xref: /freebsd/sys/kern/vfs_acl.c (revision b5368498)
191f37dcbSRobert Watson /*-
2e4256d1eSRobert Watson  * Copyright (c) 1999-2006 Robert N. M. Watson
391f37dcbSRobert Watson  * All rights reserved.
491f37dcbSRobert Watson  *
56d878543SRobert Watson  * This software was developed by Robert Watson for the TrustedBSD Project.
66d878543SRobert Watson  *
791f37dcbSRobert Watson  * Redistribution and use in source and binary forms, with or without
891f37dcbSRobert Watson  * modification, are permitted provided that the following conditions
991f37dcbSRobert Watson  * are met:
1091f37dcbSRobert Watson  * 1. Redistributions of source code must retain the above copyright
1191f37dcbSRobert Watson  *    notice, this list of conditions and the following disclaimer.
1291f37dcbSRobert Watson  * 2. Redistributions in binary form must reproduce the above copyright
1391f37dcbSRobert Watson  *    notice, this list of conditions and the following disclaimer in the
1491f37dcbSRobert Watson  *    documentation and/or other materials provided with the distribution.
1591f37dcbSRobert Watson  *
1691f37dcbSRobert Watson  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
1791f37dcbSRobert Watson  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1891f37dcbSRobert Watson  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
1991f37dcbSRobert Watson  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
2091f37dcbSRobert Watson  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2191f37dcbSRobert Watson  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2291f37dcbSRobert Watson  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2391f37dcbSRobert Watson  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2491f37dcbSRobert Watson  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2591f37dcbSRobert Watson  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2691f37dcbSRobert Watson  * SUCH DAMAGE.
2791f37dcbSRobert Watson  */
2891f37dcbSRobert Watson /*
295293465fSRobert Watson  * Developed by the TrustedBSD Project.
30e4256d1eSRobert Watson  *
31e4256d1eSRobert Watson  * ACL system calls and other functions common across different ACL types.
32e4256d1eSRobert Watson  * Type-specific routines go into subr_acl_<type>.c.
3391f37dcbSRobert Watson  */
3491f37dcbSRobert Watson 
35677b542eSDavid E. O'Brien #include <sys/cdefs.h>
36677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$");
37677b542eSDavid E. O'Brien 
38c86ca022SRobert Watson #include "opt_mac.h"
39c86ca022SRobert Watson 
4091f37dcbSRobert Watson #include <sys/param.h>
4191f37dcbSRobert Watson #include <sys/systm.h>
4291f37dcbSRobert Watson #include <sys/sysproto.h>
4391f37dcbSRobert Watson #include <sys/kernel.h>
4491f37dcbSRobert Watson #include <sys/malloc.h>
4542e7197fSChristian S.J. Peron #include <sys/mount.h>
4691f37dcbSRobert Watson #include <sys/vnode.h>
4791f37dcbSRobert Watson #include <sys/lock.h>
48f708f4d1SMatthew Dillon #include <sys/mutex.h>
4991f37dcbSRobert Watson #include <sys/namei.h>
5091f37dcbSRobert Watson #include <sys/file.h>
5113438f68SAlfred Perlstein #include <sys/filedesc.h>
5291f37dcbSRobert Watson #include <sys/proc.h>
5391f37dcbSRobert Watson #include <sys/sysent.h>
5491f37dcbSRobert Watson #include <sys/acl.h>
5591f37dcbSRobert Watson 
56aed55708SRobert Watson #include <security/mac/mac_framework.h>
57aed55708SRobert Watson 
58d1dfd921SChristian S.J. Peron #include <vm/uma.h>
5991f37dcbSRobert Watson 
60d1dfd921SChristian S.J. Peron uma_zone_t	acl_zone;
61cbeb8402SRobert Watson static int	vacl_set_acl(struct thread *td, struct vnode *vp,
62cbeb8402SRobert Watson 		    acl_type_t type, struct acl *aclp);
63cbeb8402SRobert Watson static int	vacl_get_acl(struct thread *td, struct vnode *vp,
64cbeb8402SRobert Watson 		    acl_type_t type, struct acl *aclp);
65b40ce416SJulian Elischer static int	vacl_aclcheck(struct thread *td, struct vnode *vp,
66b114e127SRobert Watson 		    acl_type_t type, struct acl *aclp);
6791f37dcbSRobert Watson 
6891f37dcbSRobert Watson /*
69b0c521e2SRobert Watson  * These calls wrap the real vnode operations, and are called by the syscall
70b0c521e2SRobert Watson  * code once the syscall has converted the path or file descriptor to a vnode
71b0c521e2SRobert Watson  * (unlocked).  The aclp pointer is assumed still to point to userland, so
72b0c521e2SRobert Watson  * this should not be consumed within the kernel except by syscall code.
