145916cd2Sjpk /* 245916cd2Sjpk * CDDL HEADER START 345916cd2Sjpk * 445916cd2Sjpk * The contents of this file are subject to the terms of the 545916cd2Sjpk * Common Development and Distribution License (the "License"). 645916cd2Sjpk * You may not use this file except in compliance with the License. 745916cd2Sjpk * 845916cd2Sjpk * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 945916cd2Sjpk * or http://www.opensolaris.org/os/licensing. 1045916cd2Sjpk * See the License for the specific language governing permissions 1145916cd2Sjpk * and limitations under the License. 1245916cd2Sjpk * 1345916cd2Sjpk * When distributing Covered Code, include this CDDL HEADER in each 1445916cd2Sjpk * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 1545916cd2Sjpk * If applicable, add the following below this CDDL HEADER, with the 1645916cd2Sjpk * fields enclosed by brackets "[]" replaced with your own identifying 1745916cd2Sjpk * information: Portions Copyright [yyyy] [name of copyright owner] 1845916cd2Sjpk * 1945916cd2Sjpk * CDDL HEADER END 2045916cd2Sjpk */ 2145916cd2Sjpk /* 22e071b5fbSkp158701 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 2345916cd2Sjpk * Use is subject to license terms. 2445916cd2Sjpk */ 2545916cd2Sjpk 2645916cd2Sjpk #pragma ident "%Z%%M% %I% %E% SMI" 2745916cd2Sjpk 2845916cd2Sjpk #include <sys/types.h> 2945916cd2Sjpk #include <sys/param.h> 3045916cd2Sjpk #include <sys/cmn_err.h> 3145916cd2Sjpk #include <sys/systm.h> 3245916cd2Sjpk #include <sys/cred.h> 3345916cd2Sjpk #include <sys/modctl.h> 3445916cd2Sjpk #include <sys/vfs.h> 3545916cd2Sjpk #include <sys/vnode.h> 3645916cd2Sjpk #include <sys/tiuser.h> 3745916cd2Sjpk #include <sys/kmem.h> 3845916cd2Sjpk #include <sys/pathname.h> 3945916cd2Sjpk #include <sys/zone.h> 4045916cd2Sjpk #include <sys/tsol/label.h> 4145916cd2Sjpk #include <sys/tsol/tnet.h> 4245916cd2Sjpk #include <sys/fs/lofs_node.h> 4345916cd2Sjpk #include <inet/ip6.h> 4445916cd2Sjpk #include <rpc/auth.h> 4545916cd2Sjpk #include <rpc/clnt.h> 4645916cd2Sjpk #include <nfs/nfs.h> 4745916cd2Sjpk #include <nfs/nfs4.h> 4845916cd2Sjpk #include <nfs/nfs_clnt.h> 4945916cd2Sjpk #include <sys/dnlc.h> 5045916cd2Sjpk 5145916cd2Sjpk 52*f875b4ebSrica int sys_labeling = 0; /* the default is "off" */ 5345916cd2Sjpk 5445916cd2Sjpk static kmem_cache_t *tslabel_cache; 5545916cd2Sjpk ts_label_t *l_admin_low; 5645916cd2Sjpk ts_label_t *l_admin_high; 5745916cd2Sjpk 5845916cd2Sjpk uint32_t default_doi = DEFAULT_DOI; 5945916cd2Sjpk 6045916cd2Sjpk /* 6145916cd2Sjpk * Initialize labels infrastructure. 6245916cd2Sjpk * This is called during startup() time (before vfs_mntroot) by thread_init(). 