145916cd2Sjpk /* 245916cd2Sjpk * CDDL HEADER START 345916cd2Sjpk * 445916cd2Sjpk * The contents of this file are subject to the terms of the 545916cd2Sjpk * Common Development and Distribution License (the "License"). 645916cd2Sjpk * You may not use this file except in compliance with the License. 745916cd2Sjpk * 845916cd2Sjpk * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 945916cd2Sjpk * or http://www.opensolaris.org/os/licensing. 1045916cd2Sjpk * See the License for the specific language governing permissions 1145916cd2Sjpk * and limitations under the License. 1245916cd2Sjpk * 1345916cd2Sjpk * When distributing Covered Code, include this CDDL HEADER in each 1445916cd2Sjpk * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 1545916cd2Sjpk * If applicable, add the following below this CDDL HEADER, with the 1645916cd2Sjpk * fields enclosed by brackets "[]" replaced with your own identifying 1745916cd2Sjpk * information: Portions Copyright [yyyy] [name of copyright owner] 1845916cd2Sjpk * 1945916cd2Sjpk * CDDL HEADER END 2045916cd2Sjpk */ 2145916cd2Sjpk /* 2245916cd2Sjpk * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 2345916cd2Sjpk * Use is subject to license terms. 2445916cd2Sjpk */ 2545916cd2Sjpk 2645916cd2Sjpk #pragma ident "%Z%%M% %I% %E% SMI" 2745916cd2Sjpk 2845916cd2Sjpk #include <sys/types.h> 2945916cd2Sjpk #include <sys/param.h> 3045916cd2Sjpk #include <sys/cmn_err.h> 3145916cd2Sjpk #include <sys/systm.h> 3245916cd2Sjpk #include <sys/cred.h> 3345916cd2Sjpk #include <sys/modctl.h> 3445916cd2Sjpk #include <sys/vfs.h> 3545916cd2Sjpk #include <sys/vnode.h> 3645916cd2Sjpk #include <sys/tiuser.h> 3745916cd2Sjpk #include <sys/kmem.h> 3845916cd2Sjpk #include <sys/pathname.h> 3945916cd2Sjpk #include <sys/zone.h> 4045916cd2Sjpk #include <sys/tsol/label.h> 4145916cd2Sjpk #include <sys/tsol/tnet.h> 4245916cd2Sjpk #include <sys/fs/lofs_node.h> 4345916cd2Sjpk #include <inet/ip6.h> 4445916cd2Sjpk #include <rpc/auth.h> 4545916cd2Sjpk #include <rpc/clnt.h> 4645916cd2Sjpk #include <nfs/nfs.h> 4745916cd2Sjpk #include <nfs/nfs4.h> 4845916cd2Sjpk #include <nfs/nfs_clnt.h> 4945916cd2Sjpk #include <sys/dnlc.h> 5045916cd2Sjpk 5145916cd2Sjpk 5245916cd2Sjpk int sys_labeling = -1; /* initially unset */ 5345916cd2Sjpk 5445916cd2Sjpk static kmem_cache_t *tslabel_cache; 5545916cd2Sjpk ts_label_t *l_admin_low; 5645916cd2Sjpk ts_label_t *l_admin_high; 5745916cd2Sjpk 5845916cd2Sjpk uint32_t default_doi = DEFAULT_DOI; 5945916cd2Sjpk 6045916cd2Sjpk /* 6145916cd2Sjpk * Initialize labels infrastructure. 6245916cd2Sjpk * This is called during startup() time (before vfs_mntroot) by thread_init(). 