73b0c521e2SRobert Watson  * Other code should directly invoke VOP_{SET,GET}ACL.
7491f37dcbSRobert Watson  */
7591f37dcbSRobert Watson 
7691f37dcbSRobert Watson /*
7791f37dcbSRobert Watson  * Given a vnode, set its ACL.
7891f37dcbSRobert Watson  */
7991f37dcbSRobert Watson static int
80b40ce416SJulian Elischer vacl_set_acl(struct thread *td, struct vnode *vp, acl_type_t type,
8191f37dcbSRobert Watson     struct acl *aclp)
8291f37dcbSRobert Watson {
8391f37dcbSRobert Watson 	struct acl inkernacl;
844e1123c7SRobert Watson 	struct mount *mp;
8591f37dcbSRobert Watson 	int error;
8691f37dcbSRobert Watson 
8791f37dcbSRobert Watson 	error = copyin(aclp, &inkernacl, sizeof(struct acl));
8891f37dcbSRobert Watson 	if (error)
8991f37dcbSRobert Watson 		return(error);
904e1123c7SRobert Watson 	error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
914e1123c7SRobert Watson 	if (error != 0)
924e1123c7SRobert Watson 		return (error);
93a854ed98SJohn Baldwin 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
94b40ce416SJulian Elischer 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
95c86ca022SRobert Watson #ifdef MAC
96c86ca022SRobert Watson 	error = mac_check_vnode_setacl(td->td_ucred, vp, type, &inkernacl);
97c86ca022SRobert Watson 	if (error != 0)
98c86ca022SRobert Watson 		goto out;
99c86ca022SRobert Watson #endif
100a854ed98SJohn Baldwin 	error = VOP_SETACL(vp, type, &inkernacl, td->td_ucred, td);
101c86ca022SRobert Watson #ifdef MAC
102c86ca022SRobert Watson out:
103c86ca022SRobert Watson #endif
104b40ce416SJulian Elischer 	VOP_UNLOCK(vp, 0, td);
1054e1123c7SRobert Watson 	vn_finished_write(mp);
10691f37dcbSRobert Watson 	return(error);
10791f37dcbSRobert Watson }
10891f37dcbSRobert Watson 
10991f37dcbSRobert Watson /*
11091f37dcbSRobert Watson  * Given a vnode, get its ACL.