6345916cd2Sjpk * It has to be called early so that the is_system_labeled() function returns 6445916cd2Sjpk * the right value when called by the networking code on a diskless boot. 6545916cd2Sjpk */ 6645916cd2Sjpk void 6745916cd2Sjpk label_init(void) 6845916cd2Sjpk { 6945916cd2Sjpk bslabel_t label; 7045916cd2Sjpk 7145916cd2Sjpk /* 72*f875b4ebSrica * sys_labeling will default to "off" unless it is overridden 73*f875b4ebSrica * in /etc/system. 7445916cd2Sjpk */ 7545916cd2Sjpk 7645916cd2Sjpk tslabel_cache = kmem_cache_create("tslabel_cache", sizeof (ts_label_t), 7745916cd2Sjpk 0, NULL, NULL, NULL, NULL, NULL, 0); 7845916cd2Sjpk bsllow(&label); 7945916cd2Sjpk l_admin_low = labelalloc(&label, default_doi, KM_SLEEP); 8045916cd2Sjpk bslhigh(&label); 8145916cd2Sjpk l_admin_high = labelalloc(&label, default_doi, KM_SLEEP); 8245916cd2Sjpk } 8345916cd2Sjpk 8445916cd2Sjpk /* 8545916cd2Sjpk * Allocate new ts_label_t. 8645916cd2Sjpk */ 8745916cd2Sjpk ts_label_t * 8845916cd2Sjpk labelalloc(const bslabel_t *val, uint32_t doi, int flag) 8945916cd2Sjpk { 9045916cd2Sjpk ts_label_t *lab = kmem_cache_alloc(tslabel_cache, flag); 9145916cd2Sjpk 9245916cd2Sjpk if (lab != NULL) { 9345916cd2Sjpk lab->tsl_ref = 1; 9445916cd2Sjpk lab->tsl_doi = doi; 95e071b5fbSkp158701 lab->tsl_flags = 0; 9645916cd2Sjpk if (val == NULL) 9745916cd2Sjpk bzero(&lab->tsl_label, sizeof (bslabel_t)); 9845916cd2Sjpk else 9945916cd2Sjpk bcopy(val, &lab->tsl_label, sizeof (bslabel_t)); 10045916cd2Sjpk } 10145916cd2Sjpk return (lab); 10245916cd2Sjpk } 10345916cd2Sjpk 10445916cd2Sjpk /* 10545916cd2Sjpk * Put a hold on a label structure. 10645916cd2Sjpk */ 10745916cd2Sjpk void 10845916cd2Sjpk label_hold(ts_label_t *lab) 10945916cd2Sjpk { 11045916cd2Sjpk atomic_add_32(&lab->tsl_ref, 1); 11145916cd2Sjpk } 11245916cd2Sjpk 11345916cd2Sjpk /* 11445916cd2Sjpk * Release previous hold on a label structure. Free it if refcnt == 0. 11545916cd2Sjpk */ 11645916cd2Sjpk void 11745916cd2Sjpk label_rele(ts_label_t *lab) 11845916cd2Sjpk { 11945916cd2Sjpk if (atomic_add_32_nv(&lab->tsl_ref, -1) == 0) 12045916cd2Sjpk kmem_cache_free(tslabel_cache, lab); 12145916cd2Sjpk } 12245916cd2Sjpk 12345916cd2Sjpk bslabel_t * 12445916cd2Sjpk label2bslabel(ts_label_t *lab) 12545916cd2Sjpk { 12645916cd2Sjpk return (&lab->tsl_label); 12745916cd2Sjpk } 12845916cd2Sjpk 12945916cd2Sjpk 13045916cd2Sjpk uint32_t 13145916cd2Sjpk label2doi(ts_label_t *lab) 13245916cd2Sjpk { 13345916cd2Sjpk return (lab->tsl_doi); 13445916cd2Sjpk } 13545916cd2Sjpk 13645916cd2Sjpk /* 13745916cd2Sjpk * Compare labels. Return 1 if equal, 0 otherwise. 13845916cd2Sjpk */ 13945916cd2Sjpk boolean_t 14045916cd2Sjpk label_equal(const ts_label_t *l1, const ts_label_t *l2) 14145916cd2Sjpk { 14245916cd2Sjpk return ((l1->tsl_doi == l2->tsl_doi) && 14345916cd2Sjpk blequal(&l1->tsl_label, &l2->tsl_label)); 14445916cd2Sjpk } 14545916cd2Sjpk 14645916cd2Sjpk /* 14745916cd2Sjpk * There's no protocol today to obtain the label from the server. 