6345916cd2Sjpk * It has to be called early so that the is_system_labeled() function returns 6445916cd2Sjpk * the right value when called by the networking code on a diskless boot. 6545916cd2Sjpk */ 6645916cd2Sjpk void 6745916cd2Sjpk label_init(void) 6845916cd2Sjpk { 6945916cd2Sjpk bslabel_t label; 7045916cd2Sjpk 7145916cd2Sjpk /* 7245916cd2Sjpk * Use the value of "label_services" within the edition module. 7345916cd2Sjpk * If for some reason label_services is not found, this will 7445916cd2Sjpk * result in the appropriate default -- "off." 7545916cd2Sjpk */ 7645916cd2Sjpk if (modgetsymvalue("label_services", B_FALSE) != 0) 7745916cd2Sjpk sys_labeling = 1; 7845916cd2Sjpk else 7945916cd2Sjpk sys_labeling = 0; 8045916cd2Sjpk 8145916cd2Sjpk tslabel_cache = kmem_cache_create("tslabel_cache", sizeof (ts_label_t), 8245916cd2Sjpk 0, NULL, NULL, NULL, NULL, NULL, 0); 8345916cd2Sjpk bsllow(&label); 8445916cd2Sjpk l_admin_low = labelalloc(&label, default_doi, KM_SLEEP); 8545916cd2Sjpk bslhigh(&label); 8645916cd2Sjpk l_admin_high = labelalloc(&label, default_doi, KM_SLEEP); 8745916cd2Sjpk } 8845916cd2Sjpk 8945916cd2Sjpk /* 9045916cd2Sjpk * Allocate new ts_label_t. 9145916cd2Sjpk */ 9245916cd2Sjpk ts_label_t * 9345916cd2Sjpk labelalloc(const bslabel_t *val, uint32_t doi, int flag) 9445916cd2Sjpk { 9545916cd2Sjpk ts_label_t *lab = kmem_cache_alloc(tslabel_cache, flag); 9645916cd2Sjpk 9745916cd2Sjpk if (lab != NULL) { 9845916cd2Sjpk lab->tsl_ref = 1; 9945916cd2Sjpk lab->tsl_doi = doi; 10045916cd2Sjpk if (val == NULL) 10145916cd2Sjpk bzero(&lab->tsl_label, sizeof (bslabel_t)); 10245916cd2Sjpk else 10345916cd2Sjpk bcopy(val, &lab->tsl_label, sizeof (bslabel_t)); 10445916cd2Sjpk } 10545916cd2Sjpk return (lab); 10645916cd2Sjpk } 10745916cd2Sjpk 10845916cd2Sjpk /* 10945916cd2Sjpk * Put a hold on a label structure. 11045916cd2Sjpk */ 11145916cd2Sjpk void 11245916cd2Sjpk label_hold(ts_label_t *lab) 11345916cd2Sjpk { 11445916cd2Sjpk atomic_add_32(&lab->tsl_ref, 1); 11545916cd2Sjpk } 11645916cd2Sjpk 11745916cd2Sjpk /* 11845916cd2Sjpk * Release previous hold on a label structure. Free it if refcnt == 0. 11945916cd2Sjpk */ 12045916cd2Sjpk void 12145916cd2Sjpk label_rele(ts_label_t *lab) 12245916cd2Sjpk { 12345916cd2Sjpk if (atomic_add_32_nv(&lab->tsl_ref, -1) == 0) 12445916cd2Sjpk kmem_cache_free(tslabel_cache, lab); 12545916cd2Sjpk } 12645916cd2Sjpk 12745916cd2Sjpk bslabel_t * 12845916cd2Sjpk label2bslabel(ts_label_t *lab) 12945916cd2Sjpk { 13045916cd2Sjpk return (&lab->tsl_label); 13145916cd2Sjpk } 13245916cd2Sjpk 13345916cd2Sjpk 13445916cd2Sjpk uint32_t 13545916cd2Sjpk label2doi(ts_label_t *lab) 13645916cd2Sjpk { 13745916cd2Sjpk return (lab->tsl_doi); 13845916cd2Sjpk } 13945916cd2Sjpk 14045916cd2Sjpk /* 14145916cd2Sjpk * Compare labels. Return 1 if equal, 0 otherwise. 