11191f37dcbSRobert Watson  */
11291f37dcbSRobert Watson static int
113b40ce416SJulian Elischer vacl_get_acl(struct thread *td, struct vnode *vp, acl_type_t type,
11491f37dcbSRobert Watson     struct acl *aclp)
11591f37dcbSRobert Watson {
11691f37dcbSRobert Watson 	struct acl inkernelacl;
11791f37dcbSRobert Watson 	int error;
11891f37dcbSRobert Watson 
119a854ed98SJohn Baldwin 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
120b40ce416SJulian Elischer 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
121c86ca022SRobert Watson #ifdef MAC
122c86ca022SRobert Watson 	error = mac_check_vnode_getacl(td->td_ucred, vp, type);
123c86ca022SRobert Watson 	if (error != 0)
124c86ca022SRobert Watson 		goto out;
125c86ca022SRobert Watson #endif
126a854ed98SJohn Baldwin 	error = VOP_GETACL(vp, type, &inkernelacl, td->td_ucred, td);
127c86ca022SRobert Watson #ifdef MAC
128c86ca022SRobert Watson out:
129c86ca022SRobert Watson #endif
130b40ce416SJulian Elischer 	VOP_UNLOCK(vp, 0, td);
13191f37dcbSRobert Watson 	if (error == 0)
13291f37dcbSRobert Watson 		error = copyout(&inkernelacl, aclp, sizeof(struct acl));
13391f37dcbSRobert Watson 	return (error);
13491f37dcbSRobert Watson }
13591f37dcbSRobert Watson 
13691f37dcbSRobert Watson /*
13791f37dcbSRobert Watson  * Given a vnode, delete its ACL.
13891f37dcbSRobert Watson  */
13991f37dcbSRobert Watson static int
140b40ce416SJulian Elischer vacl_delete(struct thread *td, struct vnode *vp, acl_type_t type)
14191f37dcbSRobert Watson {
1424e1123c7SRobert Watson 	struct mount *mp;
14391f37dcbSRobert Watson 	int error;
14491f37dcbSRobert Watson 
1454e1123c7SRobert Watson 	error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
1464e1123c7SRobert Watson 	if (error)
1474e1123c7SRobert Watson 		return (error);
148a854ed98SJohn Baldwin 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
149b40ce416SJulian Elischer 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
150c86ca022SRobert Watson #ifdef MAC
151c86ca022SRobert Watson 	error = mac_check_vnode_deleteacl(td->td_ucred, vp, type);
152c86ca022SRobert Watson 	if (error)
153c86ca022SRobert Watson 		goto out;
154c86ca022SRobert Watson #endif
155c86ca022SRobert Watson 	error = VOP_SETACL(vp, type, 0, td->td_ucred, td);
156c86ca022SRobert Watson #ifdef MAC
157c86ca022SRobert Watson out:
158c86ca022SRobert Watson #endif
159b40ce416SJulian Elischer 	VOP_UNLOCK(vp, 0, td);
1604e1123c7SRobert Watson 	vn_finished_write(mp);
16191f37dcbSRobert Watson 	return (error);
16291f37dcbSRobert Watson }
16391f37dcbSRobert Watson 
16491f37dcbSRobert Watson /*
16591f37dcbSRobert Watson  * Given a vnode, check whether an ACL is appropriate for it
16691f37dcbSRobert Watson  */
16791f37dcbSRobert Watson static int
168b40ce416SJulian Elischer vacl_aclcheck(struct thread *td, struct vnode *vp, acl_type_t type,
16991f37dcbSRobert Watson     struct acl *aclp)
17091f37dcbSRobert Watson {
17191f37dcbSRobert Watson 	struct acl inkernelacl;
17291f37dcbSRobert Watson 	int error;
17391f37dcbSRobert Watson 
17491f37dcbSRobert Watson 	error = copyin(aclp, &inkernelacl, sizeof(struct acl));
17591f37dcbSRobert Watson 	if (error)
17691f37dcbSRobert Watson 		return(error);
177a854ed98SJohn Baldwin 	error = VOP_ACLCHECK(vp, type, &inkernelacl, td->td_ucred, td);
17891f37dcbSRobert Watson 	return (error);
17991f37dcbSRobert Watson }
18091f37dcbSRobert Watson 
18191f37dcbSRobert Watson /*
182b0c521e2SRobert Watson  * syscalls -- convert the path/fd to a vnode, and call vacl_whatever.  Don't
183b0c521e2SRobert Watson  * need to lock, as the vacl_ code will get/release any locks required.