14845916cd2Sjpk * So we rely on conventions: zones, zone names, and zone paths 14945916cd2Sjpk * must match across TX servers and their TX clients. Now use 15045916cd2Sjpk * the exported name to find the equivalent local zone and its 15145916cd2Sjpk * label. Caller is responsible for doing a label_rele of the 15245916cd2Sjpk * returned ts_label. 15345916cd2Sjpk */ 15445916cd2Sjpk ts_label_t * 15545916cd2Sjpk getflabel_cipso(vfs_t *vfsp) 15645916cd2Sjpk { 15745916cd2Sjpk zone_t *reszone; 15845916cd2Sjpk zone_t *new_reszone; 15945916cd2Sjpk char *nfspath, *respath; 16045916cd2Sjpk refstr_t *resource_ref; 16145916cd2Sjpk boolean_t treat_abs = B_FALSE; 16245916cd2Sjpk 16345916cd2Sjpk if (vfsp->vfs_resource == NULL) 16445916cd2Sjpk return (NULL); /* error */ 16545916cd2Sjpk resource_ref = vfs_getresource(vfsp); 16645916cd2Sjpk 16745916cd2Sjpk nfspath = (char *)refstr_value(resource_ref); 16845916cd2Sjpk respath = strchr(nfspath, ':'); /* skip server name */ 16945916cd2Sjpk if (respath) 17045916cd2Sjpk respath++; /* skip over ":" */ 17145916cd2Sjpk if (*respath != '/') { 17245916cd2Sjpk /* treat path as absolute but it doesn't have leading '/' */ 17345916cd2Sjpk treat_abs = B_TRUE; 17445916cd2Sjpk } 17545916cd2Sjpk 17645916cd2Sjpk reszone = zone_find_by_any_path(respath, treat_abs); 17745916cd2Sjpk if (reszone == global_zone) { 17845916cd2Sjpk refstr_rele(resource_ref); 17945916cd2Sjpk label_hold(l_admin_low); 18045916cd2Sjpk zone_rele(reszone); 18145916cd2Sjpk return (l_admin_low); 18245916cd2Sjpk } 18345916cd2Sjpk 18445916cd2Sjpk /* 18545916cd2Sjpk * Skip over zonepath (not including "root"), e.g. /zone/internal 18645916cd2Sjpk */ 18745916cd2Sjpk respath += reszone->zone_rootpathlen - 7; 18845916cd2Sjpk if (treat_abs) 18945916cd2Sjpk respath--; /* no leading '/' to skip */ 19045916cd2Sjpk if (strncmp(respath, "/root/", 6) == 0) { 19145916cd2Sjpk /* Check if we now have something like "/zone/public/" */ 19245916cd2Sjpk 19345916cd2Sjpk respath += 5; /* skip "/root" first */ 19445916cd2Sjpk new_reszone = zone_find_by_any_path(respath, B_FALSE); 19545916cd2Sjpk if (new_reszone != global_zone) { 19645916cd2Sjpk zone_rele(reszone); 19745916cd2Sjpk reszone = new_reszone; 19845916cd2Sjpk } else { 19945916cd2Sjpk zone_rele(new_reszone); 20045916cd2Sjpk } 20145916cd2Sjpk } 20245916cd2Sjpk 20345916cd2Sjpk refstr_rele(resource_ref); 20445916cd2Sjpk label_hold(reszone->zone_slabel); 20545916cd2Sjpk zone_rele(reszone); 20645916cd2Sjpk 20745916cd2Sjpk return (reszone->zone_slabel); 20845916cd2Sjpk } 20945916cd2Sjpk 21045916cd2Sjpk