14245916cd2Sjpk */ 14345916cd2Sjpk boolean_t 14445916cd2Sjpk label_equal(const ts_label_t *l1, const ts_label_t *l2) 14545916cd2Sjpk { 14645916cd2Sjpk return ((l1->tsl_doi == l2->tsl_doi) && 14745916cd2Sjpk blequal(&l1->tsl_label, &l2->tsl_label)); 14845916cd2Sjpk } 14945916cd2Sjpk 15045916cd2Sjpk /* 15145916cd2Sjpk * There's no protocol today to obtain the label from the server. 15245916cd2Sjpk * So we rely on conventions: zones, zone names, and zone paths 15345916cd2Sjpk * must match across TX servers and their TX clients. Now use 15445916cd2Sjpk * the exported name to find the equivalent local zone and its 15545916cd2Sjpk * label. Caller is responsible for doing a label_rele of the 15645916cd2Sjpk * returned ts_label. 15745916cd2Sjpk */ 15845916cd2Sjpk ts_label_t * 15945916cd2Sjpk getflabel_cipso(vfs_t *vfsp) 16045916cd2Sjpk { 16145916cd2Sjpk zone_t *reszone; 16245916cd2Sjpk zone_t *new_reszone; 16345916cd2Sjpk char *nfspath, *respath; 16445916cd2Sjpk refstr_t *resource_ref; 16545916cd2Sjpk boolean_t treat_abs = B_FALSE; 16645916cd2Sjpk 16745916cd2Sjpk if (vfsp->vfs_resource == NULL) 16845916cd2Sjpk return (NULL); /* error */ 16945916cd2Sjpk resource_ref = vfs_getresource(vfsp); 17045916cd2Sjpk 17145916cd2Sjpk nfspath = (char *)refstr_value(resource_ref); 17245916cd2Sjpk respath = strchr(nfspath, ':'); /* skip server name */ 17345916cd2Sjpk if (respath) 17445916cd2Sjpk respath++; /* skip over ":" */ 17545916cd2Sjpk if (*respath != '/') { 17645916cd2Sjpk /* treat path as absolute but it doesn't have leading '/' */ 17745916cd2Sjpk treat_abs = B_TRUE; 17845916cd2Sjpk } 17945916cd2Sjpk 18045916cd2Sjpk reszone = zone_find_by_any_path(respath, treat_abs); 18145916cd2Sjpk if (reszone == global_zone) { 18245916cd2Sjpk refstr_rele(resource_ref); 18345916cd2Sjpk label_hold(l_admin_low); 18445916cd2Sjpk zone_rele(reszone); 18545916cd2Sjpk return (l_admin_low); 18645916cd2Sjpk } 18745916cd2Sjpk 18845916cd2Sjpk /* 18945916cd2Sjpk * Skip over zonepath (not including "root"), e.g. /zone/internal 19045916cd2Sjpk */ 19145916cd2Sjpk respath += reszone->zone_rootpathlen - 7; 19245916cd2Sjpk if (treat_abs) 19345916cd2Sjpk respath--; /* no leading '/' to skip */ 19445916cd2Sjpk if (strncmp(respath, "/root/", 6) == 0) { 19545916cd2Sjpk /* Check if we now have something like "/zone/public/" */ 19645916cd2Sjpk 19745916cd2Sjpk respath += 5; /* skip "/root" first */ 19845916cd2Sjpk new_reszone = zone_find_by_any_path(respath, B_FALSE); 19945916cd2Sjpk if (new_reszone != global_zone) { 20045916cd2Sjpk zone_rele(reszone); 20145916cd2Sjpk reszone = new_reszone; 20245916cd2Sjpk } else { 20345916cd2Sjpk zone_rele(new_reszone); 20445916cd2Sjpk } 20545916cd2Sjpk } 20645916cd2Sjpk 20745916cd2Sjpk refstr_rele(resource_ref); 20845916cd2Sjpk label_hold(reszone->zone_slabel); 20945916cd2Sjpk