18491f37dcbSRobert Watson  */
18591f37dcbSRobert Watson 
18691f37dcbSRobert Watson /*
18791f37dcbSRobert Watson  * Given a file path, get an ACL for it
18891f37dcbSRobert Watson  */
18991f37dcbSRobert Watson int
190b40ce416SJulian Elischer __acl_get_file(struct thread *td, struct __acl_get_file_args *uap)
19191f37dcbSRobert Watson {
19291f37dcbSRobert Watson 	struct nameidata nd;
19342e7197fSChristian S.J. Peron 	int vfslocked, error;
19491f37dcbSRobert Watson 
19542e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|FOLLOW, UIO_USERSPACE, uap->path, td);
19691f37dcbSRobert Watson 	error = namei(&nd);
19742e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
198f708f4d1SMatthew Dillon 	if (error == 0) {
199f97182acSAlfred Perlstein 		error = vacl_get_acl(td, nd.ni_vp, uap->type, uap->aclp);
20091f37dcbSRobert Watson 		NDFREE(&nd, 0);
201f708f4d1SMatthew Dillon 	}
20242e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
20391f37dcbSRobert Watson 	return (error);
20491f37dcbSRobert Watson }
20591f37dcbSRobert Watson 
20691f37dcbSRobert Watson /*
2073c67c23bSRobert Watson  * Given a file path, get an ACL for it; don't follow links.
2083c67c23bSRobert Watson  */
2093c67c23bSRobert Watson int
2103c67c23bSRobert Watson __acl_get_link(struct thread *td, struct __acl_get_link_args *uap)
2113c67c23bSRobert Watson {
2123c67c23bSRobert Watson 	struct nameidata nd;
21342e7197fSChristian S.J. Peron 	int vfslocked, error;
2143c67c23bSRobert Watson 
21542e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|NOFOLLOW, UIO_USERSPACE, uap->path, td);
2163c67c23bSRobert Watson 	error = namei(&nd);
21742e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
2183c67c23bSRobert Watson 	if (error == 0) {
2193c67c23bSRobert Watson 		error = vacl_get_acl(td, nd.ni_vp, uap->type, uap->aclp);
2203c67c23bSRobert Watson 		NDFREE(&nd, 0);
2213c67c23bSRobert Watson 	}
22242e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
2233c67c23bSRobert Watson 	return (error);
2243c67c23bSRobert Watson }
2253c67c23bSRobert Watson 
2263c67c23bSRobert Watson /*
2270c14ff0eSRobert Watson  * Given a file path, set an ACL for it.
22891f37dcbSRobert Watson  */
22991f37dcbSRobert Watson int
230b40ce416SJulian Elischer __acl_set_file(struct thread *td, struct __acl_set_file_args *uap)
23191f37dcbSRobert Watson {
23291f37dcbSRobert Watson 	struct nameidata nd;
23342e7197fSChristian S.J. Peron 	int vfslocked, error;
23491f37dcbSRobert Watson 
23542e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|FOLLOW, UIO_USERSPACE, uap->path, td);
23691f37dcbSRobert Watson 	error = namei(&nd);
23742e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
238f708f4d1SMatthew Dillon 	if (error == 0) {
239f97182acSAlfred Perlstein 		error = vacl_set_acl(td, nd.ni_vp, uap->type, uap->aclp);
24091f37dcbSRobert Watson 		NDFREE(&nd, 0);
241f708f4d1SMatthew Dillon 	}
24242e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
24391f37dcbSRobert Watson 	return (error);
24491f37dcbSRobert Watson }
24591f37dcbSRobert Watson 
24691f37dcbSRobert Watson /*
2473c67c23bSRobert Watson  * Given a file path, set an ACL for it; don't follow links.