static ts_label_t * 21145916cd2Sjpk getflabel_nfs(vfs_t *vfsp) 21245916cd2Sjpk { 21345916cd2Sjpk bslabel_t *server_sl; 21445916cd2Sjpk ts_label_t *srv_label; 21545916cd2Sjpk tsol_tpc_t *tp; 21645916cd2Sjpk int addr_type; 21745916cd2Sjpk void *ipaddr; 21845916cd2Sjpk struct servinfo *svp; 21945916cd2Sjpk struct netbuf *addr; 22045916cd2Sjpk struct knetconfig *knconf; 22145916cd2Sjpk mntinfo_t *mi; 22245916cd2Sjpk 22345916cd2Sjpk mi = VFTOMI(vfsp); 22445916cd2Sjpk svp = mi->mi_curr_serv; 22545916cd2Sjpk addr = &svp->sv_addr; 22645916cd2Sjpk knconf = svp->sv_knconf; 22745916cd2Sjpk 22845916cd2Sjpk if (strcmp(knconf->knc_protofmly, NC_INET) == 0) { 22945916cd2Sjpk addr_type = IPV4_VERSION; 23045916cd2Sjpk /* LINTED: following cast to ipaddr is OK */ 23145916cd2Sjpk ipaddr = &((struct sockaddr_in *)addr->buf)->sin_addr; 23245916cd2Sjpk } else if (strcmp(knconf->knc_protofmly, NC_INET6) == 0) { 23345916cd2Sjpk addr_type = IPV6_VERSION; 23445916cd2Sjpk /* LINTED: following cast to ipaddr is OK */ 23545916cd2Sjpk ipaddr = &((struct sockaddr_in6 *)addr->buf)->sin6_addr; 23645916cd2Sjpk } else { 23745916cd2Sjpk goto errout; 23845916cd2Sjpk } 23945916cd2Sjpk 24045916cd2Sjpk tp = find_tpc(ipaddr, addr_type, B_FALSE); 24145916cd2Sjpk if (tp == NULL) 24245916cd2Sjpk goto errout; 24345916cd2Sjpk 24445916cd2Sjpk if (tp->tpc_tp.host_type == SUN_CIPSO) { 24545916cd2Sjpk TPC_RELE(tp); 24645916cd2Sjpk return (getflabel_cipso(vfsp)); 24745916cd2Sjpk } 24845916cd2Sjpk 24945916cd2Sjpk if (tp->tpc_tp.host_type != UNLABELED) 25045916cd2Sjpk goto errout; 25145916cd2Sjpk 25245916cd2Sjpk server_sl = &tp->tpc_tp.tp_def_label; 25345916cd2Sjpk srv_label = labelalloc(server_sl, default_doi, KM_SLEEP); 25445916cd2Sjpk 25545916cd2Sjpk TPC_RELE(tp); 25645916cd2Sjpk 25745916cd2Sjpk return (srv_label); 25845916cd2Sjpk 25945916cd2Sjpk errout: 26045916cd2Sjpk return (NULL); 26145916cd2Sjpk } 26245916cd2Sjpk 26345916cd2Sjpk /* 26445916cd2Sjpk * getflabel - 26545916cd2Sjpk * 26645916cd2Sjpk * Return pointer to the ts_label associated with the specified file, 26745916cd2Sjpk * or returns NULL if error occurs. Caller is responsible for doing 26845916cd2Sjpk * a label_rele of the ts_label. 26945916cd2Sjpk */ 27045916cd2Sjpk ts_label_t * 27145916cd2Sjpk getflabel(vnode_t *vp) 27245916cd2Sjpk { 2736fc927dcSgfaden vfs_t *vfsp, *rvfsp; 27445916cd2Sjpk vnode_t *rvp, *rvp2; 27545916cd2Sjpk zone_t *zone; 27645916cd2Sjpk ts_label_t *zl; 27745916cd2Sjpk boolean_t vfs_is_held = B_FALSE; 27845916cd2Sjpk char vpath[MAXPATHLEN]; 27945916cd2Sjpk 28045916cd2Sjpk ASSERT(vp); 2816fc927dcSgfaden vfsp = vp->v_vfsp; 28245916cd2Sjpk if (vfsp == NULL) 28345916cd2Sjpk return (NULL); 28445916cd2Sjpk 2856fc927dcSgfaden rvp = vp; 