xref: /freebsd/sys/security/mac/mac_system.c (revision 83985c26)
17bc82500SRobert Watson /*-
27bc82500SRobert Watson  * Copyright (c) 1999, 2000, 2001, 2002 Robert N. M. Watson
37bc82500SRobert Watson  * Copyright (c) 2001 Ilmar S. Habibulin
47bc82500SRobert Watson  * Copyright (c) 2001, 2002 Networks Associates Technology, Inc.
57bc82500SRobert Watson  * All rights reserved.
67bc82500SRobert Watson  *
77bc82500SRobert Watson  * This software was developed by Robert Watson and Ilmar Habibulin for the
87bc82500SRobert Watson  * TrustedBSD Project.
97bc82500SRobert Watson  *
107bc82500SRobert Watson  * This software was developed for the FreeBSD Project in part by NAI Labs,
117bc82500SRobert Watson  * the Security Research Division of Network Associates, Inc. under
127bc82500SRobert Watson  * DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA
137bc82500SRobert Watson  * CHATS research program.
147bc82500SRobert Watson  *
157bc82500SRobert Watson  * Redistribution and use in source and binary forms, with or without
167bc82500SRobert Watson  * modification, are permitted provided that the following conditions
177bc82500SRobert Watson  * are met:
187bc82500SRobert Watson  * 1. Redistributions of source code must retain the above copyright
197bc82500SRobert Watson  *    notice, this list of conditions and the following disclaimer.
207bc82500SRobert Watson  * 2. Redistributions in binary form must reproduce the above copyright
217bc82500SRobert Watson  *    notice, this list of conditions and the following disclaimer in the
227bc82500SRobert Watson  *    documentation and/or other materials provided with the distribution.
237bc82500SRobert Watson  * 3. The names of the authors may not be used to endorse or promote
247bc82500SRobert Watson  *    products derived from this software without specific prior written
257bc82500SRobert Watson  *    permission.
267bc82500SRobert Watson  *
277bc82500SRobert Watson  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
287bc82500SRobert Watson  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
297bc82500SRobert Watson  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
307bc82500SRobert Watson  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
317bc82500SRobert Watson  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
327bc82500SRobert Watson  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
337bc82500SRobert Watson  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
347bc82500SRobert Watson  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
357bc82500SRobert Watson  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
367bc82500SRobert Watson  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
377bc82500SRobert Watson  * SUCH DAMAGE.
387bc82500SRobert Watson  *
397bc82500SRobert Watson  * $FreeBSD$
407bc82500SRobert Watson  */
417bc82500SRobert Watson /*
427bc82500SRobert Watson  * Developed by the TrustedBSD Project.
437bc82500SRobert Watson  *
447bc82500SRobert Watson  * Framework for extensible kernel access control.  Kernel and userland
457bc82500SRobert Watson  * interface to the framework, policy registration and composition.
467bc82500SRobert Watson  */
477bc82500SRobert Watson 
487bc82500SRobert Watson #include "opt_mac.h"
49328048bcSPoul-Henning Kamp #include "opt_devfs.h"
50f9d0d524SRobert Watson 
517bc82500SRobert Watson #include <sys/param.h>
5295fab37eSRobert Watson #include <sys/extattr.h>
5395fab37eSRobert Watson #include <sys/kernel.h>
5495fab37eSRobert Watson #include <sys/lock.h>
55b656366bSBruce Evans #include <sys/malloc.h>
5695fab37eSRobert Watson #include <sys/mutex.h>
5795fab37eSRobert Watson #include <sys/mac.h>
587ba28492SRobert Watson #include <sys/module.h>
5995fab37eSRobert Watson #include <sys/proc.h>
6095fab37eSRobert Watson #include <sys/systm.h>
617bc82500SRobert Watson #include <sys/sysproto.h>
627bc82500SRobert Watson #include <sys/sysent.h>
6395fab37eSRobert Watson #include <sys/vnode.h>
6495fab37eSRobert Watson #include <sys/mount.h>
6595fab37eSRobert Watson #include <sys/file.h>
6695fab37eSRobert Watson #include <sys/namei.h>
6795fab37eSRobert Watson #include <sys/socket.h>
6895fab37eSRobert Watson #include <sys/pipe.h>
6995fab37eSRobert Watson #include <sys/socketvar.h>
7095fab37eSRobert Watson #include <sys/sysctl.h>
7195fab37eSRobert Watson 
7295fab37eSRobert Watson #include <vm/vm.h>
7395fab37eSRobert Watson #include <vm/pmap.h>
7495fab37eSRobert Watson #include <vm/vm_map.h>
7595fab37eSRobert Watson #include <vm/vm_object.h>
7695fab37eSRobert Watson 
7795fab37eSRobert Watson #include <sys/mac_policy.h>
7895fab37eSRobert Watson 
7995fab37eSRobert Watson #include <fs/devfs/devfs.h>
8095fab37eSRobert Watson 
8195fab37eSRobert Watson #include <net/bpfdesc.h>
8295fab37eSRobert Watson #include <net/if.h>
8395fab37eSRobert Watson #include <net/if_var.h>
8495fab37eSRobert Watson 
8595fab37eSRobert Watson #include <netinet/in.h>
8695fab37eSRobert Watson #include <netinet/ip_var.h>
8795fab37eSRobert Watson 
8895fab37eSRobert Watson #ifdef MAC
8995fab37eSRobert Watson 
907ba28492SRobert Watson /*
917ba28492SRobert Watson  * Declare that the kernel provides MAC support, version 1.  This permits
927ba28492SRobert Watson  * modules to refuse to be loaded if the necessary support isn't present,
937ba28492SRobert Watson  * even if it's pre-boot.
947ba28492SRobert Watson  */
957ba28492SRobert Watson MODULE_VERSION(kernel_mac_support, 1);
967ba28492SRobert Watson 
9795fab37eSRobert Watson SYSCTL_DECL(_security);
9895fab37eSRobert Watson 
9995fab37eSRobert Watson SYSCTL_NODE(_security, OID_AUTO, mac, CTLFLAG_RW, 0,
10095fab37eSRobert Watson     "TrustedBSD MAC policy controls");
101b2f0927aSRobert Watson 
10295fab37eSRobert Watson #ifndef MAC_MAX_POLICIES
10395fab37eSRobert Watson #define	MAC_MAX_POLICIES	8
10495fab37eSRobert Watson #endif
10595fab37eSRobert Watson #if MAC_MAX_POLICIES > 32
10695fab37eSRobert Watson #error "MAC_MAX_POLICIES too large"
10795fab37eSRobert Watson #endif
10895fab37eSRobert Watson static unsigned int mac_max_policies = MAC_MAX_POLICIES;
10995fab37eSRobert Watson static unsigned int mac_policy_offsets_free = (1 << MAC_MAX_POLICIES) - 1;
11095fab37eSRobert Watson SYSCTL_UINT(_security_mac, OID_AUTO, max_policies, CTLFLAG_RD,
11195fab37eSRobert Watson     &mac_max_policies, 0, "");
11295fab37eSRobert Watson 
11395fab37eSRobert Watson static int	mac_late = 0;
11495fab37eSRobert Watson 
11595fab37eSRobert Watson static int	mac_enforce_fs = 1;
11695fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_fs, CTLFLAG_RW,
11795fab37eSRobert Watson     &mac_enforce_fs, 0, "Enforce MAC policy on file system objects");
11895fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_fs", &mac_enforce_fs);
11995fab37eSRobert Watson 
12095fab37eSRobert Watson static int	mac_enforce_network = 1;
12195fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_network, CTLFLAG_RW,
12295fab37eSRobert Watson     &mac_enforce_network, 0, "Enforce MAC policy on network packets");
12395fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
12495fab37eSRobert Watson 
125b88c98f6SRobert Watson static int	mac_enforce_pipe = 1;
126b88c98f6SRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
127b88c98f6SRobert Watson     &mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
128c031391bSRobert Watson TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
129b88c98f6SRobert Watson 
13095fab37eSRobert Watson static int	mac_enforce_process = 1;
13195fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
13295fab37eSRobert Watson     &mac_enforce_process, 0, "Enforce MAC policy on inter-process operations");
13395fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_process", &mac_enforce_process);
13495fab37eSRobert Watson 
13595fab37eSRobert Watson static int	mac_enforce_socket = 1;
13695fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_socket, CTLFLAG_RW,
13795fab37eSRobert Watson     &mac_enforce_socket, 0, "Enforce MAC policy on socket operations");
13895fab37eSRobert Watson TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
13995fab37eSRobert Watson 
140ca7850c3SRobert Watson static int     mac_enforce_vm = 1;
141ca7850c3SRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
142ca7850c3SRobert Watson     &mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
143c031391bSRobert Watson TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
144ca7850c3SRobert Watson 
14595fab37eSRobert Watson static int	mac_label_size = sizeof(struct mac);
14695fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
14795fab37eSRobert Watson     &mac_label_size, 0, "Pre-compiled MAC label size");
14895fab37eSRobert Watson 
14995fab37eSRobert Watson static int	mac_cache_fslabel_in_vnode = 1;
15095fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, cache_fslabel_in_vnode, CTLFLAG_RW,
15195fab37eSRobert Watson     &mac_cache_fslabel_in_vnode, 0, "Cache mount fslabel in vnode");
15295fab37eSRobert Watson TUNABLE_INT("security.mac.cache_fslabel_in_vnode",
15395fab37eSRobert Watson     &mac_cache_fslabel_in_vnode);
15495fab37eSRobert Watson 
15595fab37eSRobert Watson static int	mac_vnode_label_cache_hits = 0;
15695fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, vnode_label_cache_hits, CTLFLAG_RD,
15795fab37eSRobert Watson     &mac_vnode_label_cache_hits, 0, "Cache hits on vnode labels");
15895fab37eSRobert Watson static int	mac_vnode_label_cache_misses = 0;
15995fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, vnode_label_cache_misses, CTLFLAG_RD,
16095fab37eSRobert Watson     &mac_vnode_label_cache_misses, 0, "Cache misses on vnode labels");
161c0f39905SRobert Watson 
162c0f39905SRobert Watson static int	mac_mmap_revocation = 1;
163c0f39905SRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, mmap_revocation, CTLFLAG_RW,
164c0f39905SRobert Watson     &mac_mmap_revocation, 0, "Revoke mmap access to files on subject "
165c0f39905SRobert Watson     "relabel");
16699fa64f8SRobert Watson static int	mac_mmap_revocation_via_cow = 0;
16795fab37eSRobert Watson SYSCTL_INT(_security_mac, OID_AUTO, mmap_revocation_via_cow, CTLFLAG_RW,
16895fab37eSRobert Watson     &mac_mmap_revocation_via_cow, 0, "Revoke mmap access to files via "
16995fab37eSRobert Watson     "copy-on-write semantics, or by removing all write access");
17095fab37eSRobert Watson 
171f050add5SRobert Watson #ifdef MAC_DEBUG
1726be0c25eSRobert Watson SYSCTL_NODE(_security_mac, OID_AUTO, debug, CTLFLAG_RW, 0,
1736be0c25eSRobert Watson     "TrustedBSD MAC debug info");
1746be0c25eSRobert Watson 
1756be0c25eSRobert Watson static int	mac_debug_label_fallback = 0;
1766be0c25eSRobert Watson SYSCTL_INT(_security_mac_debug, OID_AUTO, label_fallback, CTLFLAG_RW,
1776be0c25eSRobert Watson     &mac_debug_label_fallback, 0, "Filesystems should fall back to fs label"
1786be0c25eSRobert Watson     "when label is corrupted.");
1796be0c25eSRobert Watson TUNABLE_INT("security.mac.debug_label_fallback",
1806be0c25eSRobert Watson     &mac_debug_label_fallback);
1816be0c25eSRobert Watson 
182b2f0927aSRobert Watson SYSCTL_NODE(_security_mac_debug, OID_AUTO, counters, CTLFLAG_RW, 0,
183b2f0927aSRobert Watson     "TrustedBSD MAC object counters");
184b2f0927aSRobert Watson 
18595fab37eSRobert Watson static unsigned int nmacmbufs, nmaccreds, nmacifnets, nmacbpfdescs,
18695fab37eSRobert Watson     nmacsockets, nmacmounts, nmactemp, nmacvnodes, nmacdevfsdirents,
18795fab37eSRobert Watson     nmacipqs, nmacpipes;
188b2f0927aSRobert Watson 
189b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, mbufs, CTLFLAG_RD,
19095fab37eSRobert Watson     &nmacmbufs, 0, "number of mbufs in use");
191b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, creds, CTLFLAG_RD,
19295fab37eSRobert Watson     &nmaccreds, 0, "number of ucreds in use");
193b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, ifnets, CTLFLAG_RD,
19495fab37eSRobert Watson     &nmacifnets, 0, "number of ifnets in use");
195b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, ipqs, CTLFLAG_RD,
19695fab37eSRobert Watson     &nmacipqs, 0, "number of ipqs in use");
197b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, bpfdescs, CTLFLAG_RD,
19895fab37eSRobert Watson     &nmacbpfdescs, 0, "number of bpfdescs in use");
199b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, sockets, CTLFLAG_RD,
20095fab37eSRobert Watson     &nmacsockets, 0, "number of sockets in use");
201b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, pipes, CTLFLAG_RD,
20295fab37eSRobert Watson     &nmacpipes, 0, "number of pipes in use");
203b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, mounts, CTLFLAG_RD,
20495fab37eSRobert Watson     &nmacmounts, 0, "number of mounts in use");
205b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, temp, CTLFLAG_RD,
20695fab37eSRobert Watson     &nmactemp, 0, "number of temporary labels in use");
207b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, vnodes, CTLFLAG_RD,
20895fab37eSRobert Watson     &nmacvnodes, 0, "number of vnodes in use");
209b2f0927aSRobert Watson SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, devfsdirents, CTLFLAG_RD,
21095fab37eSRobert Watson     &nmacdevfsdirents, 0, "number of devfs dirents inuse");
211f050add5SRobert Watson #endif
21295fab37eSRobert Watson 
21395fab37eSRobert Watson static int	error_select(int error1, int error2);
21495fab37eSRobert Watson static int	mac_externalize(struct label *label, struct mac *mac);
21595fab37eSRobert Watson static int	mac_policy_register(struct mac_policy_conf *mpc);
21695fab37eSRobert Watson static int	mac_policy_unregister(struct mac_policy_conf *mpc);
21795fab37eSRobert Watson 
21895fab37eSRobert Watson static int	mac_stdcreatevnode_ea(struct vnode *vp);
21995fab37eSRobert Watson static void	mac_cred_mmapped_drop_perms(struct thread *td,
22095fab37eSRobert Watson 		    struct ucred *cred);
22195fab37eSRobert Watson static void	mac_cred_mmapped_drop_perms_recurse(struct thread *td,
22295fab37eSRobert Watson 		    struct ucred *cred, struct vm_map *map);
22395fab37eSRobert Watson 
22483985c26SRobert Watson static void	mac_destroy_socket_label(struct label *label);
22583985c26SRobert Watson 
22695fab37eSRobert Watson MALLOC_DEFINE(M_MACOPVEC, "macopvec", "MAC policy operation vector");
22795fab37eSRobert Watson MALLOC_DEFINE(M_MACPIPELABEL, "macpipelabel", "MAC labels for pipes");
22895fab37eSRobert Watson 
22995fab37eSRobert Watson /*
23095fab37eSRobert Watson  * mac_policy_list_lock protects the consistency of 'mac_policy_list',
23195fab37eSRobert Watson  * the linked list of attached policy modules.  Read-only consumers of
23295fab37eSRobert Watson  * the list must acquire a shared lock for the duration of their use;
23395fab37eSRobert Watson  * writers must acquire an exclusive lock.  Note that for compound
23495fab37eSRobert Watson  * operations, locks should be held for the entire compound operation,
23595fab37eSRobert Watson  * and that this is not yet done for relabel requests.
23695fab37eSRobert Watson  */
23795fab37eSRobert Watson static struct mtx mac_policy_list_lock;
23895fab37eSRobert Watson static LIST_HEAD(, mac_policy_conf) mac_policy_list;
23995fab37eSRobert Watson static int mac_policy_list_busy;
24095fab37eSRobert Watson #define	MAC_POLICY_LIST_LOCKINIT()	mtx_init(&mac_policy_list_lock,	\
24195fab37eSRobert Watson 	"mac_policy_list_lock", NULL, MTX_DEF);
24295fab37eSRobert Watson #define	MAC_POLICY_LIST_LOCK()	mtx_lock(&mac_policy_list_lock);
24395fab37eSRobert Watson #define	MAC_POLICY_LIST_UNLOCK()	mtx_unlock(&mac_policy_list_lock);
24495fab37eSRobert Watson 
24595fab37eSRobert Watson #define	MAC_POLICY_LIST_BUSY() do {					\
24695fab37eSRobert Watson 	MAC_POLICY_LIST_LOCK();						\
24795fab37eSRobert Watson 	mac_policy_list_busy++;						\
24895fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();					\
24995fab37eSRobert Watson } while (0)
25095fab37eSRobert Watson 
25195fab37eSRobert Watson #define	MAC_POLICY_LIST_UNBUSY() do {					\
25295fab37eSRobert Watson 	MAC_POLICY_LIST_LOCK();						\
25395fab37eSRobert Watson 	mac_policy_list_busy--;						\
25495fab37eSRobert Watson 	if (mac_policy_list_busy < 0)					\
25595fab37eSRobert Watson 		panic("Extra mac_policy_list_busy--");			\
25695fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();					\
25795fab37eSRobert Watson } while (0)
25895fab37eSRobert Watson 
25995fab37eSRobert Watson /*
26095fab37eSRobert Watson  * MAC_CHECK performs the designated check by walking the policy
26195fab37eSRobert Watson  * module list and checking with each as to how it feels about the
26295fab37eSRobert Watson  * request.  Note that it returns its value via 'error' in the scope
26395fab37eSRobert Watson  * of the caller.