2483c67c23bSRobert Watson  */
2493c67c23bSRobert Watson int
2503c67c23bSRobert Watson __acl_set_link(struct thread *td, struct __acl_set_link_args *uap)
2513c67c23bSRobert Watson {
2523c67c23bSRobert Watson 	struct nameidata nd;
25342e7197fSChristian S.J. Peron 	int vfslocked, error;
2543c67c23bSRobert Watson 
25542e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|NOFOLLOW, UIO_USERSPACE, uap->path, td);
2563c67c23bSRobert Watson 	error = namei(&nd);
25742e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
2583c67c23bSRobert Watson 	if (error == 0) {
2593c67c23bSRobert Watson 		error = vacl_set_acl(td, nd.ni_vp, uap->type, uap->aclp);
2603c67c23bSRobert Watson 		NDFREE(&nd, 0);
2613c67c23bSRobert Watson 	}
26242e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
2633c67c23bSRobert Watson 	return (error);
2643c67c23bSRobert Watson }
2653c67c23bSRobert Watson 
2663c67c23bSRobert Watson /*
267b5368498SRobert Watson  * Given a file descriptor, get an ACL for it.
26891f37dcbSRobert Watson  */
26991f37dcbSRobert Watson int
270b40ce416SJulian Elischer __acl_get_fd(struct thread *td, struct __acl_get_fd_args *uap)
27191f37dcbSRobert Watson {
27291f37dcbSRobert Watson 	struct file *fp;
27342e7197fSChristian S.J. Peron 	int vfslocked, error;
27491f37dcbSRobert Watson 
275d1e405c5SAlfred Perlstein 	error = getvnode(td->td_proc->p_fd, uap->filedes, &fp);
276f708f4d1SMatthew Dillon 	if (error == 0) {
27742e7197fSChristian S.J. Peron 		vfslocked = VFS_LOCK_GIANT(fp->f_vnode->v_mount);
2783b6d9652SPoul-Henning Kamp 		error = vacl_get_acl(td, fp->f_vnode, uap->type, uap->aclp);
279426da3bcSAlfred Perlstein 		fdrop(fp, td);
28042e7197fSChristian S.J. Peron 		VFS_UNLOCK_GIANT(vfslocked);
281f708f4d1SMatthew Dillon 	}
28291f37dcbSRobert Watson 	return (error);
28391f37dcbSRobert Watson }
28491f37dcbSRobert Watson 
28591f37dcbSRobert Watson /*
286b5368498SRobert Watson  * Given a file descriptor, set an ACL for it.
28791f37dcbSRobert Watson  */
28891f37dcbSRobert Watson int
289b40ce416SJulian Elischer __acl_set_fd(struct thread *td, struct __acl_set_fd_args *uap)
29091f37dcbSRobert Watson {
29191f37dcbSRobert Watson 	struct file *fp;
29242e7197fSChristian S.J. Peron 	int vfslocked, error;
29391f37dcbSRobert Watson 
294d1e405c5SAlfred Perlstein 	error = getvnode(td->td_proc->p_fd, uap->filedes, &fp);
295f708f4d1SMatthew Dillon 	if (error == 0) {
29642e7197fSChristian S.J. Peron 		vfslocked = VFS_LOCK_GIANT(fp->f_vnode->v_mount);
2973b6d9652SPoul-Henning Kamp 		error = vacl_set_acl(td, fp->f_vnode, uap->type, uap->aclp);
298426da3bcSAlfred Perlstein 		fdrop(fp, td);
29942e7197fSChristian S.J. Peron 		VFS_UNLOCK_GIANT(vfslocked);
300f708f4d1SMatthew Dillon 	}
30191f37dcbSRobert Watson 	return (error);
30291f37dcbSRobert Watson }
30391f37dcbSRobert Watson 
30491f37dcbSRobert Watson /*
30591f37dcbSRobert Watson  * Given a file path, delete an ACL from it.