28645916cd2Sjpk 28745916cd2Sjpk /* 2886fc927dcSgfaden * Traverse lofs mounts and fattach'es to get the real vnode 28945916cd2Sjpk */ 2906fc927dcSgfaden if (VOP_REALVP(rvp, &rvp2) == 0) 29145916cd2Sjpk rvp = rvp2; 29245916cd2Sjpk 2936fc927dcSgfaden rvfsp = rvp->v_vfsp; 29445916cd2Sjpk 29545916cd2Sjpk /* rvp/rvfsp now represent the real vnode/vfs we will be using */ 29645916cd2Sjpk 29745916cd2Sjpk /* Go elsewhere to handle all nfs files. */ 29845916cd2Sjpk if (strncmp(vfssw[rvfsp->vfs_fstype].vsw_name, "nfs", 3) == 0) 29945916cd2Sjpk return (getflabel_nfs(rvfsp)); 30045916cd2Sjpk 30145916cd2Sjpk /* 30245916cd2Sjpk * Fast path, for objects in a labeled zone: everything except 30345916cd2Sjpk * for lofs/nfs will be just the label of that zone. 30445916cd2Sjpk */ 30545916cd2Sjpk if ((rvfsp->vfs_zone != NULL) && (rvfsp->vfs_zone != global_zone)) { 30645916cd2Sjpk if ((strcmp(vfssw[rvfsp->vfs_fstype].vsw_name, 30745916cd2Sjpk "lofs") != 0)) { 30845916cd2Sjpk zone = rvfsp->vfs_zone; 30945916cd2Sjpk zone_hold(zone); 31045916cd2Sjpk goto zone_out; /* return this label */ 31145916cd2Sjpk } 31245916cd2Sjpk } 31345916cd2Sjpk 3146fc927dcSgfaden if (vnodetopath(rootdir, rvp, vpath, sizeof (vpath), kcred) != 0) { 3156fc927dcSgfaden return (NULL); 31645916cd2Sjpk } 31745916cd2Sjpk 31845916cd2Sjpk /* 3196fc927dcSgfaden * Sanity check - vpath may be weird for some cases, like devices. 32045916cd2Sjpk */ 3216fc927dcSgfaden if (*vpath != '/') { 32245916cd2Sjpk zone = curproc->p_zone; 32345916cd2Sjpk zone_hold(zone); 32445916cd2Sjpk goto zone_out; 32545916cd2Sjpk } 32645916cd2Sjpk 327afed4af4Srica /* 328afed4af4Srica * If a mountpoint exists, hold the vfs while we reference it. 329afed4af4Srica * Otherwise if mountpoint is NULL it should not be held (e.g., 330afed4af4Srica * a hold/release on spec_vfs would result in an attempted free 331afed4af4Srica * and panic.) 332afed4af4Srica */ 333afed4af4Srica if (vfsp->vfs_mntpt != NULL) { 33445916cd2Sjpk VFS_HOLD(vfsp); 33545916cd2Sjpk vfs_is_held = B_TRUE; 336afed4af4Srica } 33745916cd2Sjpk 3386fc927dcSgfaden zone = zone_find_by_any_path(vpath, B_FALSE); 33945916cd2Sjpk 34045916cd2Sjpk /* 3416fc927dcSgfaden * If the vnode source zone is properly set to a non-global zone, or 34245916cd2Sjpk * any zone if the mount is R/W, then use the label of that zone. 34345916cd2Sjpk */ 34445916cd2Sjpk if ((zone != global_zone) || ((vfsp->vfs_flag & VFS_RDONLY) != 0)) 34545916cd2Sjpk goto zone_out; /* return this label */ 34645916cd2Sjpk 34745916cd2Sjpk /* 34845916cd2Sjpk * Otherwise, if we're not in the global zone, use the label of 34945916cd2Sjpk * our zone. 35045916cd2Sjpk */ 35145916cd2Sjpk if ((zone = curproc->p_zone) != global_zone) { 35245916cd2Sjpk zone_hold(zone); 