26495fab37eSRobert Watson  */
26595fab37eSRobert Watson #define	MAC_CHECK(check, args...) do {					\
26695fab37eSRobert Watson 	struct mac_policy_conf *mpc;					\
26795fab37eSRobert Watson 									\
26895fab37eSRobert Watson 	error = 0;							\
26995fab37eSRobert Watson 	MAC_POLICY_LIST_BUSY();						\
27095fab37eSRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {			\
27195fab37eSRobert Watson 		if (mpc->mpc_ops->mpo_ ## check != NULL)		\
27295fab37eSRobert Watson 			error = error_select(				\
27395fab37eSRobert Watson 			    mpc->mpc_ops->mpo_ ## check (args),		\
27495fab37eSRobert Watson 			    error);					\
27595fab37eSRobert Watson 	}								\
27695fab37eSRobert Watson 	MAC_POLICY_LIST_UNBUSY();					\
27795fab37eSRobert Watson } while (0)
27895fab37eSRobert Watson 
27995fab37eSRobert Watson /*
28095fab37eSRobert Watson  * MAC_BOOLEAN performs the designated boolean composition by walking
28195fab37eSRobert Watson  * the module list, invoking each instance of the operation, and
28295fab37eSRobert Watson  * combining the results using the passed C operator.  Note that it
28395fab37eSRobert Watson  * returns its value via 'result' in the scope of the caller, which
28495fab37eSRobert Watson  * should be initialized by the caller in a meaningful way to get
28595fab37eSRobert Watson  * a meaningful result.
28695fab37eSRobert Watson  */
28795fab37eSRobert Watson #define	MAC_BOOLEAN(operation, composition, args...) do {		\
28895fab37eSRobert Watson 	struct mac_policy_conf *mpc;					\
28995fab37eSRobert Watson 									\
29095fab37eSRobert Watson 	MAC_POLICY_LIST_BUSY();						\
29195fab37eSRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {			\
29295fab37eSRobert Watson 		if (mpc->mpc_ops->mpo_ ## operation != NULL)		\
29395fab37eSRobert Watson 			result = result composition			\
29495fab37eSRobert Watson 			    mpc->mpc_ops->mpo_ ## operation (args);	\
29595fab37eSRobert Watson 	}								\
29695fab37eSRobert Watson 	MAC_POLICY_LIST_UNBUSY();					\
29795fab37eSRobert Watson } while (0)
29895fab37eSRobert Watson 
29995fab37eSRobert Watson /*
30095fab37eSRobert Watson  * MAC_PERFORM performs the designated operation by walking the policy
30195fab37eSRobert Watson  * module list and invoking that operation for each policy.
30295fab37eSRobert Watson  */
30395fab37eSRobert Watson #define	MAC_PERFORM(operation, args...) do {				\
30495fab37eSRobert Watson 	struct mac_policy_conf *mpc;					\
30595fab37eSRobert Watson 									\
30695fab37eSRobert Watson 	MAC_POLICY_LIST_BUSY();						\
30795fab37eSRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {			\
30895fab37eSRobert Watson 		if (mpc->mpc_ops->mpo_ ## operation != NULL)		\
30995fab37eSRobert Watson 			mpc->mpc_ops->mpo_ ## operation (args);		\
31095fab37eSRobert Watson 	}								\
31195fab37eSRobert Watson 	MAC_POLICY_LIST_UNBUSY();					\
31295fab37eSRobert Watson } while (0)
31395fab37eSRobert Watson 
31495fab37eSRobert Watson /*
31595fab37eSRobert Watson  * Initialize the MAC subsystem, including appropriate SMP locks.
31695fab37eSRobert Watson  */
31795fab37eSRobert Watson static void
31895fab37eSRobert Watson mac_init(void)
31995fab37eSRobert Watson {
32095fab37eSRobert Watson 
32195fab37eSRobert Watson 	LIST_INIT(&mac_policy_list);
32295fab37eSRobert Watson 	MAC_POLICY_LIST_LOCKINIT();
32395fab37eSRobert Watson }
32495fab37eSRobert Watson 
32595fab37eSRobert Watson /*
32695fab37eSRobert Watson  * For the purposes of modules that want to know if they were loaded
32795fab37eSRobert Watson  * "early", set the mac_late flag once we've processed modules either
32895fab37eSRobert Watson  * linked into the kernel, or loaded before the kernel startup.
32995fab37eSRobert Watson  */
33095fab37eSRobert Watson static void
33195fab37eSRobert Watson mac_late_init(void)
33295fab37eSRobert Watson {
33395fab37eSRobert Watson 
33495fab37eSRobert Watson 	mac_late = 1;
33595fab37eSRobert Watson }
33695fab37eSRobert Watson 
33795fab37eSRobert Watson /*
33895fab37eSRobert Watson  * Allow MAC policy modules to register during boot, etc.
33995fab37eSRobert Watson  */
34095fab37eSRobert Watson int
34195fab37eSRobert Watson mac_policy_modevent(module_t mod, int type, void *data)
34295fab37eSRobert Watson {
34395fab37eSRobert Watson 	struct mac_policy_conf *mpc;
34495fab37eSRobert Watson 	int error;
34595fab37eSRobert Watson 
34695fab37eSRobert Watson 	error = 0;
34795fab37eSRobert Watson 	mpc = (struct mac_policy_conf *) data;
34895fab37eSRobert Watson 
34995fab37eSRobert Watson 	switch (type) {
35095fab37eSRobert Watson 	case MOD_LOAD:
35195fab37eSRobert Watson 		if (mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_NOTLATE &&
35295fab37eSRobert Watson 		    mac_late) {
35395fab37eSRobert Watson 			printf("mac_policy_modevent: can't load %s policy "
35495fab37eSRobert Watson 			    "after booting\n", mpc->mpc_name);
35595fab37eSRobert Watson 			error = EBUSY;
35695fab37eSRobert Watson 			break;
35795fab37eSRobert Watson 		}
35895fab37eSRobert Watson 		error = mac_policy_register(mpc);
35995fab37eSRobert Watson 		break;
36095fab37eSRobert Watson 	case MOD_UNLOAD:
36195fab37eSRobert Watson 		/* Don't unregister the module if it was never registered. */
36295fab37eSRobert Watson 		if ((mpc->mpc_runtime_flags & MPC_RUNTIME_FLAG_REGISTERED)
36395fab37eSRobert Watson 		    != 0)
36495fab37eSRobert Watson 			error = mac_policy_unregister(mpc);
36595fab37eSRobert Watson 		else
36695fab37eSRobert Watson 			error = 0;
36795fab37eSRobert Watson 		break;
36895fab37eSRobert Watson 	default:
36995fab37eSRobert Watson 		break;
37095fab37eSRobert Watson 	}
37195fab37eSRobert Watson 
37295fab37eSRobert Watson 	return (error);
37395fab37eSRobert Watson }
37495fab37eSRobert Watson 
37595fab37eSRobert Watson static int
37695fab37eSRobert Watson mac_policy_register(struct mac_policy_conf *mpc)
37795fab37eSRobert Watson {
37895fab37eSRobert Watson 	struct mac_policy_conf *tmpc;
37995fab37eSRobert Watson 	struct mac_policy_op_entry *mpe;
38095fab37eSRobert Watson 	int slot;
38195fab37eSRobert Watson 
382cc51a2b5SRobert Watson 	MALLOC(mpc->mpc_ops, struct mac_policy_ops *, sizeof(*mpc->mpc_ops),
383cc51a2b5SRobert Watson 	    M_MACOPVEC, M_WAITOK | M_ZERO);
38495fab37eSRobert Watson 	for (mpe = mpc->mpc_entries; mpe->mpe_constant != MAC_OP_LAST; mpe++) {
38595fab37eSRobert Watson 		switch (mpe->mpe_constant) {
38695fab37eSRobert Watson 		case MAC_OP_LAST:
38795fab37eSRobert Watson 			/*
38895fab37eSRobert Watson 			 * Doesn't actually happen, but this allows checking
38995fab37eSRobert Watson 			 * that all enumerated values are handled.
39095fab37eSRobert Watson 			 */
39195fab37eSRobert Watson 			break;
39295fab37eSRobert Watson 		case MAC_DESTROY:
39395fab37eSRobert Watson 			mpc->mpc_ops->mpo_destroy =
39495fab37eSRobert Watson 			    mpe->mpe_function;
39595fab37eSRobert Watson 			break;
39695fab37eSRobert Watson 		case MAC_INIT:
39795fab37eSRobert Watson 			mpc->mpc_ops->mpo_init =
39895fab37eSRobert Watson 			    mpe->mpe_function;
39995fab37eSRobert Watson 			break;
40027f2eac7SRobert Watson 		case MAC_SYSCALL:
40127f2eac7SRobert Watson 			mpc->mpc_ops->mpo_syscall =
40227f2eac7SRobert Watson 			    mpe->mpe_function;
40327f2eac7SRobert Watson 			break;
40496adb909SRobert Watson 		case MAC_INIT_BPFDESC_LABEL:
40596adb909SRobert Watson 			mpc->mpc_ops->mpo_init_bpfdesc_label =
40695fab37eSRobert Watson 			    mpe->mpe_function;
40795fab37eSRobert Watson 			break;
40896adb909SRobert Watson 		case MAC_INIT_CRED_LABEL:
40996adb909SRobert Watson 			mpc->mpc_ops->mpo_init_cred_label =
41095fab37eSRobert Watson 			    mpe->mpe_function;
41195fab37eSRobert Watson 			break;
41296adb909SRobert Watson 		case MAC_INIT_DEVFSDIRENT_LABEL:
41396adb909SRobert Watson 			mpc->mpc_ops->mpo_init_devfsdirent_label =
41495fab37eSRobert Watson 			    mpe->mpe_function;
41595fab37eSRobert Watson 			break;
41696adb909SRobert Watson 		case MAC_INIT_IFNET_LABEL:
41796adb909SRobert Watson 			mpc->mpc_ops->mpo_init_ifnet_label =
41895fab37eSRobert Watson 			    mpe->mpe_function;
41995fab37eSRobert Watson 			break;
42096adb909SRobert Watson 		case MAC_INIT_IPQ_LABEL:
42196adb909SRobert Watson 			mpc->mpc_ops->mpo_init_ipq_label =
42295fab37eSRobert Watson 			    mpe->mpe_function;
42395fab37eSRobert Watson 			break;
42496adb909SRobert Watson 		case MAC_INIT_MBUF_LABEL:
42596adb909SRobert Watson 			mpc->mpc_ops->mpo_init_mbuf_label =
42695fab37eSRobert Watson 			    mpe->mpe_function;
42795fab37eSRobert Watson 			break;
42896adb909SRobert Watson 		case MAC_INIT_MOUNT_LABEL:
42996adb909SRobert Watson 			mpc->mpc_ops->mpo_init_mount_label =
43095fab37eSRobert Watson 			    mpe->mpe_function;
43195fab37eSRobert Watson 			break;
43296adb909SRobert Watson 		case MAC_INIT_MOUNT_FS_LABEL:
43396adb909SRobert Watson 			mpc->mpc_ops->mpo_init_mount_fs_label =
43495fab37eSRobert Watson 			    mpe->mpe_function;
43595fab37eSRobert Watson 			break;
43696adb909SRobert Watson 		case MAC_INIT_PIPE_LABEL:
43796adb909SRobert Watson 			mpc->mpc_ops->mpo_init_pipe_label =
43895fab37eSRobert Watson 			    mpe->mpe_function;
43995fab37eSRobert Watson 			break;
44096adb909SRobert Watson 		case MAC_INIT_SOCKET_LABEL:
44196adb909SRobert Watson 			mpc->mpc_ops->mpo_init_socket_label =
44295fab37eSRobert Watson 			    mpe->mpe_function;
44395fab37eSRobert Watson 			break;
44496adb909SRobert Watson 		case MAC_INIT_SOCKET_PEER_LABEL:
44596adb909SRobert Watson 			mpc->mpc_ops->mpo_init_socket_peer_label =
44695fab37eSRobert Watson 			    mpe->mpe_function;
44795fab37eSRobert Watson 			break;
44896adb909SRobert Watson 		case MAC_INIT_TEMP_LABEL:
44996adb909SRobert Watson 			mpc->mpc_ops->mpo_init_temp_label =
45095fab37eSRobert Watson 			    mpe->mpe_function;
45195fab37eSRobert Watson 			break;
45296adb909SRobert Watson 		case MAC_INIT_VNODE_LABEL:
45396adb909SRobert Watson 			mpc->mpc_ops->mpo_init_vnode_label =
45495fab37eSRobert Watson 			    mpe->mpe_function;
45595fab37eSRobert Watson 			break;
45696adb909SRobert Watson 		case MAC_DESTROY_BPFDESC_LABEL:
45796adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_bpfdesc_label =
45895fab37eSRobert Watson 			    mpe->mpe_function;
45995fab37eSRobert Watson 			break;
46096adb909SRobert Watson 		case MAC_DESTROY_CRED_LABEL:
46196adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_cred_label =
46295fab37eSRobert Watson 			    mpe->mpe_function;
46395fab37eSRobert Watson 			break;
46496adb909SRobert Watson 		case MAC_DESTROY_DEVFSDIRENT_LABEL:
46596adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_devfsdirent_label =
46695fab37eSRobert Watson 			    mpe->mpe_function;
46795fab37eSRobert Watson 			break;
46896adb909SRobert Watson 		case MAC_DESTROY_IFNET_LABEL:
46996adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_ifnet_label =
47095fab37eSRobert Watson 			    mpe->mpe_function;
47195fab37eSRobert Watson 			break;
47296adb909SRobert Watson 		case MAC_DESTROY_IPQ_LABEL:
47396adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_ipq_label =
47495fab37eSRobert Watson 			    mpe->mpe_function;
47595fab37eSRobert Watson 			break;
47696adb909SRobert Watson 		case MAC_DESTROY_MBUF_LABEL:
47796adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_mbuf_label =
47895fab37eSRobert Watson 			    mpe->mpe_function;
47995fab37eSRobert Watson 			break;
48096adb909SRobert Watson 		case MAC_DESTROY_MOUNT_LABEL:
48196adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_mount_label =
48295fab37eSRobert Watson 			    mpe->mpe_function;
48395fab37eSRobert Watson 			break;
48496adb909SRobert Watson 		case MAC_DESTROY_MOUNT_FS_LABEL:
48596adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_mount_fs_label =
48695fab37eSRobert Watson 			    mpe->mpe_function;
48795fab37eSRobert Watson 			break;
48896adb909SRobert Watson 		case MAC_DESTROY_PIPE_LABEL:
48996adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_pipe_label =
49096adb909SRobert Watson 			    mpe->mpe_function;
49196adb909SRobert Watson 			break;
49296adb909SRobert Watson 		case MAC_DESTROY_SOCKET_LABEL:
49396adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_socket_label =
49496adb909SRobert Watson 			    mpe->mpe_function;
49596adb909SRobert Watson 			break;
49696adb909SRobert Watson 		case MAC_DESTROY_SOCKET_PEER_LABEL:
49796adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_socket_peer_label =
49896adb909SRobert Watson 			    mpe->mpe_function;
49996adb909SRobert Watson 			break;
50096adb909SRobert Watson 		case MAC_DESTROY_TEMP_LABEL:
50196adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_temp_label =
50296adb909SRobert Watson 			    mpe->mpe_function;
50396adb909SRobert Watson 			break;
50496adb909SRobert Watson 		case MAC_DESTROY_VNODE_LABEL:
50596adb909SRobert Watson 			mpc->mpc_ops->mpo_destroy_vnode_label =
50695fab37eSRobert Watson 			    mpe->mpe_function;
50795fab37eSRobert Watson 			break;
50895fab37eSRobert Watson 		case MAC_EXTERNALIZE:
50995fab37eSRobert Watson 			mpc->mpc_ops->mpo_externalize =
51095fab37eSRobert Watson 			    mpe->mpe_function;
51195fab37eSRobert Watson 			break;
51295fab37eSRobert Watson 		case MAC_INTERNALIZE:
51395fab37eSRobert Watson 			mpc->mpc_ops->mpo_internalize =
51495fab37eSRobert Watson 			    mpe->mpe_function;
51595fab37eSRobert Watson 			break;
51695fab37eSRobert Watson 		case MAC_CREATE_DEVFS_DEVICE:
51795fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_devfs_device =
51895fab37eSRobert Watson 			    mpe->mpe_function;
51995fab37eSRobert Watson 			break;
52095fab37eSRobert Watson 		case MAC_CREATE_DEVFS_DIRECTORY:
52195fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_devfs_directory =
52295fab37eSRobert Watson 			    mpe->mpe_function;
52395fab37eSRobert Watson 			break;
52474e62b1bSRobert Watson 		case MAC_CREATE_DEVFS_SYMLINK:
52574e62b1bSRobert Watson 			mpc->mpc_ops->mpo_create_devfs_symlink =
52674e62b1bSRobert Watson 			    mpe->mpe_function;
52774e62b1bSRobert Watson 			break;
52895fab37eSRobert Watson 		case MAC_CREATE_DEVFS_VNODE:
52995fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_devfs_vnode =
53095fab37eSRobert Watson 			    mpe->mpe_function;
53195fab37eSRobert Watson 			break;
53295fab37eSRobert Watson 		case MAC_STDCREATEVNODE_EA:
53395fab37eSRobert Watson 			mpc->mpc_ops->mpo_stdcreatevnode_ea =
53495fab37eSRobert Watson 			    mpe->mpe_function;
53595fab37eSRobert Watson 			break;
53695fab37eSRobert Watson 		case MAC_CREATE_VNODE:
53795fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_vnode =
53895fab37eSRobert Watson 			    mpe->mpe_function;
53995fab37eSRobert Watson 			break;
54095fab37eSRobert Watson 		case MAC_CREATE_MOUNT:
54195fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mount =