30691f37dcbSRobert Watson  */
30791f37dcbSRobert Watson int
308b40ce416SJulian Elischer __acl_delete_file(struct thread *td, struct __acl_delete_file_args *uap)
30991f37dcbSRobert Watson {
31091f37dcbSRobert Watson 	struct nameidata nd;
31142e7197fSChristian S.J. Peron 	int vfslocked, error;
31291f37dcbSRobert Watson 
31342e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|FOLLOW, UIO_USERSPACE, uap->path, td);
31491f37dcbSRobert Watson 	error = namei(&nd);
31542e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
316f708f4d1SMatthew Dillon 	if (error == 0) {
317d1e405c5SAlfred Perlstein 		error = vacl_delete(td, nd.ni_vp, uap->type);
31891f37dcbSRobert Watson 		NDFREE(&nd, 0);
319f708f4d1SMatthew Dillon 	}
32042e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
32191f37dcbSRobert Watson 	return (error);
32291f37dcbSRobert Watson }
32391f37dcbSRobert Watson 
32491f37dcbSRobert Watson /*
3253c67c23bSRobert Watson  * Given a file path, delete an ACL from it; don't follow links.
3263c67c23bSRobert Watson  */
3273c67c23bSRobert Watson int
3283c67c23bSRobert Watson __acl_delete_link(struct thread *td, struct __acl_delete_link_args *uap)
3293c67c23bSRobert Watson {
3303c67c23bSRobert Watson 	struct nameidata nd;
33142e7197fSChristian S.J. Peron 	int vfslocked, error;
3323c67c23bSRobert Watson 
33342e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|NOFOLLOW, UIO_USERSPACE, uap->path, td);
3343c67c23bSRobert Watson 	error = namei(&nd);
33542e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
3363c67c23bSRobert Watson 	if (error == 0) {
3373c67c23bSRobert Watson 		error = vacl_delete(td, nd.ni_vp, uap->type);
3383c67c23bSRobert Watson 		NDFREE(&nd, 0);
3393c67c23bSRobert Watson 	}
34042e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
3413c67c23bSRobert Watson 	return (error);
3423c67c23bSRobert Watson }
3433c67c23bSRobert Watson 
3443c67c23bSRobert Watson /*
34591f37dcbSRobert Watson  * Given a file path, delete an ACL from it.
34691f37dcbSRobert Watson  */
34791f37dcbSRobert Watson int
348b40ce416SJulian Elischer __acl_delete_fd(struct thread *td, struct __acl_delete_fd_args *uap)
34991f37dcbSRobert Watson {
35091f37dcbSRobert Watson 	struct file *fp;
35142e7197fSChristian S.J. Peron 	int vfslocked, error;
35291f37dcbSRobert Watson 
353d1e405c5SAlfred Perlstein 	error = getvnode(td->td_proc->p_fd, uap->filedes, &fp);
354f708f4d1SMatthew Dillon 	if (error == 0) {
35542e7197fSChristian S.J. Peron 		vfslocked = VFS_LOCK_GIANT(fp->f_vnode->v_mount);
3563b6d9652SPoul-Henning Kamp 		error = vacl_delete(td, fp->f_vnode, uap->type);
357426da3bcSAlfred Perlstein 		fdrop(fp, td);
35842e7197fSChristian S.J. Peron 		VFS_UNLOCK_GIANT(vfslocked);
359f708f4d1SMatthew Dillon 	}
36091f37dcbSRobert Watson 	return (error);
36191f37dcbSRobert Watson }
36291f37dcbSRobert Watson 
36391f37dcbSRobert Watson /*
3640c14ff0eSRobert Watson  * Given a file path, check an ACL for it.
36591f37dcbSRobert Watson  */
36691f37dcbSRobert Watson int
367b40ce416SJulian Elischer __acl_aclcheck_file(struct thread *td, struct __acl_aclcheck_file_args *uap)
36891f37dcbSRobert Watson {
36991f37dcbSRobert Watson 	struct nameidata	nd;
37042e7197fSChristian S.J. Peron 	int vfslocked, error;
37191f37dcbSRobert Watson 
37242e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|FOLLOW, UIO_USERSPACE, uap->path, td);
37391f37dcbSRobert Watson 	error = namei(&nd);
37442e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
375f708f4d1SMatthew Dillon 	if (error == 0) {
376f97182acSAlfred Perlstein 		error = vacl_aclcheck(td, nd.ni_vp, uap->type, uap->aclp);
37791f37dcbSRobert Watson 		NDFREE(&nd, 0);
378f708f4d1SMatthew Dillon 	}
37942e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
38091f37dcbSRobert Watson 	return (error);
38191f37dcbSRobert Watson }
38291f37dcbSRobert Watson 
38391f37dcbSRobert Watson /*
3843c67c23bSRobert Watson  * Given a file path, check an ACL for it; don't follow links.
