145916cd2Sjpk /* 245916cd2Sjpk * CDDL HEADER START 345916cd2Sjpk * 445916cd2Sjpk * The contents of this file are subject to the terms of the 545916cd2Sjpk * Common Development and Distribution License (the "License"). 645916cd2Sjpk * You may not use this file except in compliance with the License. 745916cd2Sjpk * 845916cd2Sjpk * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 945916cd2Sjpk * or http://www.opensolaris.org/os/licensing. 1045916cd2Sjpk * See the License for the specific language governing permissions 1145916cd2Sjpk * and limitations under the License. 1245916cd2Sjpk * 1345916cd2Sjpk * When distributing Covered Code, include this CDDL HEADER in each 1445916cd2Sjpk * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 1545916cd2Sjpk * If applicable, add the following below this CDDL HEADER, with the 1645916cd2Sjpk * fields enclosed by brackets "[]" replaced with your own identifying 1745916cd2Sjpk * information: Portions Copyright [yyyy] [name of copyright owner] 1845916cd2Sjpk * 1945916cd2Sjpk * CDDL HEADER END 2045916cd2Sjpk */ 2145916cd2Sjpk /* 2245916cd2Sjpk * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 2345916cd2Sjpk * Use is subject to license terms. 2445916cd2Sjpk */ 2545916cd2Sjpk 2645916cd2Sjpk #pragma ident "%Z%%M% %I% %E% SMI" 2745916cd2Sjpk 2845916cd2Sjpk #include <sys/types.h> 2945916cd2Sjpk #include <sys/param.h> 3045916cd2Sjpk #include <sys/cmn_err.h> 3145916cd2Sjpk #include <sys/systm.h> 3245916cd2Sjpk #include <sys/cred.h> 3345916cd2Sjpk #include <sys/modctl.h> 3445916cd2Sjpk #include <sys/vfs.h> 3545916cd2Sjpk #include <sys/vnode.h> 3645916cd2Sjpk #include <sys/tiuser.h> 3745916cd2Sjpk #include <sys/kmem.h> 3845916cd2Sjpk #include <sys/pathname.h> 3945916cd2Sjpk #include <sys/zone.h> 4045916cd2Sjpk #include <sys/tsol/label.h> 4145916cd2Sjpk #include <sys/tsol/tnet.h> 4245916cd2Sjpk #include <sys/fs/lofs_node.h> 4345916cd2Sjpk #include <inet/ip6.h> 4445916cd2Sjpk #include <rpc/auth.h> 4545916cd2Sjpk #include <rpc/clnt.h> 4645916cd2Sjpk #include <nfs/nfs.h> 4745916cd2Sjpk #include <nfs/nfs4.h> 4845916cd2Sjpk #include <nfs/nfs_clnt.h> 4945916cd2Sjpk #include <sys/dnlc.h> 5045916cd2Sjpk 5145916cd2Sjpk 5245916cd2Sjpk int sys_labeling = -1; /* initially unset */ 5345916cd2Sjpk 5445916cd2Sjpk static kmem_cache_t *tslabel_cache; 5545916cd2Sjpk ts_label_t *l_admin_low; 5645916cd2Sjpk ts_label_t *l_admin_high; 5745916cd2Sjpk 5845916cd2Sjpk uint32_t default_doi = DEFAULT_DOI; 5945916cd2Sjpk 6045916cd2Sjpk /* 6145916cd2Sjpk * Initialize labels infrastructure. 6245916cd2Sjpk * This is called during startup() time (before vfs_mntroot) by thread_init(). 