zone_rele(reszone); 21045916cd2Sjpk 21145916cd2Sjpk return (reszone->zone_slabel); 21245916cd2Sjpk } 21345916cd2Sjpk 21445916cd2Sjpk static ts_label_t * 21545916cd2Sjpk getflabel_nfs(vfs_t *vfsp) 21645916cd2Sjpk { 21745916cd2Sjpk bslabel_t *server_sl; 21845916cd2Sjpk ts_label_t *srv_label; 21945916cd2Sjpk tsol_tpc_t *tp; 22045916cd2Sjpk int addr_type; 22145916cd2Sjpk void *ipaddr; 22245916cd2Sjpk struct servinfo *svp; 22345916cd2Sjpk struct netbuf *addr; 22445916cd2Sjpk struct knetconfig *knconf; 22545916cd2Sjpk mntinfo_t *mi; 22645916cd2Sjpk 22745916cd2Sjpk mi = VFTOMI(vfsp); 22845916cd2Sjpk svp = mi->mi_curr_serv; 22945916cd2Sjpk addr = &svp->sv_addr; 23045916cd2Sjpk knconf = svp->sv_knconf; 23145916cd2Sjpk 23245916cd2Sjpk if (strcmp(knconf->knc_protofmly, NC_INET) == 0) { 23345916cd2Sjpk addr_type = IPV4_VERSION; 23445916cd2Sjpk /* LINTED: following cast to ipaddr is OK */ 23545916cd2Sjpk ipaddr = &((struct sockaddr_in *)addr->buf)->sin_addr; 23645916cd2Sjpk } else if (strcmp(knconf->knc_protofmly, NC_INET6) == 0) { 23745916cd2Sjpk addr_type = IPV6_VERSION; 23845916cd2Sjpk /* LINTED: following cast to ipaddr is OK */ 23945916cd2Sjpk ipaddr = &((struct sockaddr_in6 *)addr->buf)->sin6_addr; 24045916cd2Sjpk } else { 24145916cd2Sjpk goto errout; 24245916cd2Sjpk } 24345916cd2Sjpk 24445916cd2Sjpk tp = find_tpc(ipaddr, addr_type, B_FALSE); 24545916cd2Sjpk if (tp == NULL) 24645916cd2Sjpk goto errout; 24745916cd2Sjpk 24845916cd2Sjpk if (tp->tpc_tp.host_type == SUN_CIPSO) { 24945916cd2Sjpk TPC_RELE(tp); 25045916cd2Sjpk return (getflabel_cipso(vfsp)); 25145916cd2Sjpk } 25245916cd2Sjpk 25345916cd2Sjpk if (tp->tpc_tp.host_type != UNLABELED) 25445916cd2Sjpk goto errout; 25545916cd2Sjpk 25645916cd2Sjpk server_sl = &tp->tpc_tp.tp_def_label; 25745916cd2Sjpk srv_label = labelalloc(server_sl, default_doi, KM_SLEEP); 25845916cd2Sjpk 25945916cd2Sjpk TPC_RELE(tp); 26045916cd2Sjpk 26145916cd2Sjpk return (srv_label); 26245916cd2Sjpk 26345916cd2Sjpk errout: 26445916cd2Sjpk return (NULL); 26545916cd2Sjpk } 26645916cd2Sjpk 26745916cd2Sjpk /* 26845916cd2Sjpk * getflabel - 26945916cd2Sjpk * 27045916cd2Sjpk * Return pointer to the ts_label associated with the specified file, 27145916cd2Sjpk * or returns NULL if error occurs. Caller is responsible for doing 27245916cd2Sjpk * a label_rele of the ts_label. 27345916cd2Sjpk */ 27445916cd2Sjpk ts_label_t * 27545916cd2Sjpk getflabel(vnode_t *vp) 27645916cd2Sjpk { 2776fc927dcSgfaden vfs_t *vfsp, *rvfsp; 27845916cd2Sjpk vnode_t *rvp, *rvp2; 27945916cd2Sjpk zone_t *zone; 28045916cd2Sjpk ts_label_t *zl; 28145916cd2Sjpk boolean_t vfs_is_held = B_FALSE; 28245916cd2Sjpk char vpath[MAXPATHLEN]; 28345916cd2Sjpk 28445916cd2Sjpk ASSERT(vp); 2856fc927dcSgfaden vfsp = vp->v_vfsp; 28645916cd2Sjpk