54295fab37eSRobert Watson 			    mpe->mpe_function;
54395fab37eSRobert Watson 			break;
54495fab37eSRobert Watson 		case MAC_CREATE_ROOT_MOUNT:
54595fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_root_mount =
54695fab37eSRobert Watson 			    mpe->mpe_function;
54795fab37eSRobert Watson 			break;
54895fab37eSRobert Watson 		case MAC_RELABEL_VNODE:
54995fab37eSRobert Watson 			mpc->mpc_ops->mpo_relabel_vnode =
55095fab37eSRobert Watson 			    mpe->mpe_function;
55195fab37eSRobert Watson 			break;
55295fab37eSRobert Watson 		case MAC_UPDATE_DEVFSDIRENT:
55395fab37eSRobert Watson 			mpc->mpc_ops->mpo_update_devfsdirent =
55495fab37eSRobert Watson 			    mpe->mpe_function;
55595fab37eSRobert Watson 			break;
55695fab37eSRobert Watson 		case MAC_UPDATE_PROCFSVNODE:
55795fab37eSRobert Watson 			mpc->mpc_ops->mpo_update_procfsvnode =
55895fab37eSRobert Watson 			    mpe->mpe_function;
55995fab37eSRobert Watson 			break;
56095fab37eSRobert Watson 		case MAC_UPDATE_VNODE_FROM_EXTATTR:
56195fab37eSRobert Watson 			mpc->mpc_ops->mpo_update_vnode_from_extattr =
56295fab37eSRobert Watson 			    mpe->mpe_function;
56395fab37eSRobert Watson 			break;
56495fab37eSRobert Watson 		case MAC_UPDATE_VNODE_FROM_EXTERNALIZED:
56595fab37eSRobert Watson 			mpc->mpc_ops->mpo_update_vnode_from_externalized =
56695fab37eSRobert Watson 			    mpe->mpe_function;
56795fab37eSRobert Watson 			break;
56895fab37eSRobert Watson 		case MAC_UPDATE_VNODE_FROM_MOUNT:
56995fab37eSRobert Watson 			mpc->mpc_ops->mpo_update_vnode_from_mount =
57095fab37eSRobert Watson 			    mpe->mpe_function;
57195fab37eSRobert Watson 			break;
57295fab37eSRobert Watson 		case MAC_CREATE_MBUF_FROM_SOCKET:
57395fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_from_socket =
57495fab37eSRobert Watson 			    mpe->mpe_function;
57595fab37eSRobert Watson 			break;
57695fab37eSRobert Watson 		case MAC_CREATE_PIPE:
57795fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_pipe =
57895fab37eSRobert Watson 			    mpe->mpe_function;
57995fab37eSRobert Watson 			break;
58095fab37eSRobert Watson 		case MAC_CREATE_SOCKET:
58195fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_socket =
58295fab37eSRobert Watson 			    mpe->mpe_function;
58395fab37eSRobert Watson 			break;
58495fab37eSRobert Watson 		case MAC_CREATE_SOCKET_FROM_SOCKET:
58595fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_socket_from_socket =
58695fab37eSRobert Watson 			    mpe->mpe_function;
58795fab37eSRobert Watson 			break;
58895fab37eSRobert Watson 		case MAC_RELABEL_PIPE:
58995fab37eSRobert Watson 			mpc->mpc_ops->mpo_relabel_pipe =
59095fab37eSRobert Watson 			    mpe->mpe_function;
59195fab37eSRobert Watson 			break;
59295fab37eSRobert Watson 		case MAC_RELABEL_SOCKET:
59395fab37eSRobert Watson 			mpc->mpc_ops->mpo_relabel_socket =
59495fab37eSRobert Watson 			    mpe->mpe_function;
59595fab37eSRobert Watson 			break;
59695fab37eSRobert Watson 		case MAC_SET_SOCKET_PEER_FROM_MBUF:
59795fab37eSRobert Watson 			mpc->mpc_ops->mpo_set_socket_peer_from_mbuf =
59895fab37eSRobert Watson 			    mpe->mpe_function;
59995fab37eSRobert Watson 			break;
60095fab37eSRobert Watson 		case MAC_SET_SOCKET_PEER_FROM_SOCKET:
60195fab37eSRobert Watson 			mpc->mpc_ops->mpo_set_socket_peer_from_socket =
60295fab37eSRobert Watson 			    mpe->mpe_function;
60395fab37eSRobert Watson 			break;
60495fab37eSRobert Watson 		case MAC_CREATE_BPFDESC:
60595fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_bpfdesc =
60695fab37eSRobert Watson 			    mpe->mpe_function;
60795fab37eSRobert Watson 			break;
60895fab37eSRobert Watson 		case MAC_CREATE_DATAGRAM_FROM_IPQ:
60995fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_datagram_from_ipq =
61095fab37eSRobert Watson 			    mpe->mpe_function;
61195fab37eSRobert Watson 			break;
61295fab37eSRobert Watson 		case MAC_CREATE_FRAGMENT:
61395fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_fragment =
61495fab37eSRobert Watson 			    mpe->mpe_function;
61595fab37eSRobert Watson 			break;
61695fab37eSRobert Watson 		case MAC_CREATE_IFNET:
61795fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_ifnet =
61895fab37eSRobert Watson 			    mpe->mpe_function;
61995fab37eSRobert Watson 			break;
62095fab37eSRobert Watson 		case MAC_CREATE_IPQ:
62195fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_ipq =
62295fab37eSRobert Watson 			    mpe->mpe_function;
62395fab37eSRobert Watson 			break;
62495fab37eSRobert Watson 		case MAC_CREATE_MBUF_FROM_MBUF:
62595fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_from_mbuf =
62695fab37eSRobert Watson 			    mpe->mpe_function;
62795fab37eSRobert Watson 			break;
62895fab37eSRobert Watson 		case MAC_CREATE_MBUF_LINKLAYER:
62995fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_linklayer =
63095fab37eSRobert Watson 			    mpe->mpe_function;
63195fab37eSRobert Watson 			break;
63295fab37eSRobert Watson 		case MAC_CREATE_MBUF_FROM_BPFDESC:
63395fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_from_bpfdesc =
63495fab37eSRobert Watson 			    mpe->mpe_function;
63595fab37eSRobert Watson 			break;
63695fab37eSRobert Watson 		case MAC_CREATE_MBUF_FROM_IFNET:
63795fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_from_ifnet =
63895fab37eSRobert Watson 			    mpe->mpe_function;
63995fab37eSRobert Watson 			break;
64095fab37eSRobert Watson 		case MAC_CREATE_MBUF_MULTICAST_ENCAP:
64195fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_multicast_encap =
64295fab37eSRobert Watson 			    mpe->mpe_function;
64395fab37eSRobert Watson 			break;
64495fab37eSRobert Watson 		case MAC_CREATE_MBUF_NETLAYER:
64595fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_mbuf_netlayer =
64695fab37eSRobert Watson 			    mpe->mpe_function;
64795fab37eSRobert Watson 			break;
64895fab37eSRobert Watson 		case MAC_FRAGMENT_MATCH:
64995fab37eSRobert Watson 			mpc->mpc_ops->mpo_fragment_match =
65095fab37eSRobert Watson 			    mpe->mpe_function;
65195fab37eSRobert Watson 			break;
65295fab37eSRobert Watson 		case MAC_RELABEL_IFNET:
65395fab37eSRobert Watson 			mpc->mpc_ops->mpo_relabel_ifnet =
65495fab37eSRobert Watson 			    mpe->mpe_function;
65595fab37eSRobert Watson 			break;
65695fab37eSRobert Watson 		case MAC_UPDATE_IPQ:
65795fab37eSRobert Watson 			mpc->mpc_ops->mpo_update_ipq =
65895fab37eSRobert Watson 			    mpe->mpe_function;
65995fab37eSRobert Watson 			break;
66095fab37eSRobert Watson 		case MAC_CREATE_CRED:
66195fab37eSRobert Watson 			mpc->mpc_ops->mpo_create_cred =
66295fab37eSRobert Watson 			    mpe->mpe_function;
66395fab37eSRobert Watson 			break;
66495fab37eSRobert Watson 		case MAC_EXECVE_TRANSITION:
66595fab37eSRobert Watson 			mpc->mpc_ops->mpo_execve_transition =
66695fab37eSRobert Watson 			    mpe->mpe_function;
66795fab37eSRobert Watson 			break;
66895fab37eSRobert Watson 		case MAC_EXECVE_WILL_TRANSITION:
66995fab37eSRobert Watson 			mpc->mpc_ops->mpo_execve_will_transition =
67095fab37eSRobert Watson 			    mpe->mpe_function;
67195fab37eSRobert Watson 			break;
67295fab37eSRobert Watson 		case MAC_CREATE_PROC0:
673226b96fbSRobert Watson 			mpc->mpc_ops->mpo_create_proc0 =
674226b96fbSRobert Watson 			    mpe->mpe_function;
67595fab37eSRobert Watson 			break;
67695fab37eSRobert Watson 		case MAC_CREATE_PROC1:
677226b96fbSRobert Watson 			mpc->mpc_ops->mpo_create_proc1 =
678226b96fbSRobert Watson 			    mpe->mpe_function;
67995fab37eSRobert Watson 			break;
68095fab37eSRobert Watson 		case MAC_RELABEL_CRED:
68195fab37eSRobert Watson 			mpc->mpc_ops->mpo_relabel_cred =
68295fab37eSRobert Watson 			    mpe->mpe_function;
68395fab37eSRobert Watson 			break;
68492dbb82aSRobert Watson 		case MAC_THREAD_USERRET:
68592dbb82aSRobert Watson 			mpc->mpc_ops->mpo_thread_userret =
68692dbb82aSRobert Watson 			    mpe->mpe_function;
68792dbb82aSRobert Watson 			break;
68895fab37eSRobert Watson 		case MAC_CHECK_BPFDESC_RECEIVE:
68995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_bpfdesc_receive =
69095fab37eSRobert Watson 			    mpe->mpe_function;
69195fab37eSRobert Watson 			break;
69295fab37eSRobert Watson 		case MAC_CHECK_CRED_RELABEL:
69395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_cred_relabel =
69495fab37eSRobert Watson 			    mpe->mpe_function;
69595fab37eSRobert Watson 			break;
69695fab37eSRobert Watson 		case MAC_CHECK_CRED_VISIBLE:
69795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_cred_visible =
69895fab37eSRobert Watson 			    mpe->mpe_function;
69995fab37eSRobert Watson 			break;
70095fab37eSRobert Watson 		case MAC_CHECK_IFNET_RELABEL:
70195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_ifnet_relabel =
70295fab37eSRobert Watson 			    mpe->mpe_function;
70395fab37eSRobert Watson 			break;
70495fab37eSRobert Watson 		case MAC_CHECK_IFNET_TRANSMIT:
70595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_ifnet_transmit =
70695fab37eSRobert Watson 			    mpe->mpe_function;
70795fab37eSRobert Watson 			break;
70895fab37eSRobert Watson 		case MAC_CHECK_MOUNT_STAT:
70995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_mount_stat =
71095fab37eSRobert Watson 			    mpe->mpe_function;
71195fab37eSRobert Watson 			break;
71295fab37eSRobert Watson 		case MAC_CHECK_PIPE_IOCTL:
71395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_pipe_ioctl =
71495fab37eSRobert Watson 			    mpe->mpe_function;
71595fab37eSRobert Watson 			break;
716c024c3eeSRobert Watson 		case MAC_CHECK_PIPE_POLL:
717c024c3eeSRobert Watson 			mpc->mpc_ops->mpo_check_pipe_poll =
718c024c3eeSRobert Watson 			    mpe->mpe_function;
719c024c3eeSRobert Watson 			break;
720c024c3eeSRobert Watson 		case MAC_CHECK_PIPE_READ:
721c024c3eeSRobert Watson 			mpc->mpc_ops->mpo_check_pipe_read =
72295fab37eSRobert Watson 			    mpe->mpe_function;
72395fab37eSRobert Watson 			break;
72495fab37eSRobert Watson 		case MAC_CHECK_PIPE_RELABEL:
72595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_pipe_relabel =
72695fab37eSRobert Watson 			    mpe->mpe_function;
72795fab37eSRobert Watson 			break;
728c024c3eeSRobert Watson 		case MAC_CHECK_PIPE_STAT:
729c024c3eeSRobert Watson 			mpc->mpc_ops->mpo_check_pipe_stat =
730c024c3eeSRobert Watson 			    mpe->mpe_function;
731c024c3eeSRobert Watson 			break;
732c024c3eeSRobert Watson 		case MAC_CHECK_PIPE_WRITE:
733c024c3eeSRobert Watson 			mpc->mpc_ops->mpo_check_pipe_write =
734c024c3eeSRobert Watson 			    mpe->mpe_function;
735c024c3eeSRobert Watson 			break;
73695fab37eSRobert Watson 		case MAC_CHECK_PROC_DEBUG:
73795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_proc_debug =
73895fab37eSRobert Watson 			    mpe->mpe_function;
73995fab37eSRobert Watson 			break;
74095fab37eSRobert Watson 		case MAC_CHECK_PROC_SCHED:
74195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_proc_sched =
74295fab37eSRobert Watson 			    mpe->mpe_function;
74395fab37eSRobert Watson 			break;
74495fab37eSRobert Watson 		case MAC_CHECK_PROC_SIGNAL:
74595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_proc_signal =
74695fab37eSRobert Watson 			    mpe->mpe_function;
74795fab37eSRobert Watson 			break;
74895fab37eSRobert Watson 		case MAC_CHECK_SOCKET_BIND:
74995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_socket_bind =
75095fab37eSRobert Watson 			    mpe->mpe_function;
75195fab37eSRobert Watson 			break;
75295fab37eSRobert Watson 		case MAC_CHECK_SOCKET_CONNECT:
75395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_socket_connect =
75495fab37eSRobert Watson 			    mpe->mpe_function;
75595fab37eSRobert Watson 			break;
756d61198e4SRobert Watson 		case MAC_CHECK_SOCKET_DELIVER:
757d61198e4SRobert Watson 			mpc->mpc_ops->mpo_check_socket_deliver =
75895fab37eSRobert Watson 			    mpe->mpe_function;
75995fab37eSRobert Watson 			break;
760d61198e4SRobert Watson 		case MAC_CHECK_SOCKET_LISTEN:
761d61198e4SRobert Watson 			mpc->mpc_ops->mpo_check_socket_listen =
76295fab37eSRobert Watson 			    mpe->mpe_function;
76395fab37eSRobert Watson 			break;
76495fab37eSRobert Watson 		case MAC_CHECK_SOCKET_RELABEL:
76595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_socket_relabel =
76695fab37eSRobert Watson 			    mpe->mpe_function;
76795fab37eSRobert Watson 			break;
76895fab37eSRobert Watson 		case MAC_CHECK_SOCKET_VISIBLE:
76995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_socket_visible =
77095fab37eSRobert Watson 			    mpe->mpe_function;
77195fab37eSRobert Watson 			break;
77295fab37eSRobert Watson 		case MAC_CHECK_VNODE_ACCESS:
77395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_access =
77495fab37eSRobert Watson 			    mpe->mpe_function;
77595fab37eSRobert Watson 			break;
77695fab37eSRobert Watson 		case MAC_CHECK_VNODE_CHDIR:
77795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_chdir =
77895fab37eSRobert Watson 			    mpe->mpe_function;
77995fab37eSRobert Watson 			break;
78095fab37eSRobert Watson 		case MAC_CHECK_VNODE_CHROOT:
78195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_chroot =
78295fab37eSRobert Watson 			    mpe->mpe_function;
78395fab37eSRobert Watson 			break;
78495fab37eSRobert Watson 		case MAC_CHECK_VNODE_CREATE:
78595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_create =
78695fab37eSRobert Watson 			    mpe->mpe_function;
78795fab37eSRobert Watson 			break;
78895fab37eSRobert Watson 		case MAC_CHECK_VNODE_DELETE:
78995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_delete =
79095fab37eSRobert Watson 			    mpe->mpe_function;
79195fab37eSRobert Watson 			break;
79295fab37eSRobert Watson 		case MAC_CHECK_VNODE_DELETEACL:
79395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_deleteacl =
79495fab37eSRobert Watson 			    mpe->mpe_function;
79595fab37eSRobert Watson 			break;
79695fab37eSRobert Watson 		case MAC_CHECK_VNODE_EXEC:
79795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_exec =
79895fab37eSRobert Watson 			    mpe->mpe_function;
79995fab37eSRobert Watson 			break;
80095fab37eSRobert Watson 		case MAC_CHECK_VNODE_GETACL:
80195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_getacl =
80295fab37eSRobert Watson 			    mpe->mpe_function;
80395fab37eSRobert Watson 			break;
80495fab37eSRobert Watson 		case MAC_CHECK_VNODE_GETEXTATTR:
80595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_getextattr =
80695fab37eSRobert Watson 			    mpe->mpe_function;
80795fab37eSRobert Watson 			break;
8080a694196SRobert Watson 		case MAC_CHECK_VNODE_LINK:
8090a694196SRobert Watson 			mpc->mpc_ops->mpo_check_vnode_link =
8100a694196SRobert Watson 			    mpe->mpe_function;
8110a694196SRobert Watson 			break;
81295fab37eSRobert Watson 		case MAC_CHECK_VNODE_LOOKUP:
81395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_lookup =
81495fab37eSRobert Watson 			    mpe->mpe_function;