6345916cd2Sjpk * It has to be called early so that the is_system_labeled() function returns 6445916cd2Sjpk * the right value when called by the networking code on a diskless boot. 6545916cd2Sjpk */ 6645916cd2Sjpk void 6745916cd2Sjpk label_init(void) 6845916cd2Sjpk { 6945916cd2Sjpk bslabel_t label; 7045916cd2Sjpk 7145916cd2Sjpk /* 7245916cd2Sjpk * Use the value of "label_services" within the edition module. 7345916cd2Sjpk * If for some reason label_services is not found, this will 7445916cd2Sjpk * result in the appropriate default -- "off." 7545916cd2Sjpk */ 7645916cd2Sjpk if (modgetsymvalue("label_services", B_FALSE) != 0) 7745916cd2Sjpk sys_labeling = 1; 7845916cd2Sjpk else 7945916cd2Sjpk sys_labeling = 0; 8045916cd2Sjpk 8145916cd2Sjpk tslabel_cache = kmem_cache_create("tslabel_cache", sizeof (ts_label_t), 8245916cd2Sjpk 0, NULL, NULL, NULL, NULL, NULL, 0); 8345916cd2Sjpk bsllow(&label); 8445916cd2Sjpk l_admin_low = labelalloc(&label, default_doi, KM_SLEEP); 8545916cd2Sjpk bslhigh(&label); 8645916cd2Sjpk l_admin_high = labelalloc(&label, default_doi, KM_SLEEP); 8745916cd2Sjpk } 8845916cd2Sjpk 8945916cd2Sjpk /* 9045916cd2Sjpk * Allocate new ts_label_t. 9145916cd2Sjpk */ 9245916cd2Sjpk ts_label_t * 9345916cd2Sjpk labelalloc(const bslabel_t *val, uint32_t doi, int flag) 9445916cd2Sjpk { 9545916cd2Sjpk ts_label_t *lab = kmem_cache_alloc(tslabel_cache, flag); 9645916cd2Sjpk 9745916cd2Sjpk if (lab != NULL) { 9845916cd2Sjpk lab->tsl_ref = 1; 9945916cd2Sjpk lab->tsl_doi = doi; 10045916cd2Sjpk if (val == NULL) 10145916cd2Sjpk bzero(&lab->tsl_label, sizeof (bslabel_t)); 10245916cd2Sjpk else 10345916cd2Sjpk bcopy(val, &lab->tsl_label, sizeof (bslabel_t)); 10445916cd2Sjpk } 10545916cd2Sjpk return (lab); 10645916cd2Sjpk } 10745916cd2Sjpk 10845916cd2Sjpk /* 10945916cd2Sjpk * Put a hold on a label structure. 11045916cd2Sjpk */ 11145916cd2Sjpk void 11245916cd2Sjpk label_hold(ts_label_t *lab) 11345916cd2Sjpk { 11445916cd2Sjpk atomic_add_32(&lab->tsl_ref, 1); 11545916cd2Sjpk } 11645916cd2Sjpk 11745916cd2Sjpk /* 11845916cd2Sjpk * Release previous hold on a label structure. Free it if refcnt == 0. 11945916cd2Sjpk */ 12045916cd2Sjpk void 12145916cd2Sjpk label_rele(ts_label_t *lab) 12245916cd2Sjpk { 12345916cd2Sjpk if (atomic_add_32_nv(&lab->tsl_ref, -1) == 0) 12445916cd2Sjpk kmem_cache_free(tslabel_cache, lab); 12545916cd2Sjpk } 12645916cd2Sjpk 12745916cd2Sjpk bslabel_t * 12845916cd2Sjpk label2bslabel(ts_label_t *lab) 12945916cd2Sjpk { 13045916cd2Sjpk return (&lab->tsl_label); 13145916cd2Sjpk } 13245916cd2Sjpk 13345916cd2Sjpk 13445916cd2Sjpk uint32_t 13545916cd2Sjpk label2doi(ts_label_t *lab) 13645916cd2Sjpk { 13745916cd2Sjpk return (lab->tsl_doi); 13845916cd2Sjpk } 13945916cd2Sjpk 14045916cd2Sjpk /* 14145916cd2Sjpk * Compare labels. Return 1 if equal, 0 otherwise. 