if (vfsp == NULL) 28745916cd2Sjpk return (NULL); 28845916cd2Sjpk 2896fc927dcSgfaden rvp = vp; 29045916cd2Sjpk 29145916cd2Sjpk /* 2926fc927dcSgfaden * Traverse lofs mounts and fattach'es to get the real vnode 29345916cd2Sjpk */ 2946fc927dcSgfaden if (VOP_REALVP(rvp, &rvp2) == 0) 29545916cd2Sjpk rvp = rvp2; 29645916cd2Sjpk 2976fc927dcSgfaden rvfsp = rvp->v_vfsp; 29845916cd2Sjpk 29945916cd2Sjpk /* rvp/rvfsp now represent the real vnode/vfs we will be using */ 30045916cd2Sjpk 30145916cd2Sjpk /* Go elsewhere to handle all nfs files. */ 30245916cd2Sjpk if (strncmp(vfssw[rvfsp->vfs_fstype].vsw_name, "nfs", 3) == 0) 30345916cd2Sjpk return (getflabel_nfs(rvfsp)); 30445916cd2Sjpk 30545916cd2Sjpk /* 30645916cd2Sjpk * Fast path, for objects in a labeled zone: everything except 30745916cd2Sjpk * for lofs/nfs will be just the label of that zone. 30845916cd2Sjpk */ 30945916cd2Sjpk if ((rvfsp->vfs_zone != NULL) && (rvfsp->vfs_zone != global_zone)) { 31045916cd2Sjpk if ((strcmp(vfssw[rvfsp->vfs_fstype].vsw_name, 31145916cd2Sjpk "lofs") != 0)) { 31245916cd2Sjpk zone = rvfsp->vfs_zone; 31345916cd2Sjpk zone_hold(zone); 31445916cd2Sjpk goto zone_out; /* return this label */ 31545916cd2Sjpk } 31645916cd2Sjpk } 31745916cd2Sjpk 3186fc927dcSgfaden if (vnodetopath(rootdir, rvp, vpath, sizeof (vpath), kcred) != 0) { 3196fc927dcSgfaden return (NULL); 32045916cd2Sjpk } 32145916cd2Sjpk 32245916cd2Sjpk /* 3236fc927dcSgfaden * Sanity check - vpath may be weird for some cases, like devices. 32445916cd2Sjpk */ 3256fc927dcSgfaden if (*vpath != '/') { 32645916cd2Sjpk zone = curproc->p_zone; 32745916cd2Sjpk zone_hold(zone); 32845916cd2Sjpk goto zone_out; 32945916cd2Sjpk } 33045916cd2Sjpk 331*afed4af4Srica /* 332*afed4af4Srica * If a mountpoint exists, hold the vfs while we reference it. 333*afed4af4Srica * Otherwise if mountpoint is NULL it should not be held (e.g., 334*afed4af4Srica * a hold/release on spec_vfs would result in an attempted free 335*afed4af4Srica * and panic.) 336*afed4af4Srica */ 337*afed4af4Srica if (vfsp->vfs_mntpt != NULL) { 33845916cd2Sjpk VFS_HOLD(vfsp); 33945916cd2Sjpk vfs_is_held = B_TRUE; 340*afed4af4Srica } 34145916cd2Sjpk 3426fc927dcSgfaden zone = zone_find_by_any_path(vpath, B_FALSE); 34345916cd2Sjpk 34445916cd2Sjpk /* 3456fc927dcSgfaden * If the vnode source zone is properly set to a non-global zone, or 34645916cd2Sjpk * any zone if the mount is R/W, then use the label of that zone. 34745916cd2Sjpk */ 34845916cd2Sjpk if ((zone != global_zone) || ((vfsp->vfs_flag & VFS_RDONLY) != 0)) 34945916cd2Sjpk goto zone_out; /* return this label */ 35045916cd2Sjpk 35145916cd2Sjpk /* 35245916cd2Sjpk * Otherwise, if we're not in the global zone, use the label of 35345916cd2Sjpk * our zone. 35445916cd2Sjpk */ 