobert Watson #endif
561ea599aa0SRobert Watson 	/*
562ea599aa0SRobert Watson 	 * Only allow the unload to proceed if the module is unloadable
563ea599aa0SRobert Watson 	 * by its own definition.
564ea599aa0SRobert Watson 	 */
565ea599aa0SRobert Watson 	if ((mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_UNLOADOK) == 0) {
566ea599aa0SRobert Watson 		MAC_POLICY_LIST_UNLOCK();
56795fab37eSRobert Watson 		return (EBUSY);
568ea599aa0SRobert Watson 	}
56995fab37eSRobert Watson 	if (mpc->mpc_ops->mpo_destroy != NULL)
57095fab37eSRobert Watson 		(*(mpc->mpc_ops->mpo_destroy))(mpc);
57195fab37eSRobert Watson 
57295fab37eSRobert Watson 	LIST_REMOVE(mpc, mpc_list);
5739aeffb2bSRobert Watson 	mpc->mpc_runtime_flags &= ~MPC_RUNTIME_FLAG_REGISTERED;
57495fab37eSRobert Watson 
575a96acd1aSRobert Watson 	MAC_POLICY_LIST_UNLOCK();
576a96acd1aSRobert Watson 
57795fab37eSRobert Watson 	printf("Security policy unload: %s (%s)\n", mpc->mpc_fullname,
57895fab37eSRobert Watson 	    mpc->mpc_name);
57995fab37eSRobert Watson 
58095fab37eSRobert Watson 	return (0);
58195fab37eSRobert Watson }
58295fab37eSRobert Watson 
58395fab37eSRobert Watson /*
58495fab37eSRobert Watson  * Define an error value precedence, and given two arguments, selects the
58595fab37eSRobert Watson  * value with the higher precedence.
58695fab37eSRobert Watson  */
58795fab37eSRobert Watson static int
58895fab37eSRobert Watson error_select(int error1, int error2)
58995fab37eSRobert Watson {
59095fab37eSRobert Watson 
59195fab37eSRobert Watson 	/* Certain decision-making errors take top priority. */
59295fab37eSRobert Watson 	if (error1 == EDEADLK || error2 == EDEADLK)
59395fab37eSRobert Watson 		return (EDEADLK);
59495fab37eSRobert Watson 
59595fab37eSRobert Watson 	/* Invalid arguments should be reported where possible. */
59695fab37eSRobert Watson 	if (error1 == EINVAL || error2 == EINVAL)
59795fab37eSRobert Watson 		return (EINVAL);
59895fab37eSRobert Watson 
59995fab37eSRobert Watson 	/* Precedence goes to "visibility", with both process and file. */
60095fab37eSRobert Watson 	if (error1 == ESRCH || error2 == ESRCH)
60195fab37eSRobert Watson 		return (ESRCH);
60295fab37eSRobert Watson 
60395fab37eSRobert Watson 	if (error1 == ENOENT || error2 == ENOENT)
60495fab37eSRobert Watson 		return (ENOENT);
60595fab37eSRobert Watson 
60695fab37eSRobert Watson 	/* Precedence goes to DAC/MAC protections. */
60795fab37eSRobert Watson 	if (error1 == EACCES || error2 == EACCES)
60895fab37eSRobert Watson 		return (EACCES);
60995fab37eSRobert Watson 
61095fab37eSRobert Watson 	/* Precedence goes to privilege. */
61195fab37eSRobert Watson 	if (error1 == EPERM || error2 == EPERM)
61295fab37eSRobert Watson 		return (EPERM);
61395fab37eSRobert Watson 
61495fab37eSRobert Watson 	/* Precedence goes to error over success; otherwise, arbitrary. */
61595fab37eSRobert Watson 	if (error1 != 0)
61695fab37eSRobert Watson 		return (error1);
61795fab37eSRobert Watson 	return (error2);
61895fab37eSRobert Watson }
61995fab37eSRobert Watson 
62008bcdc58SRobert Watson static void
62108bcdc58SRobert Watson mac_init_label(struct label *label)
62208bcdc58SRobert Watson {
62308bcdc58SRobert Watson 
62408bcdc58SRobert Watson 	bzero(label, sizeof(*label));
62508bcdc58SRobert Watson 	label->l_flags = MAC_FLAG_INITIALIZED;
62608bcdc58SRobert Watson }
62708bcdc58SRobert Watson 
62808bcdc58SRobert Watson static void
62908bcdc58SRobert Watson mac_destroy_label(struct label *label)
63008bcdc58SRobert Watson {
63108bcdc58SRobert Watson 
63208bcdc58SRobert Watson 	KASSERT(label->l_flags & MAC_FLAG_INITIALIZED,
63308bcdc58SRobert Watson 	    ("destroying uninitialized label"));
63408bcdc58SRobert Watson 
63508bcdc58SRobert Watson 	bzero(label, sizeof(*label));
63608bcdc58SRobert Watson 	/* implicit: label->l_flags &= ~MAC_FLAG_INITIALIZED; */
63708bcdc58SRobert Watson }
63808bcdc58SRobert Watson 
63908bcdc58SRobert Watson void
64087807196SRobert Watson mac_init_bpfdesc(struct bpf_d *bpf_d)
64108bcdc58SRobert Watson {
64208bcdc58SRobert Watson 
64387807196SRobert Watson 	mac_init_label(&bpf_d->bd_label);
64487807196SRobert Watson 	MAC_PERFORM(init_bpfdesc_label, &bpf_d->bd_label);
64508bcdc58SRobert Watson #ifdef MAC_DEBUG
64687807196SRobert Watson 	atomic_add_int(&nmacbpfdescs, 1);
64708bcdc58SRobert Watson #endif
64808bcdc58SRobert Watson }
64908bcdc58SRobert Watson 
650f7b951a8SRobert Watson static void
651f7b951a8SRobert Watson mac_init_cred_label(struct label *label)
65208bcdc58SRobert Watson {
65308bcdc58SRobert Watson 
654f7b951a8SRobert Watson 	mac_init_label(label);
655f7b951a8SRobert Watson 	MAC_PERFORM(init_cred_label, label);
65608bcdc58SRobert Watson #ifdef MAC_DEBUG
65708bcdc58SRobert Watson 	atomic_add_int(&nmaccreds, 1);
65808bcdc58SRobert Watson #endif
65908bcdc58SRobert Watson }
66008bcdc58SRobert Watson 
66108bcdc58SRobert Watson void
662f7b951a8SRobert Watson mac_init_cred(struct ucred *cred)
663f7b951a8SRobert Watson {
664f7b951a8SRobert Watson 
665f7b951a8SRobert Watson 	mac_init_cred_label(&cred->cr_label);
666f7b951a8SRobert Watson }
667f7b951a8SRobert Watson 
668f7b951a8SRobert Watson void
66987807196SRobert Watson mac_init_devfsdirent(struct devfs_dirent *de)
67008bcdc58SRobert Watson {
67108bcdc58SRobert Watson 
67287807196SRobert Watson 	mac_init_label(&de->de_label);
67387807196SRobert Watson 	MAC_PERFORM(init_devfsdirent_label, &de->de_label);
67408bcdc58SRobert Watson #ifdef MAC_DEBUG
67587807196SRobert Watson 	atomic_add_int(&nmacdevfsdirents, 1);
67608bcdc58SRobert Watson #endif
67708bcdc58SRobert Watson }
67808bcdc58SRobert Watson 
679f7b951a8SRobert Watson static void
680f7b951a8SRobert Watson mac_init_ifnet_label(struct label *label)
681f7b951a8SRobert Watson {
682f7b951a8SRobert Watson 
683f7b951a8SRobert Watson 	mac_init_label(label);
684f7b951a8SRobert Watson 	MAC_PERFORM(init_ifnet_label, label);
685f7b951a8SRobert Watson #ifdef MAC_DEBUG
686f7b951a8SRobert Watson 	atomic_add_int(&nmacifnets, 1);
687f7b951a8SRobert Watson #endif
688f7b951a8SRobert Watson }
689f7b951a8SRobert Watson 
69008bcdc58SRobert Watson void
69108bcdc58SRobert Watson mac_init_ifnet(struct ifnet *ifp)
69208bcdc58SRobert Watson {
69308bcdc58SRobert Watson 
694f7b951a8SRobert Watson 	mac_init_ifnet_label(&ifp->if_label);
69508bcdc58SRobert Watson }
69608bcdc58SRobert Watson 
69708bcdc58SRobert Watson void
69808bcdc58SRobert Watson mac_init_ipq(struct ipq *ipq)
69908bcdc58SRobert Watson {
70008bcdc58SRobert Watson 
70108bcdc58SRobert Watson 	mac_init_label(&ipq->ipq_label);
70208bcdc58SRobert Watson 	MAC_PERFORM(init_ipq_label, &ipq->ipq_label);
70308bcdc58SRobert Watson #ifdef MAC_DEBUG
70408bcdc58SRobert Watson 	atomic_add_int(&nmacipqs, 1);
70508bcdc58SRobert Watson #endif
70608bcdc58SRobert Watson }
70708bcdc58SRobert Watson 
70887807196SRobert Watson int
70987807196SRobert Watson mac_init_mbuf(struct mbuf *m, int flag)
71008bcdc58SRobert Watson {
71156c15412SRobert Watson 	int error;
71256c15412SRobert Watson 
71387807196SRobert Watson 	KASSERT(m->m_flags & M_PKTHDR, ("mac_init_mbuf on non-header mbuf"));
71408bcdc58SRobert Watson 
71587807196SRobert Watson 	mac_init_label(&m->m_pkthdr.label);
71687807196SRobert Watson 
71756c15412SRobert Watson 	MAC_CHECK(init_mbuf_label, &m->m_pkthdr.label, flag);
71856c15412SRobert Watson 	if (error) {
71956c15412SRobert Watson 		MAC_PERFORM(destroy_mbuf_label, &m->m_pkthdr.label);
72056c15412SRobert Watson 		mac_destroy_label(&m->m_pkthdr.label);
72156c15412SRobert Watson 	}
72256c15412SRobert Watson 
72308bcdc58SRobert Watson #ifdef MAC_DEBUG
72456c15412SRobert Watson 	if (error == 0)
72587807196SRobert Watson 		atomic_add_int(&nmacmbufs, 1);
72608bcdc58SRobert Watson #endif
72756c15412SRobert Watson 	return (error);
72808bcdc58SRobert Watson }
72908bcdc58SRobert Watson 
73008bcdc58SRobert Watson void
73187807196SRobert Watson mac_init_mount(struct mount *mp)
73208bcdc58SRobert Watson {
73308bcdc58SRobert Watson 
73487807196SRobert Watson 	mac_init_label(&mp->mnt_mntlabel);
73587807196SRobert Watson 	mac_init_label(&mp->mnt_fslabel);
73687807196SRobert Watson 	MAC_PERFORM(init_mount_label, &mp->mnt_mntlabel);
73787807196SRobert Watson 	MAC_PERFORM(init_mount_fs_label, &mp->mnt_fslabel);
73808bcdc58SRobert Watson #ifdef MAC_DEBUG
73987807196SRobert Watson 	atomic_add_int(&nmacmounts, 1);
74008bcdc58SRobert Watson #endif
74108bcdc58SRobert Watson }
74208bcdc58SRobert Watson 
743f7b951a8SRobert Watson static void
744f7b951a8SRobert Watson mac_init_pipe_label(struct label *label)
745f7b951a8SRobert Watson {
746f7b951a8SRobert Watson 
747f7b951a8SRobert Watson 	mac_init_label(label);
748f7b951a8SRobert Watson 	MAC_PERFORM(init_pipe_label, label);
749f7b951a8SRobert Watson #ifdef MAC_DEBUG
750f7b951a8SRobert Watson 	atomic_add_int(&nmacpipes, 1);
751f7b951a8SRobert Watson #endif
752f7b951a8SRobert Watson }
753f7b951a8SRobert Watson 
75408bcdc58SRobert Watson void
75508bcdc58SRobert Watson mac_init_pipe(struct pipe *pipe)
75608bcdc58SRobert Watson {
75708bcdc58SRobert Watson 	struct label *label;
75808bcdc58SRobert Watson 
75908bcdc58SRobert Watson 	label = malloc(sizeof(struct label), M_MACPIPELABEL, M_ZERO|M_WAITOK);
76008bcdc58SRobert Watson 	pipe->pipe_label = label;
76108bcdc58SRobert Watson 	pipe->pipe_peer->pipe_label = label;
762f7b951a8SRobert Watson 	mac_init_pipe_label(label);
76308bcdc58SRobert Watson }
76408bcdc58SRobert Watson 
76583985c26SRobert Watson static int
76683985c26SRobert Watson mac_init_socket_label(struct label *label, int flag)
76708bcdc58SRobert Watson {
76883985c26SRobert Watson 	int error;
76908bcdc58SRobert Watson 
77083985c26SRobert Watson 	mac_init_label(label);
77183985c26SRobert Watson 
77283985c26SRobert Watson 	MAC_CHECK(init_socket_label, label, flag);
77383985c26SRobert Watson 	if (error) {
77483985c26SRobert Watson 		MAC_PERFORM(destroy_socket_label, label);
77583985c26SRobert Watson 		mac_destroy_label(label);
77683985c26SRobert Watson 	}
77783985c26SRobert Watson 
77808bcdc58SRobert Watson #ifdef MAC_DEBUG
77983985c26SRobert Watson 	if (error == 0)
78087807196SRobert Watson 		atomic_add_int(&nmacsockets, 1);
78187807196SRobert Watson #endif
78283985c26SRobert Watson 
78383985c26SRobert Watson 	return (error);
78483985c26SRobert Watson }
78583985c26SRobert Watson 
78683985c26SRobert Watson static int
78783985c26SRobert Watson mac_init_socket_peer_label(struct label *label, int flag)
78883985c26SRobert Watson {
78983985c26SRobert Watson 	int error;
79083985c26SRobert Watson 
79183985c26SRobert Watson 	mac_init_label(label);
79283985c26SRobert Watson 
79383985c26SRobert Watson 	MAC_CHECK(init_socket_peer_label, label, flag);
79483985c26SRobert Watson 	if (error) {
79583985c26SRobert Watson 		MAC_PERFORM(destroy_socket_label, label);
79683985c26SRobert Watson 		mac_destroy_label(label);
79783985c26SRobert Watson 	}
79883985c26SRobert Watson 
79983985c26SRobert Watson 	return (error);
80083985c26SRobert Watson }
80183985c26SRobert Watson 
80283985c26SRobert Watson int
80383985c26SRobert Watson mac_init_socket(struct socket *socket, int flag)
80483985c26SRobert Watson {
80583985c26SRobert Watson 	int error;
80683985c26SRobert Watson 
80783985c26SRobert Watson 	error = mac_init_socket_label(&socket->so_label, flag);
80883985c26SRobert Watson 	if (error)
80983985c26SRobert Watson 		return (error);
81083985c26SRobert Watson 
81183985c26SRobert Watson 	error = mac_init_socket_peer_label(&socket->so_peerlabel, flag);
81283985c26SRobert Watson 	if (error)
81383985c26SRobert Watson 		mac_destroy_socket_label(&socket->so_label);
81483985c26SRobert Watson 
81583985c26SRobert Watson 	return (error);
81687807196SRobert Watson }
81787807196SRobert Watson 
818763bbd2fSRobert Watson void
819f7b951a8SRobert Watson mac_init_vnode_label(struct label *label)
82087807196SRobert Watson {
82187807196SRobert Watson 
82287807196SRobert Watson 	mac_init_label(label);
823f7b951a8SRobert Watson 	MAC_PERFORM(init_vnode_label, label);
82487807196SRobert Watson #ifdef MAC_DEBUG
825f7b951a8SRobert Watson 	atomic_add_int(&nmacvnodes, 1);
82608bcdc58SRobert Watson #endif
82708bcdc58SRobert Watson }
82808bcdc58SRobert Watson 
82908bcdc58SRobert Watson void
83087807196SRobert Watson mac_init_vnode(struct vnode *vp)
83108bcdc58SRobert Watson {
83208bcdc58SRobert Watson 
833f7b951a8SRobert Watson 	mac_init_vnode_label(&vp->v_label);
83408bcdc58SRobert Watson }
83508bcdc58SRobert Watson 
83608bcdc58SRobert Watson void
83708bcdc58SRobert Watson mac_destroy_bpfdesc(struct bpf_d *bpf_d)
83808bcdc58SRobert Watson {
83908bcdc58SRobert Watson 
84008bcdc58SRobert Watson 	MAC_PERFORM(destroy_bpfdesc_label, &bpf_d->bd_label);
84108bcdc58SRobert Watson 	mac_destroy_label(&bpf_d->bd_label);
84208bcdc58SRobert Watson #ifdef MAC_DEBUG
84308bcdc58SRobert Watson 	atomic_subtract_int(&nmacbpfdescs, 1);
84408bcdc58SRobert Watson #endif
84508bcdc58SRobert Watson }
84608bcdc58SRobert Watson 
847f7b951a8SRobert Watson static void
848f7b951a8SRobert Watson mac_destroy_cred_label(struct label *label)
84908bcdc58SRobert Watson {
85008bcdc58SRobert Watson 
851f7b951a8SRobert Watson 	MAC_PERFORM(destroy_cred_label, label);
852f7b951a8SRobert Watson 	mac_destroy_label(label);
85308bcdc58SRobert Watson #ifdef MAC_DEBUG
85487807196SRobert Watson 	atomic_subtract_int(&nmaccreds, 1);
85587807196SRobert Watson #endif
85687807196SRobert Watson }
85787807196SRobert Watson 
85887807196SRobert Watson void
859f7b951a8SRobert Watson mac_destroy_cred(struct ucred *cred)
860f7b951a8SRobert Watson {
861f7b951a8SRobert Watson 
862f7b951a8SRobert Watson 	mac_destroy_cred_label(&cred->cr_label);
863f7b951a8SRobert Watson }
864f7b951a8SRobert Watson 
865f7b951a8SRobert Watson void
86687807196SRobert Watson mac_destroy_devfsdirent(struct devfs_dirent *de)
86787807196SRobert Watson {
86887807196SRobert Watson 
86987807196SRobert Watson 	MAC_PERFORM(destroy_devfsdirent_label, &de->de_label);
87087807196SRobert Watson 	mac_destroy_label(&de->de_label);
87187807196SRobert Watson #ifdef MAC_DEBUG
87287807196SRobert Watson 	atomic_subtract_int(&nmacdevfsdirents, 1);
87387807196SRobert Watson #endif
87487807196SRobert Watson }
87587807196SRobert Watson 
876f7b951a8SRobert Watson static void
877f7b951a8SRobert Watson mac_destroy_ifnet_label(struct label *label)
878f7b951a8SRobert Watson {
879f7b951a8SRobert Watson 
880f7b951a8SRobert Watson 	MAC_PERFORM(destroy_ifnet_label, label);
881f7b951a8SRobert Watson 	mac_destroy_label(label);
882f7b951a8SRobert Watson #ifdef MAC_DEBUG
883f7b951a8SRobert Watson 	atomic_subtract_int(&nmacifnets, 1);
884f7b951a8SRobert Watson #endif
885f7b951a8SRobert Watson }
886f7b951a8SRobert Watson 
88787807196SRobert Watson void
88887807196SRobert Watson mac_destroy_ifnet(struct ifnet *ifp)
88987807196SRobert Watson {
89087807196SRobert Watson 
891f7b951a8SRobert Watson 	mac_destroy_ifnet_label(&ifp->if_label);
89287807196SRobert Watson }
89387807196SRobert Watson 
89487807196SRobert Watson void
89587807196SRobert Watson mac_destroy_ipq(struct ipq *ipq)
89687807196SRobert Watson {
89787807196SRobert Watson 
89887807196SRobert Watson 	MAC_PERFORM(destroy_ipq_label, &ipq->ipq_label);
89987807196SRobert Watson 	mac_destroy_label(&ipq->ipq_label);
90087807196SRobert Watson #ifdef MAC_DEBUG
90187807196SRobert Watson 	atomic_subtract_int(&nmacipqs, 1);
90287807196SRobert Watson #endif
90387807196SRobert Watson }
90487807196SRobert Watson 
90587807196SRobert Watson void
90687807196SRobert Watson mac_destroy_mbuf(struct mbuf *m)
90787807196SRobert Watson {
90887807196SRobert Watson 
90987807196SRobert Watson 	MAC_PERFORM(destroy_mbuf_label, &m->m_pkthdr.label);
91087807196SRobert Watson 	mac_destroy_label(&m->m_pkthdr.label);
91187807196SRobert Watson #ifdef MAC_DEBUG
91287807196SRobert Watson 	atomic_subtract_int(&nmacmbufs, 1);
91308bcdc58SRobert Watson #endif
91408bcdc58SRobert Watson }
91508bcdc58SRobert Watson 
91608bcdc58SRobert Watson void
91708bcdc58SRobert Watson mac_destroy_mount(struct mount *mp)
91808bcdc58SRobert Watson {
91908bcdc58SRobert Watson 
92008bcdc58SRobert Watson 	MAC_PERFORM(destroy_mount_label, &mp->mnt_mntlabel);
92108bcdc58SRobert Watson 	MAC_PERFORM(destroy_mount_fs_label, &mp->mnt_fslabel);
92208bcdc58SRobert Watson 	mac_destroy_label(&mp->mnt_fslabel);
92308bcdc58SRobert Watson 	mac_destroy_label(&mp->mnt_mntlabel);
92408bcdc58SRobert Watson #ifdef MAC_DEBUG
92508bcdc58SRobert Watson 	atomic_subtract_int(&nmacmounts, 1);
92608bcdc58SRobert Watson #endif
92708bcdc58SRobert Watson }
92808bcdc58SRobert Watson 
929f7b951a8SRobert Watson static void
930f7b951a8SRobert Watson mac_destroy_pipe_label(struct label *label)
931f7b951a8SRobert Watson {
932f7b951a8SRobert Watson 
933f7b951a8SRobert Watson 	MAC_PERFORM(destroy_pipe_label, label);
934f7b951a8SRobert Watson 	mac_destroy_label(label);
935f7b951a8SRobert Watson #ifdef MAC_DEBUG
936f7b951a8SRobert Watson 	atomic_subtract_int(&nmacpipes, 1);
937f7b951a8SRobert Watson #endif
938f7b951a8SRobert Watson }
939f7b951a8SRobert Watson 
94087807196SRobert Watson void
94187807196SRobert Watson mac_destroy_pipe(struct pipe *pipe)
94208bcdc58SRobert Watson {
94308bcdc58SRobert Watson 
944f7b951a8SRobert Watson 	mac_destroy_pipe_label(pipe->pipe_label);
94587807196SRobert Watson 	free(pipe->pipe_label, M_MACPIPELABEL);
94687807196SRobert Watson }
94787807196SRobert Watson 
94883985c26SRobert Watson static void
94983985c26SRobert Watson mac_destroy_socket_label(struct label *label)
95083985c26SRobert Watson {
95183985c26SRobert Watson 
95283985c26SRobert Watson 	MAC_PERFORM(destroy_socket_label, label);
95383985c26SRobert Watson 	mac_destroy_label(label);
95483985c26SRobert Watson #ifdef MAC_DEBUG
95583985c26SRobert Watson 	atomic_subtract_int(&nmacsockets, 1);
95683985c26SRobert Watson #endif
95783985c26SRobert Watson }
95883985c26SRobert Watson 
95983985c26SRobert Watson static void
96083985c26SRobert Watson mac_destroy_socket_peer_label(struct label *label)
96183985c26SRobert Watson {
96283985c26SRobert Watson 
96383985c26SRobert Watson 	MAC_PERFORM(destroy_socket_peer_label, label);
96483985c26SRobert Watson 	mac_destroy_label(label);
96583985c26SRobert Watson }
96683985c26SRobert Watson 
96787807196SRobert Watson void
96887807196SRobert Watson mac_destroy_socket(struct socket *socket)
96987807196SRobert Watson {
97087807196SRobert Watson 
97183985c26SRobert Watson 	mac_destroy_socket_label(&socket->so_label);
97283985c26SRobert Watson 	mac_destroy_socket_peer_label(&socket->so_peerlabel);
97308bcdc58SRobert Watson }
97408bcdc58SRobert Watson 
975763bbd2fSRobert Watson void
976f7b951a8SRobert Watson mac_destroy_vnode_label(struct label *label)
97708bcdc58SRobert Watson {
97808bcdc58SRobert Watson 
979f7b951a8SRobert Watson 	MAC_PERFORM(destroy_vnode_label, label);
98008bcdc58SRobert Watson 	mac_destroy_label(label);
98108bcdc58SRobert Watson #ifdef MAC_DEBUG
982f7b951a8SRobert Watson 	atomic_subtract_int(&nmacvnodes, 1);
98308bcdc58SRobert Watson #endif
98408bcdc58SRobert Watson }
98508bcdc58SRobert Watson 
98608bcdc58SRobert Watson void
98708bcdc58SRobert Watson mac_destroy_vnode(struct vnode *vp)
98808bcdc58SRobert Watson {
98908bcdc58SRobert Watson 
990f7b951a8SRobert Watson 	mac_destroy_vnode_label(&vp->v_label);
991f7b951a8SRobert Watson }
992f7b951a8SRobert Watson 
993f7b951a8SRobert Watson static void
994f7b951a8SRobert Watson mac_copy_pipe_label(struct label *src, struct label *dest)
995f7b951a8SRobert Watson {
996f7b951a8SRobert Watson 
997f7b951a8SRobert Watson 	MAC_PERFORM(copy_pipe_label, src, dest);
998f7b951a8SRobert Watson }
999f7b951a8SRobert Watson 
1000763bbd2fSRobert Watson void