35345916cd2Sjpk goto zone_out; /* return this label */ 35445916cd2Sjpk } 35545916cd2Sjpk 35645916cd2Sjpk /* 35745916cd2Sjpk * We're in the global zone and the mount is R/W ... so the file 35845916cd2Sjpk * may actually be in the global zone -- or in the root of any zone. 35945916cd2Sjpk * Always build our own path for the file, to be sure it's simplified 36045916cd2Sjpk * (i.e., no ".", "..", "//", and so on). 36145916cd2Sjpk */ 36245916cd2Sjpk 36345916cd2Sjpk zone_rele(zone); 36445916cd2Sjpk zone = zone_find_by_any_path(vpath, B_FALSE); 36545916cd2Sjpk 36645916cd2Sjpk zone_out: 36745916cd2Sjpk if ((curproc->p_zone == global_zone) && (zone == global_zone)) { 36845916cd2Sjpk vfs_t *nvfs; 36945916cd2Sjpk boolean_t exported = B_FALSE; 37045916cd2Sjpk refstr_t *mntpt_ref; 37145916cd2Sjpk char *mntpt; 37245916cd2Sjpk 37345916cd2Sjpk /* 37445916cd2Sjpk * File is in the global zone - check whether it's admin_high. 37545916cd2Sjpk * If it's in a filesys that was exported from the global zone, 37645916cd2Sjpk * it's admin_low by definition. Otherwise, if it's in a 37745916cd2Sjpk * filesys that's NOT exported to any zone, it's admin_high. 37845916cd2Sjpk * 37945916cd2Sjpk * And for these files if there wasn't a valid mount resource, 38045916cd2Sjpk * the file must be admin_high (not exported, probably a global 38145916cd2Sjpk * zone device). 38245916cd2Sjpk */ 38345916cd2Sjpk if (!vfs_is_held) 38445916cd2Sjpk goto out_high; 38545916cd2Sjpk 38645916cd2Sjpk mntpt_ref = vfs_getmntpoint(vfsp); 38745916cd2Sjpk mntpt = (char *)refstr_value(mntpt_ref); 38845916cd2Sjpk 38945916cd2Sjpk if ((mntpt != NULL) && (*mntpt == '/')) { 39045916cd2Sjpk zone_t *to_zone; 39145916cd2Sjpk 39245916cd2Sjpk to_zone = zone_find_by_any_path(mntpt, B_FALSE); 39345916cd2Sjpk zone_rele(to_zone); 39445916cd2Sjpk if (to_zone != global_zone) { 39545916cd2Sjpk /* force admin_low */ 39645916cd2Sjpk exported = B_TRUE; 39745916cd2Sjpk } 39845916cd2Sjpk } 39945916cd2Sjpk if (mntpt_ref) 40045916cd2Sjpk refstr_rele(mntpt_ref); 40145916cd2Sjpk 40245916cd2Sjpk if (!exported) { 40345916cd2Sjpk size_t plen = strlen(vpath); 40445916cd2Sjpk 40545916cd2Sjpk vfs_list_read_lock(); 40645916cd2Sjpk nvfs = vfsp->vfs_next; 40745916cd2Sjpk while (nvfs != vfsp) { 40845916cd2Sjpk const char *rstr; 40945916cd2Sjpk size_t rlen = 0; 41045916cd2Sjpk 41145916cd2Sjpk rstr = refstr_value(nvfs->vfs_resource); 41245916cd2Sjpk if (rstr != NULL) 41345916cd2Sjpk rlen = strlen(rstr); 41445916cd2Sjpk 41545916cd2Sjpk /* 41645916cd2Sjpk * Check for a match: does this vfs correspond 41745916cd2Sjpk * to our global zone file path? I.e., check 41845916cd2Sjpk * if the resource string of this vfs is a 41945916cd2Sjpk * prefix of our path. 