35545916cd2Sjpk if ((zone = curproc->p_zone) != global_zone) { 35645916cd2Sjpk zone_hold(zone); 35745916cd2Sjpk goto zone_out; /* return this label */ 35845916cd2Sjpk } 35945916cd2Sjpk 36045916cd2Sjpk /* 36145916cd2Sjpk * We're in the global zone and the mount is R/W ... so the file 36245916cd2Sjpk * may actually be in the global zone -- or in the root of any zone. 36345916cd2Sjpk * Always build our own path for the file, to be sure it's simplified 36445916cd2Sjpk * (i.e., no ".", "..", "//", and so on). 36545916cd2Sjpk */ 36645916cd2Sjpk 36745916cd2Sjpk zone_rele(zone); 36845916cd2Sjpk zone = zone_find_by_any_path(vpath, B_FALSE); 36945916cd2Sjpk 37045916cd2Sjpk zone_out: 37145916cd2Sjpk if ((curproc->p_zone == global_zone) && (zone == global_zone)) { 37245916cd2Sjpk vfs_t *nvfs; 37345916cd2Sjpk boolean_t exported = B_FALSE; 37445916cd2Sjpk refstr_t *mntpt_ref; 37545916cd2Sjpk char *mntpt; 37645916cd2Sjpk 37745916cd2Sjpk /* 37845916cd2Sjpk * File is in the global zone - check whether it's admin_high. 37945916cd2Sjpk * If it's in a filesys that was exported from the global zone, 38045916cd2Sjpk * it's admin_low by definition. Otherwise, if it's in a 38145916cd2Sjpk * filesys that's NOT exported to any zone, it's admin_high. 38245916cd2Sjpk * 38345916cd2Sjpk * And for these files if there wasn't a valid mount resource, 38445916cd2Sjpk * the file must be admin_high (not exported, probably a global 38545916cd2Sjpk * zone device). 38645916cd2Sjpk */ 38745916cd2Sjpk if (!vfs_is_held) 38845916cd2Sjpk goto out_high; 38945916cd2Sjpk 39045916cd2Sjpk mntpt_ref = vfs_getmntpoint(vfsp); 39145916cd2Sjpk mntpt = (char *)refstr_value(mntpt_ref); 39245916cd2Sjpk 39345916cd2Sjpk if ((mntpt != NULL) && (*mntpt == '/')) { 39445916cd2Sjpk zone_t *to_zone; 39545916cd2Sjpk 39645916cd2Sjpk to_zone = zone_find_by_any_path(mntpt, B_FALSE); 39745916cd2Sjpk zone_rele(to_zone); 39845916cd2Sjpk if (to_zone != global_zone) { 39945916cd2Sjpk /* force admin_low */ 40045916cd2Sjpk exported = B_TRUE; 40145916cd2Sjpk } 40245916cd2Sjpk } 40345916cd2Sjpk if (mntpt_ref) 40445916cd2Sjpk refstr_rele(mntpt_ref); 40545916cd2Sjpk 40645916cd2Sjpk if (!exported) { 40745916cd2Sjpk size_t plen = strlen(vpath); 40845916cd2Sjpk 40945916cd2Sjpk vfs_list_read_lock(); 41045916cd2Sjpk nvfs = vfsp->vfs_next; 41145916cd2Sjpk while (nvfs != vfsp) { 41245916cd2Sjpk const char *rstr; 41345916cd2Sjpk size_t rlen = 0; 41445916cd2Sjpk 41545916cd2Sjpk rstr = refstr_value(nvfs->vfs_resource); 41645916cd2Sjpk if (rstr != NULL) 41745916cd2Sjpk rlen = strlen(rstr); 41845916cd2Sjpk 41945916cd2Sjpk /* 42045916cd2Sjpk * Check for a match: does this vfs correspond 42145916cd2Sjpk * to our global zone file path? I.e., check 42245916cd2Sjpk * if the resource string of this