81595fab37eSRobert Watson 			break;
81695fab37eSRobert Watson 		case MAC_CHECK_VNODE_MMAP_PERMS:
81795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_mmap_perms =
81895fab37eSRobert Watson 			    mpe->mpe_function;
81995fab37eSRobert Watson 			break;
82095fab37eSRobert Watson 		case MAC_CHECK_VNODE_OPEN:
82195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_open =
82295fab37eSRobert Watson 			    mpe->mpe_function;
82395fab37eSRobert Watson 			break;
8247f724f8bSRobert Watson 		case MAC_CHECK_VNODE_POLL:
8257f724f8bSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_poll =
8267f724f8bSRobert Watson 			    mpe->mpe_function;
8277f724f8bSRobert Watson 			break;
8287f724f8bSRobert Watson 		case MAC_CHECK_VNODE_READ:
8297f724f8bSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_read =
8307f724f8bSRobert Watson 			    mpe->mpe_function;
8317f724f8bSRobert Watson 			break;
83295fab37eSRobert Watson 		case MAC_CHECK_VNODE_READDIR:
83395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_readdir =
83495fab37eSRobert Watson 			    mpe->mpe_function;
83595fab37eSRobert Watson 			break;
83695fab37eSRobert Watson 		case MAC_CHECK_VNODE_READLINK:
83795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_readlink =
83895fab37eSRobert Watson 			    mpe->mpe_function;
83995fab37eSRobert Watson 			break;
84095fab37eSRobert Watson 		case MAC_CHECK_VNODE_RELABEL:
84195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_relabel =
84295fab37eSRobert Watson 			    mpe->mpe_function;
84395fab37eSRobert Watson 			break;
84495fab37eSRobert Watson 		case MAC_CHECK_VNODE_RENAME_FROM:
84595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_rename_from =
84695fab37eSRobert Watson 			    mpe->mpe_function;
84795fab37eSRobert Watson 			break;
84895fab37eSRobert Watson 		case MAC_CHECK_VNODE_RENAME_TO:
84995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_rename_to =
85095fab37eSRobert Watson 			    mpe->mpe_function;
85195fab37eSRobert Watson 			break;
85295fab37eSRobert Watson 		case MAC_CHECK_VNODE_REVOKE:
85395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_revoke =
85495fab37eSRobert Watson 			    mpe->mpe_function;
85595fab37eSRobert Watson 			break;
85695fab37eSRobert Watson 		case MAC_CHECK_VNODE_SETACL:
85795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_setacl =
85895fab37eSRobert Watson 			    mpe->mpe_function;
85995fab37eSRobert Watson 			break;
86095fab37eSRobert Watson 		case MAC_CHECK_VNODE_SETEXTATTR:
86195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_setextattr =
86295fab37eSRobert Watson 			    mpe->mpe_function;
86395fab37eSRobert Watson 			break;
86495fab37eSRobert Watson 		case MAC_CHECK_VNODE_SETFLAGS:
86595fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_setflags =
86695fab37eSRobert Watson 			    mpe->mpe_function;
86795fab37eSRobert Watson 			break;
86895fab37eSRobert Watson 		case MAC_CHECK_VNODE_SETMODE:
86995fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_setmode =
87095fab37eSRobert Watson 			    mpe->mpe_function;
87195fab37eSRobert Watson 			break;
87295fab37eSRobert Watson 		case MAC_CHECK_VNODE_SETOWNER:
87395fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_setowner =
87495fab37eSRobert Watson 			    mpe->mpe_function;
87595fab37eSRobert Watson 			break;
87695fab37eSRobert Watson 		case MAC_CHECK_VNODE_SETUTIMES:
87795fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_setutimes =
87895fab37eSRobert Watson 			    mpe->mpe_function;
87995fab37eSRobert Watson 			break;
88095fab37eSRobert Watson 		case MAC_CHECK_VNODE_STAT:
88195fab37eSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_stat =
88295fab37eSRobert Watson 			    mpe->mpe_function;
88395fab37eSRobert Watson 			break;
8847f724f8bSRobert Watson 		case MAC_CHECK_VNODE_WRITE:
8857f724f8bSRobert Watson 			mpc->mpc_ops->mpo_check_vnode_write =
8867f724f8bSRobert Watson 			    mpe->mpe_function;
8877f724f8bSRobert Watson 			break;
88895fab37eSRobert Watson /*
88995fab37eSRobert Watson 		default:
89095fab37eSRobert Watson 			printf("MAC policy `%s': unknown operation %d\n",
89195fab37eSRobert Watson 			    mpc->mpc_name, mpe->mpe_constant);
89295fab37eSRobert Watson 			return (EINVAL);
89395fab37eSRobert Watson */
89495fab37eSRobert Watson 		}
89595fab37eSRobert Watson 	}
89695fab37eSRobert Watson 	MAC_POLICY_LIST_LOCK();
89795fab37eSRobert Watson 	if (mac_policy_list_busy > 0) {
89895fab37eSRobert Watson 		MAC_POLICY_LIST_UNLOCK();
89995fab37eSRobert Watson 		FREE(mpc->mpc_ops, M_MACOPVEC);
90095fab37eSRobert Watson 		mpc->mpc_ops = NULL;
90195fab37eSRobert Watson 		return (EBUSY);
90295fab37eSRobert Watson 	}
90395fab37eSRobert Watson 	LIST_FOREACH(tmpc, &mac_policy_list, mpc_list) {
90495fab37eSRobert Watson 		if (strcmp(tmpc->mpc_name, mpc->mpc_name) == 0) {
90595fab37eSRobert Watson 			MAC_POLICY_LIST_UNLOCK();
90695fab37eSRobert Watson 			FREE(mpc->mpc_ops, M_MACOPVEC);
90795fab37eSRobert Watson 			mpc->mpc_ops = NULL;
90895fab37eSRobert Watson 			return (EEXIST);
90995fab37eSRobert Watson 		}
91095fab37eSRobert Watson 	}
91195fab37eSRobert Watson 	if (mpc->mpc_field_off != NULL) {
91295fab37eSRobert Watson 		slot = ffs(mac_policy_offsets_free);
91395fab37eSRobert Watson 		if (slot == 0) {
91495fab37eSRobert Watson 			MAC_POLICY_LIST_UNLOCK();
91595fab37eSRobert Watson 			FREE(mpc->mpc_ops, M_MACOPVEC);
91695fab37eSRobert Watson 			mpc->mpc_ops = NULL;
91795fab37eSRobert Watson 			return (ENOMEM);
91895fab37eSRobert Watson 		}
91995fab37eSRobert Watson 		slot--;
92095fab37eSRobert Watson 		mac_policy_offsets_free &= ~(1 << slot);
92195fab37eSRobert Watson 		*mpc->mpc_field_off = slot;
92295fab37eSRobert Watson 	}
92395fab37eSRobert Watson 	mpc->mpc_runtime_flags |= MPC_RUNTIME_FLAG_REGISTERED;
92495fab37eSRobert Watson 	LIST_INSERT_HEAD(&mac_policy_list, mpc, mpc_list);
92595fab37eSRobert Watson 
92695fab37eSRobert Watson 	/* Per-policy initialization. */
92795fab37eSRobert Watson 	if (mpc->mpc_ops->mpo_init != NULL)
92895fab37eSRobert Watson 		(*(mpc->mpc_ops->mpo_init))(mpc);
92995fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();
93095fab37eSRobert Watson 
93195fab37eSRobert Watson 	printf("Security policy loaded: %s (%s)\n", mpc->mpc_fullname,
93295fab37eSRobert Watson 	    mpc->mpc_name);
93395fab37eSRobert Watson 
93495fab37eSRobert Watson 	return (0);
93595fab37eSRobert Watson }
93695fab37eSRobert Watson 
93795fab37eSRobert Watson static int
93895fab37eSRobert Watson mac_policy_unregister(struct mac_policy_conf *mpc)
93995fab37eSRobert Watson {
94095fab37eSRobert Watson 
941ea599aa0SRobert Watson 	/*
942ea599aa0SRobert Watson 	 * If we fail the load, we may get a request to unload.  Check
943ea599aa0SRobert Watson 	 * to see if we did the run-time registration, and if not,
944ea599aa0SRobert Watson 	 * silently succeed.
945ea599aa0SRobert Watson 	 */
946ea599aa0SRobert Watson 	MAC_POLICY_LIST_LOCK();
947ea599aa0SRobert Watson 	if ((mpc->mpc_runtime_flags & MPC_RUNTIME_FLAG_REGISTERED) == 0) {
948ea599aa0SRobert Watson 		MAC_POLICY_LIST_UNLOCK();
949ea599aa0SRobert Watson 		return (0);
950ea599aa0SRobert Watson 	}
95195fab37eSRobert Watson #if 0
95295fab37eSRobert Watson 	/*
95395fab37eSRobert Watson 	 * Don't allow unloading modules with private data.
95495fab37eSRobert Watson 	 */
955ea599aa0SRobert Watson 	if (mpc->mpc_field_off != NULL) {
956ea599aa0SRobert Watson 		MAC_POLICY_LIST_UNLOCK();
95795fab37eSRobert Watson 		return (EBUSY);
958ea599aa0SRobert Watson 	}
95995fab37eSRobert Watson #endif
960ea599aa0SRobert Watson 	/*
961ea599aa0SRobert Watson 	 * Only allow the unload to proceed if the module is unloadable
962ea599aa0SRobert Watson 	 * by its own definition.
963ea599aa0SRobert Watson 	 */
964ea599aa0SRobert Watson 	if ((mpc->mpc_loadtime_flags & MPC_LOADTIME_FLAG_UNLOADOK) == 0) {
965ea599aa0SRobert Watson 		MAC_POLICY_LIST_UNLOCK();
96695fab37eSRobert Watson 		return (EBUSY);
967ea599aa0SRobert Watson 	}
968ea599aa0SRobert Watson 	/*
969ea599aa0SRobert Watson 	 * Right now, we EBUSY if the list is in use.  In the future,
970ea599aa0SRobert Watson 	 * for reliability reasons, we might want to sleep and wakeup
971ea599aa0SRobert Watson 	 * later to try again.
972ea599aa0SRobert Watson 	 */
97395fab37eSRobert Watson 	if (mac_policy_list_busy > 0) {
97495fab37eSRobert Watson 		MAC_POLICY_LIST_UNLOCK();
97595fab37eSRobert Watson 		return (EBUSY);
97695fab37eSRobert Watson 	}
97795fab37eSRobert Watson 	if (mpc->mpc_ops->mpo_destroy != NULL)
97895fab37eSRobert Watson 		(*(mpc->mpc_ops->mpo_destroy))(mpc);
97995fab37eSRobert Watson 
98095fab37eSRobert Watson 	LIST_REMOVE(mpc, mpc_list);
98195fab37eSRobert Watson 	MAC_POLICY_LIST_UNLOCK();
98295fab37eSRobert Watson 
98395fab37eSRobert Watson 	FREE(mpc->mpc_ops, M_MACOPVEC);
98495fab37eSRobert Watson 	mpc->mpc_ops = NULL;
98595fab37eSRobert Watson 
98695fab37eSRobert Watson 	printf("Security policy unload: %s (%s)\n", mpc->mpc_fullname,
98795fab37eSRobert Watson 	    mpc->mpc_name);
98895fab37eSRobert Watson 
98995fab37eSRobert Watson 	return (0);
99095fab37eSRobert Watson }
99195fab37eSRobert Watson 
99295fab37eSRobert Watson /*
99395fab37eSRobert Watson  * Define an error value precedence, and given two arguments, selects the
99495fab37eSRobert Watson  * value with the higher precedence.
99595fab37eSRobert Watson  */
99695fab37eSRobert Watson static int
99795fab37eSRobert Watson error_select(int error1, int error2)
99895fab37eSRobert Watson {
99995fab37eSRobert Watson 
100095fab37eSRobert Watson 	/* Certain decision-making errors take top priority. */
100195fab37eSRobert Watson 	if (error1 == EDEADLK || error2 == EDEADLK)
100295fab37eSRobert Watson 		return (EDEADLK);
100395fab37eSRobert Watson 
100495fab37eSRobert Watson 	/* Invalid arguments should be reported where possible. */
100595fab37eSRobert Watson 	if (error1 == EINVAL || error2 == EINVAL)
100695fab37eSRobert Watson 		return (EINVAL);
100795fab37eSRobert Watson 
100895fab37eSRobert Watson 	/* Precedence goes to "visibility", with both process and file. */
100995fab37eSRobert Watson 	if (error1 == ESRCH || error2 == ESRCH)
101095fab37eSRobert Watson 		return (ESRCH);
101195fab37eSRobert Watson 
101295fab37eSRobert Watson 	if (error1 == ENOENT || error2 == ENOENT)
101395fab37eSRobert Watson 		return (ENOENT);
101495fab37eSRobert Watson 
101595fab37eSRobert Watson 	/* Precedence goes to DAC/MAC protections. */
101695fab37eSRobert Watson 	if (error1 == EACCES || error2 == EACCES)
101795fab37eSRobert Watson 		return (EACCES);
101895fab37eSRobert Watson 
101995fab37eSRobert Watson 	/* Precedence goes to privilege. */
102095fab37eSRobert Watson 	if (error1 == EPERM || error2 == EPERM)
102195fab37eSRobert Watson 		return (EPERM);
102295fab37eSRobert Watson 
102395fab37eSRobert Watson 	/* Precedence goes to error over success; otherwise, arbitrary. */
102495fab37eSRobert Watson 	if (error1 != 0)
102595fab37eSRobert Watson 		return (error1);
102695fab37eSRobert Watson 	return (error2);
102795fab37eSRobert Watson }
102895fab37eSRobert Watson 
102908bcdc58SRobert Watson static void
103008bcdc58SRobert Watson mac_init_label(struct label *label)
103108bcdc58SRobert Watson {
103208bcdc58SRobert Watson 
103308bcdc58SRobert Watson 	bzero(label, sizeof(*label));
103408bcdc58SRobert Watson 	label->l_flags = MAC_FLAG_INITIALIZED;
103508bcdc58SRobert Watson }
103608bcdc58SRobert Watson 
103708bcdc58SRobert Watson static void
103808bcdc58SRobert Watson mac_destroy_label(struct label *label)
103908bcdc58SRobert Watson {
104008bcdc58SRobert Watson 
104108bcdc58SRobert Watson 	KASSERT(label->l_flags & MAC_FLAG_INITIALIZED,
104208bcdc58SRobert Watson 	    ("destroying uninitialized label"));
104308bcdc58SRobert Watson 
104408bcdc58SRobert Watson 	bzero(label, sizeof(*label));
104508bcdc58SRobert Watson 	/* implicit: label->l_flags &= ~MAC_FLAG_INITIALIZED; */
104608bcdc58SRobert Watson }
104708bcdc58SRobert Watson 
104808bcdc58SRobert Watson static void
104908bcdc58SRobert Watson mac_init_structmac(struct mac *mac)
105008bcdc58SRobert Watson {
105108bcdc58SRobert Watson 
105208bcdc58SRobert Watson 	bzero(mac, sizeof(*mac));
105308bcdc58SRobert Watson 	mac->m_macflags = MAC_FLAG_INITIALIZED;
105408bcdc58SRobert Watson }
105508bcdc58SRobert Watson 
105608bcdc58SRobert Watson void
105787807196SRobert Watson mac_init_bpfdesc(struct bpf_d *bpf_d)
105808bcdc58SRobert Watson {
105908bcdc58SRobert Watson 
106087807196SRobert Watson 	mac_init_label(&bpf_d->bd_label);
106187807196SRobert Watson 	MAC_PERFORM(init_bpfdesc_label, &bpf_d->bd_label);
106208bcdc58SRobert Watson #ifdef MAC_DEBUG
106387807196SRobert Watson 	atomic_add_int(&nmacbpfdescs, 1);
106408bcdc58SRobert Watson #endif
106508bcdc58SRobert Watson }
106608bcdc58SRobert Watson 
106708bcdc58SRobert Watson void
106808bcdc58SRobert Watson mac_init_cred(struct ucred *cr)
106908bcdc58SRobert Watson {
107008bcdc58SRobert Watson 
107108bcdc58SRobert Watson 	mac_init_label(&cr->cr_label);
107208bcdc58SRobert Watson 	MAC_PERFORM(init_cred_label, &cr->cr_label);
107308bcdc58SRobert Watson #ifdef MAC_DEBUG
107408bcdc58SRobert Watson 	atomic_add_int(&nmaccreds, 1);
107508bcdc58SRobert Watson #endif
107608bcdc58SRobert Watson }
107708bcdc58SRobert Watson 
107808bcdc58SRobert Watson void
107987807196SRobert Watson mac_init_devfsdirent(struct devfs_dirent *de)
108008bcdc58SRobert Watson {
108108bcdc58SRobert Watson 
108287807196SRobert Watson 	mac_init_label(&de->de_label);
108387807196SRobert Watson 	MAC_PERFORM(init_devfsdirent_label, &de->de_label);
108408bcdc58SRobert Watson #ifdef MAC_DEBUG
108587807196SRobert Watson 	atomic_add_int(&nmacdevfsdirents, 1);
108608bcdc58SRobert Watson #endif
108708bcdc58SRobert Watson }
108808bcdc58SRobert Watson 
108908bcdc58SRobert Watson void
109008bcdc58SRobert Watson mac_init_ifnet(struct ifnet *ifp)
109108bcdc58SRobert Watson {
109208bcdc58SRobert Watson 
109308bcdc58SRobert Watson 	mac_init_label(&ifp->if_label);
109408bcdc58SRobert Watson 	MAC_PERFORM(init_ifnet_label, &ifp->if_label);
109508bcdc58SRobert Watson #ifdef MAC_DEBUG
109608bcdc58SRobert Watson 	atomic_add_int(&nmacifnets, 1);
109708bcdc58SRobert Watson #endif
109808bcdc58SRobert Watson }
109908bcdc58SRobert Watson 
110008bcdc58SRobert Watson void
110108bcdc58SRobert Watson mac_init_ipq(struct ipq *ipq)
110208bcdc58SRobert Watson {
110308bcdc58SRobert Watson 
110408bcdc58SRobert Watson 	mac_init_label(&ipq->ipq_label);
110508bcdc58SRobert Watson 	MAC_PERFORM(init_ipq_label, &ipq->ipq_label);
110608bcdc58SRobert Watson #ifdef MAC_DEBUG
110708bcdc58SRobert Watson 	atomic_add_int(&nmacipqs, 1);
110808bcdc58SRobert Watson #endif
110908bcdc58SRobert Watson }
111008bcdc58SRobert Watson 