1001f7b951a8SRobert Watson mac_copy_vnode_label(struct label *src, struct label *dest)
1002f7b951a8SRobert Watson {
1003f7b951a8SRobert Watson 
1004f7b951a8SRobert Watson 	MAC_PERFORM(copy_vnode_label, src, dest);
100508bcdc58SRobert Watson }
100608bcdc58SRobert Watson 
100769bbb5b1SRobert Watson static int
1008f7b951a8SRobert Watson mac_check_structmac_consistent(struct mac *mac)
1009f7b951a8SRobert Watson {
1010f7b951a8SRobert Watson 
1011f7b951a8SRobert Watson 	if (mac->m_buflen > MAC_MAX_LABEL_BUF_LEN)
1012f7b951a8SRobert Watson 		return (EINVAL);
1013f7b951a8SRobert Watson 
1014f7b951a8SRobert Watson 	return (0);
1015f7b951a8SRobert Watson }
1016f7b951a8SRobert Watson 
1017f7b951a8SRobert Watson static int
1018f7b951a8SRobert Watson mac_externalize_cred_label(struct label *label, char *elements,
1019f7b951a8SRobert Watson     char *outbuf, size_t outbuflen, int flags)
102069bbb5b1SRobert Watson {
102169bbb5b1SRobert Watson 	int error;
102269bbb5b1SRobert Watson 
1023f7b951a8SRobert Watson 	MAC_EXTERNALIZE(cred_label, label, elements, outbuf, outbuflen);
102469bbb5b1SRobert Watson 
102569bbb5b1SRobert Watson 	return (error);
102669bbb5b1SRobert Watson }
102769bbb5b1SRobert Watson 
102869bbb5b1SRobert Watson static int
1029f7b951a8SRobert Watson mac_externalize_ifnet_label(struct label *label, char *elements,
1030f7b951a8SRobert Watson     char *outbuf, size_t outbuflen, int flags)
103169bbb5b1SRobert Watson {
103269bbb5b1SRobert Watson 	int error;
103369bbb5b1SRobert Watson 
1034f7b951a8SRobert Watson 	MAC_EXTERNALIZE(ifnet_label, label, elements, outbuf, outbuflen);
1035f7b951a8SRobert Watson 
1036f7b951a8SRobert Watson 	return (error);
1037f7b951a8SRobert Watson }
1038f7b951a8SRobert Watson 
1039f7b951a8SRobert Watson static int
1040f7b951a8SRobert Watson mac_externalize_pipe_label(struct label *label, char *elements,
1041f7b951a8SRobert Watson     char *outbuf, size_t outbuflen, int flags)
1042f7b951a8SRobert Watson {
1043f7b951a8SRobert Watson 	int error;
1044f7b951a8SRobert Watson 
1045f7b951a8SRobert Watson 	MAC_EXTERNALIZE(pipe_label, label, elements, outbuf, outbuflen);
1046f7b951a8SRobert Watson 
1047f7b951a8SRobert Watson 	return (error);
1048f7b951a8SRobert Watson }
1049f7b951a8SRobert Watson 
1050f7b951a8SRobert Watson static int
1051f7b951a8SRobert Watson mac_externalize_socket_label(struct label *label, char *elements,
1052f7b951a8SRobert Watson     char *outbuf, size_t outbuflen, int flags)
1053f7b951a8SRobert Watson {
1054f7b951a8SRobert Watson 	int error;
1055f7b951a8SRobert Watson 
1056f7b951a8SRobert Watson 	MAC_EXTERNALIZE(socket_label, label, elements, outbuf, outbuflen);
1057f7b951a8SRobert Watson 
1058f7b951a8SRobert Watson 	return (error);
1059f7b951a8SRobert Watson }
1060f7b951a8SRobert Watson 
1061f7b951a8SRobert Watson static int
1062f7b951a8SRobert Watson mac_externalize_socket_peer_label(struct label *label, char *elements,
1063f7b951a8SRobert Watson     char *outbuf, size_t outbuflen, int flags)
1064f7b951a8SRobert Watson {
1065f7b951a8SRobert Watson 	int error;
1066f7b951a8SRobert Watson 
1067f7b951a8SRobert Watson 	MAC_EXTERNALIZE(socket_peer_label, label, elements, outbuf, outbuflen);
1068f7b951a8SRobert Watson 
1069f7b951a8SRobert Watson 	return (error);
1070f7b951a8SRobert Watson }
1071f7b951a8SRobert Watson 
1072f7b951a8SRobert Watson static int
1073f7b951a8SRobert Watson mac_externalize_vnode_label(struct label *label, char *elements,
1074f7b951a8SRobert Watson     char *outbuf, size_t outbuflen, int flags)
1075f7b951a8SRobert Watson {
1076f7b951a8SRobert Watson 	int error;
1077f7b951a8SRobert Watson 
1078f7b951a8SRobert Watson 	MAC_EXTERNALIZE(vnode_label, label, elements, outbuf, outbuflen);
1079f7b951a8SRobert Watson 
1080f7b951a8SRobert Watson 	return (error);
1081f7b951a8SRobert Watson }
1082f7b951a8SRobert Watson 
1083f7b951a8SRobert Watson static int
1084f7b951a8SRobert Watson mac_internalize_cred_label(struct label *label, char *string)
1085f7b951a8SRobert Watson {
1086f7b951a8SRobert Watson 	int error;
1087f7b951a8SRobert Watson 
1088f7b951a8SRobert Watson 	MAC_INTERNALIZE(cred_label, label, string);
1089f7b951a8SRobert Watson 
1090f7b951a8SRobert Watson 	return (error);
1091f7b951a8SRobert Watson }
1092f7b951a8SRobert Watson 
1093f7b951a8SRobert Watson static int
1094f7b951a8SRobert Watson mac_internalize_ifnet_label(struct label *label, char *string)
1095f7b951a8SRobert Watson {
1096f7b951a8SRobert Watson 	int error;
1097f7b951a8SRobert Watson 
1098f7b951a8SRobert Watson 	MAC_INTERNALIZE(ifnet_label, label, string);
1099f7b951a8SRobert Watson 
1100f7b951a8SRobert Watson 	return (error);
1101f7b951a8SRobert Watson }
1102f7b951a8SRobert Watson 
1103f7b951a8SRobert Watson static int
1104f7b951a8SRobert Watson mac_internalize_pipe_label(struct label *label, char *string)
1105f7b951a8SRobert Watson {
1106f7b951a8SRobert Watson 	int error;
1107f7b951a8SRobert Watson 
1108f7b951a8SRobert Watson 	MAC_INTERNALIZE(pipe_label, label, string);
1109f7b951a8SRobert Watson 
1110f7b951a8SRobert Watson 	return (error);
1111f7b951a8SRobert Watson }
1112f7b951a8SRobert Watson 
1113f7b951a8SRobert Watson static int
1114f7b951a8SRobert Watson mac_internalize_socket_label(struct label *label, char *string)
1115f7b951a8SRobert Watson {
1116f7b951a8SRobert Watson 	int error;
1117f7b951a8SRobert Watson 
1118f7b951a8SRobert Watson 	MAC_INTERNALIZE(socket_label, label, string);
1119f7b951a8SRobert Watson 
1120f7b951a8SRobert Watson 	return (error);
1121f7b951a8SRobert Watson }
1122f7b951a8SRobert Watson 
1123f7b951a8SRobert Watson static int
1124f7b951a8SRobert Watson mac_internalize_vnode_label(struct label *label, char *string)
1125f7b951a8SRobert Watson {
1126f7b951a8SRobert Watson 	int error;
1127f7b951a8SRobert Watson 
1128f7b951a8SRobert Watson 	MAC_INTERNALIZE(vnode_label, label, string);
112969bbb5b1SRobert Watson 
113069bbb5b1SRobert Watson 	return (error);
113169bbb5b1SRobert Watson }
113269bbb5b1SRobert Watson 
113369bbb5b1SRobert Watson /*
113469bbb5b1SRobert Watson  * Initialize MAC label for the first kernel process, from which other
113569bbb5b1SRobert Watson  * kernel processes and threads are spawned.
113669bbb5b1SRobert Watson  */
113769bbb5b1SRobert Watson void
113869bbb5b1SRobert Watson mac_create_proc0(struct ucred *cred)
113969bbb5b1SRobert Watson {
114069bbb5b1SRobert Watson 
114169bbb5b1SRobert Watson 	MAC_PERFORM(create_proc0, cred);
114269bbb5b1SRobert Watson }
114369bbb5b1SRobert Watson 
114469bbb5b1SRobert Watson /*
114569bbb5b1SRobert Watson  * Initialize MAC label for the first userland process, from which other
114669bbb5b1SRobert Watson  * userland processes and threads are spawned.
114769bbb5b1SRobert Watson  */
114869bbb5b1SRobert Watson void
114969bbb5b1SRobert Watson mac_create_proc1(struct ucred *cred)
115069bbb5b1SRobert Watson {
115169bbb5b1SRobert Watson 
115269bbb5b1SRobert Watson 	MAC_PERFORM(create_proc1, cred);
115369bbb5b1SRobert Watson }
115469bbb5b1SRobert Watson 
115569bbb5b1SRobert Watson void
115669bbb5b1SRobert Watson mac_thread_userret(struct thread *td)
115769bbb5b1SRobert Watson {
115869bbb5b1SRobert Watson 
115969bbb5b1SRobert Watson 	MAC_PERFORM(thread_userret, td);
116069bbb5b1SRobert Watson }
116169bbb5b1SRobert Watson 
116269bbb5b1SRobert Watson /*
116369bbb5b1SRobert Watson  * When a new process is created, its label must be initialized.  Generally,
116469bbb5b1SRobert Watson  * this involves inheritence from the parent process, modulo possible
116569bbb5b1SRobert Watson  * deltas.  This function allows that processing to take place.
116669bbb5b1SRobert Watson  */
116769bbb5b1SRobert Watson void
116869bbb5b1SRobert Watson mac_create_cred(struct ucred *parent_cred, struct ucred *child_cred)
116969bbb5b1SRobert Watson {
117069bbb5b1SRobert Watson 
117169bbb5b1SRobert Watson 	MAC_PERFORM(create_cred, parent_cred, child_cred);
117269bbb5b1SRobert Watson }
117369bbb5b1SRobert Watson 
117495fab37eSRobert Watson void
117595fab37eSRobert Watson mac_update_devfsdirent(struct devfs_dirent *de, struct vnode *vp)
117695fab37eSRobert Watson {
117795fab37eSRobert Watson 
117895fab37eSRobert Watson 	MAC_PERFORM(update_devfsdirent, de, &de->de_label, vp, &vp->v_label);
117995fab37eSRobert Watson }
118095fab37eSRobert Watson 
118195fab37eSRobert Watson void
1182763bbd2fSRobert Watson mac_associate_vnode_devfs(struct mount *mp, struct devfs_dirent *de,
1183763bbd2fSRobert Watson     struct vnode *vp)
118495fab37eSRobert Watson {
118595fab37eSRobert Watson 
1186763bbd2fSRobert Watson 	MAC_PERFORM(associate_vnode_devfs, mp, &mp->mnt_fslabel, de,
1187763bbd2fSRobert Watson 	    &de->de_label, vp, &vp->v_label);
118895fab37eSRobert Watson }
118995fab37eSRobert Watson 
1190763bbd2fSRobert Watson int
1191763bbd2fSRobert Watson mac_associate_vnode_extattr(struct mount *mp, struct vnode *vp)
119295fab37eSRobert Watson {
119395fab37eSRobert Watson 	int error;
119495fab37eSRobert Watson 
1195763bbd2fSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_associate_vnode_extattr");
1196763bbd2fSRobert Watson 
1197763bbd2fSRobert Watson 	MAC_CHECK(associate_vnode_extattr, mp, &mp->mnt_fslabel, vp,
1198763bbd2fSRobert Watson 	    &vp->v_label);
119995fab37eSRobert Watson 
120095fab37eSRobert Watson 	return (error);
120195fab37eSRobert Watson }
120295fab37eSRobert Watson 
120395fab37eSRobert Watson void
1204763bbd2fSRobert Watson mac_associate_vnode_singlelabel(struct mount *mp, struct vnode *vp)
120595fab37eSRobert Watson {
120695fab37eSRobert Watson 
1207763bbd2fSRobert Watson 	MAC_PERFORM(associate_vnode_singlelabel, mp, &mp->mnt_fslabel, vp,
1208763bbd2fSRobert Watson 	    &vp->v_label);
120995fab37eSRobert Watson }
121095fab37eSRobert Watson 
121195fab37eSRobert Watson int
1212763bbd2fSRobert Watson mac_create_vnode_extattr(struct ucred *cred, struct mount *mp,
1213763bbd2fSRobert Watson     struct vnode *dvp, struct vnode *vp, struct componentname *cnp)
121495fab37eSRobert Watson {
1215763bbd2fSRobert Watson 	int error;
121695fab37eSRobert Watson 
1217763bbd2fSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_create_vnode_extattr");
1218763bbd2fSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_create_vnode_extattr");
121995fab37eSRobert Watson 
1220763bbd2fSRobert Watson 	error = VOP_OPENEXTATTR(vp, cred, curthread);
1221763bbd2fSRobert Watson 	if (error == EOPNOTSUPP) {
1222763bbd2fSRobert Watson 		/* XXX: Optionally abort if transactions not supported. */
1223763bbd2fSRobert Watson 		if (ea_warn_once == 0) {
1224763bbd2fSRobert Watson 			printf("Warning: transactions not supported "
1225763bbd2fSRobert Watson 			    "in EA write.\n");
1226763bbd2fSRobert Watson 			ea_warn_once = 1;
1227763bbd2fSRobert Watson 		}
1228763bbd2fSRobert Watson 	} else if (error)
122995fab37eSRobert Watson 		return (error);
123095fab37eSRobert Watson 
1231763bbd2fSRobert Watson 	MAC_CHECK(create_vnode_extattr, cred, mp, &mp->mnt_fslabel,
1232763bbd2fSRobert Watson 	    dvp, &dvp->v_label, vp, &vp->v_label, cnp);
123395fab37eSRobert Watson 
1234763bbd2fSRobert Watson 	if (error) {
1235763bbd2fSRobert Watson 		VOP_CLOSEEXTATTR(vp, 0, NOCRED, curthread);
123695fab37eSRobert Watson 		return (error);
123795fab37eSRobert Watson 	}
123895fab37eSRobert Watson 
1239763bbd2fSRobert Watson 	error = VOP_CLOSEEXTATTR(vp, 1, NOCRED, curthread);
124095fab37eSRobert Watson 
1241763bbd2fSRobert Watson 	if (error == EOPNOTSUPP)
1242763bbd2fSRobert Watson 		error = 0;				/* XXX */
124395fab37eSRobert Watson 
124495fab37eSRobert Watson 	return (error);
124595fab37eSRobert Watson }
124695fab37eSRobert Watson 
124795fab37eSRobert Watson static int
1248763bbd2fSRobert Watson mac_setlabel_vnode_extattr(struct ucred *cred, struct vnode *vp,
1249763bbd2fSRobert Watson     struct label *intlabel)
125095fab37eSRobert Watson {
125195fab37eSRobert Watson 	int error;
125295fab37eSRobert Watson 
1253763bbd2fSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_setlabel_vnode_extattr");
125495fab37eSRobert Watson 
1255763bbd2fSRobert Watson 	error = VOP_OPENEXTATTR(vp, cred, curthread);
1256763bbd2fSRobert Watson 	if (error == EOPNOTSUPP) {
1257763bbd2fSRobert Watson 		/* XXX: Optionally abort if transactions not supported. */
1258763bbd2fSRobert Watson 		if (ea_warn_once == 0) {
1259763bbd2fSRobert Watson 			printf("Warning: transactions not supported "
1260763bbd2fSRobert Watson 			    "in EA write.\n");
1261763bbd2fSRobert Watson 			ea_warn_once = 1;
126295fab37eSRobert Watson 		}
1263763bbd2fSRobert Watson 	} else if (error)
126495fab37eSRobert Watson 		return (error);
126595fab37eSRobert Watson 
1266763bbd2fSRobert Watson 	MAC_CHECK(setlabel_vnode_extattr, cred, vp, &vp->v_label, intlabel);
126795fab37eSRobert Watson 
1268763bbd2fSRobert Watson 	if (error) {
1269763bbd2fSRobert Watson 		VOP_CLOSEEXTATTR(vp, 0, NOCRED, curthread);
127095fab37eSRobert Watson 		return (error);
127195fab37eSRobert Watson 	}
127295fab37eSRobert Watson 
1273763bbd2fSRobert Watson 	error = VOP_CLOSEEXTATTR(vp, 1, NOCRED, curthread);
1274763bbd2fSRobert Watson 
1275763bbd2fSRobert Watson 	if (error == EOPNOTSUPP)
1276763bbd2fSRobert Watson 		error = 0;				/* XXX */
1277763bbd2fSRobert Watson 
1278763bbd2fSRobert Watson 	return (error);
127995fab37eSRobert Watson }
128095fab37eSRobert Watson 
1281670cb89bSRobert Watson int
1282670cb89bSRobert Watson mac_execve_enter(struct image_params *imgp, struct mac *mac_p,
1283670cb89bSRobert Watson     struct label *execlabelstorage)
1284670cb89bSRobert Watson {
1285670cb89bSRobert Watson 	struct mac mac;
1286670cb89bSRobert Watson 	char *buffer;
1287670cb89bSRobert Watson 	int error;
1288670cb89bSRobert Watson 
1289670cb89bSRobert Watson 	if (mac_p == NULL)
1290670cb89bSRobert Watson 		return (0);
1291670cb89bSRobert Watson 
1292670cb89bSRobert Watson 	error = copyin(mac_p, &mac, sizeof(mac));
1293670cb89bSRobert Watson 	if (error)
1294670cb89bSRobert Watson 		return (error);
1295670cb89bSRobert Watson 
1296670cb89bSRobert Watson 	error = mac_check_structmac_consistent(&mac);
1297670cb89bSRobert Watson 	if (error)
1298670cb89bSRobert Watson 		return (error);
1299670cb89bSRobert Watson 
1300670cb89bSRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
1301670cb89bSRobert Watson 	error = copyinstr(mac.m_string, buffer, mac.m_buflen, NULL);
1302670cb89bSRobert Watson 	if (error) {
1303670cb89bSRobert Watson 		free(buffer, M_MACTEMP);
1304670cb89bSRobert Watson 		return (error);
1305670cb89bSRobert Watson 	}
1306670cb89bSRobert Watson 
1307670cb89bSRobert Watson 	mac_init_cred_label(execlabelstorage);
1308670cb89bSRobert Watson 	error = mac_internalize_cred_label(execlabelstorage, buffer);
1309670cb89bSRobert Watson 	free(buffer, M_MACTEMP);
1310670cb89bSRobert Watson 	if (error) {
1311670cb89bSRobert Watson 		mac_destroy_cred_label(execlabelstorage);
1312670cb89bSRobert Watson 		return (error);
1313670cb89bSRobert Watson 	}
1314670cb89bSRobert Watson 	imgp->execlabel = execlabelstorage;
1315670cb89bSRobert Watson 	return (0);
1316670cb89bSRobert Watson }
1317670cb89bSRobert Watson 
131895fab37eSRobert Watson void
1319670cb89bSRobert Watson mac_execve_exit(struct image_params *imgp)
1320670cb89bSRobert Watson {
1321670cb89bSRobert Watson 	if (imgp->execlabel != NULL)
1322670cb89bSRobert Watson 		mac_destroy_cred_label(imgp->execlabel);
1323670cb89bSRobert Watson }
1324670cb89bSRobert Watson 
1325670cb89bSRobert Watson void
1326670cb89bSRobert Watson mac_execve_transition(struct ucred *old, struct ucred *new, struct vnode *vp,
1327670cb89bSRobert Watson     struct label *interpvnodelabel, struct image_params *imgp)
132895fab37eSRobert Watson {
132995fab37eSRobert Watson 
133095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_execve_transition");
133195fab37eSRobert Watson 
13324443e9ffSRobert Watson 	if (!mac_enforce_process && !mac_enforce_fs)
13334443e9ffSRobert Watson 		return;
13344443e9ffSRobert Watson 
1335670cb89bSRobert Watson 	MAC_PERFORM(execve_transition, old, new, vp, &vp->v_label,
13369fa3506eSRobert Watson 	    interpvnodelabel, imgp, imgp->execlabel);
133795fab37eSRobert Watson }
133895fab37eSRobert Watson 
133995fab37eSRobert Watson int
1340670cb89bSRobert Watson mac_execve_will_transition(struct ucred *old, struct vnode *vp,
1341670cb89bSRobert Watson     struct label *interpvnodelabel, struct image_params *imgp)
134295fab37eSRobert Watson {
1343763bbd2fSRobert Watson 	int result;
134495fab37eSRobert Watson 
13454443e9ffSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_execve_will_transition");
13464443e9ffSRobert Watson 
13474443e9ffSRobert Watson 	if (!mac_enforce_process && !mac_enforce_fs)
13484443e9ffSRobert Watson 		return (0);
13494443e9ffSRobert Watson 
135095fab37eSRobert Watson 	result = 0;
1351670cb89bSRobert Watson 	MAC_BOOLEAN(execve_will_transition, ||, old, vp, &vp->v_label,
13529fa3506eSRobert Watson 	    interpvnodelabel, imgp, imgp->execlabel);
135395fab37eSRobert Watson 
135495fab37eSRobert Watson 	return (result);
135595fab37eSRobert Watson }
135695fab37eSRobert Watson 
135795fab37eSRobert Watson int
1358b914de36SRobert Watson mac_check_vnode_access(struct ucred *cred, struct vnode *vp, int acc_mode)
135995fab37eSRobert Watson {
136095fab37eSRobert Watson 	int error;
136195fab37eSRobert Watson 
136295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_access");
136395fab37eSRobert Watson 
136495fab37eSRobert Watson 	if (!mac_enforce_fs)
136595fab37eSRobert Watson 		return (0);
136695fab37eSRobert Watson 
1367b914de36SRobert Watson 	MAC_CHECK(check_vnode_access, cred, vp, &vp->v_label, acc_mode);
136895fab37eSRobert Watson 	return (error);
136995fab37eSRobert Watson }
137095fab37eSRobert Watson 
137195fab37eSRobert Watson int
137295fab37eSRobert Watson mac_check_vnode_chdir(struct ucred *cred, struct vnode *dvp)
137395fab37eSRobert Watson {
137495fab37eSRobert Watson 	int error;
137595fab37eSRobert Watson 
137695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_chdir");
137795fab37eSRobert Watson 
137895fab37eSRobert Watson 	if (!mac_enforce_fs)
137995fab37eSRobert Watson 		return (0);
138095fab37eSRobert Watson 
138195fab37eSRobert Watson 	MAC_CHECK(check_vnode_chdir, cred, dvp, &dvp->v_label);
138295fab37eSRobert Watson 	return (error);
138395fab37eSRobert Watson }
138495fab37eSRobert Watson 
138595fab37eSRobert Watson int
138695fab37eSRobert Watson mac_check_vnode_chroot(struct ucred *cred, struct vnode *dvp)
138795fab37eSRobert Watson {
138895fab37eSRobert Watson 	int error;
138995fab37eSRobert Watson 
139095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_chroot");
139195fab37eSRobert Watson 
139295fab37eSRobert Watson 	if (!mac_enforce_fs)
139395fab37eSRobert Watson 		return (0);
139495fab37eSRobert Watson 
139595fab37eSRobert Watson 	MAC_CHECK(check_vnode_chroot, cred, dvp, &dvp->v_label);
139695fab37eSRobert Watson 	return (error);
139795fab37eSRobert Watson }
139895fab37eSRobert Watson 
139995fab37eSRobert Watson int
140095fab37eSRobert Watson mac_check_vnode_create(struct ucred *cred, struct vnode *dvp,
140195fab37eSRobert Watson     struct componentname *cnp, struct vattr *vap)
140295fab37eSRobert Watson {
140395fab37eSRobert Watson 	int error;
140495fab37eSRobert Watson 
140595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_create");
140695fab37eSRobert Watson 
140795fab37eSRobert Watson 	if (!mac_enforce_fs)
140895fab37eSRobert Watson 		return (0);
140995fab37eSRobert Watson 
141095fab37eSRobert Watson 	MAC_CHECK(check_vnode_create, cred, dvp, &dvp->v_label, cnp, vap);
141195fab37eSRobert Watson 	return (error);
141295fab37eSRobert Watson }
141395fab37eSRobert Watson 
141495fab37eSRobert Watson int