vfs is a 42345916cd2Sjpk * prefix of our path. 42445916cd2Sjpk */ 42545916cd2Sjpk if ((rlen > 0) && (rlen <= plen) && 42645916cd2Sjpk (strncmp(rstr, vpath, rlen) == 0) && 42745916cd2Sjpk (vpath[rlen] == '/' || 42845916cd2Sjpk vpath[rlen] == '\0')) { 42945916cd2Sjpk /* force admin_low */ 43045916cd2Sjpk exported = B_TRUE; 43145916cd2Sjpk break; 43245916cd2Sjpk } 43345916cd2Sjpk nvfs = nvfs->vfs_next; 43445916cd2Sjpk } 43545916cd2Sjpk vfs_list_unlock(); 43645916cd2Sjpk } 43745916cd2Sjpk 43845916cd2Sjpk if (!exported) 43945916cd2Sjpk goto out_high; 44045916cd2Sjpk } 44145916cd2Sjpk 44245916cd2Sjpk if (vfs_is_held) 44345916cd2Sjpk VFS_RELE(vfsp); 44445916cd2Sjpk 44545916cd2Sjpk /* 44645916cd2Sjpk * Now that we have the "home" zone for the file, return the slabel 44745916cd2Sjpk * of that zone. 44845916cd2Sjpk */ 44945916cd2Sjpk zl = zone->zone_slabel; 45045916cd2Sjpk label_hold(zl); 45145916cd2Sjpk zone_rele(zone); 45245916cd2Sjpk return (zl); 45345916cd2Sjpk 45445916cd2Sjpk out_high: 45545916cd2Sjpk if (vfs_is_held) 45645916cd2Sjpk VFS_RELE(vfsp); 45745916cd2Sjpk 45845916cd2Sjpk label_hold(l_admin_high); 45945916cd2Sjpk zone_rele(zone); 46045916cd2Sjpk return (l_admin_high); 46145916cd2Sjpk } 46245916cd2Sjpk 46345916cd2Sjpk static int 46445916cd2Sjpk cgetlabel(bslabel_t *label_p, vnode_t *vp) 46545916cd2Sjpk { 46645916cd2Sjpk ts_label_t *tsl; 46745916cd2Sjpk int error = 0; 46845916cd2Sjpk 46945916cd2Sjpk if ((tsl = getflabel(vp)) == NULL) 47045916cd2Sjpk return (EIO); 47145916cd2Sjpk 47245916cd2Sjpk if (copyout((caddr_t)label2bslabel(tsl), (caddr_t)label_p, 47345916cd2Sjpk sizeof (*(label_p))) != 0) 47445916cd2Sjpk error = EFAULT; 47545916cd2Sjpk 47645916cd2Sjpk label_rele(tsl); 47745916cd2Sjpk return (error); 47845916cd2Sjpk } 47945916cd2Sjpk 48045916cd2Sjpk /* 48145916cd2Sjpk * fgetlabel(2TSOL) - get file label 48245916cd2Sjpk * getlabel(2TSOL) - get file label 48345916cd2Sjpk */ 48445916cd2Sjpk int 48545916cd2Sjpk getlabel(const char *path, bslabel_t *label_p) 48645916cd2Sjpk { 48745916cd2Sjpk struct vnode *vp; 48845916cd2Sjpk char *spath; 48945916cd2Sjpk int error; 49045916cd2Sjpk 49145916cd2Sjpk /* Sanity check arguments */ 49245916cd2Sjpk if (path == NULL) 49345916cd2Sjpk return (set_errno(EINVAL)); 49445916cd2Sjpk 49545916cd2Sjpk spath = kmem_zalloc(MAXPATHLEN, KM_SLEEP); 49645916cd2Sjpk if ((error = copyinstr(path, spath, MAXPATHLEN, NULL)) != 0) { 49745916cd2Sjpk kmem_free(spath, MAXPATHLEN); 49845916cd2Sjpk return (set_errno(error)); 49945916cd2Sjpk } 50045916cd2Sjpk 50145916cd2Sjpk if (error = lookupname(spath, UIO_SYSSPACE, FOLLOW, NULLVPP, &vp)) { 50245916cd2Sjpk kmem_free(spath, MAXPATHLEN); 50345916cd2Sjpk return (set_errno(error)); 50445916cd2Sjpk } 50545916cd2Sjpk kmem_free(spath, MAXPATHLEN); 