14245916cd2Sjpk */ 14345916cd2Sjpk boolean_t 14445916cd2Sjpk label_equal(const ts_label_t *l1, const ts_label_t *l2) 14545916cd2Sjpk { 14645916cd2Sjpk return ((l1->tsl_doi == l2->tsl_doi) && 14745916cd2Sjpk blequal(&l1->tsl_label, &l2->tsl_label)); 14845916cd2Sjpk } 14945916cd2Sjpk 15045916cd2Sjpk /* 15145916cd2Sjpk * There's no protocol today to obtain the label from the server. 15245916cd2Sjpk * So we rely on conventions: zones, zone names, and zone paths 15345916cd2Sjpk * must match across TX servers and their TX clients. Now use 15445916cd2Sjpk * the exported name to find the equivalent local zone and its 15545916cd2Sjpk * label. Caller is responsible for doing a label_rele of the 15645916cd2Sjpk * returned ts_label. 15745916cd2Sjpk */ 15845916cd2Sjpk ts_label_t * 15945916cd2Sjpk getflabel_cipso(vfs_t *vfsp) 16045916cd2Sjpk { 16145916cd2Sjpk zone_t *reszone; 16245916cd2Sjpk zone_t *new_reszone; 16345916cd2Sjpk char *nfspath, *respath; 16445916cd2Sjpk refstr_t *resource_ref; 16545916cd2Sjpk boolean_t treat_abs = B_FALSE; 16645916cd2Sjpk 16745916cd2Sjpk if (vfsp->vfs_resource == NULL) 16845916cd2Sjpk return (NULL); /* error */ 16945916cd2Sjpk resource_ref = vfs_getresource(vfsp); 17045916cd2Sjpk 17145916cd2Sjpk nfspath = (char *)refstr_value(resource_ref); 17245916cd2Sjpk respath = strchr(nfspath, ':'); /* skip server name */ 17345916cd2Sjpk if (respath) 17445916cd2Sjpk respath++; /* skip over ":" */ 17545916cd2Sjpk if (*respath != '/') { 17645916cd2Sjpk /* treat path as absolute but it doesn't have leading '/' */ 17745916cd2Sjpk treat_abs = B_TRUE; 17845916cd2Sjpk } 17945916cd2Sjpk 18045916cd2Sjpk reszone = zone_find_by_any_path(respath, treat_abs); 18145916cd2Sjpk if (reszone == global_zone) { 18245916cd2Sjpk refstr_rele(resource_ref); 18345916cd2Sjpk label_hold(l_admin_low); 18445916cd2Sjpk zone_rele(reszone); 18545916cd2Sjpk return (l_admin_low); 18645916cd2Sjpk } 18745916cd2Sjpk 18845916cd2Sjpk /* 18945916cd2Sjpk * Skip over zonepath (not including "root"), e.g. /zone/internal 19045916cd2Sjpk */ 19145916cd2Sjpk respath += reszone->zone_rootpathlen - 7; 19245916cd2Sjpk if (treat_abs) 19345916cd2Sjpk respath--; /* no leading '/' to skip */ 19445916cd2Sjpk if (strncmp(respath, "/root/", 6) == 0) { 19545916cd2Sjpk /* Check if we now have something like "/zone/public/" */ 19645916cd2Sjpk 19745916cd2Sjpk respath += 5; /* skip "/root" first */ 19845916cd2Sjpk new_reszone = zone_find_by_any_path(respath, B_FALSE); 19945916cd2Sjpk if (new_reszone != global_zone) { 20045916cd2Sjpk zone_rele(reszone); 20145916cd2Sjpk reszone = new_reszone; 20245916cd2Sjpk } else { 20345916cd2Sjpk zone_rele(new_reszone); 20445916cd2Sjpk } 