141595fab37eSRobert Watson mac_check_vnode_delete(struct ucred *cred, struct vnode *dvp, struct vnode *vp,
141695fab37eSRobert Watson     struct componentname *cnp)
141795fab37eSRobert Watson {
141895fab37eSRobert Watson 	int error;
141995fab37eSRobert Watson 
142095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_delete");
142195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_delete");
142295fab37eSRobert Watson 
142395fab37eSRobert Watson 	if (!mac_enforce_fs)
142495fab37eSRobert Watson 		return (0);
142595fab37eSRobert Watson 
142695fab37eSRobert Watson 	MAC_CHECK(check_vnode_delete, cred, dvp, &dvp->v_label, vp,
142795fab37eSRobert Watson 	    &vp->v_label, cnp);
142895fab37eSRobert Watson 	return (error);
142995fab37eSRobert Watson }
143095fab37eSRobert Watson 
143195fab37eSRobert Watson int
143295fab37eSRobert Watson mac_check_vnode_deleteacl(struct ucred *cred, struct vnode *vp,
143395fab37eSRobert Watson     acl_type_t type)
143495fab37eSRobert Watson {
143595fab37eSRobert Watson 	int error;
143695fab37eSRobert Watson 
143795fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_deleteacl");
143895fab37eSRobert Watson 
143995fab37eSRobert Watson 	if (!mac_enforce_fs)
144095fab37eSRobert Watson 		return (0);
144195fab37eSRobert Watson 
144295fab37eSRobert Watson 	MAC_CHECK(check_vnode_deleteacl, cred, vp, &vp->v_label, type);
144395fab37eSRobert Watson 	return (error);
144495fab37eSRobert Watson }
144595fab37eSRobert Watson 
144695fab37eSRobert Watson int
1447670cb89bSRobert Watson mac_check_vnode_exec(struct ucred *cred, struct vnode *vp,
1448670cb89bSRobert Watson     struct image_params *imgp)
144995fab37eSRobert Watson {
145095fab37eSRobert Watson 	int error;
145195fab37eSRobert Watson 
1452851704bbSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_exec");
1453851704bbSRobert Watson 
145495fab37eSRobert Watson 	if (!mac_enforce_process && !mac_enforce_fs)
145595fab37eSRobert Watson 		return (0);
145695fab37eSRobert Watson 
14579fa3506eSRobert Watson 	MAC_CHECK(check_vnode_exec, cred, vp, &vp->v_label, imgp,
14589fa3506eSRobert Watson 	    imgp->execlabel);
145995fab37eSRobert Watson 
146095fab37eSRobert Watson 	return (error);
146195fab37eSRobert Watson }
146295fab37eSRobert Watson 
146395fab37eSRobert Watson int
146495fab37eSRobert Watson mac_check_vnode_getacl(struct ucred *cred, struct vnode *vp, acl_type_t type)
146595fab37eSRobert Watson {
146695fab37eSRobert Watson 	int error;
146795fab37eSRobert Watson 
146895fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_getacl");
146995fab37eSRobert Watson 
147095fab37eSRobert Watson 	if (!mac_enforce_fs)
147195fab37eSRobert Watson 		return (0);
147295fab37eSRobert Watson 
147395fab37eSRobert Watson 	MAC_CHECK(check_vnode_getacl, cred, vp, &vp->v_label, type);
147495fab37eSRobert Watson 	return (error);
147595fab37eSRobert Watson }
147695fab37eSRobert Watson 
147795fab37eSRobert Watson int
147895fab37eSRobert Watson mac_check_vnode_getextattr(struct ucred *cred, struct vnode *vp,
147995fab37eSRobert Watson     int attrnamespace, const char *name, struct uio *uio)
148095fab37eSRobert Watson {
148195fab37eSRobert Watson 	int error;
148295fab37eSRobert Watson 
148395fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_getextattr");
148495fab37eSRobert Watson 
148595fab37eSRobert Watson 	if (!mac_enforce_fs)
148695fab37eSRobert Watson 		return (0);
148795fab37eSRobert Watson 
148895fab37eSRobert Watson 	MAC_CHECK(check_vnode_getextattr, cred, vp, &vp->v_label,
148995fab37eSRobert Watson 	    attrnamespace, name, uio);
149095fab37eSRobert Watson 	return (error);
149195fab37eSRobert Watson }
149295fab37eSRobert Watson 
149395fab37eSRobert Watson int
14940a694196SRobert Watson mac_check_vnode_link(struct ucred *cred, struct vnode *dvp,
14950a694196SRobert Watson     struct vnode *vp, struct componentname *cnp)
14960a694196SRobert Watson {
14970a694196SRobert Watson 	int error;
14980a694196SRobert Watson 
14990a694196SRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_link");
15000a694196SRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_link");
15010a694196SRobert Watson 
15020a694196SRobert Watson 	if (!mac_enforce_fs)
15030a694196SRobert Watson 		return (0);
15040a694196SRobert Watson 
15050a694196SRobert Watson 	MAC_CHECK(check_vnode_link, cred, dvp, &dvp->v_label, vp,
15060a694196SRobert Watson 	    &vp->v_label, cnp);
15070a694196SRobert Watson 	return (error);
15080a694196SRobert Watson }
15090a694196SRobert Watson 
15100a694196SRobert Watson int
151195fab37eSRobert Watson mac_check_vnode_lookup(struct ucred *cred, struct vnode *dvp,
151295fab37eSRobert Watson     struct componentname *cnp)
151395fab37eSRobert Watson {
151495fab37eSRobert Watson 	int error;
151595fab37eSRobert Watson 
151695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_lookup");
151795fab37eSRobert Watson 
151895fab37eSRobert Watson 	if (!mac_enforce_fs)
151995fab37eSRobert Watson 		return (0);
152095fab37eSRobert Watson 
152195fab37eSRobert Watson 	MAC_CHECK(check_vnode_lookup, cred, dvp, &dvp->v_label, cnp);
152295fab37eSRobert Watson 	return (error);
152395fab37eSRobert Watson }
152495fab37eSRobert Watson 
1525e183f80eSRobert Watson int
1526e183f80eSRobert Watson mac_check_vnode_mmap(struct ucred *cred, struct vnode *vp, int prot)
152795fab37eSRobert Watson {
1528e183f80eSRobert Watson 	int error;
152995fab37eSRobert Watson 
1530e183f80eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_mmap");
1531ca7850c3SRobert Watson 
1532e183f80eSRobert Watson 	if (!mac_enforce_fs || !mac_enforce_vm)
1533e183f80eSRobert Watson 		return (0);
1534e183f80eSRobert Watson 
1535e183f80eSRobert Watson 	MAC_CHECK(check_vnode_mmap, cred, vp, &vp->v_label, prot);
1536e183f80eSRobert Watson 	return (error);
1537e183f80eSRobert Watson }
1538e183f80eSRobert Watson 
1539e183f80eSRobert Watson void
1540e183f80eSRobert Watson mac_check_vnode_mmap_downgrade(struct ucred *cred, struct vnode *vp, int *prot)
1541e183f80eSRobert Watson {
1542e183f80eSRobert Watson 	int result = *prot;
1543e183f80eSRobert Watson 
1544e183f80eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_mmap_downgrade");
1545e183f80eSRobert Watson 
1546e183f80eSRobert Watson 	if (!mac_enforce_fs || !mac_enforce_vm)
1547e183f80eSRobert Watson 		return;
1548e183f80eSRobert Watson 
1549e183f80eSRobert Watson 	MAC_PERFORM(check_vnode_mmap_downgrade, cred, vp, &vp->v_label,
1550e183f80eSRobert Watson 	    &result);
1551e183f80eSRobert Watson 
1552e183f80eSRobert Watson 	*prot = result;
1553e183f80eSRobert Watson }
1554e183f80eSRobert Watson 
1555e183f80eSRobert Watson int
1556e183f80eSRobert Watson mac_check_vnode_mprotect(struct ucred *cred, struct vnode *vp, int prot)
1557e183f80eSRobert Watson {
1558e183f80eSRobert Watson 	int error;
1559e183f80eSRobert Watson 
1560e183f80eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_mprotect");
1561e183f80eSRobert Watson 
1562e183f80eSRobert Watson 	if (!mac_enforce_fs || !mac_enforce_vm)
1563e183f80eSRobert Watson 		return (0);
1564e183f80eSRobert Watson 
1565e183f80eSRobert Watson 	MAC_CHECK(check_vnode_mprotect, cred, vp, &vp->v_label, prot);
1566e183f80eSRobert Watson 	return (error);
156795fab37eSRobert Watson }
156895fab37eSRobert Watson 
156995fab37eSRobert Watson int
1570b914de36SRobert Watson mac_check_vnode_open(struct ucred *cred, struct vnode *vp, int acc_mode)
157195fab37eSRobert Watson {
157295fab37eSRobert Watson 	int error;
157395fab37eSRobert Watson 
157495fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_open");
157595fab37eSRobert Watson 
157695fab37eSRobert Watson 	if (!mac_enforce_fs)
157795fab37eSRobert Watson 		return (0);
157895fab37eSRobert Watson 
157995fab37eSRobert Watson 	MAC_CHECK(check_vnode_open, cred, vp, &vp->v_label, acc_mode);
158095fab37eSRobert Watson 	return (error);
158195fab37eSRobert Watson }
158295fab37eSRobert Watson 
158395fab37eSRobert Watson int
1584177142e4SRobert Watson mac_check_vnode_poll(struct ucred *active_cred, struct ucred *file_cred,
1585177142e4SRobert Watson     struct vnode *vp)
15867f724f8bSRobert Watson {
15877f724f8bSRobert Watson 	int error;
15887f724f8bSRobert Watson 
15897f724f8bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_poll");
15907f724f8bSRobert Watson 
15917f724f8bSRobert Watson 	if (!mac_enforce_fs)
15927f724f8bSRobert Watson 		return (0);
15937f724f8bSRobert Watson 
1594177142e4SRobert Watson 	MAC_CHECK(check_vnode_poll, active_cred, file_cred, vp,
1595177142e4SRobert Watson 	    &vp->v_label);
15967f724f8bSRobert Watson 
15977f724f8bSRobert Watson 	return (error);
15987f724f8bSRobert Watson }
15997f724f8bSRobert Watson 
16007f724f8bSRobert Watson int
1601177142e4SRobert Watson mac_check_vnode_read(struct ucred *active_cred, struct ucred *file_cred,
1602177142e4SRobert Watson     struct vnode *vp)
16037f724f8bSRobert Watson {
16047f724f8bSRobert Watson 	int error;
16057f724f8bSRobert Watson 
16067f724f8bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_read");
16077f724f8bSRobert Watson 
16087f724f8bSRobert Watson 	if (!mac_enforce_fs)
16097f724f8bSRobert Watson 		return (0);
16107f724f8bSRobert Watson 
1611177142e4SRobert Watson 	MAC_CHECK(check_vnode_read, active_cred, file_cred, vp,
1612177142e4SRobert Watson 	    &vp->v_label);
16137f724f8bSRobert Watson 
16147f724f8bSRobert Watson 	return (error);
16157f724f8bSRobert Watson }
16167f724f8bSRobert Watson 
16177f724f8bSRobert Watson int
161895fab37eSRobert Watson mac_check_vnode_readdir(struct ucred *cred, struct vnode *dvp)
161995fab37eSRobert Watson {
162095fab37eSRobert Watson 	int error;
162195fab37eSRobert Watson 
162295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_readdir");
162395fab37eSRobert Watson 
162495fab37eSRobert Watson 	if (!mac_enforce_fs)
162595fab37eSRobert Watson 		return (0);
162695fab37eSRobert Watson 
162795fab37eSRobert Watson 	MAC_CHECK(check_vnode_readdir, cred, dvp, &dvp->v_label);
162895fab37eSRobert Watson 	return (error);
162995fab37eSRobert Watson }
163095fab37eSRobert Watson 
163195fab37eSRobert Watson int
163295fab37eSRobert Watson mac_check_vnode_readlink(struct ucred *cred, struct vnode *vp)
163395fab37eSRobert Watson {
163495fab37eSRobert Watson 	int error;
163595fab37eSRobert Watson 
163695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_readlink");
163795fab37eSRobert Watson 
163895fab37eSRobert Watson 	if (!mac_enforce_fs)
163995fab37eSRobert Watson 		return (0);
164095fab37eSRobert Watson 
164195fab37eSRobert Watson 	MAC_CHECK(check_vnode_readlink, cred, vp, &vp->v_label);
164295fab37eSRobert Watson 	return (error);
164395fab37eSRobert Watson }
164495fab37eSRobert Watson 
164595fab37eSRobert Watson static int
164695fab37eSRobert Watson mac_check_vnode_relabel(struct ucred *cred, struct vnode *vp,
164795fab37eSRobert Watson     struct label *newlabel)
164895fab37eSRobert Watson {
164995fab37eSRobert Watson 	int error;
165095fab37eSRobert Watson 
165195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_relabel");
165295fab37eSRobert Watson 
165395fab37eSRobert Watson 	MAC_CHECK(check_vnode_relabel, cred, vp, &vp->v_label, newlabel);
165495fab37eSRobert Watson 
165595fab37eSRobert Watson 	return (error);
165695fab37eSRobert Watson }
165795fab37eSRobert Watson 
165895fab37eSRobert Watson int
165995fab37eSRobert Watson mac_check_vnode_rename_from(struct ucred *cred, struct vnode *dvp,
166095fab37eSRobert Watson     struct vnode *vp, struct componentname *cnp)
166195fab37eSRobert Watson {
166295fab37eSRobert Watson 	int error;
166395fab37eSRobert Watson 
166495fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_rename_from");
166595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_rename_from");
166695fab37eSRobert Watson 
166795fab37eSRobert Watson 	if (!mac_enforce_fs)
166895fab37eSRobert Watson 		return (0);
166995fab37eSRobert Watson 
167095fab37eSRobert Watson 	MAC_CHECK(check_vnode_rename_from, cred, dvp, &dvp->v_label, vp,
167195fab37eSRobert Watson 	    &vp->v_label, cnp);
167295fab37eSRobert Watson 	return (error);
167395fab37eSRobert Watson }
167495fab37eSRobert Watson 
167595fab37eSRobert Watson int
167695fab37eSRobert Watson mac_check_vnode_rename_to(struct ucred *cred, struct vnode *dvp,
167795fab37eSRobert Watson     struct vnode *vp, int samedir, struct componentname *cnp)
167895fab37eSRobert Watson {
167995fab37eSRobert Watson 	int error;
168095fab37eSRobert Watson 
168195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_rename_to");
168295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_rename_to");
168395fab37eSRobert Watson 
168495fab37eSRobert Watson 	if (!mac_enforce_fs)
168595fab37eSRobert Watson 		return (0);
168695fab37eSRobert Watson 
168795fab37eSRobert Watson 	MAC_CHECK(check_vnode_rename_to, cred, dvp, &dvp->v_label, vp,
168895fab37eSRobert Watson 	    vp != NULL ? &vp->v_label : NULL, samedir, cnp);
168995fab37eSRobert Watson 	return (error);
169095fab37eSRobert Watson }
169195fab37eSRobert Watson 
169295fab37eSRobert Watson int
169395fab37eSRobert Watson mac_check_vnode_revoke(struct ucred *cred, struct vnode *vp)
169495fab37eSRobert Watson {
169595fab37eSRobert Watson 	int error;
169695fab37eSRobert Watson 
169795fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_revoke");
169895fab37eSRobert Watson 
169995fab37eSRobert Watson 	if (!mac_enforce_fs)
170095fab37eSRobert Watson 		return (0);
170195fab37eSRobert Watson 
170295fab37eSRobert Watson 	MAC_CHECK(check_vnode_revoke, cred, vp, &vp->v_label);
170395fab37eSRobert Watson 	return (error);
170495fab37eSRobert Watson }
170595fab37eSRobert Watson 
170695fab37eSRobert Watson int
170795fab37eSRobert Watson mac_check_vnode_setacl(struct ucred *cred, struct vnode *vp, acl_type_t type,
170895fab37eSRobert Watson     struct acl *acl)
170995fab37eSRobert Watson {
171095fab37eSRobert Watson 	int error;
171195fab37eSRobert Watson 
171295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setacl");
171395fab37eSRobert Watson 
171495fab37eSRobert Watson 	if (!mac_enforce_fs)
171595fab37eSRobert Watson 		return (0);
171695fab37eSRobert Watson 
171795fab37eSRobert Watson 	MAC_CHECK(check_vnode_setacl, cred, vp, &vp->v_label, type, acl);
171895fab37eSRobert Watson 	return (error);
171995fab37eSRobert Watson }
172095fab37eSRobert Watson 
172195fab37eSRobert Watson int
172295fab37eSRobert Watson mac_check_vnode_setextattr(struct ucred *cred, struct vnode *vp,
172395fab37eSRobert Watson     int attrnamespace, const char *name, struct uio *uio)
172495fab37eSRobert Watson {
172595fab37eSRobert Watson 	int error;
172695fab37eSRobert Watson 
172795fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setextattr");
172895fab37eSRobert Watson 
172995fab37eSRobert Watson 	if (!mac_enforce_fs)
173095fab37eSRobert Watson 		return (0);
173195fab37eSRobert Watson 
173295fab37eSRobert Watson 	MAC_CHECK(check_vnode_setextattr, cred, vp, &vp->v_label,
173395fab37eSRobert Watson 	    attrnamespace, name, uio);
173495fab37eSRobert Watson 	return (error);
173595fab37eSRobert Watson }
173695fab37eSRobert Watson 
173795fab37eSRobert Watson int
173895fab37eSRobert Watson mac_check_vnode_setflags(struct ucred *cred, struct vnode *vp, u_long flags)
173995fab37eSRobert Watson {
174095fab37eSRobert Watson 	int error;
174195fab37eSRobert Watson 
174295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setflags");
174395fab37eSRobert Watson 
174495fab37eSRobert Watson 	if (!mac_enforce_fs)
174595fab37eSRobert Watson 		return (0);
174695fab37eSRobert Watson 
174795fab37eSRobert Watson 	MAC_CHECK(check_vnode_setflags, cred, vp, &vp->v_label, flags);
174895fab37eSRobert Watson 	return (error);
174995fab37eSRobert Watson }
175095fab37eSRobert Watson 
175195fab37eSRobert Watson int
175295fab37eSRobert Watson mac_check_vnode_setmode(struct ucred *cred, struct vnode *vp, mode_t mode)
175395fab37eSRobert Watson {
175495fab37eSRobert Watson 	int error;
175595fab37eSRobert Watson 
175695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setmode");
175795fab37eSRobert Watson 
175895fab37eSRobert Watson 	if (!mac_enforce_fs)
175995fab37eSRobert Watson 		return (0);
176095fab37eSRobert Watson 
176195fab37eSRobert Watson 	MAC_CHECK(check_vnode_setmode, cred, vp, &vp->v_label, mode);
176295fab37eSRobert Watson 	return (error);
176395fab37eSRobert Watson }
176495fab37eSRobert Watson 
176595fab37eSRobert Watson int
176695fab37eSRobert Watson mac_check_vnode_setowner(struct ucred *cred, struct vnode *vp, uid_t uid,
176795fab37eSRobert Watson     gid_t gid)
176895fab37eSRobert Watson {
176995fab37eSRobert Watson 	int error;
177095fab37eSRobert Watson 
177195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setowner");
177295fab37eSRobert Watson 
177395fab37eSRobert Watson 	if (!mac_enforce_fs)
177495fab37eSRobert Watson 		return (0);
177595fab37eSRobert Watson 
177695fab37eSRobert Watson 	MAC_CHECK(check_vnode_setowner, cred, vp, &vp->v_label, uid, gid);
177795fab37eSRobert Watson 	return (error);
177895fab37eSRobert Watson }
177995fab37eSRobert Watson 
178095fab37eSRobert Watson int
178195fab37eSRobert Watson mac_check_vnode_setutimes(struct ucred *cred, struct vnode *vp,
178295fab37eSRobert Watson     struct timespec atime, struct timespec mtime)
178395fab37eSRobert Watson {
178495fab37eSRobert Watson 	int error;
178595fab37eSRobert Watson 
178695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setutimes");
178795fab37eSRobert Watson 
178895fab37eSRobert Watson 	if (!mac_enforce_fs)
178995fab37eSRobert Watson 		return (0);
179095fab37eSRobert Watson 
179195fab37eSRobert Watson 	MAC_CHECK(check_vnode_setutimes, cred, vp, &vp->v_label, atime,
179295fab37eSRobert Watson 	    mtime);
179395fab37eSRobert Watson 	return (error);
179495fab37eSRobert Watson }
179595fab37eSRobert Watson 
179695fab37eSRobert Watson int
1797177142e4SRobert Watson mac_check_vnode_stat(struct ucred *active_cred, struct ucred *file_cred,
1798177142e4SRobert Watson     struct vnode *vp)
179995fab37eSRobert Watson {
180095fab37eSRobert Watson 	int error;
180195fab37eSRobert Watson 
180295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_stat");
180395fab37eSRobert Watson 
180495fab37eSRobert Watson 	if (!mac_enforce_fs)
180595fab37eSRobert Watson 		return (0);
180695fab37eSRobert Watson 
1807177142e4SRobert Watson 	MAC_CHECK(check_vnode_stat, active_cred, file_cred, vp,
1808177142e4SRobert Watson 	    &vp->v_label);
180995fab37eSRobert Watson 	return (error);
181095fab37eSRobert Watson }
181195fab37eSRobert Watson 
18127f724f8bSRobert Watson int
1813177142e4SRobert Watson mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred,
1814177142e4SRobert Watson     struct vnode *vp)
18157f724f8bSRobert Watson {
18167f724f8bSRobert Watson 	int error;
18177f724f8bSRobert Watson 
18187f724f8bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_write");
18197f724f8bSRobert Watson 
18207f724f8bSRobert Watson 	if (!mac_enforce_fs)
18217f724f8bSRobert Watson 		return (0);
18227f724f8bSRobert Watson 
1823177142e4SRobert Watson 	MAC_CHECK(check_vnode_write, active_cred, file_cred, vp,
1824177142e4SRobert Watson 	    &vp->v_label);
18257f724f8bSRobert Watson 
18267f724f8bSRobert Watson 	return (error);
18277f724f8bSRobert Watson }
18287f724f8bSRobert Watson 
182995fab37eSRobert Watson /*
183095fab37eSRobert Watson  * When relabeling a process, call out to the policies for the maximum
183195fab37eSRobert Watson  * permission allowed for each object type we know about in its
183295fab37eSRobert Watson  * memory space, and revoke access (in the least surprising ways we
183395fab37eSRobert Watson  * know) when necessary.  The process lock is not held here.