111187807196SRobert Watson int
111287807196SRobert Watson mac_init_mbuf(struct mbuf *m, int flag)
111308bcdc58SRobert Watson {
111456c15412SRobert Watson 	int error;
111556c15412SRobert Watson 
111687807196SRobert Watson 	KASSERT(m->m_flags & M_PKTHDR, ("mac_init_mbuf on non-header mbuf"));
111708bcdc58SRobert Watson 
111887807196SRobert Watson 	mac_init_label(&m->m_pkthdr.label);
111987807196SRobert Watson 
112056c15412SRobert Watson 	MAC_CHECK(init_mbuf_label, &m->m_pkthdr.label, flag);
112156c15412SRobert Watson 	if (error) {
112256c15412SRobert Watson 		MAC_PERFORM(destroy_mbuf_label, &m->m_pkthdr.label);
112356c15412SRobert Watson 		mac_destroy_label(&m->m_pkthdr.label);
112456c15412SRobert Watson 	}
112556c15412SRobert Watson 
112608bcdc58SRobert Watson #ifdef MAC_DEBUG
112756c15412SRobert Watson 	if (error == 0)
112887807196SRobert Watson 		atomic_add_int(&nmacmbufs, 1);
112908bcdc58SRobert Watson #endif
113056c15412SRobert Watson 	return (error);
113108bcdc58SRobert Watson }
113208bcdc58SRobert Watson 
113308bcdc58SRobert Watson void
113487807196SRobert Watson mac_init_mount(struct mount *mp)
113508bcdc58SRobert Watson {
113608bcdc58SRobert Watson 
113787807196SRobert Watson 	mac_init_label(&mp->mnt_mntlabel);
113887807196SRobert Watson 	mac_init_label(&mp->mnt_fslabel);
113987807196SRobert Watson 	MAC_PERFORM(init_mount_label, &mp->mnt_mntlabel);
114087807196SRobert Watson 	MAC_PERFORM(init_mount_fs_label, &mp->mnt_fslabel);
114108bcdc58SRobert Watson #ifdef MAC_DEBUG
114287807196SRobert Watson 	atomic_add_int(&nmacmounts, 1);
114308bcdc58SRobert Watson #endif
114408bcdc58SRobert Watson }
114508bcdc58SRobert Watson 
114608bcdc58SRobert Watson void
114708bcdc58SRobert Watson mac_init_pipe(struct pipe *pipe)
114808bcdc58SRobert Watson {
114908bcdc58SRobert Watson 	struct label *label;
115008bcdc58SRobert Watson 
115108bcdc58SRobert Watson 	label = malloc(sizeof(struct label), M_MACPIPELABEL, M_ZERO|M_WAITOK);
115208bcdc58SRobert Watson 	mac_init_label(label);
115308bcdc58SRobert Watson 	pipe->pipe_label = label;
115408bcdc58SRobert Watson 	pipe->pipe_peer->pipe_label = label;
115508bcdc58SRobert Watson 	MAC_PERFORM(init_pipe_label, pipe->pipe_label);
115608bcdc58SRobert Watson #ifdef MAC_DEBUG
115708bcdc58SRobert Watson 	atomic_add_int(&nmacpipes, 1);
115808bcdc58SRobert Watson #endif
115908bcdc58SRobert Watson }
116008bcdc58SRobert Watson 
116183985c26SRobert Watson static int
116283985c26SRobert Watson mac_init_socket_label(struct label *label, int flag)
116308bcdc58SRobert Watson {
116483985c26SRobert Watson 	int error;
116508bcdc58SRobert Watson 
116683985c26SRobert Watson 	mac_init_label(label);
116783985c26SRobert Watson 
116883985c26SRobert Watson 	MAC_CHECK(init_socket_label, label, flag);
116983985c26SRobert Watson 	if (error) {
117083985c26SRobert Watson 		MAC_PERFORM(destroy_socket_label, label);
117183985c26SRobert Watson 		mac_destroy_label(label);
117283985c26SRobert Watson 	}
117383985c26SRobert Watson 
117408bcdc58SRobert Watson #ifdef MAC_DEBUG
117583985c26SRobert Watson 	if (error == 0)
117687807196SRobert Watson 		atomic_add_int(&nmacsockets, 1);
117787807196SRobert Watson #endif
117883985c26SRobert Watson 
117983985c26SRobert Watson 	return (error);
118083985c26SRobert Watson }
118183985c26SRobert Watson 
118283985c26SRobert Watson static int
118383985c26SRobert Watson mac_init_socket_peer_label(struct label *label, int flag)
118483985c26SRobert Watson {
118583985c26SRobert Watson 	int error;
118683985c26SRobert Watson 
118783985c26SRobert Watson 	mac_init_label(label);
118883985c26SRobert Watson 
118983985c26SRobert Watson 	MAC_CHECK(init_socket_peer_label, label, flag);
119083985c26SRobert Watson 	if (error) {
119183985c26SRobert Watson 		MAC_PERFORM(destroy_socket_label, label);
119283985c26SRobert Watson 		mac_destroy_label(label);
119383985c26SRobert Watson 	}
119483985c26SRobert Watson 
119583985c26SRobert Watson 	return (error);
119683985c26SRobert Watson }
119783985c26SRobert Watson 
119883985c26SRobert Watson int
119983985c26SRobert Watson mac_init_socket(struct socket *socket, int flag)
120083985c26SRobert Watson {
120183985c26SRobert Watson 	int error;
120283985c26SRobert Watson 
120383985c26SRobert Watson 	error = mac_init_socket_label(&socket->so_label, flag);
120483985c26SRobert Watson 	if (error)
120583985c26SRobert Watson 		return (error);
120683985c26SRobert Watson 
120783985c26SRobert Watson 	error = mac_init_socket_peer_label(&socket->so_peerlabel, flag);
120883985c26SRobert Watson 	if (error)
120983985c26SRobert Watson 		mac_destroy_socket_label(&socket->so_label);
121083985c26SRobert Watson 
121183985c26SRobert Watson 	return (error);
121287807196SRobert Watson }
121387807196SRobert Watson 
121487807196SRobert Watson static void
121587807196SRobert Watson mac_init_temp(struct label *label)
121687807196SRobert Watson {
121787807196SRobert Watson 
121887807196SRobert Watson 	mac_init_label(label);
121987807196SRobert Watson 	MAC_PERFORM(init_temp_label, label);
122087807196SRobert Watson #ifdef MAC_DEBUG
122187807196SRobert Watson 	atomic_add_int(&nmactemp, 1);
122208bcdc58SRobert Watson #endif
122308bcdc58SRobert Watson }
122408bcdc58SRobert Watson 
122508bcdc58SRobert Watson void
122687807196SRobert Watson mac_init_vnode(struct vnode *vp)
122708bcdc58SRobert Watson {
122808bcdc58SRobert Watson 
122987807196SRobert Watson 	mac_init_label(&vp->v_label);
123087807196SRobert Watson 	MAC_PERFORM(init_vnode_label, &vp->v_label);
123108bcdc58SRobert Watson #ifdef MAC_DEBUG
123287807196SRobert Watson 	atomic_add_int(&nmacvnodes, 1);
123308bcdc58SRobert Watson #endif
123408bcdc58SRobert Watson }
123508bcdc58SRobert Watson 
123608bcdc58SRobert Watson void
123708bcdc58SRobert Watson mac_destroy_bpfdesc(struct bpf_d *bpf_d)
123808bcdc58SRobert Watson {
123908bcdc58SRobert Watson 
124008bcdc58SRobert Watson 	MAC_PERFORM(destroy_bpfdesc_label, &bpf_d->bd_label);
124108bcdc58SRobert Watson 	mac_destroy_label(&bpf_d->bd_label);
124208bcdc58SRobert Watson #ifdef MAC_DEBUG
124308bcdc58SRobert Watson 	atomic_subtract_int(&nmacbpfdescs, 1);
124408bcdc58SRobert Watson #endif
124508bcdc58SRobert Watson }
124608bcdc58SRobert Watson 
124708bcdc58SRobert Watson void
124887807196SRobert Watson mac_destroy_cred(struct ucred *cr)
124908bcdc58SRobert Watson {
125008bcdc58SRobert Watson 
125187807196SRobert Watson 	MAC_PERFORM(destroy_cred_label, &cr->cr_label);
125287807196SRobert Watson 	mac_destroy_label(&cr->cr_label);
125308bcdc58SRobert Watson #ifdef MAC_DEBUG
125487807196SRobert Watson 	atomic_subtract_int(&nmaccreds, 1);
125587807196SRobert Watson #endif
125687807196SRobert Watson }
125787807196SRobert Watson 
125887807196SRobert Watson void
125987807196SRobert Watson mac_destroy_devfsdirent(struct devfs_dirent *de)
126087807196SRobert Watson {
126187807196SRobert Watson 
126287807196SRobert Watson 	MAC_PERFORM(destroy_devfsdirent_label, &de->de_label);
126387807196SRobert Watson 	mac_destroy_label(&de->de_label);
126487807196SRobert Watson #ifdef MAC_DEBUG
126587807196SRobert Watson 	atomic_subtract_int(&nmacdevfsdirents, 1);
126687807196SRobert Watson #endif
126787807196SRobert Watson }
126887807196SRobert Watson 
126987807196SRobert Watson void
127087807196SRobert Watson mac_destroy_ifnet(struct ifnet *ifp)
127187807196SRobert Watson {
127287807196SRobert Watson 
127387807196SRobert Watson 	MAC_PERFORM(destroy_ifnet_label, &ifp->if_label);
127487807196SRobert Watson 	mac_destroy_label(&ifp->if_label);
127587807196SRobert Watson #ifdef MAC_DEBUG
127687807196SRobert Watson 	atomic_subtract_int(&nmacifnets, 1);
127787807196SRobert Watson #endif
127887807196SRobert Watson }
127987807196SRobert Watson 
128087807196SRobert Watson void
128187807196SRobert Watson mac_destroy_ipq(struct ipq *ipq)
128287807196SRobert Watson {
128387807196SRobert Watson 
128487807196SRobert Watson 	MAC_PERFORM(destroy_ipq_label, &ipq->ipq_label);
128587807196SRobert Watson 	mac_destroy_label(&ipq->ipq_label);
128687807196SRobert Watson #ifdef MAC_DEBUG
128787807196SRobert Watson 	atomic_subtract_int(&nmacipqs, 1);
128887807196SRobert Watson #endif
128987807196SRobert Watson }
129087807196SRobert Watson 
129187807196SRobert Watson void
129287807196SRobert Watson mac_destroy_mbuf(struct mbuf *m)
129387807196SRobert Watson {
129487807196SRobert Watson 
129587807196SRobert Watson 	MAC_PERFORM(destroy_mbuf_label, &m->m_pkthdr.label);
129687807196SRobert Watson 	mac_destroy_label(&m->m_pkthdr.label);
129787807196SRobert Watson #ifdef MAC_DEBUG
129887807196SRobert Watson 	atomic_subtract_int(&nmacmbufs, 1);
129908bcdc58SRobert Watson #endif
130008bcdc58SRobert Watson }
130108bcdc58SRobert Watson 
130208bcdc58SRobert Watson void
130308bcdc58SRobert Watson mac_destroy_mount(struct mount *mp)
130408bcdc58SRobert Watson {
130508bcdc58SRobert Watson 
130608bcdc58SRobert Watson 	MAC_PERFORM(destroy_mount_label, &mp->mnt_mntlabel);
130708bcdc58SRobert Watson 	MAC_PERFORM(destroy_mount_fs_label, &mp->mnt_fslabel);
130808bcdc58SRobert Watson 	mac_destroy_label(&mp->mnt_fslabel);
130908bcdc58SRobert Watson 	mac_destroy_label(&mp->mnt_mntlabel);
131008bcdc58SRobert Watson #ifdef MAC_DEBUG
131108bcdc58SRobert Watson 	atomic_subtract_int(&nmacmounts, 1);
131208bcdc58SRobert Watson #endif
131308bcdc58SRobert Watson }
131408bcdc58SRobert Watson 
131587807196SRobert Watson void
131687807196SRobert Watson mac_destroy_pipe(struct pipe *pipe)
131708bcdc58SRobert Watson {
131808bcdc58SRobert Watson 
131987807196SRobert Watson 	MAC_PERFORM(destroy_pipe_label, pipe->pipe_label);
132087807196SRobert Watson 	mac_destroy_label(pipe->pipe_label);
132187807196SRobert Watson 	free(pipe->pipe_label, M_MACPIPELABEL);
132208bcdc58SRobert Watson #ifdef MAC_DEBUG
132387807196SRobert Watson 	atomic_subtract_int(&nmacpipes, 1);
132487807196SRobert Watson #endif
132587807196SRobert Watson }
132687807196SRobert Watson 
132783985c26SRobert Watson static void
132883985c26SRobert Watson mac_destroy_socket_label(struct label *label)
132983985c26SRobert Watson {
133083985c26SRobert Watson 
133183985c26SRobert Watson 	MAC_PERFORM(destroy_socket_label, label);
133283985c26SRobert Watson 	mac_destroy_label(label);
133383985c26SRobert Watson #ifdef MAC_DEBUG
133483985c26SRobert Watson 	atomic_subtract_int(&nmacsockets, 1);
133583985c26SRobert Watson #endif
133683985c26SRobert Watson }
133783985c26SRobert Watson 
133883985c26SRobert Watson static void
133983985c26SRobert Watson mac_destroy_socket_peer_label(struct label *label)
134083985c26SRobert Watson {
134183985c26SRobert Watson 
134283985c26SRobert Watson 	MAC_PERFORM(destroy_socket_peer_label, label);
134383985c26SRobert Watson 	mac_destroy_label(label);
134483985c26SRobert Watson }
134583985c26SRobert Watson 
134687807196SRobert Watson void
134787807196SRobert Watson mac_destroy_socket(struct socket *socket)
134887807196SRobert Watson {
134987807196SRobert Watson 
135083985c26SRobert Watson 	mac_destroy_socket_label(&socket->so_label);
135183985c26SRobert Watson 	mac_destroy_socket_peer_label(&socket->so_peerlabel);
135208bcdc58SRobert Watson }
135308bcdc58SRobert Watson 
135408bcdc58SRobert Watson static void
135508bcdc58SRobert Watson mac_destroy_temp(struct label *label)
135608bcdc58SRobert Watson {
135708bcdc58SRobert Watson 
135808bcdc58SRobert Watson 	MAC_PERFORM(destroy_temp_label, label);
135908bcdc58SRobert Watson 	mac_destroy_label(label);
136008bcdc58SRobert Watson #ifdef MAC_DEBUG
136108bcdc58SRobert Watson 	atomic_subtract_int(&nmactemp, 1);
136208bcdc58SRobert Watson #endif
136308bcdc58SRobert Watson }
136408bcdc58SRobert Watson 
136508bcdc58SRobert Watson void
136608bcdc58SRobert Watson mac_destroy_vnode(struct vnode *vp)
136708bcdc58SRobert Watson {
136808bcdc58SRobert Watson 
136908bcdc58SRobert Watson 	MAC_PERFORM(destroy_vnode_label, &vp->v_label);
137008bcdc58SRobert Watson 	mac_destroy_label(&vp->v_label);
137108bcdc58SRobert Watson #ifdef MAC_DEBUG
137208bcdc58SRobert Watson 	atomic_subtract_int(&nmacvnodes, 1);
137308bcdc58SRobert Watson #endif
137408bcdc58SRobert Watson }
137508bcdc58SRobert Watson 
137669bbb5b1SRobert Watson static int
137769bbb5b1SRobert Watson mac_externalize(struct label *label, struct mac *mac)
137869bbb5b1SRobert Watson {
137969bbb5b1SRobert Watson 	int error;
138069bbb5b1SRobert Watson 
138169bbb5b1SRobert Watson 	mac_init_structmac(mac);
138269bbb5b1SRobert Watson 	MAC_CHECK(externalize, label, mac);
138369bbb5b1SRobert Watson 
138469bbb5b1SRobert Watson 	return (error);
138569bbb5b1SRobert Watson }
138669bbb5b1SRobert Watson 
138769bbb5b1SRobert Watson static int
138869bbb5b1SRobert Watson mac_internalize(struct label *label, struct mac *mac)
138969bbb5b1SRobert Watson {
139069bbb5b1SRobert Watson 	int error;
139169bbb5b1SRobert Watson 
139269bbb5b1SRobert Watson 	mac_init_temp(label);
139369bbb5b1SRobert Watson 	MAC_CHECK(internalize, label, mac);
139469bbb5b1SRobert Watson 	if (error)
139569bbb5b1SRobert Watson 		mac_destroy_temp(label);
139669bbb5b1SRobert Watson 
139769bbb5b1SRobert Watson 	return (error);
139869bbb5b1SRobert Watson }
139969bbb5b1SRobert Watson 
140069bbb5b1SRobert Watson /*
140169bbb5b1SRobert Watson  * Initialize MAC label for the first kernel process, from which other
140269bbb5b1SRobert Watson  * kernel processes and threads are spawned.
140369bbb5b1SRobert Watson  */
140469bbb5b1SRobert Watson void
140569bbb5b1SRobert Watson mac_create_proc0(struct ucred *cred)
140669bbb5b1SRobert Watson {
140769bbb5b1SRobert Watson 
140869bbb5b1SRobert Watson 	MAC_PERFORM(create_proc0, cred);
140969bbb5b1SRobert Watson }
141069bbb5b1SRobert Watson 
141169bbb5b1SRobert Watson /*
141269bbb5b1SRobert Watson  * Initialize MAC label for the first userland process, from which other
141369bbb5b1SRobert Watson  * userland processes and threads are spawned.
141469bbb5b1SRobert Watson  */
141569bbb5b1SRobert Watson void
141669bbb5b1SRobert Watson mac_create_proc1(struct ucred *cred)
141769bbb5b1SRobert Watson {
141869bbb5b1SRobert Watson 
141969bbb5b1SRobert Watson 	MAC_PERFORM(create_proc1, cred);
142069bbb5b1SRobert Watson }
142169bbb5b1SRobert Watson 
142269bbb5b1SRobert Watson void
142369bbb5b1SRobert Watson mac_thread_userret(struct thread *td)
142469bbb5b1SRobert Watson {
142569bbb5b1SRobert Watson 
142669bbb5b1SRobert Watson 	MAC_PERFORM(thread_userret, td);
142769bbb5b1SRobert Watson }
142869bbb5b1SRobert Watson 
142969bbb5b1SRobert Watson /*
143069bbb5b1SRobert Watson  * When a new process is created, its label must be initialized.  Generally,
143169bbb5b1SRobert Watson  * this involves inheritence from the parent process, modulo possible
143269bbb5b1SRobert Watson  * deltas.  This function allows that processing to take place.