3853c67c23bSRobert Watson  */
3863c67c23bSRobert Watson int
3873c67c23bSRobert Watson __acl_aclcheck_link(struct thread *td, struct __acl_aclcheck_link_args *uap)
3883c67c23bSRobert Watson {
3893c67c23bSRobert Watson 	struct nameidata	nd;
39042e7197fSChristian S.J. Peron 	int vfslocked, error;
3913c67c23bSRobert Watson 
39242e7197fSChristian S.J. Peron 	NDINIT(&nd, LOOKUP, MPSAFE|NOFOLLOW, UIO_USERSPACE, uap->path, td);
3933c67c23bSRobert Watson 	error = namei(&nd);
39442e7197fSChristian S.J. Peron 	vfslocked = NDHASGIANT(&nd);
3953c67c23bSRobert Watson 	if (error == 0) {
3963c67c23bSRobert Watson 		error = vacl_aclcheck(td, nd.ni_vp, uap->type, uap->aclp);
3973c67c23bSRobert Watson 		NDFREE(&nd, 0);
3983c67c23bSRobert Watson 	}
39942e7197fSChristian S.J. Peron 	VFS_UNLOCK_GIANT(vfslocked);
4003c67c23bSRobert Watson 	return (error);
4013c67c23bSRobert Watson }
4023c67c23bSRobert Watson 
4033c67c23bSRobert Watson /*
4040c14ff0eSRobert Watson  * Given a file descriptor, check an ACL for it.
40591f37dcbSRobert Watson  */
40691f37dcbSRobert Watson int
407b40ce416SJulian Elischer __acl_aclcheck_fd(struct thread *td, struct __acl_aclcheck_fd_args *uap)
40891f37dcbSRobert Watson {
40991f37dcbSRobert Watson 	struct file *fp;
41042e7197fSChristian S.J. Peron 	int vfslocked, error;
41191f37dcbSRobert Watson 
412d1e405c5SAlfred Perlstein 	error = getvnode(td->td_proc->p_fd, uap->filedes, &fp);
413f708f4d1SMatthew Dillon 	if (error == 0) {
41442e7197fSChristian S.J. Peron 		vfslocked = VFS_LOCK_GIANT(fp->f_vnode->v_mount);
4153b6d9652SPoul-Henning Kamp 		error = vacl_aclcheck(td, fp->f_vnode, uap->type, uap->aclp);
416426da3bcSAlfred Perlstein 		fdrop(fp, td);
41742e7197fSChristian S.J. Peron 		VFS_UNLOCK_GIANT(vfslocked);
418f708f4d1SMatthew Dillon 	}
41991f37dcbSRobert Watson 	return (error);
42091f37dcbSRobert Watson }
421d1dfd921SChristian S.J. Peron 
422d1dfd921SChristian S.J. Peron /* ARGUSED */
423d1dfd921SChristian S.J. Peron 
424d1dfd921SChristian S.J. Peron static void
425d1dfd921SChristian S.J. Peron aclinit(void *dummy __unused)
426d1dfd921SChristian S.J. Peron {
427d1dfd921SChristian S.J. Peron 
428d1dfd921SChristian S.J. Peron 	acl_zone = uma_zcreate("ACL UMA zone", sizeof(struct acl),
429d1dfd921SChristian S.J. Peron 	    NULL, NULL, NULL, NULL, UMA_ALIGN_PTR, 0);
430d1dfd921SChristian S.J. Peron }
431d1dfd921SChristian S.J. Peron SYSINIT(acls, SI_SUB_ACL, SI_ORDER_FIRST, aclinit, NULL)
432