183495fab37eSRobert Watson  */
183595fab37eSRobert Watson static void
183695fab37eSRobert Watson mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred)
183795fab37eSRobert Watson {
183895fab37eSRobert Watson 
183995fab37eSRobert Watson 	/* XXX freeze all other threads */
184095fab37eSRobert Watson 	mac_cred_mmapped_drop_perms_recurse(td, cred,
184195fab37eSRobert Watson 	    &td->td_proc->p_vmspace->vm_map);
184295fab37eSRobert Watson 	/* XXX allow other threads to continue */
184395fab37eSRobert Watson }
184495fab37eSRobert Watson 
184595fab37eSRobert Watson static __inline const char *
184695fab37eSRobert Watson prot2str(vm_prot_t prot)
184795fab37eSRobert Watson {
184895fab37eSRobert Watson 
184995fab37eSRobert Watson 	switch (prot & VM_PROT_ALL) {
185095fab37eSRobert Watson 	case VM_PROT_READ:
185195fab37eSRobert Watson 		return ("r--");
185295fab37eSRobert Watson 	case VM_PROT_READ | VM_PROT_WRITE:
185395fab37eSRobert Watson 		return ("rw-");
185495fab37eSRobert Watson 	case VM_PROT_READ | VM_PROT_EXECUTE:
185595fab37eSRobert Watson 		return ("r-x");
185695fab37eSRobert Watson 	case VM_PROT_READ | VM_PROT_WRITE | VM_PROT_EXECUTE:
185795fab37eSRobert Watson 		return ("rwx");
185895fab37eSRobert Watson 	case VM_PROT_WRITE:
185995fab37eSRobert Watson 		return ("-w-");
186095fab37eSRobert Watson 	case VM_PROT_EXECUTE:
186195fab37eSRobert Watson 		return ("--x");
186295fab37eSRobert Watson 	case VM_PROT_WRITE | VM_PROT_EXECUTE:
186395fab37eSRobert Watson 		return ("-wx");
186495fab37eSRobert Watson 	default:
186595fab37eSRobert Watson 		return ("---");
186695fab37eSRobert Watson 	}
186795fab37eSRobert Watson }
186895fab37eSRobert Watson 
186995fab37eSRobert Watson static void
187095fab37eSRobert Watson mac_cred_mmapped_drop_perms_recurse(struct thread *td, struct ucred *cred,
187195fab37eSRobert Watson     struct vm_map *map)
187295fab37eSRobert Watson {
187395fab37eSRobert Watson 	struct vm_map_entry *vme;
1874e183f80eSRobert Watson 	int result;
1875e183f80eSRobert Watson 	vm_prot_t revokeperms;
187695fab37eSRobert Watson 	vm_object_t object;
187795fab37eSRobert Watson 	vm_ooffset_t offset;
187895fab37eSRobert Watson 	struct vnode *vp;
187995fab37eSRobert Watson 
1880c0f39905SRobert Watson 	if (!mac_mmap_revocation)
1881c0f39905SRobert Watson 		return;
1882c0f39905SRobert Watson 
188395fab37eSRobert Watson 	vm_map_lock_read(map);
188495fab37eSRobert Watson 	for (vme = map->header.next; vme != &map->header; vme = vme->next) {
188595fab37eSRobert Watson 		if (vme->eflags & MAP_ENTRY_IS_SUB_MAP) {
188695fab37eSRobert Watson 			mac_cred_mmapped_drop_perms_recurse(td, cred,
188795fab37eSRobert Watson 			    vme->object.sub_map);
188895fab37eSRobert Watson 			continue;
188995fab37eSRobert Watson 		}
189095fab37eSRobert Watson 		/*
189195fab37eSRobert Watson 		 * Skip over entries that obviously are not shared.
189295fab37eSRobert Watson 		 */
189395fab37eSRobert Watson 		if (vme->eflags & (MAP_ENTRY_COW | MAP_ENTRY_NOSYNC) ||
189495fab37eSRobert Watson 		    !vme->max_protection)
189595fab37eSRobert Watson 			continue;
189695fab37eSRobert Watson 		/*
189795fab37eSRobert Watson 		 * Drill down to the deepest backing object.
189895fab37eSRobert Watson 		 */
189995fab37eSRobert Watson 		offset = vme->offset;
190095fab37eSRobert Watson 		object = vme->object.vm_object;
190195fab37eSRobert Watson 		if (object == NULL)
190295fab37eSRobert Watson 			continue;
190395fab37eSRobert Watson 		while (object->backing_object != NULL) {
190495fab37eSRobert Watson 			object = object->backing_object;
190595fab37eSRobert Watson 			offset += object->backing_object_offset;
190695fab37eSRobert Watson 		}
190795fab37eSRobert Watson 		/*
190895fab37eSRobert Watson 		 * At the moment, vm_maps and objects aren't considered
190995fab37eSRobert Watson 		 * by the MAC system, so only things with backing by a
191095fab37eSRobert Watson 		 * normal object (read: vnodes) are checked.
191195fab37eSRobert Watson 		 */
191295fab37eSRobert Watson 		if (object->type != OBJT_VNODE)
191395fab37eSRobert Watson 			continue;
191495fab37eSRobert Watson 		vp = (struct vnode *)object->handle;
191595fab37eSRobert Watson 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
1916e183f80eSRobert Watson 		result = vme->max_protection;
1917e183f80eSRobert Watson 		mac_check_vnode_mmap_downgrade(cred, vp, &result);
191895fab37eSRobert Watson 		VOP_UNLOCK(vp, 0, td);
191995fab37eSRobert Watson 		/*
192095fab37eSRobert Watson 		 * Find out what maximum protection we may be allowing
192195fab37eSRobert Watson 		 * now but a policy needs to get removed.
192295fab37eSRobert Watson 		 */
192395fab37eSRobert Watson 		revokeperms = vme->max_protection & ~result;
192495fab37eSRobert Watson 		if (!revokeperms)
192595fab37eSRobert Watson 			continue;
1926b656366bSBruce Evans 		printf("pid %ld: revoking %s perms from %#lx:%ld "
1927b656366bSBruce Evans 		    "(max %s/cur %s)\n", (long)td->td_proc->p_pid,
1928b656366bSBruce Evans 		    prot2str(revokeperms), (u_long)vme->start,
1929b656366bSBruce Evans 		    (long)(vme->end - vme->start),
193095fab37eSRobert Watson 		    prot2str(vme->max_protection), prot2str(vme->protection));
193195fab37eSRobert Watson 		vm_map_lock_upgrade(map);
193295fab37eSRobert Watson 		/*
193395fab37eSRobert Watson 		 * This is the really simple case: if a map has more
193495fab37eSRobert Watson 		 * max_protection than is allowed, but it's not being
193595fab37eSRobert Watson 		 * actually used (that is, the current protection is
193695fab37eSRobert Watson 		 * still allowed), we can just wipe it out and do
193795fab37eSRobert Watson 		 * nothing more.
193895fab37eSRobert Watson 		 */
193995fab37eSRobert Watson 		if ((vme->protection & revokeperms) == 0) {
194095fab37eSRobert Watson 			vme->max_protection -= revokeperms;
194195fab37eSRobert Watson 		} else {
194295fab37eSRobert Watson 			if (revokeperms & VM_PROT_WRITE) {
194395fab37eSRobert Watson 				/*
194495fab37eSRobert Watson 				 * In the more complicated case, flush out all
194595fab37eSRobert Watson 				 * pending changes to the object then turn it
194695fab37eSRobert Watson 				 * copy-on-write.
194795fab37eSRobert Watson 				 */
194895fab37eSRobert Watson 				vm_object_reference(object);
194995fab37eSRobert Watson 				vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
195095fab37eSRobert Watson 				vm_object_page_clean(object,
195195fab37eSRobert Watson 				    OFF_TO_IDX(offset),
195295fab37eSRobert Watson 				    OFF_TO_IDX(offset + vme->end - vme->start +
195395fab37eSRobert Watson 					PAGE_MASK),
195495fab37eSRobert Watson 				    OBJPC_SYNC);
195595fab37eSRobert Watson 				VOP_UNLOCK(vp, 0, td);
195695fab37eSRobert Watson 				vm_object_deallocate(object);
195795fab37eSRobert Watson 				/*
195895fab37eSRobert Watson 				 * Why bother if there's no read permissions
195995fab37eSRobert Watson 				 * anymore?  For the rest, we need to leave
196095fab37eSRobert Watson 				 * the write permissions on for COW, or
196195fab37eSRobert Watson 				 * remove them entirely if configured to.
196295fab37eSRobert Watson 				 */
196395fab37eSRobert Watson 				if (!mac_mmap_revocation_via_cow) {
196495fab37eSRobert Watson 					vme->max_protection &= ~VM_PROT_WRITE;
196595fab37eSRobert Watson 					vme->protection &= ~VM_PROT_WRITE;
196695fab37eSRobert Watson 				} if ((revokeperms & VM_PROT_READ) == 0)
196795fab37eSRobert Watson 					vme->eflags |= MAP_ENTRY_COW |
196895fab37eSRobert Watson 					    MAP_ENTRY_NEEDS_COPY;
196995fab37eSRobert Watson 			}
197095fab37eSRobert Watson 			if (revokeperms & VM_PROT_EXECUTE) {
197195fab37eSRobert Watson 				vme->max_protection &= ~VM_PROT_EXECUTE;
197295fab37eSRobert Watson 				vme->protection &= ~VM_PROT_EXECUTE;
197395fab37eSRobert Watson 			}
197495fab37eSRobert Watson 			if (revokeperms & VM_PROT_READ) {
197595fab37eSRobert Watson 				vme->max_protection = 0;
197695fab37eSRobert Watson 				vme->protection = 0;
197795fab37eSRobert Watson 			}
197895fab37eSRobert Watson 			pmap_protect(map->pmap, vme->start, vme->end,
197995fab37eSRobert Watson 			    vme->protection & ~revokeperms);
198095fab37eSRobert Watson 			vm_map_simplify_entry(map, vme);
198195fab37eSRobert Watson 		}
198295fab37eSRobert Watson 		vm_map_lock_downgrade(map);
198395fab37eSRobert Watson 	}
198495fab37eSRobert Watson 	vm_map_unlock_read(map);
198595fab37eSRobert Watson }
198695fab37eSRobert Watson 
198795fab37eSRobert Watson /*
198895fab37eSRobert Watson  * When the subject's label changes, it may require revocation of privilege
198995fab37eSRobert Watson  * to mapped objects.  This can't be done on-the-fly later with a unified
199095fab37eSRobert Watson  * buffer cache.
