2 * Copyright (c) 1999-2006 Robert N. M. Watson
5 * This software was developed by Robert Watson for the TrustedBSD Project.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * Developed by the TrustedBSD Project.
31 * ACL system calls and other functions common across different ACL types.
32 * Type-specific routines go into subr_acl_<type>.c.
35 #include <sys/cdefs.h>
36 __FBSDID("$FreeBSD$");
40 #include <sys/param.h>
41 #include <sys/systm.h>
42 #include <sys/sysproto.h>
43 #include <sys/fcntl.h>
44 #include <sys/kernel.h>
45 #include <sys/malloc.h>
46 #include <sys/mount.h>
47 #include <sys/vnode.h>
49 #include <sys/mutex.h>
50 #include <sys/namei.h>
52 #include <sys/filedesc.h>
54 #include <sys/sysent.h>
57 #include <security/mac/mac_framework.h>
62 static int vacl_set_acl(struct thread
*td
, struct vnode
*vp
,
63 acl_type_t type
, struct acl
*aclp
);
64 static int vacl_get_acl(struct thread
*td
, struct vnode
*vp
,
65 acl_type_t type
, struct acl
*aclp
);
66 static int vacl_aclcheck(struct thread
*td
, struct vnode
*vp
,
67 acl_type_t type
, struct acl
*aclp
);
70 * These calls wrap the real vnode operations, and are called by the syscall
71 * code once the syscall has converted the path or file descriptor to a vnode
72 * (unlocked). The aclp pointer is assumed still to point to userland, so
73 * this should not be consumed within the kernel except by syscall code.
74 * Other code should directly invoke VOP_{SET,GET}ACL.
78 * Given a vnode, set its ACL.
81 vacl_set_acl(struct thread
*td
, struct vnode
*vp
, acl_type_t type
,
88 error
= copyin(aclp
, &inkernacl
, sizeof(struct acl
));
91 error
= vn_start_write(vp
, &mp
, V_WAIT
| PCATCH
);
94 VOP_LEASE(vp
, td
, td
->td_ucred
, LEASE_WRITE
);
95 vn_lock(vp
, LK_EXCLUSIVE
| LK_RETRY
);
97 error
= mac_vnode_check_setacl(td
->td_ucred
, vp
, type
, &inkernacl
);
101 error
= VOP_SETACL(vp
, type
, &inkernacl
, td
->td_ucred
, td
);
106 vn_finished_write(mp
);
111 * Given a vnode, get its ACL.
114 vacl_get_acl(struct thread
*td
, struct vnode
*vp
, acl_type_t type
,
117 struct acl inkernelacl
;
120 VOP_LEASE(vp
, td
, td
->td_ucred
, LEASE_WRITE
);
121 vn_lock(vp
, LK_EXCLUSIVE
| LK_RETRY
);
123 error
= mac_vnode_check_getacl(td
->td_ucred
, vp
, type
);
127 error
= VOP_GETACL(vp
, type
, &inkernelacl
, td
->td_ucred
, td
);
133 error
= copyout(&inkernelacl
, aclp
, sizeof(struct acl
));
138 * Given a vnode, delete its ACL.
141 vacl_delete(struct thread
*td
, struct vnode
*vp
, acl_type_t type
)
146 error
= vn_start_write(vp
, &mp
, V_WAIT
| PCATCH
);
149 VOP_LEASE(vp
, td
, td
->td_ucred
, LEASE_WRITE
);
150 vn_lock(vp
, LK_EXCLUSIVE
| LK_RETRY
);
152 error
= mac_vnode_check_deleteacl(td
->td_ucred
, vp
, type
);
156 error
= VOP_SETACL(vp
, type
, 0, td
->td_ucred
, td
);
161 vn_finished_write(mp
);
166 * Given a vnode, check whether an ACL is appropriate for it
169 vacl_aclcheck(struct thread
*td
, struct vnode
*vp
, acl_type_t type
,
172 struct acl inkernelacl
;
175 error
= copyin(aclp
, &inkernelacl
, sizeof(struct acl
));
178 error
= VOP_ACLCHECK(vp
, type
, &inkernelacl
, td
->td_ucred
, td
);
183 * syscalls -- convert the path/fd to a vnode, and call vacl_whatever. Don't
184 * need to lock, as the vacl_ code will get/release any locks required.
188 * Given a file path, get an ACL for it
191 __acl_get_file(struct thread
*td
, struct __acl_get_file_args
*uap
)
194 int vfslocked
, error
;
196 NDINIT(&nd
, LOOKUP
, MPSAFE
|FOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
198 vfslocked
= NDHASGIANT(&nd
);
200 error
= vacl_get_acl(td
, nd
.ni_vp
, uap
->type
, uap
->aclp
);
203 VFS_UNLOCK_GIANT(vfslocked
);
208 * Given a file path, get an ACL for it; don't follow links.
211 __acl_get_link(struct thread
*td
, struct __acl_get_link_args
*uap
)
214 int vfslocked
, error
;
216 NDINIT(&nd
, LOOKUP
, MPSAFE
|NOFOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
218 vfslocked
= NDHASGIANT(&nd
);
220 error
= vacl_get_acl(td
, nd
.ni_vp
, uap
->type
, uap
->aclp
);
223 VFS_UNLOCK_GIANT(vfslocked
);
228 * Given a file path, set an ACL for it.