143369bbb5b1SRobert Watson  */
143469bbb5b1SRobert Watson void
143569bbb5b1SRobert Watson mac_create_cred(struct ucred *parent_cred, struct ucred *child_cred)
143669bbb5b1SRobert Watson {
143769bbb5b1SRobert Watson 
143869bbb5b1SRobert Watson 	MAC_PERFORM(create_cred, parent_cred, child_cred);
143969bbb5b1SRobert Watson }
144069bbb5b1SRobert Watson 
144195fab37eSRobert Watson void
144295fab37eSRobert Watson mac_update_devfsdirent(struct devfs_dirent *de, struct vnode *vp)
144395fab37eSRobert Watson {
144495fab37eSRobert Watson 
144595fab37eSRobert Watson 	MAC_PERFORM(update_devfsdirent, de, &de->de_label, vp, &vp->v_label);
144695fab37eSRobert Watson }
144795fab37eSRobert Watson 
144895fab37eSRobert Watson void
144995fab37eSRobert Watson mac_update_procfsvnode(struct vnode *vp, struct ucred *cred)
145095fab37eSRobert Watson {
145195fab37eSRobert Watson 
145295fab37eSRobert Watson 	MAC_PERFORM(update_procfsvnode, vp, &vp->v_label, cred);
145395fab37eSRobert Watson }
145495fab37eSRobert Watson 
145595fab37eSRobert Watson /*
145695fab37eSRobert Watson  * Support callout for policies that manage their own externalization
145795fab37eSRobert Watson  * using extended attributes.
145895fab37eSRobert Watson  */
145995fab37eSRobert Watson static int
146095fab37eSRobert Watson mac_update_vnode_from_extattr(struct vnode *vp, struct mount *mp)
146195fab37eSRobert Watson {
146295fab37eSRobert Watson 	int error;
146395fab37eSRobert Watson 
146495fab37eSRobert Watson 	MAC_CHECK(update_vnode_from_extattr, vp, &vp->v_label, mp,
146595fab37eSRobert Watson 	    &mp->mnt_fslabel);
146695fab37eSRobert Watson 
146795fab37eSRobert Watson 	return (error);
146895fab37eSRobert Watson }
146995fab37eSRobert Watson 
147095fab37eSRobert Watson /*
147195fab37eSRobert Watson  * Given an externalized mac label, internalize it and stamp it on a
147295fab37eSRobert Watson  * vnode.
147395fab37eSRobert Watson  */
147495fab37eSRobert Watson static int
147595fab37eSRobert Watson mac_update_vnode_from_externalized(struct vnode *vp, struct mac *extmac)
147695fab37eSRobert Watson {
147795fab37eSRobert Watson 	int error;
147895fab37eSRobert Watson 
147995fab37eSRobert Watson 	MAC_CHECK(update_vnode_from_externalized, vp, &vp->v_label, extmac);
148095fab37eSRobert Watson 
148195fab37eSRobert Watson 	return (error);
148295fab37eSRobert Watson }
148395fab37eSRobert Watson 
148495fab37eSRobert Watson /*
148595fab37eSRobert Watson  * Call out to individual policies to update the label in a vnode from
148695fab37eSRobert Watson  * the mountpoint.
148795fab37eSRobert Watson  */
148895fab37eSRobert Watson void
148995fab37eSRobert Watson mac_update_vnode_from_mount(struct vnode *vp, struct mount *mp)
149095fab37eSRobert Watson {
149195fab37eSRobert Watson 
149295fab37eSRobert Watson 	MAC_PERFORM(update_vnode_from_mount, vp, &vp->v_label, mp,
149395fab37eSRobert Watson 	    &mp->mnt_fslabel);
149495fab37eSRobert Watson 
1495e6e370a7SJeff Roberson 	ASSERT_VOP_LOCKED(vp, "mac_update_vnode_from_mount");
149695fab37eSRobert Watson 	if (mac_cache_fslabel_in_vnode)
1497e6e370a7SJeff Roberson 		vp->v_vflag |= VV_CACHEDLABEL;
149895fab37eSRobert Watson }
149995fab37eSRobert Watson 
150095fab37eSRobert Watson /*
150195fab37eSRobert Watson  * Implementation of VOP_REFRESHLABEL() that relies on extended attributes
150295fab37eSRobert Watson  * to store label data.  Can be referenced by filesystems supporting
150395fab37eSRobert Watson  * extended attributes.
150495fab37eSRobert Watson  */
150595fab37eSRobert Watson int
150695fab37eSRobert Watson vop_stdrefreshlabel_ea(struct vop_refreshlabel_args *ap)
150795fab37eSRobert Watson {
150895fab37eSRobert Watson 	struct vnode *vp = ap->a_vp;
150995fab37eSRobert Watson 	struct mac extmac;
151095fab37eSRobert Watson 	int buflen, error;
151195fab37eSRobert Watson 
151295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "vop_stdrefreshlabel_ea");
151395fab37eSRobert Watson 
151495fab37eSRobert Watson 	/*
151595fab37eSRobert Watson 	 * Call out to external policies first.  Order doesn't really
151695fab37eSRobert Watson 	 * matter, as long as failure of one assures failure of all.
151795fab37eSRobert Watson 	 */
151895fab37eSRobert Watson 	error = mac_update_vnode_from_extattr(vp, vp->v_mount);
151995fab37eSRobert Watson 	if (error)
152095fab37eSRobert Watson 		return (error);
152195fab37eSRobert Watson 
152295fab37eSRobert Watson 	buflen = sizeof(extmac);
152395fab37eSRobert Watson 	error = vn_extattr_get(vp, IO_NODELOCKED,
152495fab37eSRobert Watson 	    FREEBSD_MAC_EXTATTR_NAMESPACE, FREEBSD_MAC_EXTATTR_NAME, &buflen,
152595fab37eSRobert Watson 	    (char *)&extmac, curthread);
152695fab37eSRobert Watson 	switch (error) {
152795fab37eSRobert Watson 	case 0:
152895fab37eSRobert Watson 		/* Got it */
152995fab37eSRobert Watson 		break;
153095fab37eSRobert Watson 
153195fab37eSRobert Watson 	case ENOATTR:
153295fab37eSRobert Watson 		/*
153395fab37eSRobert Watson 		 * Use the label from the mount point.
153495fab37eSRobert Watson 		 */
153595fab37eSRobert Watson 		mac_update_vnode_from_mount(vp, vp->v_mount);
153695fab37eSRobert Watson 		return (0);
153795fab37eSRobert Watson 
153895fab37eSRobert Watson 	case EOPNOTSUPP:
153995fab37eSRobert Watson 	default:
154095fab37eSRobert Watson 		/* Fail horribly. */
154195fab37eSRobert Watson 		return (error);
154295fab37eSRobert Watson 	}
154395fab37eSRobert Watson 
154495fab37eSRobert Watson 	if (buflen != sizeof(extmac))
154595fab37eSRobert Watson 		error = EPERM;		/* Fail very closed. */
154695fab37eSRobert Watson 	if (error == 0)
154795fab37eSRobert Watson 		error = mac_update_vnode_from_externalized(vp, &extmac);
154895fab37eSRobert Watson 	if (error == 0)
1549e6e370a7SJeff Roberson 		vp->v_vflag |= VV_CACHEDLABEL;
155095fab37eSRobert Watson 	else {
155195fab37eSRobert Watson 		struct vattr va;
155295fab37eSRobert Watson 
155395fab37eSRobert Watson 		printf("Corrupted label on %s",
155495fab37eSRobert Watson 		    vp->v_mount->mnt_stat.f_mntonname);
155595fab37eSRobert Watson 		if (VOP_GETATTR(vp, &va, curthread->td_ucred, curthread) == 0)
155695fab37eSRobert Watson 			printf(" inum %ld", va.va_fileid);
15576be0c25eSRobert Watson #ifdef MAC_DEBUG
155895fab37eSRobert Watson 		if (mac_debug_label_fallback) {
155995fab37eSRobert Watson 			printf(", falling back.\n");
156095fab37eSRobert Watson 			mac_update_vnode_from_mount(vp, vp->v_mount);
156195fab37eSRobert Watson 			error = 0;
156295fab37eSRobert Watson 		} else {
15636be0c25eSRobert Watson #endif
156495fab37eSRobert Watson 			printf(".\n");
156595fab37eSRobert Watson 			error = EPERM;
15666be0c25eSRobert Watson #ifdef MAC_DEBUG
156795fab37eSRobert Watson 		}
15686be0c25eSRobert Watson #endif
156995fab37eSRobert Watson 	}
157095fab37eSRobert Watson 
157195fab37eSRobert Watson 	return (error);
157295fab37eSRobert Watson }
157395fab37eSRobert Watson 
157495fab37eSRobert Watson /*
157595fab37eSRobert Watson  * Make sure the vnode label is up-to-date.  If EOPNOTSUPP, then we handle
157695fab37eSRobert Watson  * the labeling activity outselves.  Filesystems should be careful not
157795fab37eSRobert Watson  * to change their minds regarding whether they support vop_refreshlabel()
157895fab37eSRobert Watson  * for a vnode or not.  Don't cache the vnode here, allow the file
157995fab37eSRobert Watson  * system code to determine if it's safe to cache.  If we update from
158095fab37eSRobert Watson  * the mount, don't cache since a change to the mount label should affect
158195fab37eSRobert Watson  * all vnodes.
158295fab37eSRobert Watson  */
158395fab37eSRobert Watson static int
158495fab37eSRobert Watson vn_refreshlabel(struct vnode *vp, struct ucred *cred)
158595fab37eSRobert Watson {
158695fab37eSRobert Watson 	int error;
158795fab37eSRobert Watson 
158895fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "vn_refreshlabel");
158995fab37eSRobert Watson 
159095fab37eSRobert Watson 	if (vp->v_mount == NULL) {
159195fab37eSRobert Watson /*
159295fab37eSRobert Watson 		Eventually, we probably want to special-case refreshing
159395fab37eSRobert Watson 		of deadfs vnodes, and if there's a lock-free race somewhere,
159495fab37eSRobert Watson 		that case might be handled here.
159595fab37eSRobert Watson 
159695fab37eSRobert Watson 		mac_update_vnode_deadfs(vp);
159795fab37eSRobert Watson 		return (0);
159895fab37eSRobert Watson  */
159995fab37eSRobert Watson 		/* printf("vn_refreshlabel: null v_mount\n"); */
160006be2aaaSNate Lawson 		if (vp->v_type != VNON)
160195fab37eSRobert Watson 			printf(
160206be2aaaSNate Lawson 			    "vn_refreshlabel: null v_mount with non-VNON\n");
160395fab37eSRobert Watson 		return (EBADF);
160495fab37eSRobert Watson 	}
160595fab37eSRobert Watson 
1606e6e370a7SJeff Roberson 	if (vp->v_vflag & VV_CACHEDLABEL) {
160795fab37eSRobert Watson 		mac_vnode_label_cache_hits++;
160895fab37eSRobert Watson 		return (0);
160995fab37eSRobert Watson 	} else
161095fab37eSRobert Watson 		mac_vnode_label_cache_misses++;
161195fab37eSRobert Watson 
161295fab37eSRobert Watson 	if ((vp->v_mount->mnt_flag & MNT_MULTILABEL) == 0) {
161395fab37eSRobert Watson 		mac_update_vnode_from_mount(vp, vp->v_mount);
161495fab37eSRobert Watson 		return (0);
161595fab37eSRobert Watson 	}
161695fab37eSRobert Watson 
161795fab37eSRobert Watson 	error = VOP_REFRESHLABEL(vp, cred, curthread);
161895fab37eSRobert Watson 	switch (error) {
161995fab37eSRobert Watson 	case EOPNOTSUPP:
162095fab37eSRobert Watson 		/*
162195fab37eSRobert Watson 		 * If labels are not supported on this vnode, fall back to
162295fab37eSRobert Watson 		 * the label in the mount and propagate it to the vnode.
162395fab37eSRobert Watson 		 * There should probably be some sort of policy/flag/decision
162495fab37eSRobert Watson 		 * about doing this.
162595fab37eSRobert Watson 		 */
162695fab37eSRobert Watson 		mac_update_vnode_from_mount(vp, vp->v_mount);
162795fab37eSRobert Watson 		error = 0;
162895fab37eSRobert Watson 	default:
162995fab37eSRobert Watson 		return (error);
163095fab37eSRobert Watson 	}
163195fab37eSRobert Watson }
163295fab37eSRobert Watson 
163395fab37eSRobert Watson /*
163495fab37eSRobert Watson  * Helper function for file systems using the vop_std*_ea() calls.  This
163595fab37eSRobert Watson  * function must be called after EA service is available for the vnode,
163695fab37eSRobert Watson  * but before it's hooked up to the namespace so that the node persists
163795fab37eSRobert Watson  * if there's a crash, or before it can be accessed.  On successful
163895fab37eSRobert Watson  * commit of the label to disk (etc), do cache the label.
163995fab37eSRobert Watson  */
164095fab37eSRobert Watson int
164195fab37eSRobert Watson vop_stdcreatevnode_ea(struct vnode *dvp, struct vnode *tvp, struct ucred *cred)
164295fab37eSRobert Watson {
164395fab37eSRobert Watson 	struct mac extmac;
164495fab37eSRobert Watson 	int error;
164595fab37eSRobert Watson 
1646e6e370a7SJeff Roberson 	ASSERT_VOP_LOCKED(tvp, "vop_stdcreatevnode_ea");
164795fab37eSRobert Watson 	if ((dvp->v_mount->mnt_flag & MNT_MULTILABEL) == 0) {
164895fab37eSRobert Watson 		mac_update_vnode_from_mount(tvp, tvp->v_mount);
164995fab37eSRobert Watson 	} else {
165095fab37eSRobert Watson 		error = vn_refreshlabel(dvp, cred);
165195fab37eSRobert Watson 		if (error)
165295fab37eSRobert Watson 			return (error);
165395fab37eSRobert Watson 
165495fab37eSRobert Watson 		/*
165595fab37eSRobert Watson 		 * Stick the label in the vnode.  Then try to write to
165695fab37eSRobert Watson 		 * disk.  If we fail, return a failure to abort the
165795fab37eSRobert Watson 		 * create operation.  Really, this failure shouldn't
165895fab37eSRobert Watson 		 * happen except in fairly unusual circumstances (out
165995fab37eSRobert Watson 		 * of disk, etc).
166095fab37eSRobert Watson 		 */
166195fab37eSRobert Watson 		mac_create_vnode(cred, dvp, tvp);
166295fab37eSRobert Watson 
166395fab37eSRobert Watson 		error = mac_stdcreatevnode_ea(tvp);
166495fab37eSRobert Watson 		if (error)
166595fab37eSRobert Watson 			return (error);
166695fab37eSRobert Watson 
166795fab37eSRobert Watson 		/*
166895fab37eSRobert Watson 		 * XXX: Eventually this will go away and all policies will
166995fab37eSRobert Watson 		 * directly manage their extended attributes.
167095fab37eSRobert Watson 		 */
167195fab37eSRobert Watson 		error = mac_externalize(&tvp->v_label, &extmac);
167295fab37eSRobert Watson 		if (error)
167395fab37eSRobert Watson 			return (error);
167495fab37eSRobert Watson 
167595fab37eSRobert Watson 		error = vn_extattr_set(tvp, IO_NODELOCKED,
167695fab37eSRobert Watson 		    FREEBSD_MAC_EXTATTR_NAMESPACE, FREEBSD_MAC_EXTATTR_NAME,
167795fab37eSRobert Watson 		    sizeof(extmac), (char *)&extmac, curthread);
167895fab37eSRobert Watson 		if (error == 0)
1679e6e370a7SJeff Roberson 			tvp->v_vflag |= VV_CACHEDLABEL;
168095fab37eSRobert Watson 		else {
168195fab37eSRobert Watson #if 0
168295fab37eSRobert Watson 			/*
168395fab37eSRobert Watson 			 * In theory, we could have fall-back behavior here.
168495fab37eSRobert Watson 			 * It would probably be incorrect.