20545916cd2Sjpk } 20645916cd2Sjpk 20745916cd2Sjpk refstr_rele(resource_ref); 20845916cd2Sjpk label_hold(reszone->zone_slabel); 20945916cd2Sjpk zone_rele(reszone); 21045916cd2Sjpk 21145916cd2Sjpk return (reszone->zone_slabel); 21245916cd2Sjpk } 21345916cd2Sjpk 21445916cd2Sjpk static ts_label_t * 21545916cd2Sjpk getflabel_nfs(vfs_t *vfsp) 21645916cd2Sjpk { 21745916cd2Sjpk bslabel_t *server_sl; 21845916cd2Sjpk ts_label_t *srv_label; 21945916cd2Sjpk tsol_tpc_t *tp; 22045916cd2Sjpk int addr_type; 22145916cd2Sjpk void *ipaddr; 22245916cd2Sjpk struct servinfo *svp; 22345916cd2Sjpk struct netbuf *addr; 22445916cd2Sjpk struct knetconfig *knconf; 22545916cd2Sjpk mntinfo_t *mi; 22645916cd2Sjpk 22745916cd2Sjpk mi = VFTOMI(vfsp); 22845916cd2Sjpk svp = mi->mi_curr_serv; 22945916cd2Sjpk addr = &svp->sv_addr; 23045916cd2Sjpk knconf = svp->sv_knconf; 23145916cd2Sjpk 23245916cd2Sjpk if (strcmp(knconf->knc_protofmly, NC_INET) == 0) { 23345916cd2Sjpk addr_type = IPV4_VERSION; 23445916cd2Sjpk /* LINTED: following cast to ipaddr is OK */ 23545916cd2Sjpk ipaddr = &((struct sockaddr_in *)addr->buf)->sin_addr; 23645916cd2Sjpk } else if (strcmp(knconf->knc_protofmly, NC_INET6) == 0) { 23745916cd2Sjpk addr_type = IPV6_VERSION; 23845916cd2Sjpk /* LINTED: following cast to ipaddr is OK */ 23945916cd2Sjpk ipaddr = &((struct sockaddr_in6 *)addr->buf)->sin6_addr; 24045916cd2Sjpk } else { 24145916cd2Sjpk goto errout; 24245916cd2Sjpk } 24345916cd2Sjpk 24445916cd2Sjpk tp = find_tpc(ipaddr, addr_type, B_FALSE); 24545916cd2Sjpk if (tp == NULL) 24645916cd2Sjpk goto errout; 24745916cd2Sjpk 24845916cd2Sjpk if (tp->tpc_tp.host_type == SUN_CIPSO) { 24945916cd2Sjpk TPC_RELE(tp); 25045916cd2Sjpk return (getflabel_cipso(vfsp)); 25145916cd2Sjpk } 25245916cd2Sjpk 25345916cd2Sjpk if (tp->tpc_tp.host_type != UNLABELED) 25445916cd2Sjpk goto errout; 25545916cd2Sjpk 25645916cd2Sjpk server_sl = &tp->tpc_tp.tp_def_label; 25745916cd2Sjpk srv_label = labelalloc(server_sl, default_doi, KM_SLEEP); 25845916cd2Sjpk 25945916cd2Sjpk TPC_RELE(tp); 26045916cd2Sjpk 26145916cd2Sjpk return (srv_label); 26245916cd2Sjpk 26345916cd2Sjpk errout: 26445916cd2Sjpk return (NULL); 26545916cd2Sjpk } 26645916cd2Sjpk 26745916cd2Sjpk /* 26845916cd2Sjpk * getflabel - 26945916cd2Sjpk * 27045916cd2Sjpk * Return pointer to the ts_label associated with the specified file, 27145916cd2Sjpk * or returns NULL if error occurs. Caller is responsible for doing 27245916cd2Sjpk * a label_rele of the ts_label. 