199195fab37eSRobert Watson  */
199295fab37eSRobert Watson static void
199395fab37eSRobert Watson mac_relabel_cred(struct ucred *cred, struct label *newlabel)
199495fab37eSRobert Watson {
199595fab37eSRobert Watson 
199695fab37eSRobert Watson 	MAC_PERFORM(relabel_cred, cred, newlabel);
199795fab37eSRobert Watson }
199895fab37eSRobert Watson 
199995fab37eSRobert Watson void
200095fab37eSRobert Watson mac_relabel_vnode(struct ucred *cred, struct vnode *vp, struct label *newlabel)
200195fab37eSRobert Watson {
200295fab37eSRobert Watson 
200395fab37eSRobert Watson 	MAC_PERFORM(relabel_vnode, cred, vp, &vp->v_label, newlabel);
200495fab37eSRobert Watson }
200595fab37eSRobert Watson 
200695fab37eSRobert Watson void
200795fab37eSRobert Watson mac_create_ifnet(struct ifnet *ifnet)
200895fab37eSRobert Watson {
200995fab37eSRobert Watson 
201095fab37eSRobert Watson 	MAC_PERFORM(create_ifnet, ifnet, &ifnet->if_label);
201195fab37eSRobert Watson }
201295fab37eSRobert Watson 
201395fab37eSRobert Watson void
201495fab37eSRobert Watson mac_create_bpfdesc(struct ucred *cred, struct bpf_d *bpf_d)
201595fab37eSRobert Watson {
201695fab37eSRobert Watson 
201795fab37eSRobert Watson 	MAC_PERFORM(create_bpfdesc, cred, bpf_d, &bpf_d->bd_label);
201895fab37eSRobert Watson }
201995fab37eSRobert Watson 
202095fab37eSRobert Watson void
202195fab37eSRobert Watson mac_create_socket(struct ucred *cred, struct socket *socket)
202295fab37eSRobert Watson {
202395fab37eSRobert Watson 
202495fab37eSRobert Watson 	MAC_PERFORM(create_socket, cred, socket, &socket->so_label);
202595fab37eSRobert Watson }
202695fab37eSRobert Watson 
202795fab37eSRobert Watson void
202895fab37eSRobert Watson mac_create_pipe(struct ucred *cred, struct pipe *pipe)
202995fab37eSRobert Watson {
203095fab37eSRobert Watson 
203195fab37eSRobert Watson 	MAC_PERFORM(create_pipe, cred, pipe, pipe->pipe_label);
203295fab37eSRobert Watson }
203395fab37eSRobert Watson 
203495fab37eSRobert Watson void
203595fab37eSRobert Watson mac_create_socket_from_socket(struct socket *oldsocket,
203695fab37eSRobert Watson     struct socket *newsocket)
203795fab37eSRobert Watson {
203895fab37eSRobert Watson 
203995fab37eSRobert Watson 	MAC_PERFORM(create_socket_from_socket, oldsocket, &oldsocket->so_label,
204095fab37eSRobert Watson 	    newsocket, &newsocket->so_label);
204195fab37eSRobert Watson }
204295fab37eSRobert Watson 
204395fab37eSRobert Watson static void
204495fab37eSRobert Watson mac_relabel_socket(struct ucred *cred, struct socket *socket,
204595fab37eSRobert Watson     struct label *newlabel)
204695fab37eSRobert Watson {
204795fab37eSRobert Watson 
204895fab37eSRobert Watson 	MAC_PERFORM(relabel_socket, cred, socket, &socket->so_label, newlabel);
204995fab37eSRobert Watson }
205095fab37eSRobert Watson 
205195fab37eSRobert Watson static void
205295fab37eSRobert Watson mac_relabel_pipe(struct ucred *cred, struct pipe *pipe, struct label *newlabel)
205395fab37eSRobert Watson {
205495fab37eSRobert Watson 
205595fab37eSRobert Watson 	MAC_PERFORM(relabel_pipe, cred, pipe, pipe->pipe_label, newlabel);
205695fab37eSRobert Watson }
205795fab37eSRobert Watson 
205895fab37eSRobert Watson void
205995fab37eSRobert Watson mac_set_socket_peer_from_mbuf(struct mbuf *mbuf, struct socket *socket)
206095fab37eSRobert Watson {
206195fab37eSRobert Watson 
206295fab37eSRobert Watson 	MAC_PERFORM(set_socket_peer_from_mbuf, mbuf, &mbuf->m_pkthdr.label,
206395fab37eSRobert Watson 	    socket, &socket->so_peerlabel);
206495fab37eSRobert Watson }
206595fab37eSRobert Watson 
206695fab37eSRobert Watson void
206795fab37eSRobert Watson mac_set_socket_peer_from_socket(struct socket *oldsocket,
206895fab37eSRobert Watson     struct socket *newsocket)
206995fab37eSRobert Watson {
207095fab37eSRobert Watson 
207195fab37eSRobert Watson 	MAC_PERFORM(set_socket_peer_from_socket, oldsocket,
207295fab37eSRobert Watson 	    &oldsocket->so_label, newsocket, &newsocket->so_peerlabel);
207395fab37eSRobert Watson }
207495fab37eSRobert Watson 
207595fab37eSRobert Watson void
207695fab37eSRobert Watson mac_create_datagram_from_ipq(struct ipq *ipq, struct mbuf *datagram)
207795fab37eSRobert Watson {
207895fab37eSRobert Watson 
207995fab37eSRobert Watson 	MAC_PERFORM(create_datagram_from_ipq, ipq, &ipq->ipq_label,
208095fab37eSRobert Watson 	    datagram, &datagram->m_pkthdr.label);
208195fab37eSRobert Watson }
208295fab37eSRobert Watson 
208395fab37eSRobert Watson void
208495fab37eSRobert Watson mac_create_fragment(struct mbuf *datagram, struct mbuf *fragment)
208595fab37eSRobert Watson {
208695fab37eSRobert Watson 
208795fab37eSRobert Watson 	MAC_PERFORM(create_fragment, datagram, &datagram->m_pkthdr.label,
208895fab37eSRobert Watson 	    fragment, &fragment->m_pkthdr.label);
208995fab37eSRobert Watson }
209095fab37eSRobert Watson 
209195fab37eSRobert Watson void
209295fab37eSRobert Watson mac_create_ipq(struct mbuf *fragment, struct ipq *ipq)
209395fab37eSRobert Watson {
209495fab37eSRobert Watson 
209595fab37eSRobert Watson 	MAC_PERFORM(create_ipq, fragment, &fragment->m_pkthdr.label, ipq,
209695fab37eSRobert Watson 	    &ipq->ipq_label);
209795fab37eSRobert Watson }
209895fab37eSRobert Watson 
209995fab37eSRobert Watson void
210095fab37eSRobert Watson mac_create_mbuf_from_mbuf(struct mbuf *oldmbuf, struct mbuf *newmbuf)
210195fab37eSRobert Watson {
210295fab37eSRobert Watson 
210395fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_mbuf, oldmbuf, &oldmbuf->m_pkthdr.label,
210495fab37eSRobert Watson 	    newmbuf, &newmbuf->m_pkthdr.label);
210595fab37eSRobert Watson }
210695fab37eSRobert Watson 
210795fab37eSRobert Watson void
210895fab37eSRobert Watson mac_create_mbuf_from_bpfdesc(struct bpf_d *bpf_d, struct mbuf *mbuf)
210995fab37eSRobert Watson {
211095fab37eSRobert Watson 
211195fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_bpfdesc, bpf_d, &bpf_d->bd_label, mbuf,
211295fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
211395fab37eSRobert Watson }
211495fab37eSRobert Watson 
211595fab37eSRobert Watson void
211695fab37eSRobert Watson mac_create_mbuf_linklayer(struct ifnet *ifnet, struct mbuf *mbuf)
211795fab37eSRobert Watson {
211895fab37eSRobert Watson 
211995fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_linklayer, ifnet, &ifnet->if_label, mbuf,
212095fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
212195fab37eSRobert Watson }
212295fab37eSRobert Watson 
212395fab37eSRobert Watson void
212495fab37eSRobert Watson mac_create_mbuf_from_ifnet(struct ifnet *ifnet, struct mbuf *mbuf)
212595fab37eSRobert Watson {
212695fab37eSRobert Watson 
212795fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_ifnet, ifnet, &ifnet->if_label, mbuf,
212895fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
212995fab37eSRobert Watson }
213095fab37eSRobert Watson 
213195fab37eSRobert Watson void
213295fab37eSRobert Watson mac_create_mbuf_multicast_encap(struct mbuf *oldmbuf, struct ifnet *ifnet,
213395fab37eSRobert Watson     struct mbuf *newmbuf)
213495fab37eSRobert Watson {
213595fab37eSRobert Watson 
213695fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_multicast_encap, oldmbuf,
213795fab37eSRobert Watson 	    &oldmbuf->m_pkthdr.label, ifnet, &ifnet->if_label, newmbuf,
213895fab37eSRobert Watson 	    &newmbuf->m_pkthdr.label);
213995fab37eSRobert Watson }
214095fab37eSRobert Watson 
214195fab37eSRobert Watson void
214295fab37eSRobert Watson mac_create_mbuf_netlayer(struct mbuf *oldmbuf, struct mbuf *newmbuf)
214395fab37eSRobert Watson {
214495fab37eSRobert Watson 
214595fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_netlayer, oldmbuf, &oldmbuf->m_pkthdr.label,
214695fab37eSRobert Watson 	    newmbuf, &newmbuf->m_pkthdr.label);
214795fab37eSRobert Watson }
214895fab37eSRobert Watson 
214995fab37eSRobert Watson int
215095fab37eSRobert Watson mac_fragment_match(struct mbuf *fragment, struct ipq *ipq)
215195fab37eSRobert Watson {
215295fab37eSRobert Watson 	int result;
215395fab37eSRobert Watson 
215495fab37eSRobert Watson 	result = 1;
215595fab37eSRobert Watson 	MAC_BOOLEAN(fragment_match, &&, fragment, &fragment->m_pkthdr.label,
215695fab37eSRobert Watson 	    ipq, &ipq->ipq_label);
215795fab37eSRobert Watson 
215895fab37eSRobert Watson 	return (result);
215995fab37eSRobert Watson }
216095fab37eSRobert Watson 
216195fab37eSRobert Watson void
216295fab37eSRobert Watson mac_update_ipq(struct mbuf *fragment, struct ipq *ipq)
216395fab37eSRobert Watson {
216495fab37eSRobert Watson 
216595fab37eSRobert Watson 	MAC_PERFORM(update_ipq, fragment, &fragment->m_pkthdr.label, ipq,
216695fab37eSRobert Watson 	    &ipq->ipq_label);
216795fab37eSRobert Watson }
216895fab37eSRobert Watson 
216995fab37eSRobert Watson void
217095fab37eSRobert Watson mac_create_mbuf_from_socket(struct socket *socket, struct mbuf *mbuf)
217195fab37eSRobert Watson {
217295fab37eSRobert Watson 
217395fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_socket, socket, &socket->so_label, mbuf,
217495fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
217595fab37eSRobert Watson }
217695fab37eSRobert Watson 
217795fab37eSRobert Watson void
217895fab37eSRobert Watson mac_create_mount(struct ucred *cred, struct mount *mp)
217995fab37eSRobert Watson {
218095fab37eSRobert Watson 
218195fab37eSRobert Watson 	MAC_PERFORM(create_mount, cred, mp, &mp->mnt_mntlabel,
218295fab37eSRobert Watson 	    &mp->mnt_fslabel);
218395fab37eSRobert Watson }
218495fab37eSRobert Watson 
218595fab37eSRobert Watson void
218695fab37eSRobert Watson mac_create_root_mount(struct ucred *cred, struct mount *mp)
218795fab37eSRobert Watson {
218895fab37eSRobert Watson 
218995fab37eSRobert Watson 	MAC_PERFORM(create_root_mount, cred, mp, &mp->mnt_mntlabel,
219095fab37eSRobert Watson 	    &mp->mnt_fslabel);
219195fab37eSRobert Watson }
219295fab37eSRobert Watson 
219395fab37eSRobert Watson int
219495fab37eSRobert Watson mac_check_bpfdesc_receive(struct bpf_d *bpf_d, struct ifnet *ifnet)
219595fab37eSRobert Watson {
219695fab37eSRobert Watson 	int error;
219795fab37eSRobert Watson 
219895fab37eSRobert Watson 	if (!mac_enforce_network)
219995fab37eSRobert Watson 		return (0);
220095fab37eSRobert Watson 
220195fab37eSRobert Watson 	MAC_CHECK(check_bpfdesc_receive, bpf_d, &bpf_d->bd_label, ifnet,
220295fab37eSRobert Watson 	    &ifnet->if_label);
220395fab37eSRobert Watson 
220495fab37eSRobert Watson 	return (error);
220595fab37eSRobert Watson }
220695fab37eSRobert Watson 
220795fab37eSRobert Watson static int
220895fab37eSRobert Watson mac_check_cred_relabel(struct ucred *cred, struct label *newlabel)
220995fab37eSRobert Watson {
221095fab37eSRobert Watson 	int error;
221195fab37eSRobert Watson 
221295fab37eSRobert Watson 	MAC_CHECK(check_cred_relabel, cred, newlabel);
221395fab37eSRobert Watson 
221495fab37eSRobert Watson 	return (error);
221595fab37eSRobert Watson }
221695fab37eSRobert Watson 
221795fab37eSRobert Watson int
221895fab37eSRobert Watson mac_check_cred_visible(struct ucred *u1, struct ucred *u2)
221995fab37eSRobert Watson {
222095fab37eSRobert Watson 	int error;
222195fab37eSRobert Watson 
222295fab37eSRobert Watson 	if (!mac_enforce_process)
222395fab37eSRobert Watson 		return (0);
222495fab37eSRobert Watson 
222595fab37eSRobert Watson 	MAC_CHECK(check_cred_visible, u1, u2);
222695fab37eSRobert Watson 
222795fab37eSRobert Watson 	return (error);
222895fab37eSRobert Watson }
222995fab37eSRobert Watson 
223095fab37eSRobert Watson int
223195fab37eSRobert Watson mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
223295fab37eSRobert Watson {
223395fab37eSRobert Watson 	int error;
223495fab37eSRobert Watson 
223595fab37eSRobert Watson 	if (!mac_enforce_network)
223695fab37eSRobert Watson 		return (0);
223795fab37eSRobert Watson 
223895fab37eSRobert Watson 	KASSERT(mbuf->m_flags & M_PKTHDR, ("packet has no pkthdr"));
223995fab37eSRobert Watson 	if (!(mbuf->m_pkthdr.label.l_flags & MAC_FLAG_INITIALIZED))
224029e1b85fSBrooks Davis 		if_printf(ifnet, "not initialized\n");
224195fab37eSRobert Watson 
224295fab37eSRobert Watson 	MAC_CHECK(check_ifnet_transmit, ifnet, &ifnet->if_label, mbuf,
224395fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
224495fab37eSRobert Watson 
224595fab37eSRobert Watson 	return (error);
224695fab37eSRobert Watson }
224795fab37eSRobert Watson 
224895fab37eSRobert Watson int
2249e686e5aeSRobert Watson mac_check_kenv_dump(struct ucred *cred)
2250e686e5aeSRobert Watson {
2251e686e5aeSRobert Watson 	int error;
2252e686e5aeSRobert Watson 
2253e686e5aeSRobert Watson 	if (!mac_enforce_system)
2254e686e5aeSRobert Watson 		return (0);
2255e686e5aeSRobert Watson 
2256e686e5aeSRobert Watson 	MAC_CHECK(check_kenv_dump, cred);
2257e686e5aeSRobert Watson 
2258e686e5aeSRobert Watson 	return (error);
2259e686e5aeSRobert Watson }
2260e686e5aeSRobert Watson 
2261e686e5aeSRobert Watson int
2262e686e5aeSRobert Watson mac_check_kenv_get(struct ucred *cred, char *name)
2263e686e5aeSRobert Watson {
2264e686e5aeSRobert Watson 	int error;
2265e686e5aeSRobert Watson 
2266e686e5aeSRobert Watson 	if (!mac_enforce_system)
2267e686e5aeSRobert Watson 		return (0);
2268e686e5aeSRobert Watson 
2269e686e5aeSRobert Watson 	MAC_CHECK(check_kenv_get, cred, name);
2270e686e5aeSRobert Watson 
2271e686e5aeSRobert Watson 	return (error);
2272e686e5aeSRobert Watson }
2273e686e5aeSRobert Watson 
2274e686e5aeSRobert Watson int
2275e686e5aeSRobert Watson mac_check_kenv_set(struct ucred *cred, char *name, char *value)
2276e686e5aeSRobert Watson {
2277e686e5aeSRobert Watson 	int error;
2278e686e5aeSRobert Watson 
2279e686e5aeSRobert Watson 	if (!mac_enforce_system)
2280e686e5aeSRobert Watson 		return (0);
2281e686e5aeSRobert Watson 
2282e686e5aeSRobert Watson 	MAC_CHECK(check_kenv_set, cred, name, value);
2283e686e5aeSRobert Watson 
2284e686e5aeSRobert Watson 	return (error);
2285e686e5aeSRobert Watson }
2286e686e5aeSRobert Watson 
2287e686e5aeSRobert Watson int
2288e686e5aeSRobert Watson mac_check_kenv_unset(struct ucred *cred, char *name)
2289e686e5aeSRobert Watson {
2290e686e5aeSRobert Watson 	int error;
2291e686e5aeSRobert Watson 
2292e686e5aeSRobert Watson 	if (!mac_enforce_system)
2293e686e5aeSRobert Watson 		return (0);
2294e686e5aeSRobert Watson 
2295e686e5aeSRobert Watson 	MAC_CHECK(check_kenv_unset, cred, name);
2296e686e5aeSRobert Watson 
2297e686e5aeSRobert Watson 	return (error);
2298e686e5aeSRobert Watson }
2299e686e5aeSRobert Watson 
2300e686e5aeSRobert Watson int
2301a3df768bSRobert Watson mac_check_kld_load(struct ucred *cred, struct vnode *vp)
2302a3df768bSRobert Watson {
2303a3df768bSRobert Watson 	int error;
2304a3df768bSRobert Watson 
2305a3df768bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_kld_load");
2306a3df768bSRobert Watson 
2307a3df768bSRobert Watson 	if (!mac_enforce_kld)
2308a3df768bSRobert Watson 		return (0);
2309a3df768bSRobert Watson 
2310a3df768bSRobert Watson 	MAC_CHECK(check_kld_load, cred, vp, &vp->v_label);
2311a3df768bSRobert Watson 
2312a3df768bSRobert Watson 	return (error);
2313a3df768bSRobert Watson }
2314a3df768bSRobert Watson 
2315a3df768bSRobert Watson int
2316a3df768bSRobert Watson mac_check_kld_stat(struct ucred *cred)
2317a3df768bSRobert Watson {
2318a3df768bSRobert Watson 	int error;
2319a3df768bSRobert Watson 
2320a3df768bSRobert Watson 	if (!mac_enforce_kld)
2321a3df768bSRobert Watson 		return (0);
2322a3df768bSRobert Watson 
2323a3df768bSRobert Watson 	MAC_CHECK(check_kld_stat, cred);
2324a3df768bSRobert Watson 
2325a3df768bSRobert Watson 	return (error);
2326a3df768bSRobert Watson }
2327a3df768bSRobert Watson 
2328a3df768bSRobert Watson int
2329a3df768bSRobert Watson mac_check_kld_unload(struct ucred *cred)
2330a3df768bSRobert Watson {
2331a3df768bSRobert Watson 	int error;
2332a3df768bSRobert Watson 
2333a3df768bSRobert Watson 	if (!mac_enforce_kld)
2334a3df768bSRobert Watson 		return (0);
2335a3df768bSRobert Watson 
2336a3df768bSRobert Watson 	MAC_CHECK(check_kld_unload, cred);
2337a3df768bSRobert Watson 
2338a3df768bSRobert Watson 	return (error);
2339a3df768bSRobert Watson }
2340a3df768bSRobert Watson 
2341a3df768bSRobert Watson int
234295fab37eSRobert Watson mac_check_mount_stat(struct ucred *cred, struct mount *mount)
234395fab37eSRobert Watson {
234495fab37eSRobert Watson 	int error;
234595fab37eSRobert Watson 
234695fab37eSRobert Watson 	if (!mac_enforce_fs)
234795fab37eSRobert Watson 		return (0);
234895fab37eSRobert Watson 
234995fab37eSRobert Watson 	MAC_CHECK(check_mount_stat, cred, mount, &mount->mnt_mntlabel);
235095fab37eSRobert Watson 
235195fab37eSRobert Watson 	return (error);
235295fab37eSRobert Watson }
235395fab37eSRobert Watson 
235495fab37eSRobert Watson int
235595fab37eSRobert Watson mac_check_pipe_ioctl(struct ucred *cred, struct pipe *pipe, unsigned long cmd,
235695fab37eSRobert Watson     void *data)
235795fab37eSRobert Watson {
235895fab37eSRobert Watson 	int error;
235995fab37eSRobert Watson 
23601aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
23611aa37f53SRobert Watson 
23621aa37f53SRobert Watson 	if (!mac_enforce_pipe)
23631aa37f53SRobert Watson 		return (0);
23641aa37f53SRobert Watson 
236595fab37eSRobert Watson 	MAC_CHECK(check_pipe_ioctl, cred, pipe, pipe->pipe_label, cmd, data);
236695fab37eSRobert Watson 
236795fab37eSRobert Watson 	return (error);
236895fab37eSRobert Watson }
236995fab37eSRobert Watson 
237095fab37eSRobert Watson int
2371c024c3eeSRobert Watson mac_check_pipe_poll(struct ucred *cred, struct pipe *pipe)
237295fab37eSRobert Watson {
237395fab37eSRobert Watson 	int error;
237495fab37eSRobert Watson 
23751aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
23761aa37f53SRobert Watson 
23771aa37f53SRobert Watson 	if (!mac_enforce_pipe)
23781aa37f53SRobert Watson 		return (0);
23791aa37f53SRobert Watson 
2380c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_poll, cred, pipe, pipe->pipe_label);
2381c024c3eeSRobert Watson 
2382c024c3eeSRobert Watson 	return (error);
2383c024c3eeSRobert Watson }
2384c024c3eeSRobert Watson 
2385c024c3eeSRobert Watson int
2386c024c3eeSRobert Watson mac_check_pipe_read(struct ucred *cred, struct pipe *pipe)
2387c024c3eeSRobert Watson {
2388c024c3eeSRobert Watson 	int error;
2389c024c3eeSRobert Watson 
23901aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
23911aa37f53SRobert Watson 
23921aa37f53SRobert Watson 	if (!mac_enforce_pipe)
23931aa37f53SRobert Watson 		return (0);
23941aa37f53SRobert Watson 
2395c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_read, cred, pipe, pipe->pipe_label);
239695fab37eSRobert Watson 
239795fab37eSRobert Watson 	return (error);
239895fab37eSRobert Watson }
239995fab37eSRobert Watson 
240095fab37eSRobert Watson static int
240195fab37eSRobert Watson mac_check_pipe_relabel(struct ucred *cred, struct pipe *pipe,
240295fab37eSRobert Watson     struct label *newlabel)
240395fab37eSRobert Watson {
240495fab37eSRobert Watson 	int error;
240595fab37eSRobert Watson 
24061aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
24071aa37f53SRobert Watson 
24081aa37f53SRobert Watson 	if (!mac_enforce_pipe)
24091aa37f53SRobert Watson 		return (0);
24101aa37f53SRobert Watson 
241195fab37eSRobert Watson 	MAC_CHECK(check_pipe_relabel, cred, pipe, pipe->pipe_label, newlabel);
241295fab37eSRobert Watson 
241395fab37eSRobert Watson 	return (error);
241495fab37eSRobert Watson }
241595fab37eSRobert Watson 
241695fab37eSRobert Watson int
2417c024c3eeSRobert Watson mac_check_pipe_stat(struct ucred *cred, struct pipe *pipe)
2418c024c3eeSRobert Watson {
2419c024c3eeSRobert Watson 	int error;
2420c024c3eeSRobert Watson 
24211aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
24221aa37f53SRobert Watson 
24231aa37f53SRobert Watson 	if (!mac_enforce_pipe)
24241aa37f53SRobert Watson 		return (0);
24251aa37f53SRobert Watson 
2426c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_stat, cred, pipe, pipe->pipe_label);
2427c024c3eeSRobert Watson 
2428c024c3eeSRobert Watson 	return (error);
2429c024c3eeSRobert Watson }
2430c024c3eeSRobert Watson 
2431c024c3eeSRobert Watson int
2432c024c3eeSRobert Watson mac_check_pipe_write(struct ucred *cred, struct pipe *pipe)
2433c024c3eeSRobert Watson {
2434c024c3eeSRobert Watson 	int error;
2435c024c3eeSRobert Watson 
24361aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
24371aa37f53SRobert Watson 
24381aa37f53SRobert Watson 	if (!mac_enforce_pipe)
24391aa37f53SRobert Watson 		return (0);
24401aa37f53SRobert Watson 
2441c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_write, cred, pipe, pipe->pipe_label);
2442c024c3eeSRobert Watson 
2443c024c3eeSRobert Watson 	return (error);
2444c024c3eeSRobert Watson }
2445c024c3eeSRobert Watson 
2446c024c3eeSRobert Watson int
244795fab37eSRobert Watson mac_check_proc_debug(struct ucred *cred, struct proc *proc)
244895fab37eSRobert Watson {
244995fab37eSRobert Watson 	int error;
245095fab37eSRobert Watson 
2451b12baf55SRobert Watson 	PROC_LOCK_ASSERT(proc, MA_OWNED);
2452b12baf55SRobert Watson 
245395fab37eSRobert Watson 	if (!mac_enforce_process)
245495fab37eSRobert Watson 		return (0);
245595fab37eSRobert Watson 
245695fab37eSRobert Watson 	MAC_CHECK(check_proc_debug, cred, proc);
245795fab37eSRobert Watson 
245895fab37eSRobert Watson 	return (error);
245995fab37eSRobert Watson }
246095fab37eSRobert Watson 
246195fab37eSRobert Watson int
246295fab37eSRobert Watson mac_check_proc_sched(struct ucred *cred, struct proc *proc)
246395fab37eSRobert Watson {
246495fab37eSRobert Watson 	int error;