168595fab37eSRobert Watson 			 */
168695fab37eSRobert Watson #endif
168795fab37eSRobert Watson 			return (error);
168895fab37eSRobert Watson 		}
168995fab37eSRobert Watson 	}
169095fab37eSRobert Watson 
169195fab37eSRobert Watson 	return (0);
169295fab37eSRobert Watson }
169395fab37eSRobert Watson 
169495fab37eSRobert Watson void
169595fab37eSRobert Watson mac_execve_transition(struct ucred *old, struct ucred *new, struct vnode *vp)
169695fab37eSRobert Watson {
169795fab37eSRobert Watson 	int error;
169895fab37eSRobert Watson 
169995fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_execve_transition");
170095fab37eSRobert Watson 
170195fab37eSRobert Watson 	error = vn_refreshlabel(vp, old);
170295fab37eSRobert Watson 	if (error) {
170395fab37eSRobert Watson 		printf("mac_execve_transition: vn_refreshlabel returned %d\n",
170495fab37eSRobert Watson 		    error);
170595fab37eSRobert Watson 		printf("mac_execve_transition: using old vnode label\n");
170695fab37eSRobert Watson 	}
170795fab37eSRobert Watson 
170895fab37eSRobert Watson 	MAC_PERFORM(execve_transition, old, new, vp, &vp->v_label);
170995fab37eSRobert Watson }
171095fab37eSRobert Watson 
171195fab37eSRobert Watson int
171295fab37eSRobert Watson mac_execve_will_transition(struct ucred *old, struct vnode *vp)
171395fab37eSRobert Watson {
171495fab37eSRobert Watson 	int error, result;
171595fab37eSRobert Watson 
171695fab37eSRobert Watson 	error = vn_refreshlabel(vp, old);
171795fab37eSRobert Watson 	if (error)
171895fab37eSRobert Watson 		return (error);
171995fab37eSRobert Watson 
172095fab37eSRobert Watson 	result = 0;
172195fab37eSRobert Watson 	MAC_BOOLEAN(execve_will_transition, ||, old, vp, &vp->v_label);
172295fab37eSRobert Watson 
172395fab37eSRobert Watson 	return (result);
172495fab37eSRobert Watson }
172595fab37eSRobert Watson 
172695fab37eSRobert Watson int
172795fab37eSRobert Watson mac_check_vnode_access(struct ucred *cred, struct vnode *vp, int flags)
172895fab37eSRobert Watson {
172995fab37eSRobert Watson 	int error;
173095fab37eSRobert Watson 
173195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_access");
173295fab37eSRobert Watson 
173395fab37eSRobert Watson 	if (!mac_enforce_fs)
173495fab37eSRobert Watson 		return (0);
173595fab37eSRobert Watson 
173695fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
173795fab37eSRobert Watson 	if (error)
173895fab37eSRobert Watson 		return (error);
173995fab37eSRobert Watson 
174095fab37eSRobert Watson 	MAC_CHECK(check_vnode_access, cred, vp, &vp->v_label, flags);
174195fab37eSRobert Watson 	return (error);
174295fab37eSRobert Watson }
174395fab37eSRobert Watson 
174495fab37eSRobert Watson int
174595fab37eSRobert Watson mac_check_vnode_chdir(struct ucred *cred, struct vnode *dvp)
174695fab37eSRobert Watson {
174795fab37eSRobert Watson 	int error;
174895fab37eSRobert Watson 
174995fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_chdir");
175095fab37eSRobert Watson 
175195fab37eSRobert Watson 	if (!mac_enforce_fs)
175295fab37eSRobert Watson 		return (0);
175395fab37eSRobert Watson 
175495fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
175595fab37eSRobert Watson 	if (error)
175695fab37eSRobert Watson 		return (error);
175795fab37eSRobert Watson 
175895fab37eSRobert Watson 	MAC_CHECK(check_vnode_chdir, cred, dvp, &dvp->v_label);
175995fab37eSRobert Watson 	return (error);
176095fab37eSRobert Watson }
176195fab37eSRobert Watson 
176295fab37eSRobert Watson int
176395fab37eSRobert Watson mac_check_vnode_chroot(struct ucred *cred, struct vnode *dvp)
176495fab37eSRobert Watson {
176595fab37eSRobert Watson 	int error;
176695fab37eSRobert Watson 
176795fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_chroot");
176895fab37eSRobert Watson 
176995fab37eSRobert Watson 	if (!mac_enforce_fs)
177095fab37eSRobert Watson 		return (0);
177195fab37eSRobert Watson 
177295fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
177395fab37eSRobert Watson 	if (error)
177495fab37eSRobert Watson 		return (error);
177595fab37eSRobert Watson 
177695fab37eSRobert Watson 	MAC_CHECK(check_vnode_chroot, cred, dvp, &dvp->v_label);
177795fab37eSRobert Watson 	return (error);
177895fab37eSRobert Watson }
177995fab37eSRobert Watson 
178095fab37eSRobert Watson int
178195fab37eSRobert Watson mac_check_vnode_create(struct ucred *cred, struct vnode *dvp,
178295fab37eSRobert Watson     struct componentname *cnp, struct vattr *vap)
178395fab37eSRobert Watson {
178495fab37eSRobert Watson 	int error;
178595fab37eSRobert Watson 
178695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_create");
178795fab37eSRobert Watson 
178895fab37eSRobert Watson 	if (!mac_enforce_fs)
178995fab37eSRobert Watson 		return (0);
179095fab37eSRobert Watson 
179195fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
179295fab37eSRobert Watson 	if (error)
179395fab37eSRobert Watson 		return (error);
179495fab37eSRobert Watson 
179595fab37eSRobert Watson 	MAC_CHECK(check_vnode_create, cred, dvp, &dvp->v_label, cnp, vap);
179695fab37eSRobert Watson 	return (error);
179795fab37eSRobert Watson }
179895fab37eSRobert Watson 
179995fab37eSRobert Watson int
180095fab37eSRobert Watson mac_check_vnode_delete(struct ucred *cred, struct vnode *dvp, struct vnode *vp,
180195fab37eSRobert Watson     struct componentname *cnp)
180295fab37eSRobert Watson {
180395fab37eSRobert Watson 	int error;
180495fab37eSRobert Watson 
180595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_delete");
180695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_delete");
180795fab37eSRobert Watson 
180895fab37eSRobert Watson 	if (!mac_enforce_fs)
180995fab37eSRobert Watson 		return (0);
181095fab37eSRobert Watson 
181195fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
181295fab37eSRobert Watson 	if (error)
181395fab37eSRobert Watson 		return (error);
181495fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
181595fab37eSRobert Watson 	if (error)
181695fab37eSRobert Watson 		return (error);
181795fab37eSRobert Watson 
181895fab37eSRobert Watson 	MAC_CHECK(check_vnode_delete, cred, dvp, &dvp->v_label, vp,
181995fab37eSRobert Watson 	    &vp->v_label, cnp);
182095fab37eSRobert Watson 	return (error);
182195fab37eSRobert Watson }
182295fab37eSRobert Watson 
182395fab37eSRobert Watson int
182495fab37eSRobert Watson mac_check_vnode_deleteacl(struct ucred *cred, struct vnode *vp,
182595fab37eSRobert Watson     acl_type_t type)
182695fab37eSRobert Watson {
182795fab37eSRobert Watson 	int error;
182895fab37eSRobert Watson 
182995fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_deleteacl");
183095fab37eSRobert Watson 
183195fab37eSRobert Watson 	if (!mac_enforce_fs)
183295fab37eSRobert Watson 		return (0);
183395fab37eSRobert Watson 
183495fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
183595fab37eSRobert Watson 	if (error)
183695fab37eSRobert Watson 		return (error);
183795fab37eSRobert Watson 
183895fab37eSRobert Watson 	MAC_CHECK(check_vnode_deleteacl, cred, vp, &vp->v_label, type);
183995fab37eSRobert Watson 	return (error);
184095fab37eSRobert Watson }
184195fab37eSRobert Watson 
184295fab37eSRobert Watson int
184395fab37eSRobert Watson mac_check_vnode_exec(struct ucred *cred, struct vnode *vp)
184495fab37eSRobert Watson {
184595fab37eSRobert Watson 	int error;
184695fab37eSRobert Watson 
1847851704bbSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_exec");
1848851704bbSRobert Watson 
184995fab37eSRobert Watson 	if (!mac_enforce_process && !mac_enforce_fs)
185095fab37eSRobert Watson 		return (0);
185195fab37eSRobert Watson 
185295fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
185395fab37eSRobert Watson 	if (error)
185495fab37eSRobert Watson 		return (error);
185595fab37eSRobert Watson 	MAC_CHECK(check_vnode_exec, cred, vp, &vp->v_label);
185695fab37eSRobert Watson 
185795fab37eSRobert Watson 	return (error);
185895fab37eSRobert Watson }
185995fab37eSRobert Watson 
186095fab37eSRobert Watson int
186195fab37eSRobert Watson mac_check_vnode_getacl(struct ucred *cred, struct vnode *vp, acl_type_t type)
186295fab37eSRobert Watson {
186395fab37eSRobert Watson 	int error;
186495fab37eSRobert Watson 
186595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_getacl");
186695fab37eSRobert Watson 
186795fab37eSRobert Watson 	if (!mac_enforce_fs)
186895fab37eSRobert Watson 		return (0);
186995fab37eSRobert Watson 
187095fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
187195fab37eSRobert Watson 	if (error)
187295fab37eSRobert Watson 		return (error);
187395fab37eSRobert Watson 
187495fab37eSRobert Watson 	MAC_CHECK(check_vnode_getacl, cred, vp, &vp->v_label, type);
187595fab37eSRobert Watson 	return (error);
187695fab37eSRobert Watson }
187795fab37eSRobert Watson 
187895fab37eSRobert Watson int
187995fab37eSRobert Watson mac_check_vnode_getextattr(struct ucred *cred, struct vnode *vp,
188095fab37eSRobert Watson     int attrnamespace, const char *name, struct uio *uio)
188195fab37eSRobert Watson {
188295fab37eSRobert Watson 	int error;
188395fab37eSRobert Watson 
188495fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_getextattr");
188595fab37eSRobert Watson 
188695fab37eSRobert Watson 	if (!mac_enforce_fs)
188795fab37eSRobert Watson 		return (0);
188895fab37eSRobert Watson 
188995fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
189095fab37eSRobert Watson 	if (error)
189195fab37eSRobert Watson 		return (error);
189295fab37eSRobert Watson 
189395fab37eSRobert Watson 	MAC_CHECK(check_vnode_getextattr, cred, vp, &vp->v_label,
189495fab37eSRobert Watson 	    attrnamespace, name, uio);
189595fab37eSRobert Watson 	return (error);
189695fab37eSRobert Watson }
189795fab37eSRobert Watson 
189895fab37eSRobert Watson int
18990a694196SRobert Watson mac_check_vnode_link(struct ucred *cred, struct vnode *dvp,
19000a694196SRobert Watson     struct vnode *vp, struct componentname *cnp)
19010a694196SRobert Watson {
19020a694196SRobert Watson 
19030a694196SRobert Watson 	int error;
19040a694196SRobert Watson 
19050a694196SRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_link");
19060a694196SRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_link");
19070a694196SRobert Watson 
19080a694196SRobert Watson 	if (!mac_enforce_fs)
19090a694196SRobert Watson 		return (0);
19100a694196SRobert Watson 
19110a694196SRobert Watson 	error = vn_refreshlabel(dvp, cred);
19120a694196SRobert Watson 	if (error)
19130a694196SRobert Watson 		return (error);
19140a694196SRobert Watson 
19150a694196SRobert Watson 	error = vn_refreshlabel(vp, cred);
19160a694196SRobert Watson 	if (error)
19170a694196SRobert Watson 		return (error);
19180a694196SRobert Watson 
19190a694196SRobert Watson 	MAC_CHECK(check_vnode_link, cred, dvp, &dvp->v_label, vp,
19200a694196SRobert Watson 	    &vp->v_label, cnp);
19210a694196SRobert Watson 	return (error);
19220a694196SRobert Watson }
19230a694196SRobert Watson 
19240a694196SRobert Watson int
192595fab37eSRobert Watson mac_check_vnode_lookup(struct ucred *cred, struct vnode *dvp,
192695fab37eSRobert Watson     struct componentname *cnp)
192795fab37eSRobert Watson {
192895fab37eSRobert Watson 	int error;
192995fab37eSRobert Watson 
193095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_lookup");
193195fab37eSRobert Watson 
193295fab37eSRobert Watson 	if (!mac_enforce_fs)
193395fab37eSRobert Watson 		return (0);
193495fab37eSRobert Watson 
193595fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
193695fab37eSRobert Watson 	if (error)
193795fab37eSRobert Watson 		return (error);
193895fab37eSRobert Watson 
193995fab37eSRobert Watson 	MAC_CHECK(check_vnode_lookup, cred, dvp, &dvp->v_label, cnp);
194095fab37eSRobert Watson 	return (error);
194195fab37eSRobert Watson }
194295fab37eSRobert Watson 
194395fab37eSRobert Watson vm_prot_t
194495fab37eSRobert Watson mac_check_vnode_mmap_prot(struct ucred *cred, struct vnode *vp, int newmapping)
194595fab37eSRobert Watson {
194695fab37eSRobert Watson 	vm_prot_t result = VM_PROT_ALL;
194795fab37eSRobert Watson 
1948ca7850c3SRobert Watson 	if (!mac_enforce_vm)
1949ca7850c3SRobert Watson 		return (result);
1950ca7850c3SRobert Watson 
195195fab37eSRobert Watson 	/*
195295fab37eSRobert Watson 	 * This should be some sort of MAC_BITWISE, maybe :)
195395fab37eSRobert Watson 	 */
195495fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_mmap_perms");
195595fab37eSRobert Watson 	MAC_BOOLEAN(check_vnode_mmap_perms, &, cred, vp, &vp->v_label,
195695fab37eSRobert Watson 	    newmapping);
195795fab37eSRobert Watson 	return (result);
195895fab37eSRobert Watson }
195995fab37eSRobert Watson 
196095fab37eSRobert Watson int
196195fab37eSRobert Watson mac_check_vnode_open(struct ucred *cred, struct vnode *vp, mode_t acc_mode)
196295fab37eSRobert Watson {
196395fab37eSRobert Watson 	int error;
196495fab37eSRobert Watson 
196595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_open");
196695fab37eSRobert Watson 
196795fab37eSRobert Watson 	if (!mac_enforce_fs)
196895fab37eSRobert Watson 		return (0);
196995fab37eSRobert Watson 
197095fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
197195fab37eSRobert Watson 	if (error)
197295fab37eSRobert Watson 		return (error);
197395fab37eSRobert Watson 
197495fab37eSRobert Watson 	MAC_CHECK(check_vnode_open, cred, vp, &vp->v_label, acc_mode);
197595fab37eSRobert Watson 	return (error);
197695fab37eSRobert Watson }
197795fab37eSRobert Watson 
197895fab37eSRobert Watson int
1979177142e4SRobert Watson mac_check_vnode_poll(struct ucred *active_cred, struct ucred *file_cred,
1980177142e4SRobert Watson     struct vnode *vp)
19817f724f8bSRobert Watson {
19827f724f8bSRobert Watson 	int error;
19837f724f8bSRobert Watson 
19847f724f8bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_poll");
19857f724f8bSRobert Watson 
19867f724f8bSRobert Watson 	if (!mac_enforce_fs)
19877f724f8bSRobert Watson 		return (0);
19887f724f8bSRobert Watson 
1989177142e4SRobert Watson 	error = vn_refreshlabel(vp, active_cred);
19907f724f8bSRobert Watson 	if (error)
19917f724f8bSRobert Watson 		return (error);
19927f724f8bSRobert Watson 
1993177142e4SRobert Watson 	MAC_CHECK(check_vnode_poll, active_cred, file_cred, vp,
1994177142e4SRobert Watson 	    &vp->v_label);
19957f724f8bSRobert Watson 
19967f724f8bSRobert Watson 	return (error);
19977f724f8bSRobert Watson }
19987f724f8bSRobert Watson 
19997f724f8bSRobert Watson int
2000177142e4SRobert Watson mac_check_vnode_read(struct ucred *active_cred, struct ucred *file_cred,
2001177142e4SRobert Watson     struct vnode *vp)
20027f724f8bSRobert Watson {
20037f724f8bSRobert Watson 	int error;
20047f724f8bSRobert Watson 
20057f724f8bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_read");
20067f724f8bSRobert Watson 
20077f724f8bSRobert Watson 	if (!mac_enforce_fs)
20087f724f8bSRobert Watson 		return (0);
20097f724f8bSRobert Watson 
2010177142e4SRobert Watson 	error = vn_refreshlabel(vp, active_cred);
20117f724f8bSRobert Watson 	if (error)
20127f724f8bSRobert Watson 		return (error);
20137f724f8bSRobert Watson 
2014177142e4SRobert Watson 	MAC_CHECK(check_vnode_read, active_cred, file_cred, vp,
2015177142e4SRobert Watson 	    &vp->v_label);
20167f724f8bSRobert Watson 
20177f724f8bSRobert Watson 	return (error);
20187f724f8bSRobert Watson }
20197f724f8bSRobert Watson 
20207f724f8bSRobert Watson int
202195fab37eSRobert Watson mac_check_vnode_readdir(struct ucred *cred, struct vnode *dvp)
202295fab37eSRobert Watson {
202395fab37eSRobert Watson 	int error;
202495fab37eSRobert Watson 
202595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_readdir");
202695fab37eSRobert Watson 
202795fab37eSRobert Watson 	if (!mac_enforce_fs)
202895fab37eSRobert Watson 		return (0);
202995fab37eSRobert Watson 
203095fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
203195fab37eSRobert Watson 	if (error)
203295fab37eSRobert Watson 		return (error);
203395fab37eSRobert Watson 
203495fab37eSRobert Watson 	MAC_CHECK(check_vnode_readdir, cred, dvp, &dvp->v_label);
203595fab37eSRobert Watson 	return (error);
203695fab37eSRobert Watson }
203795fab37eSRobert Watson 
203895fab37eSRobert Watson int
203995fab37eSRobert Watson mac_check_vnode_readlink(struct ucred *cred, struct vnode *vp)
204095fab37eSRobert Watson {
204195fab37eSRobert Watson 	int error;
204295fab37eSRobert Watson 
204395fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_readlink");
204495fab37eSRobert Watson 
204595fab37eSRobert Watson 	if (!mac_enforce_fs)
204695fab37eSRobert Watson 		return (0);
204795fab37eSRobert Watson 