27345916cd2Sjpk */ 27445916cd2Sjpk ts_label_t * 27545916cd2Sjpk getflabel(vnode_t *vp) 27645916cd2Sjpk { 277*6fc927dcSgfaden vfs_t *vfsp, *rvfsp; 27845916cd2Sjpk vnode_t *rvp, *rvp2; 27945916cd2Sjpk zone_t *zone; 28045916cd2Sjpk ts_label_t *zl; 28145916cd2Sjpk boolean_t vfs_is_held = B_FALSE; 28245916cd2Sjpk char vpath[MAXPATHLEN]; 28345916cd2Sjpk 28445916cd2Sjpk ASSERT(vp); 285*6fc927dcSgfaden vfsp = vp->v_vfsp; 28645916cd2Sjpk if (vfsp == NULL) 28745916cd2Sjpk return (NULL); 28845916cd2Sjpk 289*6fc927dcSgfaden rvp = vp; 29045916cd2Sjpk 29145916cd2Sjpk /* 292*6fc927dcSgfaden * Traverse lofs mounts and fattach'es to get the real vnode 29345916cd2Sjpk */ 294*6fc927dcSgfaden if (VOP_REALVP(rvp, &rvp2) == 0) 29545916cd2Sjpk rvp = rvp2; 29645916cd2Sjpk 297*6fc927dcSgfaden rvfsp = rvp->v_vfsp; 29845916cd2Sjpk 29945916cd2Sjpk /* rvp/rvfsp now represent the real vnode/vfs we will be using */ 30045916cd2Sjpk 30145916cd2Sjpk /* Go elsewhere to handle all nfs files. */ 30245916cd2Sjpk if (strncmp(vfssw[rvfsp->vfs_fstype].vsw_name, "nfs", 3) == 0) 30345916cd2Sjpk return (getflabel_nfs(rvfsp)); 30445916cd2Sjpk 30545916cd2Sjpk /* 30645916cd2Sjpk * Fast path, for objects in a labeled zone: everything except 30745916cd2Sjpk * for lofs/nfs will be just the label of that zone. 30845916cd2Sjpk */ 30945916cd2Sjpk if ((rvfsp->vfs_zone != NULL) && (rvfsp->vfs_zone != global_zone)) { 31045916cd2Sjpk if ((strcmp(vfssw[rvfsp->vfs_fstype].vsw_name, 31145916cd2Sjpk "lofs") != 0)) { 31245916cd2Sjpk zone = rvfsp->vfs_zone; 31345916cd2Sjpk zone_hold(zone); 31445916cd2Sjpk goto zone_out; /* return this label */ 31545916cd2Sjpk } 31645916cd2Sjpk } 31745916cd2Sjpk 318*6fc927dcSgfaden if (vnodetopath(rootdir, rvp, vpath, sizeof (vpath), kcred) != 0) { 319*6fc927dcSgfaden return (NULL); 32045916cd2Sjpk } 32145916cd2Sjpk 32245916cd2Sjpk /* 323*6fc927dcSgfaden * Sanity check - vpath may be weird for some cases, like devices. 32445916cd2Sjpk */ 325*6fc927dcSgfaden if (*vpath != '/') { 32645916cd2Sjpk zone = curproc->p_zone; 32745916cd2Sjpk zone_hold(zone); 32845916cd2Sjpk goto zone_out; 32945916cd2Sjpk } 33045916cd2Sjpk 33145916cd2Sjpk VFS_HOLD(vfsp); 33245916cd2Sjpk vfs_is_held = B_TRUE; 33345916cd2Sjpk 334*6fc927dcSgfaden zone = zone_find_by_any_path(vpath, B_FALSE); 33545916cd2Sjpk 33645916cd2Sjpk /* 337*6fc927dcSgfaden * If the vnode source zone is properly set to a non-global zone, or 33845916cd2Sjpk * any zone if the mount is R/W, then use the label of that zone. 33945916cd2Sjpk */ 34045916cd2Sjpk if ((zone != global_zone) || ((vfsp->vfs_flag & VFS_RDONLY) != 0)) 34145916cd2Sjpk goto zone_out; /* return this label */ 34245916cd2Sjpk 34345916cd2Sjpk /* 34445916cd2Sjpk * Otherwise, if we're not in the global zone, use the label of 34545916cd2Sjpk * our zone. 34645916cd2Sjpk */ 34745916cd2Sjpk if ((zone = curproc->p_zone) != global_zone) { 34845916cd2Sjpk zone_hold(zone); 34945916cd2Sjpk goto zone_out; /* return this label */ 35045916cd2Sjpk } 35145916cd2Sjpk 35245916cd2Sjpk /* 35345916cd2Sjpk * We're in the global zone and the mount is R/W ... so the file 35445916cd2Sjpk * may actually be in the global zone -- or in the root of any zone. 35545916cd2Sjpk * Always build our own path for the file, to be sure it's simplified 35645916cd2Sjpk * (i.e., no ".", "..", "//", and so on). 