42045916cd2Sjpk */ 42145916cd2Sjpk if ((rlen > 0) && (rlen <= plen) && 42245916cd2Sjpk (strncmp(rstr, vpath, rlen) == 0) && 42345916cd2Sjpk (vpath[rlen] == '/' || 42445916cd2Sjpk vpath[rlen] == '\0')) { 42545916cd2Sjpk /* force admin_low */ 42645916cd2Sjpk exported = B_TRUE; 42745916cd2Sjpk break; 42845916cd2Sjpk } 42945916cd2Sjpk nvfs = nvfs->vfs_next; 43045916cd2Sjpk } 43145916cd2Sjpk vfs_list_unlock(); 43245916cd2Sjpk } 43345916cd2Sjpk 43445916cd2Sjpk if (!exported) 43545916cd2Sjpk goto out_high; 43645916cd2Sjpk } 43745916cd2Sjpk 43845916cd2Sjpk if (vfs_is_held) 43945916cd2Sjpk VFS_RELE(vfsp); 44045916cd2Sjpk 44145916cd2Sjpk /* 44245916cd2Sjpk * Now that we have the "home" zone for the file, return the slabel 44345916cd2Sjpk * of that zone. 44445916cd2Sjpk */ 44545916cd2Sjpk zl = zone->zone_slabel; 44645916cd2Sjpk label_hold(zl); 44745916cd2Sjpk zone_rele(zone); 44845916cd2Sjpk return (zl); 44945916cd2Sjpk 45045916cd2Sjpk out_high: 45145916cd2Sjpk if (vfs_is_held) 45245916cd2Sjpk VFS_RELE(vfsp); 45345916cd2Sjpk 45445916cd2Sjpk label_hold(l_admin_high); 45545916cd2Sjpk zone_rele(zone); 45645916cd2Sjpk return (l_admin_high); 45745916cd2Sjpk } 45845916cd2Sjpk 45945916cd2Sjpk static int 46045916cd2Sjpk cgetlabel(bslabel_t *label_p, vnode_t *vp) 46145916cd2Sjpk { 46245916cd2Sjpk ts_label_t *tsl; 46345916cd2Sjpk int error = 0; 46445916cd2Sjpk 46545916cd2Sjpk if ((tsl = getflabel(vp)) == NULL) 46645916cd2Sjpk return (EIO); 46745916cd2Sjpk 46845916cd2Sjpk if (copyout((caddr_t)label2bslabel(tsl), (caddr_t)label_p, 46945916cd2Sjpk sizeof (*(label_p))) != 0) 47045916cd2Sjpk error = EFAULT; 47145916cd2Sjpk 47245916cd2Sjpk label_rele(tsl); 47345916cd2Sjpk return (error); 47445916cd2Sjpk } 47545916cd2Sjpk 47645916cd2Sjpk /* 47745916cd2Sjpk * fgetlabel(2TSOL) - get file label 47845916cd2Sjpk * getlabel(2TSOL) - get file label 47945916cd2Sjpk */ 48045916cd2Sjpk int 48145916cd2Sjpk getlabel(const char *path, bslabel_t *label_p) 48245916cd2Sjpk { 48345916cd2Sjpk struct vnode *vp; 48445916cd2Sjpk char *spath; 48545916cd2Sjpk int error; 48645916cd2Sjpk 48745916cd2Sjpk /* Sanity check arguments */ 48845916cd2Sjpk if (path == NULL) 48945916cd2Sjpk return (set_errno(EINVAL)); 49045916cd2Sjpk 49145916cd2Sjpk spath = kmem_zalloc(MAXPATHLEN, KM_SLEEP); 49245916cd2Sjpk if ((error = copyinstr(path, spath, MAXPATHLEN, NULL)) != 0) { 49345916cd2Sjpk kmem_free(spath, MAXPATHLEN); 49445916cd2Sjpk return (set_errno(error)); 49545916cd2Sjpk } 49645916cd2Sjpk 49745916cd2Sjpk if (error = lookupname(spath, UIO_SYSSPACE, FOLLOW, NULLVPP, &vp)) { 49845916cd2Sjpk kmem_free(spath, MAXPATHLEN); 49945916cd2Sjpk return (set_errno(error)); 50045916cd2Sjpk } 50145916cd2Sjpk kmem_free(spath, MAXPATHLEN); 50245916cd2Sjpk 