246595fab37eSRobert Watson 
2466b12baf55SRobert Watson 	PROC_LOCK_ASSERT(proc, MA_OWNED);
2467b12baf55SRobert Watson 
246895fab37eSRobert Watson 	if (!mac_enforce_process)
246995fab37eSRobert Watson 		return (0);
247095fab37eSRobert Watson 
247195fab37eSRobert Watson 	MAC_CHECK(check_proc_sched, cred, proc);
247295fab37eSRobert Watson 
247395fab37eSRobert Watson 	return (error);
247495fab37eSRobert Watson }
247595fab37eSRobert Watson 
247695fab37eSRobert Watson int
247795fab37eSRobert Watson mac_check_proc_signal(struct ucred *cred, struct proc *proc, int signum)
247895fab37eSRobert Watson {
247995fab37eSRobert Watson 	int error;
248095fab37eSRobert Watson 
2481b12baf55SRobert Watson 	PROC_LOCK_ASSERT(proc, MA_OWNED);
2482b12baf55SRobert Watson 
248395fab37eSRobert Watson 	if (!mac_enforce_process)
248495fab37eSRobert Watson 		return (0);
248595fab37eSRobert Watson 
248695fab37eSRobert Watson 	MAC_CHECK(check_proc_signal, cred, proc, signum);
248795fab37eSRobert Watson 
248895fab37eSRobert Watson 	return (error);
248995fab37eSRobert Watson }
249095fab37eSRobert Watson 
249195fab37eSRobert Watson int
249295fab37eSRobert Watson mac_check_socket_bind(struct ucred *ucred, struct socket *socket,
249395fab37eSRobert Watson     struct sockaddr *sockaddr)
249495fab37eSRobert Watson {
249595fab37eSRobert Watson 	int error;
249695fab37eSRobert Watson 
249795fab37eSRobert Watson 	if (!mac_enforce_socket)
249895fab37eSRobert Watson 		return (0);
249995fab37eSRobert Watson 
250095fab37eSRobert Watson 	MAC_CHECK(check_socket_bind, ucred, socket, &socket->so_label,
250195fab37eSRobert Watson 	    sockaddr);
250295fab37eSRobert Watson 
250395fab37eSRobert Watson 	return (error);
250495fab37eSRobert Watson }
250595fab37eSRobert Watson 
250695fab37eSRobert Watson int
250795fab37eSRobert Watson mac_check_socket_connect(struct ucred *cred, struct socket *socket,
250895fab37eSRobert Watson     struct sockaddr *sockaddr)
250995fab37eSRobert Watson {
251095fab37eSRobert Watson 	int error;
251195fab37eSRobert Watson 
251295fab37eSRobert Watson 	if (!mac_enforce_socket)
251395fab37eSRobert Watson 		return (0);
251495fab37eSRobert Watson 
251595fab37eSRobert Watson 	MAC_CHECK(check_socket_connect, cred, socket, &socket->so_label,
251695fab37eSRobert Watson 	    sockaddr);
251795fab37eSRobert Watson 
251895fab37eSRobert Watson 	return (error);
251995fab37eSRobert Watson }
252095fab37eSRobert Watson 
252195fab37eSRobert Watson int
2522d61198e4SRobert Watson mac_check_socket_deliver(struct socket *socket, struct mbuf *mbuf)
2523d61198e4SRobert Watson {
2524d61198e4SRobert Watson 	int error;
2525d61198e4SRobert Watson 
2526d61198e4SRobert Watson 	if (!mac_enforce_socket)
2527d61198e4SRobert Watson 		return (0);
2528d61198e4SRobert Watson 
2529d61198e4SRobert Watson 	MAC_CHECK(check_socket_deliver, socket, &socket->so_label, mbuf,
2530d61198e4SRobert Watson 	    &mbuf->m_pkthdr.label);
2531d61198e4SRobert Watson 
2532d61198e4SRobert Watson 	return (error);
2533d61198e4SRobert Watson }
2534d61198e4SRobert Watson 
2535d61198e4SRobert Watson int
253695fab37eSRobert Watson mac_check_socket_listen(struct ucred *cred, struct socket *socket)
253795fab37eSRobert Watson {
253895fab37eSRobert Watson 	int error;
253995fab37eSRobert Watson 
254095fab37eSRobert Watson 	if (!mac_enforce_socket)
254195fab37eSRobert Watson 		return (0);
254295fab37eSRobert Watson 
254395fab37eSRobert Watson 	MAC_CHECK(check_socket_listen, cred, socket, &socket->so_label);
254495fab37eSRobert Watson 	return (error);
254595fab37eSRobert Watson }
254695fab37eSRobert Watson 
2547b371c939SRobert Watson int
2548b371c939SRobert Watson mac_check_socket_receive(struct ucred *cred, struct socket *so)
2549b371c939SRobert Watson {
2550b371c939SRobert Watson 	int error;
2551b371c939SRobert Watson 
2552b371c939SRobert Watson 	if (!mac_enforce_socket)
2553b371c939SRobert Watson 		return (0);
2554b371c939SRobert Watson 
2555b371c939SRobert Watson 	MAC_CHECK(check_socket_receive, cred, so, &so->so_label);
2556b371c939SRobert Watson 
2557b371c939SRobert Watson 	return (error);
2558b371c939SRobert Watson }
2559b371c939SRobert Watson 
256095fab37eSRobert Watson static int
256195fab37eSRobert Watson mac_check_socket_relabel(struct ucred *cred, struct socket *socket,
256295fab37eSRobert Watson     struct label *newlabel)
256395fab37eSRobert Watson {
256495fab37eSRobert Watson 	int error;
256595fab37eSRobert Watson 
256695fab37eSRobert Watson 	MAC_CHECK(check_socket_relabel, cred, socket, &socket->so_label,
256795fab37eSRobert Watson 	    newlabel);
256895fab37eSRobert Watson 
256995fab37eSRobert Watson 	return (error);
257095fab37eSRobert Watson }
257195fab37eSRobert Watson 
257295fab37eSRobert Watson int
2573b371c939SRobert Watson mac_check_socket_send(struct ucred *cred, struct socket *so)
2574b371c939SRobert Watson {
2575b371c939SRobert Watson 	int error;
2576b371c939SRobert Watson 
2577b371c939SRobert Watson 	if (!mac_enforce_socket)
2578b371c939SRobert Watson 		return (0);
2579b371c939SRobert Watson 
2580b371c939SRobert Watson 	MAC_CHECK(check_socket_send, cred, so, &so->so_label);
2581b371c939SRobert Watson 
2582b371c939SRobert Watson 	return (error);
2583b371c939SRobert Watson }
2584b371c939SRobert Watson 
2585b371c939SRobert Watson int
258695fab37eSRobert Watson mac_check_socket_visible(struct ucred *cred, struct socket *socket)
258795fab37eSRobert Watson {
258895fab37eSRobert Watson 	int error;
258995fab37eSRobert Watson 
259095fab37eSRobert Watson 	if (!mac_enforce_socket)
259195fab37eSRobert Watson 		return (0);
259295fab37eSRobert Watson 
259395fab37eSRobert Watson 	MAC_CHECK(check_socket_visible, cred, socket, &socket->so_label);
259495fab37eSRobert Watson 
259595fab37eSRobert Watson 	return (error);
259695fab37eSRobert Watson }
259795fab37eSRobert Watson 
259895fab37eSRobert Watson int
2599e5e820fdSRobert Watson mac_check_system_acct(struct ucred *cred, struct vnode *vp)
2600e5e820fdSRobert Watson {
2601e5e820fdSRobert Watson 	int error;
2602e5e820fdSRobert Watson 
2603e5e820fdSRobert Watson 	if (vp != NULL) {
2604e5e820fdSRobert Watson 		ASSERT_VOP_LOCKED(vp, "mac_check_system_acct");
2605e5e820fdSRobert Watson 	}
2606e5e820fdSRobert Watson 
2607e5e820fdSRobert Watson 	if (!mac_enforce_system)
2608e5e820fdSRobert Watson 		return (0);
2609e5e820fdSRobert Watson 
2610e5e820fdSRobert Watson 	MAC_CHECK(check_system_acct, cred, vp,
2611e5e820fdSRobert Watson 	    vp != NULL ? &vp->v_label : NULL);
2612e5e820fdSRobert Watson 
2613e5e820fdSRobert Watson 	return (error);
2614e5e820fdSRobert Watson }
2615e5e820fdSRobert Watson 
2616e5e820fdSRobert Watson int
2617e5e820fdSRobert Watson mac_check_system_nfsd(struct ucred *cred)
2618e5e820fdSRobert Watson {
2619e5e820fdSRobert Watson 	int error;
2620e5e820fdSRobert Watson 
2621e5e820fdSRobert Watson 	if (!mac_enforce_system)
2622e5e820fdSRobert Watson 		return (0);
2623e5e820fdSRobert Watson 
2624e5e820fdSRobert Watson 	MAC_CHECK(check_system_nfsd, cred);
2625e5e820fdSRobert Watson 
2626e5e820fdSRobert Watson 	return (error);
2627e5e820fdSRobert Watson }
2628e5e820fdSRobert Watson 
2629e5e820fdSRobert Watson int
2630a2ecb9b7SRobert Watson mac_check_system_reboot(struct ucred *cred, int howto)
2631a2ecb9b7SRobert Watson {
2632a2ecb9b7SRobert Watson 	int error;
2633a2ecb9b7SRobert Watson 
26349e913ebdSRobert Watson 	if (!mac_enforce_system)
2635a2ecb9b7SRobert Watson 		return (0);
2636a2ecb9b7SRobert Watson 
2637a2ecb9b7SRobert Watson 	MAC_CHECK(check_system_reboot, cred, howto);
26389e913ebdSRobert Watson 
2639a2ecb9b7SRobert Watson 	return (error);
2640a2ecb9b7SRobert Watson }
2641a2ecb9b7SRobert Watson 
2642a2ecb9b7SRobert Watson int
26434b8d5f2dSRobert Watson mac_check_system_settime(struct ucred *cred)
26444b8d5f2dSRobert Watson {
26454b8d5f2dSRobert Watson 	int error;
26464b8d5f2dSRobert Watson 
26474b8d5f2dSRobert Watson 	if (!mac_enforce_system)
26484b8d5f2dSRobert Watson 		return (0);
26494b8d5f2dSRobert Watson 
26504b8d5f2dSRobert Watson 	MAC_CHECK(check_system_settime, cred);
26514b8d5f2dSRobert Watson 
26524b8d5f2dSRobert Watson 	return (error);
26534b8d5f2dSRobert Watson }
26544b8d5f2dSRobert Watson 
26554b8d5f2dSRobert Watson int
265603ce2c0cSRobert Watson mac_check_system_swapon(struct ucred *cred, struct vnode *vp)
265703ce2c0cSRobert Watson {
265803ce2c0cSRobert Watson 	int error;
265903ce2c0cSRobert Watson 
266003ce2c0cSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_system_swapon");
266103ce2c0cSRobert Watson 
26629e913ebdSRobert Watson 	if (!mac_enforce_system)
266303ce2c0cSRobert Watson 		return (0);
266403ce2c0cSRobert Watson 
266503ce2c0cSRobert Watson 	MAC_CHECK(check_system_swapon, cred, vp, &vp->v_label);
266603ce2c0cSRobert Watson 	return (error);
266703ce2c0cSRobert Watson }
266803ce2c0cSRobert Watson 
266903ce2c0cSRobert Watson int
2670d3fc69eeSRobert Watson mac_check_system_sysctl(struct ucred *cred, int *name, u_int namelen,
2671d3fc69eeSRobert Watson     void *old, size_t *oldlenp, int inkernel, void *new, size_t newlen)
2672d3fc69eeSRobert Watson {
2673d3fc69eeSRobert Watson 	int error;
2674d3fc69eeSRobert Watson 
2675d3fc69eeSRobert Watson 	/*
2676d3fc69eeSRobert Watson 	 * XXXMAC: We're very much like to assert the SYSCTL_LOCK here,
2677d3fc69eeSRobert Watson 	 * but since it's not exported from kern_sysctl.c, we can't.
2678d3fc69eeSRobert Watson 	 */
26799e913ebdSRobert Watson 	if (!mac_enforce_system)
2680d3fc69eeSRobert Watson 		return (0);
2681d3fc69eeSRobert Watson 
2682d3fc69eeSRobert Watson 	MAC_CHECK(check_system_sysctl, cred, name, namelen, old, oldlenp,
2683d3fc69eeSRobert Watson 	    inkernel, new, newlen);
2684d3fc69eeSRobert Watson 
2685d3fc69eeSRobert Watson 	return (error);
2686d3fc69eeSRobert Watson }
2687d3fc69eeSRobert Watson 
2688d3fc69eeSRobert Watson int
268995fab37eSRobert Watson mac_ioctl_ifnet_get(struct ucred *cred, struct ifreq *ifr,
269095fab37eSRobert Watson     struct ifnet *ifnet)
269195fab37eSRobert Watson {
2692f7b951a8SRobert Watson 	char *elements, *buffer;
2693f7b951a8SRobert Watson 	struct mac mac;
269495fab37eSRobert Watson 	int error;
269595fab37eSRobert Watson 
2696f7b951a8SRobert Watson 	error = copyin(ifr->ifr_ifru.ifru_data, &mac, sizeof(mac));
269795fab37eSRobert Watson 	if (error)
269895fab37eSRobert Watson 		return (error);
269995fab37eSRobert Watson 
2700f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
2701f7b951a8SRobert Watson 	if (error)
2702f7b951a8SRobert Watson 		return (error);
2703f7b951a8SRobert Watson 
2704f7b951a8SRobert Watson 	elements = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
2705f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, elements, mac.m_buflen, NULL);
2706f7b951a8SRobert Watson 	if (error) {
2707f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
2708f7b951a8SRobert Watson 		return (error);
2709f7b951a8SRobert Watson 	}
2710f7b951a8SRobert Watson 
2711f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
2712f7b951a8SRobert Watson 	error = mac_externalize_ifnet_label(&ifnet->if_label, elements,
2713f7b951a8SRobert Watson 	    buffer, mac.m_buflen, M_WAITOK);
2714f7b951a8SRobert Watson 	if (error == 0)
2715f7b951a8SRobert Watson 		error = copyout(buffer, mac.m_string, strlen(buffer)+1);
2716f7b951a8SRobert Watson 
2717f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
2718f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
2719f7b951a8SRobert Watson 
2720f7b951a8SRobert Watson 	return (error);
272195fab37eSRobert Watson }
272295fab37eSRobert Watson 
272395fab37eSRobert Watson int
272495fab37eSRobert Watson mac_ioctl_ifnet_set(struct ucred *cred, struct ifreq *ifr,
272595fab37eSRobert Watson     struct ifnet *ifnet)
272695fab37eSRobert Watson {
272795fab37eSRobert Watson 	struct label intlabel;
2728f7b951a8SRobert Watson 	struct mac mac;
2729f7b951a8SRobert Watson 	char *buffer;
273095fab37eSRobert Watson 	int error;
273195fab37eSRobert Watson 
2732f7b951a8SRobert Watson 	error = copyin(ifr->ifr_ifru.ifru_data, &mac, sizeof(mac));
273395fab37eSRobert Watson 	if (error)
273495fab37eSRobert Watson 		return (error);
273595fab37eSRobert Watson 
2736f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
273795fab37eSRobert Watson 	if (error)
273895fab37eSRobert Watson 		return (error);
273995fab37eSRobert Watson 
2740f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
2741f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, buffer, mac.m_buflen, NULL);
2742f7b951a8SRobert Watson 	if (error) {
2743f7b951a8SRobert Watson 		free(buffer, M_MACTEMP);
2744f7b951a8SRobert Watson 		return (error);
2745f7b951a8SRobert Watson 	}
2746f7b951a8SRobert Watson 
2747f7b951a8SRobert Watson 	mac_init_ifnet_label(&intlabel);
2748f7b951a8SRobert Watson 	error = mac_internalize_ifnet_label(&intlabel, buffer);
2749f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
2750f7b951a8SRobert Watson 	if (error) {
2751f7b951a8SRobert Watson 		mac_destroy_ifnet_label(&intlabel);
2752f7b951a8SRobert Watson 		return (error);
2753f7b951a8SRobert Watson 	}
2754f7b951a8SRobert Watson 
275595fab37eSRobert Watson 	/*
275695fab37eSRobert Watson 	 * XXX: Note that this is a redundant privilege check, since
275795fab37eSRobert Watson 	 * policies impose this check themselves if required by the
275895fab37eSRobert Watson 	 * policy.  Eventually, this should go away.
275995fab37eSRobert Watson 	 */
276095fab37eSRobert Watson 	error = suser_cred(cred, 0);
2761f7b951a8SRobert Watson 	if (error) {
2762f7b951a8SRobert Watson 		mac_destroy_ifnet_label(&intlabel);
2763f7b951a8SRobert Watson 		return (error);
2764f7b951a8SRobert Watson 	}
276595fab37eSRobert Watson 
276695fab37eSRobert Watson 	MAC_CHECK(check_ifnet_relabel, cred, ifnet, &ifnet->if_label,
276795fab37eSRobert Watson 	    &intlabel);
2768f7b951a8SRobert Watson 	if (error) {
2769f7b951a8SRobert Watson 		mac_destroy_ifnet_label(&intlabel);
2770f7b951a8SRobert Watson 		return (error);
2771f7b951a8SRobert Watson 	}
277295fab37eSRobert Watson 
277395fab37eSRobert Watson 	MAC_PERFORM(relabel_ifnet, cred, ifnet, &ifnet->if_label, &intlabel);
277495fab37eSRobert Watson 
2775f7b951a8SRobert Watson 	mac_destroy_ifnet_label(&intlabel);
2776f7b951a8SRobert Watson 	return (0);
277795fab37eSRobert Watson }
277895fab37eSRobert Watson 
277995fab37eSRobert Watson void
278095fab37eSRobert Watson mac_create_devfs_device(dev_t dev, struct devfs_dirent *de)
278195fab37eSRobert Watson {
278295fab37eSRobert Watson 
278395fab37eSRobert Watson 	MAC_PERFORM(create_devfs_device, dev, de, &de->de_label);
278495fab37eSRobert Watson }
278595fab37eSRobert Watson 
278674e62b1bSRobert Watson void
278774e62b1bSRobert Watson mac_create_devfs_symlink(struct ucred *cred, struct devfs_dirent *dd,
278874e62b1bSRobert Watson     struct devfs_dirent *de)
278974e62b1bSRobert Watson {
279074e62b1bSRobert Watson 
279174e62b1bSRobert Watson 	MAC_PERFORM(create_devfs_symlink, cred, dd, &dd->de_label, de,
279274e62b1bSRobert Watson 	    &de->de_label);
279374e62b1bSRobert Watson }
279474e62b1bSRobert Watson 
279595fab37eSRobert Watson void
279695fab37eSRobert Watson mac_create_devfs_directory(char *dirname, int dirnamelen,
279795fab37eSRobert Watson     struct devfs_dirent *de)
279895fab37eSRobert Watson {
279995fab37eSRobert Watson 
280095fab37eSRobert Watson 	MAC_PERFORM(create_devfs_directory, dirname, dirnamelen, de,
280195fab37eSRobert Watson 	    &de->de_label);
280295fab37eSRobert Watson }
280395fab37eSRobert Watson 
280495fab37eSRobert Watson int
280595fab37eSRobert Watson mac_setsockopt_label_set(struct ucred *cred, struct socket *so,
2806f7b951a8SRobert Watson     struct mac *mac)
280795fab37eSRobert Watson {
280895fab37eSRobert Watson 	struct label intlabel;
2809f7b951a8SRobert Watson 	char *buffer;
281095fab37eSRobert Watson 	int error;
281195fab37eSRobert Watson 
2812f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(mac);
281395fab37eSRobert Watson 	if (error)
281495fab37eSRobert Watson 		return (error);
281595fab37eSRobert Watson 
2816f7b951a8SRobert Watson 	buffer = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK);
2817f7b951a8SRobert Watson 	error = copyinstr(mac->m_string, buffer, mac->m_buflen, NULL);
2818f7b951a8SRobert Watson 	if (error) {
2819f7b951a8SRobert Watson 		free(buffer, M_MACTEMP);
2820f7b951a8SRobert Watson 		return (error);
2821f7b951a8SRobert Watson 	}
2822f7b951a8SRobert Watson 
2823f7b951a8SRobert Watson 	mac_init_socket_label(&intlabel, M_WAITOK);
2824f7b951a8SRobert Watson 	error = mac_internalize_socket_label(&intlabel, buffer);
2825f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
2826f7b951a8SRobert Watson 	if (error) {
2827f7b951a8SRobert Watson 		mac_destroy_socket_label(&intlabel);
2828f7b951a8SRobert Watson 		return (error);
2829f7b951a8SRobert Watson 	}
2830f7b951a8SRobert Watson 
283195fab37eSRobert Watson 	mac_check_socket_relabel(cred, so, &intlabel);
283295fab37eSRobert Watson 	if (error) {
2833f7b951a8SRobert Watson 		mac_destroy_socket_label(&intlabel);
283495fab37eSRobert Watson 		return (error);
283595fab37eSRobert Watson 	}
283695fab37eSRobert Watson 
283795fab37eSRobert Watson 	mac_relabel_socket(cred, so, &intlabel);
283895fab37eSRobert Watson 
2839f7b951a8SRobert Watson 	mac_destroy_socket_label(&intlabel);
284095fab37eSRobert Watson 	return (0);
284195fab37eSRobert Watson }
284295fab37eSRobert Watson 
284395fab37eSRobert Watson int
284495fab37eSRobert Watson mac_pipe_label_set(struct ucred *cred, struct pipe *pipe, struct label *label)
284595fab37eSRobert Watson {
284695fab37eSRobert Watson 	int error;
284795fab37eSRobert Watson 
28481aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
28491aa37f53SRobert Watson 
285095fab37eSRobert Watson 	error = mac_check_pipe_relabel(cred, pipe, label);
285195fab37eSRobert Watson 	if (error)
285295fab37eSRobert Watson 		return (error);
285395fab37eSRobert Watson 
285495fab37eSRobert Watson 	mac_relabel_pipe(cred, pipe, label);
285595fab37eSRobert Watson 
285695fab37eSRobert Watson 	return (0);
285795fab37eSRobert Watson }
285895fab37eSRobert Watson 
285995fab37eSRobert Watson int
286095fab37eSRobert Watson mac_getsockopt_label_get(struct ucred *cred, struct socket *so,
2861f7b951a8SRobert Watson     struct mac *mac)
286295fab37eSRobert Watson {
2863f7b951a8SRobert Watson 	char *buffer, *elements;
2864f7b951a8SRobert Watson 	int error;
286595fab37eSRobert Watson 
2866f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(mac);
2867f7b951a8SRobert Watson 	if (error)
2868f7b951a8SRobert Watson 		return (error);
2869f7b951a8SRobert Watson 
2870f7b951a8SRobert Watson 	elements = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK);
2871f7b951a8SRobert Watson 	error = copyinstr(mac->m_string, elements, mac->m_buflen, NULL);
2872f7b951a8SRobert Watson 	if (error) {
2873f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
2874f7b951a8SRobert Watson 		return (error);
2875f7b951a8SRobert Watson 	}
2876f7b951a8SRobert Watson 
2877f7b951a8SRobert Watson 	buffer = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
2878f7b951a8SRobert Watson 	error = mac_externalize_socket_label(&so->so_label, elements,
2879f7b951a8SRobert Watson 	    buffer, mac->m_buflen, M_WAITOK);
2880f7b951a8SRobert Watson 	if (error == 0)
2881f7b951a8SRobert Watson 		error = copyout(buffer, mac->m_string, strlen(buffer)+1);
2882f7b951a8SRobert Watson 
2883f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
2884f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
2885f7b951a8SRobert Watson 
2886f7b951a8SRobert Watson 	return (error);
288795fab37eSRobert Watson }
288895fab37eSRobert Watson 
288995fab37eSRobert Watson int
289095fab37eSRobert Watson mac_getsockopt_peerlabel_get(struct ucred *cred, struct socket *so,
2891f7b951a8SRobert Watson     struct mac *mac)
289295fab37eSRobert Watson {
2893f7b951a8SRobert Watson 	char *elements, *buffer;
2894f7b951a8SRobert Watson 	int error;
289595fab37eSRobert Watson 
2896f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(mac);
2897f7b951a8SRobert Watson 	if (error)
2898f7b951a8SRobert Watson 		return (error);
2899f7b951a8SRobert Watson 
2900f7b951a8SRobert Watson 	elements = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK);
2901f7b951a8SRobert Watson 	error = copyinstr(mac->m_string, elements, mac->m_buflen, NULL);
2902f7b951a8SRobert Watson 	if (error) {
2903f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
2904f7b951a8SRobert Watson 		return (error);
2905f7b951a8SRobert Watson 	}
2906f7b951a8SRobert Watson 
2907f7b951a8SRobert Watson 	buffer = malloc(mac->m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
2908f7b951a8SRobert Watson 	error = mac_externalize_socket_peer_label(&so->so_peerlabel,
2909f7b951a8SRobert Watson 	    elements, buffer, mac->m_buflen, M_WAITOK);
2910f7b951a8SRobert Watson 	if (error == 0)
2911f7b951a8SRobert Watson 		error = copyout(buffer, mac->m_string, strlen(buffer)+1);
2912f7b951a8SRobert Watson 
2913f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
2914f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
2915f7b951a8SRobert Watson 
2916f7b951a8SRobert Watson 	return (error);
291795fab37eSRobert Watson }
291895fab37eSRobert Watson 
291995fab37eSRobert Watson /*
292095fab37eSRobert Watson  * Implementation of VOP_SETLABEL() that relies on extended attributes
292195fab37eSRobert Watson  * to store label data.  Can be referenced by filesystems supporting
292295fab37eSRobert Watson  * extended attributes.