35745916cd2Sjpk */ 35845916cd2Sjpk 35945916cd2Sjpk zone_rele(zone); 36045916cd2Sjpk zone = zone_find_by_any_path(vpath, B_FALSE); 36145916cd2Sjpk 36245916cd2Sjpk zone_out: 36345916cd2Sjpk if ((curproc->p_zone == global_zone) && (zone == global_zone)) { 36445916cd2Sjpk vfs_t *nvfs; 36545916cd2Sjpk boolean_t exported = B_FALSE; 36645916cd2Sjpk refstr_t *mntpt_ref; 36745916cd2Sjpk char *mntpt; 36845916cd2Sjpk 36945916cd2Sjpk /* 37045916cd2Sjpk * File is in the global zone - check whether it's admin_high. 37145916cd2Sjpk * If it's in a filesys that was exported from the global zone, 37245916cd2Sjpk * it's admin_low by definition. Otherwise, if it's in a 37345916cd2Sjpk * filesys that's NOT exported to any zone, it's admin_high. 37445916cd2Sjpk * 37545916cd2Sjpk * And for these files if there wasn't a valid mount resource, 37645916cd2Sjpk * the file must be admin_high (not exported, probably a global 37745916cd2Sjpk * zone device). 37845916cd2Sjpk */ 37945916cd2Sjpk if (!vfs_is_held) 38045916cd2Sjpk goto out_high; 38145916cd2Sjpk 38245916cd2Sjpk mntpt_ref = vfs_getmntpoint(vfsp); 38345916cd2Sjpk mntpt = (char *)refstr_value(mntpt_ref); 38445916cd2Sjpk 38545916cd2Sjpk if ((mntpt != NULL) && (*mntpt == '/')) { 38645916cd2Sjpk zone_t *to_zone; 38745916cd2Sjpk 38845916cd2Sjpk to_zone = zone_find_by_any_path(mntpt, B_FALSE); 38945916cd2Sjpk zone_rele(to_zone); 39045916cd2Sjpk if (to_zone != global_zone) { 39145916cd2Sjpk /* force admin_low */ 39245916cd2Sjpk exported = B_TRUE; 39345916cd2Sjpk } 39445916cd2Sjpk } 39545916cd2Sjpk if (mntpt_ref) 39645916cd2Sjpk refstr_rele(mntpt_ref); 39745916cd2Sjpk 39845916cd2Sjpk if (!exported) { 39945916cd2Sjpk size_t plen = strlen(vpath); 40045916cd2Sjpk 40145916cd2Sjpk vfs_list_read_lock(); 40245916cd2Sjpk nvfs = vfsp->vfs_next; 40345916cd2Sjpk while (nvfs != vfsp) { 40445916cd2Sjpk const char *rstr; 40545916cd2Sjpk size_t rlen = 0; 40645916cd2Sjpk 40745916cd2Sjpk rstr = refstr_value(nvfs->vfs_resource); 40845916cd2Sjpk if (rstr != NULL) 40945916cd2Sjpk rlen = strlen(rstr); 41045916cd2Sjpk 41145916cd2Sjpk /* 41245916cd2Sjpk * Check for a match: does this vfs correspond 41345916cd2Sjpk * to our global zone file path? I.e., check 41445916cd2Sjpk * if the resource string of this vfs is a 41545916cd2Sjpk * prefix of our path. 41645916cd2Sjpk */ 41745916cd2Sjpk if ((rlen > 