50345916cd2Sjpk error = cgetlabel(label_p, vp); 50445916cd2Sjpk 50545916cd2Sjpk VN_RELE(vp); 50645916cd2Sjpk if (error != 0) 50745916cd2Sjpk return (set_errno(error)); 50845916cd2Sjpk else 50945916cd2Sjpk return (0); 51045916cd2Sjpk } 51145916cd2Sjpk 51245916cd2Sjpk int 51345916cd2Sjpk fgetlabel(int fd, bslabel_t *label_p) 51445916cd2Sjpk { 51545916cd2Sjpk file_t *fp; 51645916cd2Sjpk int error; 51745916cd2Sjpk 51845916cd2Sjpk if ((fp = getf(fd)) == NULL) 51945916cd2Sjpk return (set_errno(EBADF)); 52045916cd2Sjpk 52145916cd2Sjpk error = cgetlabel(label_p, fp->f_vnode); 52245916cd2Sjpk releasef(fd); 52345916cd2Sjpk 52445916cd2Sjpk if (error != 0) 52545916cd2Sjpk return (set_errno(error)); 52645916cd2Sjpk else 52745916cd2Sjpk return (0); 52845916cd2Sjpk } 52945916cd2Sjpk 53045916cd2Sjpk /* 53145916cd2Sjpk * Used by NFSv4 to query label of a pathname 53245916cd2Sjpk * component during lookup/access ops. 53345916cd2Sjpk */ 53445916cd2Sjpk ts_label_t * 53545916cd2Sjpk nfs4_getflabel(vnode_t *vp) 53645916cd2Sjpk { 53745916cd2Sjpk zone_t *zone; 53845916cd2Sjpk ts_label_t *zone_label; 53945916cd2Sjpk char path[MAXNAMELEN]; 54045916cd2Sjpk vnode_t *pvp, *tvp; 54145916cd2Sjpk 54245916cd2Sjpk mutex_enter(&vp->v_lock); 54345916cd2Sjpk /* 54445916cd2Sjpk * mount traverse has been done by caller 54545916cd2Sjpk * before calling this routine. 54645916cd2Sjpk */ 54745916cd2Sjpk ASSERT(!vn_ismntpt(vp)); 54845916cd2Sjpk if (vp->v_path != NULL) { 54945916cd2Sjpk zone = zone_find_by_any_path(vp->v_path, B_FALSE); 55045916cd2Sjpk mutex_exit(&vp->v_lock); 55145916cd2Sjpk } else { 55245916cd2Sjpk /* 55345916cd2Sjpk * v_path not cached. Since we rely on path 55445916cd2Sjpk * of an obj to get its label, we need to get 55545916cd2Sjpk * path corresponding to the parent vnode. 55645916cd2Sjpk */ 55745916cd2Sjpk tvp = vp; 55845916cd2Sjpk do { 55945916cd2Sjpk mutex_exit(&tvp->v_lock); 56045916cd2Sjpk if ((pvp = dnlc_reverse_lookup(tvp, path, 56145916cd2Sjpk sizeof (path))) == NULL) 56245916cd2Sjpk return (NULL); 56345916cd2Sjpk mutex_enter(&pvp->v_lock); 56445916cd2Sjpk tvp = pvp; 56545916cd2Sjpk } while (pvp->v_path == NULL); 56645916cd2Sjpk zone = zone_find_by_any_path(pvp->v_path, B_FALSE); 56745916cd2Sjpk mutex_exit(&pvp->v_lock); 56845916cd2Sjpk } 56945916cd2Sjpk /* 57045916cd2Sjpk * Caller has verified that the file is either 57145916cd2Sjpk * exported or visible. So if the path falls in 57245916cd2Sjpk * global zone, admin_low is returned; otherwise 57345916cd2Sjpk * the zone's label is returned. 57445916cd2Sjpk */ 57545916cd2Sjpk zone_label = zone->zone_slabel; 57645916cd2Sjpk label_hold(zone_label); 57745916cd2Sjpk zone_rele(zone); 57845916cd2Sjpk return (zone_label); 57945916cd2Sjpk } 580