292395fab37eSRobert Watson  */
292495fab37eSRobert Watson int
292595fab37eSRobert Watson vop_stdsetlabel_ea(struct vop_setlabel_args *ap)
292695fab37eSRobert Watson {
292795fab37eSRobert Watson 	struct vnode *vp = ap->a_vp;
292895fab37eSRobert Watson 	struct label *intlabel = ap->a_label;
292995fab37eSRobert Watson 	int error;
293095fab37eSRobert Watson 
293195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "vop_stdsetlabel_ea");
293295fab37eSRobert Watson 
2933763bbd2fSRobert Watson 	if ((vp->v_mount->mnt_flag & MNT_MULTILABEL) == 0)
2934763bbd2fSRobert Watson 		return (EOPNOTSUPP);
293595fab37eSRobert Watson 
2936763bbd2fSRobert Watson 	error = mac_setlabel_vnode_extattr(ap->a_cred, vp, intlabel);
293795fab37eSRobert Watson 	if (error)
293895fab37eSRobert Watson 		return (error);
293995fab37eSRobert Watson 
294095fab37eSRobert Watson 	mac_relabel_vnode(ap->a_cred, vp, intlabel);
294195fab37eSRobert Watson 
294295fab37eSRobert Watson 	return (0);
294395fab37eSRobert Watson }
294495fab37eSRobert Watson 
294595fab37eSRobert Watson static int
294695fab37eSRobert Watson vn_setlabel(struct vnode *vp, struct label *intlabel, struct ucred *cred)
294795fab37eSRobert Watson {
294895fab37eSRobert Watson 	int error;
294995fab37eSRobert Watson 
295095fab37eSRobert Watson 	if (vp->v_mount == NULL) {
295195fab37eSRobert Watson 		/* printf("vn_setlabel: null v_mount\n"); */
295206be2aaaSNate Lawson 		if (vp->v_type != VNON)
295306be2aaaSNate Lawson 			printf("vn_setlabel: null v_mount with non-VNON\n");
295495fab37eSRobert Watson 		return (EBADF);
295595fab37eSRobert Watson 	}
295695fab37eSRobert Watson 
295795fab37eSRobert Watson 	if ((vp->v_mount->mnt_flag & MNT_MULTILABEL) == 0)
295895fab37eSRobert Watson 		return (EOPNOTSUPP);
295995fab37eSRobert Watson 
296095fab37eSRobert Watson 	/*
296195fab37eSRobert Watson 	 * Multi-phase commit.  First check the policies to confirm the
296295fab37eSRobert Watson 	 * change is OK.  Then commit via the filesystem.  Finally,
296395fab37eSRobert Watson 	 * update the actual vnode label.  Question: maybe the filesystem
296495fab37eSRobert Watson 	 * should update the vnode at the end as part of VOP_SETLABEL()?
296595fab37eSRobert Watson 	 */
296695fab37eSRobert Watson 	error = mac_check_vnode_relabel(cred, vp, intlabel);
296795fab37eSRobert Watson 	if (error)
296895fab37eSRobert Watson 		return (error);
296995fab37eSRobert Watson 
297095fab37eSRobert Watson 	/*
297195fab37eSRobert Watson 	 * VADMIN provides the opportunity for the filesystem to make
297295fab37eSRobert Watson 	 * decisions about who is and is not able to modify labels
297395fab37eSRobert Watson 	 * and protections on files.  This might not be right.  We can't
297495fab37eSRobert Watson 	 * assume VOP_SETLABEL() will do it, because we might implement
297595fab37eSRobert Watson 	 * that as part of vop_stdsetlabel_ea().
297695fab37eSRobert Watson 	 */
297795fab37eSRobert Watson 	error = VOP_ACCESS(vp, VADMIN, cred, curthread);
297895fab37eSRobert Watson 	if (error)
297995fab37eSRobert Watson 		return (error);
298095fab37eSRobert Watson 
298195fab37eSRobert Watson 	error = VOP_SETLABEL(vp, intlabel, cred, curthread);
298295fab37eSRobert Watson 	if (error)
298395fab37eSRobert Watson 		return (error);
298495fab37eSRobert Watson 
298595fab37eSRobert Watson 	return (0);
298695fab37eSRobert Watson }
298795fab37eSRobert Watson 
2988f7b951a8SRobert Watson int
2989f7b951a8SRobert Watson __mac_get_pid(struct thread *td, struct __mac_get_pid_args *uap)
2990f7b951a8SRobert Watson {
2991f7b951a8SRobert Watson 	char *elements, *buffer;
2992f7b951a8SRobert Watson 	struct mac mac;
2993f7b951a8SRobert Watson 	struct proc *tproc;
2994f7b951a8SRobert Watson 	struct ucred *tcred;
2995f7b951a8SRobert Watson 	int error;
2996f7b951a8SRobert Watson 
2997f7b951a8SRobert Watson 	error = copyin(SCARG(uap, mac_p), &mac, sizeof(mac));
2998f7b951a8SRobert Watson 	if (error)
2999f7b951a8SRobert Watson 		return (error);
3000f7b951a8SRobert Watson 
3001f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3002f7b951a8SRobert Watson 	if (error)
3003f7b951a8SRobert Watson 		return (error);
3004f7b951a8SRobert Watson 
3005f7b951a8SRobert Watson 	tproc = pfind(uap->pid);
3006f7b951a8SRobert Watson 	if (tproc == NULL)
3007f7b951a8SRobert Watson 		return (ESRCH);
3008f7b951a8SRobert Watson 
3009f7b951a8SRobert Watson 	tcred = NULL;				/* Satisfy gcc. */
3010f7b951a8SRobert Watson 	error = p_cansee(td, tproc);
3011f7b951a8SRobert Watson 	if (error == 0)
3012f7b951a8SRobert Watson 		tcred = crhold(tproc->p_ucred);
3013f7b951a8SRobert Watson 	PROC_UNLOCK(tproc);
3014f7b951a8SRobert Watson 	if (error)
3015f7b951a8SRobert Watson 		return (error);
3016f7b951a8SRobert Watson 
3017f7b951a8SRobert Watson 	elements = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3018f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, elements, mac.m_buflen, NULL);
3019f7b951a8SRobert Watson 	if (error) {
3020f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
3021f7b951a8SRobert Watson 		crfree(tcred);
3022f7b951a8SRobert Watson 		return (error);
3023f7b951a8SRobert Watson 	}
3024f7b951a8SRobert Watson 
3025f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
3026f7b951a8SRobert Watson 	error = mac_externalize_cred_label(&tcred->cr_label, elements,
3027f7b951a8SRobert Watson 	    buffer, mac.m_buflen, M_WAITOK);
3028f7b951a8SRobert Watson 	if (error == 0)
3029f7b951a8SRobert Watson 		error = copyout(buffer, mac.m_string, strlen(buffer)+1);
3030f7b951a8SRobert Watson 
3031f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3032f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
3033f7b951a8SRobert Watson 	crfree(tcred);
3034f7b951a8SRobert Watson 	return (error);
3035f7b951a8SRobert Watson }
3036f7b951a8SRobert Watson 
303795fab37eSRobert Watson /*
303895fab37eSRobert Watson  * MPSAFE
303995fab37eSRobert Watson  */
304095fab37eSRobert Watson int
304195fab37eSRobert Watson __mac_get_proc(struct thread *td, struct __mac_get_proc_args *uap)
304295fab37eSRobert Watson {
3043f7b951a8SRobert Watson 	char *elements, *buffer;
3044f7b951a8SRobert Watson 	struct mac mac;
304595fab37eSRobert Watson 	int error;
304695fab37eSRobert Watson 
3047f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
3048f7b951a8SRobert Watson 	if (error)
3049f7b951a8SRobert Watson 		return (error);
305095fab37eSRobert Watson 
3051f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3052f7b951a8SRobert Watson 	if (error)
3053f7b951a8SRobert Watson 		return (error);
3054f7b951a8SRobert Watson 
3055f7b951a8SRobert Watson 	elements = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3056f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, elements, mac.m_buflen, NULL);
3057f7b951a8SRobert Watson 	if (error) {
3058f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
3059f7b951a8SRobert Watson 		return (error);
3060f7b951a8SRobert Watson 	}
3061f7b951a8SRobert Watson 
3062f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
3063f7b951a8SRobert Watson 	error = mac_externalize_cred_label(&td->td_ucred->cr_label,
3064f7b951a8SRobert Watson 	    elements, buffer, mac.m_buflen, M_WAITOK);
3065f7b951a8SRobert Watson 	if (error == 0)
3066f7b951a8SRobert Watson 		error = copyout(buffer, mac.m_string, strlen(buffer)+1);
3067f7b951a8SRobert Watson 
3068f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3069f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
307095fab37eSRobert Watson 	return (error);
307195fab37eSRobert Watson }
307295fab37eSRobert Watson 
307395fab37eSRobert Watson /*
307495fab37eSRobert Watson  * MPSAFE
307595fab37eSRobert Watson  */
307695fab37eSRobert Watson int
307795fab37eSRobert Watson __mac_set_proc(struct thread *td, struct __mac_set_proc_args *uap)
307895fab37eSRobert Watson {
307995fab37eSRobert Watson 	struct ucred *newcred, *oldcred;
308095fab37eSRobert Watson 	struct label intlabel;
3081f7b951a8SRobert Watson 	struct proc *p;
3082f7b951a8SRobert Watson 	struct mac mac;
3083f7b951a8SRobert Watson 	char *buffer;
308495fab37eSRobert Watson 	int error;
308595fab37eSRobert Watson 
3086f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
308795fab37eSRobert Watson 	if (error)
308895fab37eSRobert Watson 		return (error);
308995fab37eSRobert Watson 
3090f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
309195fab37eSRobert Watson 	if (error)
309295fab37eSRobert Watson 		return (error);
309395fab37eSRobert Watson 
3094f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3095f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, buffer, mac.m_buflen, NULL);
3096f7b951a8SRobert Watson 	if (error) {
3097f7b951a8SRobert Watson 		free(buffer, M_MACTEMP);
3098f7b951a8SRobert Watson 		return (error);
3099f7b951a8SRobert Watson 	}
3100f7b951a8SRobert Watson 
3101f7b951a8SRobert Watson 	mac_init_cred_label(&intlabel);
3102f7b951a8SRobert Watson 	error = mac_internalize_cred_label(&intlabel, buffer);
3103f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3104f7b951a8SRobert Watson 	if (error) {
3105f7b951a8SRobert Watson 		mac_destroy_cred_label(&intlabel);
3106f7b951a8SRobert Watson 		return (error);
3107f7b951a8SRobert Watson 	}
3108f7b951a8SRobert Watson 
310995fab37eSRobert Watson 	newcred = crget();
311095fab37eSRobert Watson 
311195fab37eSRobert Watson 	p = td->td_proc;
311295fab37eSRobert Watson 	PROC_LOCK(p);
311395fab37eSRobert Watson 	oldcred = p->p_ucred;
311495fab37eSRobert Watson 
311595fab37eSRobert Watson 	error = mac_check_cred_relabel(oldcred, &intlabel);
311695fab37eSRobert Watson 	if (error) {
311795fab37eSRobert Watson 		PROC_UNLOCK(p);
311895fab37eSRobert Watson 		crfree(newcred);
3119f7b951a8SRobert Watson 		goto out;
312095fab37eSRobert Watson 	}
312195fab37eSRobert Watson 
312295fab37eSRobert Watson 	setsugid(p);
312395fab37eSRobert Watson 	crcopy(newcred, oldcred);
312495fab37eSRobert Watson 	mac_relabel_cred(newcred, &intlabel);
312595fab37eSRobert Watson 	p->p_ucred = newcred;
3126e5cb5e37SRobert Watson 
3127e5cb5e37SRobert Watson 	/*
3128e5cb5e37SRobert Watson 	 * Grab additional reference for use while revoking mmaps, prior
3129e5cb5e37SRobert Watson 	 * to releasing the proc lock and sharing the cred.
3130e5cb5e37SRobert Watson 	 */
3131e5cb5e37SRobert Watson 	crhold(newcred);
313295fab37eSRobert Watson 	PROC_UNLOCK(p);
3133e5cb5e37SRobert Watson 
3134f7b951a8SRobert Watson 	if (mac_enforce_vm) {
313516140035SRobert Watson 		mtx_lock(&Giant);
3136e5cb5e37SRobert Watson 		mac_cred_mmapped_drop_perms(td, newcred);
313716140035SRobert Watson 		mtx_unlock(&Giant);
3138f7b951a8SRobert Watson 	}
3139e5cb5e37SRobert Watson 
3140e5cb5e37SRobert Watson 	crfree(newcred);	/* Free revocation reference. */
314195fab37eSRobert Watson 	crfree(oldcred);
3142f7b951a8SRobert Watson 
3143f7b951a8SRobert Watson out:
3144f7b951a8SRobert Watson 	mac_destroy_cred_label(&intlabel);
3145f7b951a8SRobert Watson 	return (error);
314695fab37eSRobert Watson }
314795fab37eSRobert Watson 
314895fab37eSRobert Watson /*
314995fab37eSRobert Watson  * MPSAFE
315095fab37eSRobert Watson  */
315195fab37eSRobert Watson int
315295fab37eSRobert Watson __mac_get_fd(struct thread *td, struct __mac_get_fd_args *uap)
315395fab37eSRobert Watson {
3154f7b951a8SRobert Watson 	char *elements, *buffer;
3155f7b951a8SRobert Watson 	struct label intlabel;
315695fab37eSRobert Watson 	struct file *fp;
3157f7b951a8SRobert Watson 	struct mac mac;
315895fab37eSRobert Watson 	struct vnode *vp;
315995fab37eSRobert Watson 	struct pipe *pipe;
3160f7b951a8SRobert Watson 	short label_type;
316195fab37eSRobert Watson 	int error;
316295fab37eSRobert Watson 
3163f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
3164f7b951a8SRobert Watson 	if (error)
3165f7b951a8SRobert Watson 		return (error);
316695fab37eSRobert Watson 
3167f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3168f7b951a8SRobert Watson 	if (error)
3169f7b951a8SRobert Watson 		return (error);
3170f7b951a8SRobert Watson 
3171f7b951a8SRobert Watson 	elements = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3172f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, elements, mac.m_buflen, NULL);
3173f7b951a8SRobert Watson 	if (error) {
3174f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
3175f7b951a8SRobert Watson 		return (error);
3176f7b951a8SRobert Watson 	}
3177f7b951a8SRobert Watson 
3178f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
3179f7b951a8SRobert Watson 	mtx_lock(&Giant);				/* VFS */
318095fab37eSRobert Watson 	error = fget(td, SCARG(uap, fd), &fp);
318195fab37eSRobert Watson 	if (error)
318295fab37eSRobert Watson 		goto out;
318395fab37eSRobert Watson 
3184f7b951a8SRobert Watson 	label_type = fp->f_type;
318595fab37eSRobert Watson 	switch (fp->f_type) {
318695fab37eSRobert Watson 	case DTYPE_FIFO:
318795fab37eSRobert Watson 	case DTYPE_VNODE:
318895fab37eSRobert Watson 		vp = (struct vnode *)fp->f_data;
318995fab37eSRobert Watson 
3190f7b951a8SRobert Watson 		mac_init_vnode_label(&intlabel);
3191f7b951a8SRobert Watson 
319295fab37eSRobert Watson 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3193f7b951a8SRobert Watson 		mac_copy_vnode_label(&vp->v_label, &intlabel);
319495fab37eSRobert Watson 		VOP_UNLOCK(vp, 0, td);
3195f7b951a8SRobert Watson 
319695fab37eSRobert Watson 		break;
319795fab37eSRobert Watson 	case DTYPE_PIPE:
319895fab37eSRobert Watson 		pipe = (struct pipe *)fp->f_data;
3199f7b951a8SRobert Watson 
3200f7b951a8SRobert Watson 		mac_init_pipe_label(&intlabel);
3201f7b951a8SRobert Watson 
3202f7b951a8SRobert Watson 		PIPE_LOCK(pipe);
3203f7b951a8SRobert Watson 		mac_copy_pipe_label(pipe->pipe_label, &intlabel);
3204f7b951a8SRobert Watson 		PIPE_UNLOCK(pipe);
320595fab37eSRobert Watson 		break;
320695fab37eSRobert Watson 	default:
320795fab37eSRobert Watson 		error = EINVAL;
3208f7b951a8SRobert Watson 		fdrop(fp, td);
3209f7b951a8SRobert Watson 		goto out;
3210f7b951a8SRobert Watson 	}
3211f7b951a8SRobert Watson 	fdrop(fp, td);
3212f7b951a8SRobert Watson 
3213f7b951a8SRobert Watson 	switch (label_type) {
3214f7b951a8SRobert Watson 	case DTYPE_FIFO:
3215f7b951a8SRobert Watson 	case DTYPE_VNODE:
3216f7b951a8SRobert Watson 		if (error == 0)
3217f7b951a8SRobert Watson 			error = mac_externalize_vnode_label(&intlabel,
3218f7b951a8SRobert Watson 			    elements, buffer, mac.m_buflen, M_WAITOK);
3219f7b951a8SRobert Watson 		mac_destroy_vnode_label(&intlabel);
3220f7b951a8SRobert Watson 		break;
3221f7b951a8SRobert Watson 	case DTYPE_PIPE:
3222f7b951a8SRobert Watson 		error = mac_externalize_pipe_label(&intlabel, elements,
3223f7b951a8SRobert Watson 		    buffer, mac.m_buflen, M_WAITOK);
3224f7b951a8SRobert Watson 		mac_destroy_pipe_label(&intlabel);
3225f7b951a8SRobert Watson 		break;
3226f7b951a8SRobert Watson 	default:
3227f7b951a8SRobert Watson 		panic("__mac_get_fd: corrupted label_type");
322895fab37eSRobert Watson 	}
322995fab37eSRobert Watson 
323095fab37eSRobert Watson 	if (error == 0)
3231f7b951a8SRobert Watson 		error = copyout(buffer, mac.m_string, strlen(buffer)+1);
323295fab37eSRobert Watson 
323395fab37eSRobert Watson out:
3234f7b951a8SRobert Watson 	mtx_unlock(&Giant);				/* VFS */
3235f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3236f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
3237f7b951a8SRobert Watson 
323895fab37eSRobert Watson 	return (error);
323995fab37eSRobert Watson }
324095fab37eSRobert Watson 
324195fab37eSRobert Watson /*
324295fab37eSRobert Watson  * MPSAFE
324395fab37eSRobert Watson  */
324495fab37eSRobert Watson int
324595fab37eSRobert Watson __mac_get_file(struct thread *td, struct __mac_get_file_args *uap)
324695fab37eSRobert Watson {
3247f7b951a8SRobert Watson 	char *elements, *buffer;
324895fab37eSRobert Watson 	struct nameidata nd;
3249f7b951a8SRobert Watson 	struct label intlabel;
3250f7b951a8SRobert Watson 	struct mac mac;
325195fab37eSRobert Watson 	int error;
325295fab37eSRobert Watson 
3253f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
3254f7b951a8SRobert Watson 	if (error)
3255f7b951a8SRobert Watson 		return (error);
3256f7b951a8SRobert Watson 
3257f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3258f7b951a8SRobert Watson 	if (error)
3259f7b951a8SRobert Watson 		return (error);
3260f7b951a8SRobert Watson 
3261f7b951a8SRobert Watson 	elements = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3262f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, elements, mac.m_buflen, NULL);
3263f7b951a8SRobert Watson 	if (error) {
3264f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
3265f7b951a8SRobert Watson 		return (error);
3266f7b951a8SRobert Watson 	}
3267f7b951a8SRobert Watson 
3268f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
3269f7b951a8SRobert Watson 	mtx_lock(&Giant);				/* VFS */
3270f7b951a8SRobert Watson 	NDINIT(&nd, LOOKUP, LOCKLEAF | FOLLOW, UIO_USERSPACE, uap->path_p,
3271f7b951a8SRobert Watson 	    td);
327295fab37eSRobert Watson 	error = namei(&nd);
327395fab37eSRobert Watson 	if (error)
327495fab37eSRobert Watson 		goto out;
327595fab37eSRobert Watson 
3276f7b951a8SRobert Watson 	mac_init_vnode_label(&intlabel);
3277f7b951a8SRobert Watson 	mac_copy_vnode_label(&nd.ni_vp->v_label, &intlabel);
3278763bbd2fSRobert Watson 	error = mac_externalize_vnode_label(&intlabel, elements, buffer,