50645916cd2Sjpk 50745916cd2Sjpk error = cgetlabel(label_p, vp); 50845916cd2Sjpk 50945916cd2Sjpk VN_RELE(vp); 51045916cd2Sjpk if (error != 0) 51145916cd2Sjpk return (set_errno(error)); 51245916cd2Sjpk else 51345916cd2Sjpk return (0); 51445916cd2Sjpk } 51545916cd2Sjpk 51645916cd2Sjpk int 51745916cd2Sjpk fgetlabel(int fd, bslabel_t *label_p) 51845916cd2Sjpk { 51945916cd2Sjpk file_t *fp; 52045916cd2Sjpk int error; 52145916cd2Sjpk 52245916cd2Sjpk if ((fp = getf(fd)) == NULL) 52345916cd2Sjpk return (set_errno(EBADF)); 52445916cd2Sjpk 52545916cd2Sjpk error = cgetlabel(label_p, fp->f_vnode); 52645916cd2Sjpk releasef(fd); 52745916cd2Sjpk 52845916cd2Sjpk if (error != 0) 52945916cd2Sjpk return (set_errno(error)); 53045916cd2Sjpk else 53145916cd2Sjpk return (0); 53245916cd2Sjpk } 53345916cd2Sjpk 53445916cd2Sjpk /* 53545916cd2Sjpk * Used by NFSv4 to query label of a pathname 53645916cd2Sjpk * component during lookup/access ops. 53745916cd2Sjpk */ 53845916cd2Sjpk ts_label_t * 53945916cd2Sjpk nfs4_getflabel(vnode_t *vp) 54045916cd2Sjpk { 54145916cd2Sjpk zone_t *zone; 54245916cd2Sjpk ts_label_t *zone_label; 54345916cd2Sjpk char path[MAXNAMELEN]; 54445916cd2Sjpk vnode_t *pvp, *tvp; 54545916cd2Sjpk 54645916cd2Sjpk mutex_enter(&vp->v_lock); 54745916cd2Sjpk /* 54845916cd2Sjpk * mount traverse has been done by caller 54945916cd2Sjpk * before calling this routine. 55045916cd2Sjpk */ 55145916cd2Sjpk ASSERT(!vn_ismntpt(vp)); 55245916cd2Sjpk if (vp->v_path != NULL) { 55345916cd2Sjpk zone = zone_find_by_any_path(vp->v_path, B_FALSE); 55445916cd2Sjpk mutex_exit(&vp->v_lock); 55545916cd2Sjpk } else { 55645916cd2Sjpk /* 55745916cd2Sjpk * v_path not cached. Since we rely on path 55845916cd2Sjpk * of an obj to get its label, we need to get 55945916cd2Sjpk * path corresponding to the parent vnode. 56045916cd2Sjpk */ 56145916cd2Sjpk tvp = vp; 56245916cd2Sjpk do { 56345916cd2Sjpk mutex_exit(&tvp->v_lock); 56445916cd2Sjpk if ((pvp = dnlc_reverse_lookup(tvp, path, 56545916cd2Sjpk sizeof (path))) == NULL) 56645916cd2Sjpk return (NULL); 56745916cd2Sjpk mutex_enter(&pvp->v_lock); 56845916cd2Sjpk tvp = pvp; 56945916cd2Sjpk } while (pvp->v_path == NULL); 57045916cd2Sjpk zone = zone_find_by_any_path(pvp->v_path, B_FALSE); 57145916cd2Sjpk mutex_exit(&pvp->v_lock); 57245916cd2Sjpk } 57345916cd2Sjpk /* 57445916cd2Sjpk * Caller has verified that the file is either 57545916cd2Sjpk * exported or visible. So if the path falls in 57645916cd2Sjpk * global zone, admin_low is returned; otherwise 57745916cd2Sjpk * the zone's label is returned. 57845916cd2Sjpk */ 57945916cd2Sjpk zone_label = zone->zone_slabel; 58045916cd2Sjpk label_hold(zone_label); 58145916cd2Sjpk zone_rele(zone); 58245916cd2Sjpk return (zone_label); 58345916cd2Sjpk } 584