231 __acl_set_file(struct thread
*td
, struct __acl_set_file_args
*uap
)
234 int vfslocked
, error
;
236 NDINIT(&nd
, LOOKUP
, MPSAFE
|FOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
238 vfslocked
= NDHASGIANT(&nd
);
240 error
= vacl_set_acl(td
, nd
.ni_vp
, uap
->type
, uap
->aclp
);
243 VFS_UNLOCK_GIANT(vfslocked
);
248 * Given a file path, set an ACL for it; don't follow links.
251 __acl_set_link(struct thread
*td
, struct __acl_set_link_args
*uap
)
254 int vfslocked
, error
;
256 NDINIT(&nd
, LOOKUP
, MPSAFE
|NOFOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
258 vfslocked
= NDHASGIANT(&nd
);
260 error
= vacl_set_acl(td
, nd
.ni_vp
, uap
->type
, uap
->aclp
);
263 VFS_UNLOCK_GIANT(vfslocked
);
268 * Given a file descriptor, get an ACL for it.
271 __acl_get_fd(struct thread
*td
, struct __acl_get_fd_args
*uap
)
274 int vfslocked
, error
;
276 error
= getvnode(td
->td_proc
->p_fd
, uap
->filedes
, &fp
);
278 vfslocked
= VFS_LOCK_GIANT(fp
->f_vnode
->v_mount
);
279 error
= vacl_get_acl(td
, fp
->f_vnode
, uap
->type
, uap
->aclp
);
281 VFS_UNLOCK_GIANT(vfslocked
);
287 * Given a file descriptor, set an ACL for it.
290 __acl_set_fd(struct thread
*td
, struct __acl_set_fd_args
*uap
)
293 int vfslocked
, error
;
295 error
= getvnode(td
->td_proc
->p_fd
, uap
->filedes
, &fp
);
297 vfslocked
= VFS_LOCK_GIANT(fp
->f_vnode
->v_mount
);
298 error
= vacl_set_acl(td
, fp
->f_vnode
, uap
->type
, uap
->aclp
);
300 VFS_UNLOCK_GIANT(vfslocked
);
306 * Given a file path, delete an ACL from it.
309 __acl_delete_file(struct thread
*td
, struct __acl_delete_file_args
*uap
)
312 int vfslocked
, error
;
314 NDINIT(&nd
, LOOKUP
, MPSAFE
|FOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
316 vfslocked
= NDHASGIANT(&nd
);
318 error
= vacl_delete(td
, nd
.ni_vp
, uap
->type
);
321 VFS_UNLOCK_GIANT(vfslocked
);
326 * Given a file path, delete an ACL from it; don't follow links.
329 __acl_delete_link(struct thread
*td
, struct __acl_delete_link_args
*uap
)
332 int vfslocked
, error
;
334 NDINIT(&nd
, LOOKUP
, MPSAFE
|NOFOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
336 vfslocked
= NDHASGIANT(&nd
);
338 error
= vacl_delete(td
, nd
.ni_vp
, uap
->type
);
341 VFS_UNLOCK_GIANT(vfslocked
);
346 * Given a file path, delete an ACL from it.
349 __acl_delete_fd(struct thread
*td
, struct __acl_delete_fd_args
*uap
)
352 int vfslocked
, error
;
354 error
= getvnode(td
->td_proc
->p_fd
, uap
->filedes
, &fp
);
356 vfslocked
= VFS_LOCK_GIANT(fp
->f_vnode
->v_mount
);
357 error
= vacl_delete(td
, fp
->f_vnode
, uap
->type
);
359 VFS_UNLOCK_GIANT(vfslocked
);
365 * Given a file path, check an ACL for it.
368 __acl_aclcheck_file(struct thread
*td
, struct __acl_aclcheck_file_args
*uap
)
371 int vfslocked
, error
;
373 NDINIT(&nd
, LOOKUP
, MPSAFE
|FOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
375 vfslocked
= NDHASGIANT(&nd
);
377 error
= vacl_aclcheck(td
, nd
.ni_vp
, uap
->type
, uap
->aclp
);
380 VFS_UNLOCK_GIANT(vfslocked
);
385 * Given a file path, check an ACL for it; don't follow links.
388 __acl_aclcheck_link(struct thread
*td
, struct __acl_aclcheck_link_args
*uap
)
391 int vfslocked
, error
;
393 NDINIT(&nd
, LOOKUP
, MPSAFE
|NOFOLLOW
, UIO_USERSPACE
, uap
->path
, td
);
395 vfslocked
= NDHASGIANT(&nd
);
397 error
= vacl_aclcheck(td
, nd
.ni_vp
, uap
->type
, uap
->aclp
);
400 VFS_UNLOCK_GIANT(vfslocked
);
405 * Given a file descriptor, check an ACL for it.
408 __acl_aclcheck_fd(struct thread
*td
, struct __acl_aclcheck_fd_args
*uap
)
411 int vfslocked
, error
;
413 error
= getvnode(td
->td_proc
->p_fd
, uap
->filedes
, &fp
);
415 vfslocked
= VFS_LOCK_GIANT(fp
->f_vnode
->v_mount
);
416 error
= vacl_aclcheck(td
, fp
->f_vnode
, uap
->type
, uap
->aclp
);
418 VFS_UNLOCK_GIANT(vfslocked
);
426 aclinit(void *dummy __unused
)
429 acl_zone
= uma_zcreate("ACL UMA zone", sizeof(struct acl
),
430 NULL
, NULL
, NULL
, NULL
, UMA_ALIGN_PTR
, 0);
432 SYSINIT(acls
, SI_SUB_ACL
, SI_ORDER_FIRST
, aclinit
, NULL
);