3279763bbd2fSRobert Watson 	    mac.m_buflen, M_WAITOK);
3280f7b951a8SRobert Watson 
328195fab37eSRobert Watson 	NDFREE(&nd, 0);
3282f7b951a8SRobert Watson 	mac_destroy_vnode_label(&intlabel);
3283f7b951a8SRobert Watson 
3284f7b951a8SRobert Watson 	if (error == 0)
3285f7b951a8SRobert Watson 		error = copyout(buffer, mac.m_string, strlen(buffer)+1);
3286f7b951a8SRobert Watson 
3287f7b951a8SRobert Watson out:
3288f7b951a8SRobert Watson 	mtx_unlock(&Giant);				/* VFS */
3289f7b951a8SRobert Watson 
3290f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3291f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
3292f7b951a8SRobert Watson 
3293f7b951a8SRobert Watson 	return (error);
3294f7b951a8SRobert Watson }
3295f7b951a8SRobert Watson 
3296f7b951a8SRobert Watson /*
3297f7b951a8SRobert Watson  * MPSAFE
3298f7b951a8SRobert Watson  */
3299f7b951a8SRobert Watson int
3300f7b951a8SRobert Watson __mac_get_link(struct thread *td, struct __mac_get_link_args *uap)
3301f7b951a8SRobert Watson {
3302f7b951a8SRobert Watson 	char *elements, *buffer;
3303f7b951a8SRobert Watson 	struct nameidata nd;
3304f7b951a8SRobert Watson 	struct label intlabel;
3305f7b951a8SRobert Watson 	struct mac mac;
3306f7b951a8SRobert Watson 	int error;
3307f7b951a8SRobert Watson 
3308f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
3309f7b951a8SRobert Watson 	if (error)
3310f7b951a8SRobert Watson 		return (error);
3311f7b951a8SRobert Watson 
3312f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3313f7b951a8SRobert Watson 	if (error)
3314f7b951a8SRobert Watson 		return (error);
3315f7b951a8SRobert Watson 
3316f7b951a8SRobert Watson 	elements = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3317f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, elements, mac.m_buflen, NULL);
3318f7b951a8SRobert Watson 	if (error) {
3319f7b951a8SRobert Watson 		free(elements, M_MACTEMP);
3320f7b951a8SRobert Watson 		return (error);
3321f7b951a8SRobert Watson 	}
3322f7b951a8SRobert Watson 
3323f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK | M_ZERO);
3324f7b951a8SRobert Watson 	mtx_lock(&Giant);				/* VFS */
3325f7b951a8SRobert Watson 	NDINIT(&nd, LOOKUP, LOCKLEAF | NOFOLLOW, UIO_USERSPACE, uap->path_p,
3326f7b951a8SRobert Watson 	    td);
3327f7b951a8SRobert Watson 	error = namei(&nd);
332895fab37eSRobert Watson 	if (error)
332995fab37eSRobert Watson 		goto out;
333095fab37eSRobert Watson 
3331f7b951a8SRobert Watson 	mac_init_vnode_label(&intlabel);
3332f7b951a8SRobert Watson 	mac_copy_vnode_label(&nd.ni_vp->v_label, &intlabel);
3333763bbd2fSRobert Watson 	error = mac_externalize_vnode_label(&intlabel, elements, buffer,
3334763bbd2fSRobert Watson 	    mac.m_buflen, M_WAITOK);
3335f7b951a8SRobert Watson 	NDFREE(&nd, 0);
3336f7b951a8SRobert Watson 	mac_destroy_vnode_label(&intlabel);
3337f7b951a8SRobert Watson 
3338f7b951a8SRobert Watson 	if (error == 0)
3339f7b951a8SRobert Watson 		error = copyout(buffer, mac.m_string, strlen(buffer)+1);
334095fab37eSRobert Watson 
334195fab37eSRobert Watson out:
3342f7b951a8SRobert Watson 	mtx_unlock(&Giant);				/* VFS */
3343f7b951a8SRobert Watson 
3344f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3345f7b951a8SRobert Watson 	free(elements, M_MACTEMP);
3346f7b951a8SRobert Watson 
334795fab37eSRobert Watson 	return (error);
334895fab37eSRobert Watson }
334995fab37eSRobert Watson 
335095fab37eSRobert Watson /*
335195fab37eSRobert Watson  * MPSAFE
335295fab37eSRobert Watson  */
335395fab37eSRobert Watson int
335495fab37eSRobert Watson __mac_set_fd(struct thread *td, struct __mac_set_fd_args *uap)
335595fab37eSRobert Watson {
335695fab37eSRobert Watson 	struct label intlabel;
3357f7b951a8SRobert Watson 	struct pipe *pipe;
3358f7b951a8SRobert Watson 	struct file *fp;
335995fab37eSRobert Watson 	struct mount *mp;
336095fab37eSRobert Watson 	struct vnode *vp;
3361f7b951a8SRobert Watson 	struct mac mac;
3362f7b951a8SRobert Watson 	char *buffer;
336395fab37eSRobert Watson 	int error;
336495fab37eSRobert Watson 
3365f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
3366f7b951a8SRobert Watson 	if (error)
3367f7b951a8SRobert Watson 		return (error);
3368f7b951a8SRobert Watson 
3369f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3370f7b951a8SRobert Watson 	if (error)
3371f7b951a8SRobert Watson 		return (error);
3372f7b951a8SRobert Watson 
3373f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3374f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, buffer, mac.m_buflen, NULL);
3375f7b951a8SRobert Watson 	if (error) {
3376f7b951a8SRobert Watson 		free(buffer, M_MACTEMP);
3377f7b951a8SRobert Watson 		return (error);
3378f7b951a8SRobert Watson 	}
3379f7b951a8SRobert Watson 
3380f7b951a8SRobert Watson 	mtx_lock(&Giant);				/* VFS */
3381f7b951a8SRobert Watson 
338295fab37eSRobert Watson 	error = fget(td, SCARG(uap, fd), &fp);
338395fab37eSRobert Watson 	if (error)
3384f7b951a8SRobert Watson 		goto out;
338595fab37eSRobert Watson 
338695fab37eSRobert Watson 	switch (fp->f_type) {
338795fab37eSRobert Watson 	case DTYPE_FIFO:
338895fab37eSRobert Watson 	case DTYPE_VNODE:
3389f7b951a8SRobert Watson 		mac_init_vnode_label(&intlabel);
3390f7b951a8SRobert Watson 		error = mac_internalize_vnode_label(&intlabel, buffer);
3391f7b951a8SRobert Watson 		if (error) {
3392f7b951a8SRobert Watson 			mac_destroy_vnode_label(&intlabel);
3393f7b951a8SRobert Watson 			break;
3394f7b951a8SRobert Watson 		}
3395f7b951a8SRobert Watson 
339695fab37eSRobert Watson 		vp = (struct vnode *)fp->f_data;
339795fab37eSRobert Watson 		error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
3398f7b951a8SRobert Watson 		if (error != 0) {
3399f7b951a8SRobert Watson 			mac_destroy_vnode_label(&intlabel);
340095fab37eSRobert Watson 			break;
3401f7b951a8SRobert Watson 		}
340295fab37eSRobert Watson 
340395fab37eSRobert Watson 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
340495fab37eSRobert Watson 		error = vn_setlabel(vp, &intlabel, td->td_ucred);
340595fab37eSRobert Watson 		VOP_UNLOCK(vp, 0, td);
340695fab37eSRobert Watson 		vn_finished_write(mp);
3407f7b951a8SRobert Watson 
3408f7b951a8SRobert Watson 		mac_destroy_vnode_label(&intlabel);
340995fab37eSRobert Watson 		break;
3410f7b951a8SRobert Watson 
341195fab37eSRobert Watson 	case DTYPE_PIPE:
3412f7b951a8SRobert Watson 		mac_init_pipe_label(&intlabel);
3413f7b951a8SRobert Watson 		error = mac_internalize_pipe_label(&intlabel, buffer);
3414f7b951a8SRobert Watson 		if (error == 0) {
341595fab37eSRobert Watson 			pipe = (struct pipe *)fp->f_data;
34161aa37f53SRobert Watson 			PIPE_LOCK(pipe);
3417f7b951a8SRobert Watson 			error = mac_pipe_label_set(td->td_ucred, pipe,
3418f7b951a8SRobert Watson 			    &intlabel);
34191aa37f53SRobert Watson 			PIPE_UNLOCK(pipe);
3420f7b951a8SRobert Watson 		}
3421f7b951a8SRobert Watson 
3422f7b951a8SRobert Watson 		mac_destroy_pipe_label(&intlabel);
342395fab37eSRobert Watson 		break;
3424f7b951a8SRobert Watson 
342595fab37eSRobert Watson 	default:
342695fab37eSRobert Watson 		error = EINVAL;
342795fab37eSRobert Watson 	}
342895fab37eSRobert Watson 
342995fab37eSRobert Watson 	fdrop(fp, td);
3430f7b951a8SRobert Watson out:
3431f7b951a8SRobert Watson 	mtx_unlock(&Giant);				/* VFS */
3432f7b951a8SRobert Watson 
3433f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3434f7b951a8SRobert Watson 
343595fab37eSRobert Watson 	return (error);
343695fab37eSRobert Watson }
343795fab37eSRobert Watson 
343895fab37eSRobert Watson /*
343995fab37eSRobert Watson  * MPSAFE
344095fab37eSRobert Watson  */
344195fab37eSRobert Watson int
344295fab37eSRobert Watson __mac_set_file(struct thread *td, struct __mac_set_file_args *uap)
344395fab37eSRobert Watson {
344495fab37eSRobert Watson 	struct label intlabel;
3445f7b951a8SRobert Watson 	struct nameidata nd;
344695fab37eSRobert Watson 	struct mount *mp;
3447f7b951a8SRobert Watson 	struct mac mac;
3448f7b951a8SRobert Watson 	char *buffer;
344995fab37eSRobert Watson 	int error;
345095fab37eSRobert Watson 
3451f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
345295fab37eSRobert Watson 	if (error)
3453f7b951a8SRobert Watson 		return (error);
345495fab37eSRobert Watson 
3455f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
345695fab37eSRobert Watson 	if (error)
3457f7b951a8SRobert Watson 		return (error);
345895fab37eSRobert Watson 
3459f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3460f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, buffer, mac.m_buflen, NULL);
3461f7b951a8SRobert Watson 	if (error) {
3462f7b951a8SRobert Watson 		free(buffer, M_MACTEMP);
346395fab37eSRobert Watson 		return (error);
346495fab37eSRobert Watson 	}
346595fab37eSRobert Watson 
3466f7b951a8SRobert Watson 	mac_init_vnode_label(&intlabel);
3467f7b951a8SRobert Watson 	error = mac_internalize_vnode_label(&intlabel, buffer);
3468f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3469f7b951a8SRobert Watson 	if (error) {
3470f7b951a8SRobert Watson 		mac_destroy_vnode_label(&intlabel);
3471f7b951a8SRobert Watson 		return (error);
3472f7b951a8SRobert Watson 	}
3473f7b951a8SRobert Watson 
3474f7b951a8SRobert Watson 	mtx_lock(&Giant);				/* VFS */
3475f7b951a8SRobert Watson 
3476f7b951a8SRobert Watson 	NDINIT(&nd, LOOKUP, LOCKLEAF | FOLLOW, UIO_USERSPACE, uap->path_p,
3477f7b951a8SRobert Watson 	    td);
3478f7b951a8SRobert Watson 	error = namei(&nd);
3479f7b951a8SRobert Watson 	if (error == 0) {
3480f7b951a8SRobert Watson 		error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH);
3481f7b951a8SRobert Watson 		if (error == 0)
3482f7b951a8SRobert Watson 			error = vn_setlabel(nd.ni_vp, &intlabel,
3483f7b951a8SRobert Watson 			    td->td_ucred);
3484f7b951a8SRobert Watson 		vn_finished_write(mp);
3485f7b951a8SRobert Watson 	}
3486f7b951a8SRobert Watson 
3487f7b951a8SRobert Watson 	NDFREE(&nd, 0);
3488f7b951a8SRobert Watson 	mtx_unlock(&Giant);				/* VFS */
3489f7b951a8SRobert Watson 	mac_destroy_vnode_label(&intlabel);
3490f7b951a8SRobert Watson 
3491f7b951a8SRobert Watson 	return (error);
3492f7b951a8SRobert Watson }
3493f7b951a8SRobert Watson 
3494f7b951a8SRobert Watson /*
3495f7b951a8SRobert Watson  * MPSAFE
3496f7b951a8SRobert Watson  */
3497f7b951a8SRobert Watson int
3498f7b951a8SRobert Watson __mac_set_link(struct thread *td, struct __mac_set_link_args *uap)
3499f7b951a8SRobert Watson {
3500f7b951a8SRobert Watson 	struct label intlabel;
3501f7b951a8SRobert Watson 	struct nameidata nd;
3502f7b951a8SRobert Watson 	struct mount *mp;
3503f7b951a8SRobert Watson 	struct mac mac;
3504f7b951a8SRobert Watson 	char *buffer;
3505f7b951a8SRobert Watson 	int error;
3506f7b951a8SRobert Watson 
3507f7b951a8SRobert Watson 	error = copyin(uap->mac_p, &mac, sizeof(mac));
3508f7b951a8SRobert Watson 	if (error)
3509f7b951a8SRobert Watson 		return (error);
3510f7b951a8SRobert Watson 
3511f7b951a8SRobert Watson 	error = mac_check_structmac_consistent(&mac);
3512f7b951a8SRobert Watson 	if (error)
3513f7b951a8SRobert Watson 		return (error);
3514f7b951a8SRobert Watson 
3515f7b951a8SRobert Watson 	buffer = malloc(mac.m_buflen, M_MACTEMP, M_WAITOK);
3516f7b951a8SRobert Watson 	error = copyinstr(mac.m_string, buffer, mac.m_buflen, NULL);
3517f7b951a8SRobert Watson 	if (error) {
3518f7b951a8SRobert Watson 		free(buffer, M_MACTEMP);
3519f7b951a8SRobert Watson 		return (error);
3520f7b951a8SRobert Watson 	}
3521f7b951a8SRobert Watson 
3522f7b951a8SRobert Watson 	mac_init_vnode_label(&intlabel);
3523f7b951a8SRobert Watson 	error = mac_internalize_vnode_label(&intlabel, buffer);
3524f7b951a8SRobert Watson 	free(buffer, M_MACTEMP);
3525f7b951a8SRobert Watson 	if (error) {
3526f7b951a8SRobert Watson 		mac_destroy_vnode_label(&intlabel);
3527f7b951a8SRobert Watson 		return (error);
3528f7b951a8SRobert Watson 	}
3529f7b951a8SRobert Watson 
3530f7b951a8SRobert Watson 	mtx_lock(&Giant);				/* VFS */
3531f7b951a8SRobert Watson 
3532f7b951a8SRobert Watson 	NDINIT(&nd, LOOKUP, LOCKLEAF | NOFOLLOW, UIO_USERSPACE, uap->path_p,
3533f7b951a8SRobert Watson 	    td);
3534f7b951a8SRobert Watson 	error = namei(&nd);
3535f7b951a8SRobert Watson 	if (error == 0) {
3536f7b951a8SRobert Watson 		error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH);
3537f7b951a8SRobert Watson 		if (error == 0)
3538f7b951a8SRobert Watson 			error = vn_setlabel(nd.ni_vp, &intlabel,
3539f7b951a8SRobert Watson 			    td->td_ucred);
3540f7b951a8SRobert Watson 		vn_finished_write(mp);
3541f7b951a8SRobert Watson 	}
3542f7b951a8SRobert Watson 
3543f7b951a8SRobert Watson 	NDFREE(&nd, 0);
3544f7b951a8SRobert Watson 	mtx_unlock(&Giant);				/* VFS */
3545f7b951a8SRobert Watson 	mac_destroy_vnode_label(&intlabel);
3546f7b951a8SRobert Watson 
3547f7b951a8SRobert Watson 	return (error);
3548f7b951a8SRobert Watson }
3549f7b951a8SRobert Watson 
3550f7b951a8SRobert Watson /*
3551f7b951a8SRobert Watson  * MPSAFE
3552f7b951a8SRobert Watson  */
355327f2eac7SRobert Watson int
355427f2eac7SRobert Watson mac_syscall(struct thread *td, struct mac_syscall_args *uap)
355527f2eac7SRobert Watson {
355627f2eac7SRobert Watson 	struct mac_policy_conf *mpc;
355727f2eac7SRobert Watson 	char target[MAC_MAX_POLICY_NAME];
355827f2eac7SRobert Watson 	int error;
355927f2eac7SRobert Watson 
356027f2eac7SRobert Watson 	error = copyinstr(SCARG(uap, policy), target, sizeof(target), NULL);
356127f2eac7SRobert Watson 	if (error)
356227f2eac7SRobert Watson 		return (error);
356327f2eac7SRobert Watson 
356427f2eac7SRobert Watson 	error = ENOSYS;
356527f2eac7SRobert Watson 	MAC_POLICY_LIST_BUSY();
356627f2eac7SRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {
356727f2eac7SRobert Watson 		if (strcmp(mpc->mpc_name, target) == 0 &&
356827f2eac7SRobert Watson 		    mpc->mpc_ops->mpo_syscall != NULL) {
356927f2eac7SRobert Watson 			error = mpc->mpc_ops->mpo_syscall(td,
357027f2eac7SRobert Watson 			    SCARG(uap, call), SCARG(uap, arg));
357127f2eac7SRobert Watson 			goto out;
357227f2eac7SRobert Watson 		}
357327f2eac7SRobert Watson 	}
357427f2eac7SRobert Watson 
357527f2eac7SRobert Watson out:
357627f2eac7SRobert Watson 	MAC_POLICY_LIST_UNBUSY();
357727f2eac7SRobert Watson 	return (error);
357827f2eac7SRobert Watson }
357927f2eac7SRobert Watson 
358095fab37eSRobert Watson SYSINIT(mac, SI_SUB_MAC, SI_ORDER_FIRST, mac_init, NULL);
358195fab37eSRobert Watson SYSINIT(mac_late, SI_SUB_MAC_LATE, SI_ORDER_FIRST, mac_late_init, NULL);
358295fab37eSRobert Watson 
358395fab37eSRobert Watson #else /* !MAC */
35847bc82500SRobert Watson 
35857bc82500SRobert Watson int
3586f7b951a8SRobert Watson __mac_get_pid(struct thread *td, struct __mac_get_pid_args *uap)
3587f7b951a8SRobert Watson {
3588f7b951a8SRobert Watson 
3589f7b951a8SRobert Watson 	return (ENOSYS);
3590f7b951a8SRobert Watson }
3591f7b951a8SRobert Watson 
3592f7b951a8SRobert Watson int
35937bc82500SRobert Watson __mac_get_proc(struct thread *td, struct __mac_get_proc_args *uap)
35947bc82500SRobert Watson {
35957bc82500SRobert Watson 
35967bc82500SRobert Watson 	return (ENOSYS);
35977bc82500SRobert Watson }
35987bc82500SRobert Watson 
35997bc82500SRobert Watson int
36007bc82500SRobert Watson __mac_set_proc(struct thread *td, struct __mac_set_proc_args *uap)
36017bc82500SRobert Watson {
36027bc82500SRobert Watson 
36037bc82500SRobert Watson 	return (ENOSYS);
36047bc82500SRobert Watson }
36057bc82500SRobert Watson 
36067bc82500SRobert Watson int
36077bc82500SRobert Watson __mac_get_fd(struct thread *td, struct __mac_get_fd_args *uap)
36087bc82500SRobert Watson {
36097bc82500SRobert Watson 
36107bc82500SRobert Watson 	return (ENOSYS);
36117bc82500SRobert Watson }
36127bc82500SRobert Watson 
36137bc82500SRobert Watson int
36147bc82500SRobert Watson __mac_get_file(struct thread *td, struct __mac_get_file_args *uap)
36157bc82500SRobert Watson {
36167bc82500SRobert Watson 
36177bc82500SRobert Watson 	return (ENOSYS);
36187bc82500SRobert Watson }
36197bc82500SRobert Watson 
36207bc82500SRobert Watson int
3621f7b951a8SRobert Watson __mac_get_link(struct thread *td, struct __mac_get_link_args *uap)
3622f7b951a8SRobert Watson {
3623f7b951a8SRobert Watson 
3624f7b951a8SRobert Watson 	return (ENOSYS);
3625f7b951a8SRobert Watson }
3626f7b951a8SRobert Watson 
3627f7b951a8SRobert Watson int
36287bc82500SRobert Watson __mac_set_fd(struct thread *td, struct __mac_set_fd_args *uap)
36297bc82500SRobert Watson {
36307bc82500SRobert Watson 
36317bc82500SRobert Watson 	return (ENOSYS);
36327bc82500SRobert Watson }
36337bc82500SRobert Watson 
36347bc82500SRobert Watson int
36357bc82500SRobert Watson __mac_set_file(struct thread *td, struct __mac_set_file_args *uap)
36367bc82500SRobert Watson {
36377bc82500SRobert Watson 
36387bc82500SRobert Watson 	return (ENOSYS);
36397bc82500SRobert Watson }
364095fab37eSRobert Watson 
364127f2eac7SRobert Watson int
3642f7b951a8SRobert Watson __mac_set_link(struct thread *td, struct __mac_set_link_args *uap)
3643f7b951a8SRobert Watson {
3644f7b951a8SRobert Watson 
3645f7b951a8SRobert Watson 	return (ENOSYS);
3646f7b951a8SRobert Watson }
3647f7b951a8SRobert Watson 
3648f7b951a8SRobert Watson int
364927f2eac7SRobert Watson mac_syscall(struct thread *td, struct mac_syscall_args *uap)
365027f2eac7SRobert Watson {
365127f2eac7SRobert Watson 
365227f2eac7SRobert Watson 	return (ENOSYS);
365327f2eac7SRobert Watson }
365427f2eac7SRobert Watson 
3655f7b951a8SRobert Watson #endif
3656