0) && (rlen <= plen) && 41845916cd2Sjpk (strncmp(rstr, vpath, rlen) == 0) && 41945916cd2Sjpk (vpath[rlen] == '/' || 42045916cd2Sjpk vpath[rlen] == '\0')) { 42145916cd2Sjpk /* force admin_low */ 42245916cd2Sjpk exported = B_TRUE; 42345916cd2Sjpk break; 42445916cd2Sjpk } 42545916cd2Sjpk nvfs = nvfs->vfs_next; 42645916cd2Sjpk } 42745916cd2Sjpk vfs_list_unlock(); 42845916cd2Sjpk } 42945916cd2Sjpk 43045916cd2Sjpk if (!exported) 43145916cd2Sjpk goto out_high; 43245916cd2Sjpk } 43345916cd2Sjpk 43445916cd2Sjpk if (vfs_is_held) 43545916cd2Sjpk VFS_RELE(vfsp); 43645916cd2Sjpk 43745916cd2Sjpk /* 43845916cd2Sjpk * Now that we have the "home" zone for the file, return the slabel 43945916cd2Sjpk * of that zone. 44045916cd2Sjpk */ 44145916cd2Sjpk zl = zone->zone_slabel; 44245916cd2Sjpk label_hold(zl); 44345916cd2Sjpk zone_rele(zone); 44445916cd2Sjpk return (zl); 44545916cd2Sjpk 44645916cd2Sjpk out_high: 44745916cd2Sjpk if (vfs_is_held) 44845916cd2Sjpk VFS_RELE(vfsp); 44945916cd2Sjpk 45045916cd2Sjpk label_hold(l_admin_high); 45145916cd2Sjpk zone_rele(zone); 45245916cd2Sjpk return (l_admin_high); 45345916cd2Sjpk } 45445916cd2Sjpk 45545916cd2Sjpk static int 45645916cd2Sjpk cgetlabel(bslabel_t *label_p, vnode_t *vp) 45745916cd2Sjpk { 45845916cd2Sjpk ts_label_t *tsl; 45945916cd2Sjpk int error = 0; 46045916cd2Sjpk 46145916cd2Sjpk if ((tsl = getflabel(vp)) == NULL) 46245916cd2Sjpk return (EIO); 46345916cd2Sjpk 46445916cd2Sjpk if (copyout((caddr_t)label2bslabel(tsl), (caddr_t)label_p, 46545916cd2Sjpk sizeof (*(label_p))) != 0) 46645916cd2Sjpk error = EFAULT; 46745916cd2Sjpk 46845916cd2Sjpk label_rele(tsl); 46945916cd2Sjpk return (error); 47045916cd2Sjpk } 47145916cd2Sjpk 47245916cd2Sjpk /* 47345916cd2Sjpk * fgetlabel(2TSOL) - get file label 47445916cd2Sjpk * getlabel(2TSOL) - get file label 47545916cd2Sjpk */ 47645916cd2Sjpk int 47745916cd2Sjpk getlabel(const char *path, bslabel_t *label_p) 47845916cd2Sjpk { 47945916cd2Sjpk struct vnode *vp; 48045916cd2Sjpk char *spath; 48145916cd2Sjpk int error; 48245916cd2Sjpk 48345916cd2Sjpk /* Sanity check arguments */ 48445916cd2Sjpk if (path == NULL) 48545916cd2Sjpk return (set_errno(EINVAL)); 48645916cd2Sjpk 48745916cd2Sjpk spath = kmem_zalloc(MAXPATHLEN, KM_SLEEP); 48845916cd2Sjpk if ((error = copyinstr(path, spath, MAXPATHLEN, NULL)) != 0) { 48945916cd2Sjpk kmem_free(spath, MAXPATHLEN); 49045916cd2Sjpk return (set_errno(error)); 49145916cd2Sjpk } 49245916cd2Sjpk 49345916cd2Sjpk if (error = lookupname(spath, UIO_SYSSPACE, FOLLOW, NULLVPP, &vp)) { 49445916cd2Sjpk kmem_free(spath, MAXPATHLEN); 49545916cd2Sjpk return (set_errno(error)); 49645916cd2Sjpk } 49745916cd2Sjpk kmem_free(spath, MAXPATHLEN); 49845916cd2Sjpk 49945916cd2Sjpk error = cgetlabel(label_p, vp); 50045916cd2Sjpk 50145916cd2Sjpk VN_RELE(vp); 50245916cd2Sjpk if (error != 0) 50345916cd2Sjpk return (set_errno(error)); 50445916cd2Sjpk else 50545916cd2Sjpk return (0); 50645916cd2Sjpk } 50745916cd2Sjpk 50845916cd2Sjpk int 50945916cd2Sjpk fgetlabel(int fd, bslabel_t *label_p) 51045916cd2Sjpk { 51145916cd2Sjpk file_t *fp; 51245916cd2Sjpk int error; 51345916cd2Sjpk 51445916cd2Sjpk if ((fp = getf(fd)) == NULL) 51545916cd2Sjpk return (set_errno(EBADF)); 51645916cd2Sjpk 51745916cd2Sjpk error = cgetlabel(label_p, fp->f_vnode); 51845916cd2Sjpk releasef(fd); 51945916cd2Sjpk 52045916cd2Sjpk if (error != 0) 52145916cd2Sjpk return (set_errno(error)); 52245916cd2Sjpk else 52345916cd2Sjpk return (0); 52445916cd2Sjpk } 52545916cd2Sjpk 52645916cd2Sjpk /* 52745916cd2Sjpk * Used by NFSv4 to query label of a pathname 52845916cd2Sjpk * component during lookup/access ops. 52945916cd2Sjpk */ 53045916cd2Sjpk ts_label_t * 53145916cd2Sjpk nfs4_getflabel(vnode_t *vp) 53245916cd2Sjpk { 53345916cd2Sjpk zone_t *zone; 53445916cd2Sjpk ts_label_t *zone_label; 53545916cd2Sjpk char path[MAXNAMELEN]; 53645916cd2Sjpk vnode_t *pvp, *tvp; 53745916cd2Sjpk 53845916cd2Sjpk mutex_enter(&vp->v_lock); 53945916cd2Sjpk /* 54045916cd2Sjpk * mount traverse has been done by caller 54145916cd2Sjpk * before calling this routine. 54245916cd2Sjpk */ 54345916cd2Sjpk ASSERT(!vn_ismntpt(vp)); 54445916cd2Sjpk if (vp->v_path != NULL) { 54545916cd2Sjpk zone = zone_find_by_any_path(vp->v_path, B_FALSE); 54645916cd2Sjpk mutex_exit(&vp->v_lock); 54745916cd2Sjpk } else { 54845916cd2Sjpk /* 54945916cd2Sjpk * v_path not cached. Since we rely on path 55045916cd2Sjpk * of an obj to get its label, we need to get 55145916cd2Sjpk * path corresponding to the parent vnode. 55245916cd2Sjpk */ 55345916cd2Sjpk tvp = vp; 55445916cd2Sjpk do { 55545916cd2Sjpk mutex_exit(&tvp->v_lock); 55645916cd2Sjpk if ((pvp = dnlc_reverse_lookup(tvp, path, 55745916cd2Sjpk sizeof (path))) == NULL) 55845916cd2Sjpk return (NULL); 55945916cd2Sjpk mutex_enter(&pvp->v_lock); 56045916cd2Sjpk tvp = pvp; 56145916cd2Sjpk } while (pvp->v_path == NULL); 56245916cd2Sjpk zone = zone_find_by_any_path(pvp->v_path, B_FALSE); 56345916cd2Sjpk mutex_exit(&pvp->v_lock); 56445916cd2Sjpk } 56545916cd2Sjpk /* 56645916cd2Sjpk * Caller has verified that the file is either 56745916cd2Sjpk * exported or visible. So if the path falls in 56845916cd2Sjpk * global zone, admin_low is returned; otherwise 56945916cd2Sjpk * the zone's label is returned. 57045916cd2Sjpk */ 57145916cd2Sjpk zone_label = zone->zone_slabel; 57245916cd2Sjpk label_hold(zone_label); 57345916cd2Sjpk zone_rele(zone); 57445916cd2Sjpk return (zone_label); 57545916cd2Sjpk } 576