204895fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
204995fab37eSRobert Watson 	if (error)
205095fab37eSRobert Watson 		return (error);
205195fab37eSRobert Watson 
205295fab37eSRobert Watson 	MAC_CHECK(check_vnode_readlink, cred, vp, &vp->v_label);
205395fab37eSRobert Watson 	return (error);
205495fab37eSRobert Watson }
205595fab37eSRobert Watson 
205695fab37eSRobert Watson static int
205795fab37eSRobert Watson mac_check_vnode_relabel(struct ucred *cred, struct vnode *vp,
205895fab37eSRobert Watson     struct label *newlabel)
205995fab37eSRobert Watson {
206095fab37eSRobert Watson 	int error;
206195fab37eSRobert Watson 
206295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_relabel");
206395fab37eSRobert Watson 
206495fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
206595fab37eSRobert Watson 	if (error)
206695fab37eSRobert Watson 		return (error);
206795fab37eSRobert Watson 
206895fab37eSRobert Watson 	MAC_CHECK(check_vnode_relabel, cred, vp, &vp->v_label, newlabel);
206995fab37eSRobert Watson 
207095fab37eSRobert Watson 	return (error);
207195fab37eSRobert Watson }
207295fab37eSRobert Watson 
207395fab37eSRobert Watson int
207495fab37eSRobert Watson mac_check_vnode_rename_from(struct ucred *cred, struct vnode *dvp,
207595fab37eSRobert Watson     struct vnode *vp, struct componentname *cnp)
207695fab37eSRobert Watson {
207795fab37eSRobert Watson 	int error;
207895fab37eSRobert Watson 
207995fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_rename_from");
208095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_rename_from");
208195fab37eSRobert Watson 
208295fab37eSRobert Watson 	if (!mac_enforce_fs)
208395fab37eSRobert Watson 		return (0);
208495fab37eSRobert Watson 
208595fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
208695fab37eSRobert Watson 	if (error)
208795fab37eSRobert Watson 		return (error);
208895fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
208995fab37eSRobert Watson 	if (error)
209095fab37eSRobert Watson 		return (error);
209195fab37eSRobert Watson 
209295fab37eSRobert Watson 	MAC_CHECK(check_vnode_rename_from, cred, dvp, &dvp->v_label, vp,
209395fab37eSRobert Watson 	    &vp->v_label, cnp);
209495fab37eSRobert Watson 	return (error);
209595fab37eSRobert Watson }
209695fab37eSRobert Watson 
209795fab37eSRobert Watson int
209895fab37eSRobert Watson mac_check_vnode_rename_to(struct ucred *cred, struct vnode *dvp,
209995fab37eSRobert Watson     struct vnode *vp, int samedir, struct componentname *cnp)
210095fab37eSRobert Watson {
210195fab37eSRobert Watson 	int error;
210295fab37eSRobert Watson 
210395fab37eSRobert Watson 	ASSERT_VOP_LOCKED(dvp, "mac_check_vnode_rename_to");
210495fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_rename_to");
210595fab37eSRobert Watson 
210695fab37eSRobert Watson 	if (!mac_enforce_fs)
210795fab37eSRobert Watson 		return (0);
210895fab37eSRobert Watson 
210995fab37eSRobert Watson 	error = vn_refreshlabel(dvp, cred);
211095fab37eSRobert Watson 	if (error)
211195fab37eSRobert Watson 		return (error);
211295fab37eSRobert Watson 	if (vp != NULL) {
211395fab37eSRobert Watson 		error = vn_refreshlabel(vp, cred);
211495fab37eSRobert Watson 		if (error)
211595fab37eSRobert Watson 			return (error);
211695fab37eSRobert Watson 	}
211795fab37eSRobert Watson 	MAC_CHECK(check_vnode_rename_to, cred, dvp, &dvp->v_label, vp,
211895fab37eSRobert Watson 	    vp != NULL ? &vp->v_label : NULL, samedir, cnp);
211995fab37eSRobert Watson 	return (error);
212095fab37eSRobert Watson }
212195fab37eSRobert Watson 
212295fab37eSRobert Watson int
212395fab37eSRobert Watson mac_check_vnode_revoke(struct ucred *cred, struct vnode *vp)
212495fab37eSRobert Watson {
212595fab37eSRobert Watson 	int error;
212695fab37eSRobert Watson 
212795fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_revoke");
212895fab37eSRobert Watson 
212995fab37eSRobert Watson 	if (!mac_enforce_fs)
213095fab37eSRobert Watson 		return (0);
213195fab37eSRobert Watson 
213295fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
213395fab37eSRobert Watson 	if (error)
213495fab37eSRobert Watson 		return (error);
213595fab37eSRobert Watson 
213695fab37eSRobert Watson 	MAC_CHECK(check_vnode_revoke, cred, vp, &vp->v_label);
213795fab37eSRobert Watson 	return (error);
213895fab37eSRobert Watson }
213995fab37eSRobert Watson 
214095fab37eSRobert Watson int
214195fab37eSRobert Watson mac_check_vnode_setacl(struct ucred *cred, struct vnode *vp, acl_type_t type,
214295fab37eSRobert Watson     struct acl *acl)
214395fab37eSRobert Watson {
214495fab37eSRobert Watson 	int error;
214595fab37eSRobert Watson 
214695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setacl");
214795fab37eSRobert Watson 
214895fab37eSRobert Watson 	if (!mac_enforce_fs)
214995fab37eSRobert Watson 		return (0);
215095fab37eSRobert Watson 
215195fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
215295fab37eSRobert Watson 	if (error)
215395fab37eSRobert Watson 		return (error);
215495fab37eSRobert Watson 
215595fab37eSRobert Watson 	MAC_CHECK(check_vnode_setacl, cred, vp, &vp->v_label, type, acl);
215695fab37eSRobert Watson 	return (error);
215795fab37eSRobert Watson }
215895fab37eSRobert Watson 
215995fab37eSRobert Watson int
216095fab37eSRobert Watson mac_check_vnode_setextattr(struct ucred *cred, struct vnode *vp,
216195fab37eSRobert Watson     int attrnamespace, const char *name, struct uio *uio)
216295fab37eSRobert Watson {
216395fab37eSRobert Watson 	int error;
216495fab37eSRobert Watson 
216595fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setextattr");
216695fab37eSRobert Watson 
216795fab37eSRobert Watson 	if (!mac_enforce_fs)
216895fab37eSRobert Watson 		return (0);
216995fab37eSRobert Watson 
217095fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
217195fab37eSRobert Watson 	if (error)
217295fab37eSRobert Watson 		return (error);
217395fab37eSRobert Watson 
217495fab37eSRobert Watson 	MAC_CHECK(check_vnode_setextattr, cred, vp, &vp->v_label,
217595fab37eSRobert Watson 	    attrnamespace, name, uio);
217695fab37eSRobert Watson 	return (error);
217795fab37eSRobert Watson }
217895fab37eSRobert Watson 
217995fab37eSRobert Watson int
218095fab37eSRobert Watson mac_check_vnode_setflags(struct ucred *cred, struct vnode *vp, u_long flags)
218195fab37eSRobert Watson {
218295fab37eSRobert Watson 	int error;
218395fab37eSRobert Watson 
218495fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setflags");
218595fab37eSRobert Watson 
218695fab37eSRobert Watson 	if (!mac_enforce_fs)
218795fab37eSRobert Watson 		return (0);
218895fab37eSRobert Watson 
218995fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
219095fab37eSRobert Watson 	if (error)
219195fab37eSRobert Watson 		return (error);
219295fab37eSRobert Watson 
219395fab37eSRobert Watson 	MAC_CHECK(check_vnode_setflags, cred, vp, &vp->v_label, flags);
219495fab37eSRobert Watson 	return (error);
219595fab37eSRobert Watson }
219695fab37eSRobert Watson 
219795fab37eSRobert Watson int
219895fab37eSRobert Watson mac_check_vnode_setmode(struct ucred *cred, struct vnode *vp, mode_t mode)
219995fab37eSRobert Watson {
220095fab37eSRobert Watson 	int error;
220195fab37eSRobert Watson 
220295fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setmode");
220395fab37eSRobert Watson 
220495fab37eSRobert Watson 	if (!mac_enforce_fs)
220595fab37eSRobert Watson 		return (0);
220695fab37eSRobert Watson 
220795fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
220895fab37eSRobert Watson 	if (error)
220995fab37eSRobert Watson 		return (error);
221095fab37eSRobert Watson 
221195fab37eSRobert Watson 	MAC_CHECK(check_vnode_setmode, cred, vp, &vp->v_label, mode);
221295fab37eSRobert Watson 	return (error);
221395fab37eSRobert Watson }
221495fab37eSRobert Watson 
221595fab37eSRobert Watson int
221695fab37eSRobert Watson mac_check_vnode_setowner(struct ucred *cred, struct vnode *vp, uid_t uid,
221795fab37eSRobert Watson     gid_t gid)
221895fab37eSRobert Watson {
221995fab37eSRobert Watson 	int error;
222095fab37eSRobert Watson 
222195fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setowner");
222295fab37eSRobert Watson 
222395fab37eSRobert Watson 	if (!mac_enforce_fs)
222495fab37eSRobert Watson 		return (0);
222595fab37eSRobert Watson 
222695fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
222795fab37eSRobert Watson 	if (error)
222895fab37eSRobert Watson 		return (error);
222995fab37eSRobert Watson 
223095fab37eSRobert Watson 	MAC_CHECK(check_vnode_setowner, cred, vp, &vp->v_label, uid, gid);
223195fab37eSRobert Watson 	return (error);
223295fab37eSRobert Watson }
223395fab37eSRobert Watson 
223495fab37eSRobert Watson int
223595fab37eSRobert Watson mac_check_vnode_setutimes(struct ucred *cred, struct vnode *vp,
223695fab37eSRobert Watson     struct timespec atime, struct timespec mtime)
223795fab37eSRobert Watson {
223895fab37eSRobert Watson 	int error;
223995fab37eSRobert Watson 
224095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_setutimes");
224195fab37eSRobert Watson 
224295fab37eSRobert Watson 	if (!mac_enforce_fs)
224395fab37eSRobert Watson 		return (0);
224495fab37eSRobert Watson 
224595fab37eSRobert Watson 	error = vn_refreshlabel(vp, cred);
224695fab37eSRobert Watson 	if (error)
224795fab37eSRobert Watson 		return (error);
224895fab37eSRobert Watson 
224995fab37eSRobert Watson 	MAC_CHECK(check_vnode_setutimes, cred, vp, &vp->v_label, atime,
225095fab37eSRobert Watson 	    mtime);
225195fab37eSRobert Watson 	return (error);
225295fab37eSRobert Watson }
225395fab37eSRobert Watson 
225495fab37eSRobert Watson int
2255177142e4SRobert Watson mac_check_vnode_stat(struct ucred *active_cred, struct ucred *file_cred,
2256177142e4SRobert Watson     struct vnode *vp)
225795fab37eSRobert Watson {
225895fab37eSRobert Watson 	int error;
225995fab37eSRobert Watson 
226095fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_stat");
226195fab37eSRobert Watson 
226295fab37eSRobert Watson 	if (!mac_enforce_fs)
226395fab37eSRobert Watson 		return (0);
226495fab37eSRobert Watson 
2265177142e4SRobert Watson 	error = vn_refreshlabel(vp, active_cred);
226695fab37eSRobert Watson 	if (error)
226795fab37eSRobert Watson 		return (error);
226895fab37eSRobert Watson 
2269177142e4SRobert Watson 	MAC_CHECK(check_vnode_stat, active_cred, file_cred, vp,
2270177142e4SRobert Watson 	    &vp->v_label);
227195fab37eSRobert Watson 	return (error);
227295fab37eSRobert Watson }
227395fab37eSRobert Watson 
22747f724f8bSRobert Watson int
2275177142e4SRobert Watson mac_check_vnode_write(struct ucred *active_cred, struct ucred *file_cred,
2276177142e4SRobert Watson     struct vnode *vp)
22777f724f8bSRobert Watson {
22787f724f8bSRobert Watson 	int error;
22797f724f8bSRobert Watson 
22807f724f8bSRobert Watson 	ASSERT_VOP_LOCKED(vp, "mac_check_vnode_write");
22817f724f8bSRobert Watson 
22827f724f8bSRobert Watson 	if (!mac_enforce_fs)
22837f724f8bSRobert Watson 		return (0);
22847f724f8bSRobert Watson 
2285177142e4SRobert Watson 	error = vn_refreshlabel(vp, active_cred);
22867f724f8bSRobert Watson 	if (error)
22877f724f8bSRobert Watson 		return (error);
22887f724f8bSRobert Watson 
2289177142e4SRobert Watson 	MAC_CHECK(check_vnode_write, active_cred, file_cred, vp,
2290177142e4SRobert Watson 	    &vp->v_label);
22917f724f8bSRobert Watson 
22927f724f8bSRobert Watson 	return (error);
22937f724f8bSRobert Watson }
22947f724f8bSRobert Watson 
229595fab37eSRobert Watson /*
229695fab37eSRobert Watson  * When relabeling a process, call out to the policies for the maximum
229795fab37eSRobert Watson  * permission allowed for each object type we know about in its
229895fab37eSRobert Watson  * memory space, and revoke access (in the least surprising ways we
229995fab37eSRobert Watson  * know) when necessary.  The process lock is not held here.
230095fab37eSRobert Watson  */
230195fab37eSRobert Watson static void
230295fab37eSRobert Watson mac_cred_mmapped_drop_perms(struct thread *td, struct ucred *cred)
230395fab37eSRobert Watson {
230495fab37eSRobert Watson 
230595fab37eSRobert Watson 	/* XXX freeze all other threads */
230695fab37eSRobert Watson 	mac_cred_mmapped_drop_perms_recurse(td, cred,
230795fab37eSRobert Watson 	    &td->td_proc->p_vmspace->vm_map);
230895fab37eSRobert Watson 	/* XXX allow other threads to continue */
230995fab37eSRobert Watson }
231095fab37eSRobert Watson 
231195fab37eSRobert Watson static __inline const char *
231295fab37eSRobert Watson prot2str(vm_prot_t prot)
231395fab37eSRobert Watson {
231495fab37eSRobert Watson 
231595fab37eSRobert Watson 	switch (prot & VM_PROT_ALL) {
231695fab37eSRobert Watson 	case VM_PROT_READ:
231795fab37eSRobert Watson 		return ("r--");
231895fab37eSRobert Watson 	case VM_PROT_READ | VM_PROT_WRITE:
231995fab37eSRobert Watson 		return ("rw-");
232095fab37eSRobert Watson 	case VM_PROT_READ | VM_PROT_EXECUTE:
232195fab37eSRobert Watson 		return ("r-x");
232295fab37eSRobert Watson 	case VM_PROT_READ | VM_PROT_WRITE | VM_PROT_EXECUTE:
232395fab37eSRobert Watson 		return ("rwx");
232495fab37eSRobert Watson 	case VM_PROT_WRITE:
232595fab37eSRobert Watson 		return ("-w-");
232695fab37eSRobert Watson 	case VM_PROT_EXECUTE:
232795fab37eSRobert Watson 		return ("--x");
232895fab37eSRobert Watson 	case VM_PROT_WRITE | VM_PROT_EXECUTE:
232995fab37eSRobert Watson 		return ("-wx");
233095fab37eSRobert Watson 	default:
233195fab37eSRobert Watson 		return ("---");
233295fab37eSRobert Watson 	}
233395fab37eSRobert Watson }
233495fab37eSRobert Watson 
233595fab37eSRobert Watson static void
233695fab37eSRobert Watson mac_cred_mmapped_drop_perms_recurse(struct thread *td, struct ucred *cred,
233795fab37eSRobert Watson     struct vm_map *map)
233895fab37eSRobert Watson {
233995fab37eSRobert Watson 	struct vm_map_entry *vme;
234095fab37eSRobert Watson 	vm_prot_t result, revokeperms;
234195fab37eSRobert Watson 	vm_object_t object;
234295fab37eSRobert Watson 	vm_ooffset_t offset;
234395fab37eSRobert Watson 	struct vnode *vp;
234495fab37eSRobert Watson 
2345c0f39905SRobert Watson 	if (!mac_mmap_revocation)
2346c0f39905SRobert Watson 		return;
2347c0f39905SRobert Watson 
234895fab37eSRobert Watson 	vm_map_lock_read(map);
234995fab37eSRobert Watson 	for (vme = map->header.next; vme != &map->header; vme = vme->next) {
235095fab37eSRobert Watson 		if (vme->eflags & MAP_ENTRY_IS_SUB_MAP) {
235195fab37eSRobert Watson 			mac_cred_mmapped_drop_perms_recurse(td, cred,
235295fab37eSRobert Watson 			    vme->object.sub_map);
235395fab37eSRobert Watson 			continue;
235495fab37eSRobert Watson 		}
235595fab37eSRobert Watson 		/*
235695fab37eSRobert Watson 		 * Skip over entries that obviously are not shared.
235795fab37eSRobert Watson 		 */
235895fab37eSRobert Watson 		if (vme->eflags & (MAP_ENTRY_COW | MAP_ENTRY_NOSYNC) ||
235995fab37eSRobert Watson 		    !vme->max_protection)
236095fab37eSRobert Watson 			continue;
236195fab37eSRobert Watson 		/*
236295fab37eSRobert Watson 		 * Drill down to the deepest backing object.
236395fab37eSRobert Watson 		 */
236495fab37eSRobert Watson 		offset = vme->offset;
236595fab37eSRobert Watson 		object = vme->object.vm_object;
236695fab37eSRobert Watson 		if (object == NULL)
236795fab37eSRobert Watson 			continue;
236895fab37eSRobert Watson 		while (object->backing_object != NULL) {
236995fab37eSRobert Watson 			object = object->backing_object;
237095fab37eSRobert Watson 			offset += object->backing_object_offset;
237195fab37eSRobert Watson 		}
237295fab37eSRobert Watson 		/*
237395fab37eSRobert Watson 		 * At the moment, vm_maps and objects aren't considered
237495fab37eSRobert Watson 		 * by the MAC system, so only things with backing by a
237595fab37eSRobert Watson 		 * normal object (read: vnodes) are checked.
237695fab37eSRobert Watson 		 */
237795fab37eSRobert Watson 		if (object->type != OBJT_VNODE)
237895fab37eSRobert Watson 			continue;
237995fab37eSRobert Watson 		vp = (struct vnode *)object->handle;
238095fab37eSRobert Watson 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
238195fab37eSRobert Watson 		result = mac_check_vnode_mmap_prot(cred, vp, 0);
238295fab37eSRobert Watson 		VOP_UNLOCK(vp, 0, td);
238395fab37eSRobert Watson 		/*
238495fab37eSRobert Watson 		 * Find out what maximum protection we may be allowing
238595fab37eSRobert Watson 		 * now but a policy needs to get removed.
238695fab37eSRobert Watson 		 */
238795fab37eSRobert Watson 		revokeperms = vme->max_protection & ~result;
238895fab37eSRobert Watson 		if (!revokeperms)
238995fab37eSRobert Watson 			continue;
2390b656366bSBruce Evans 		printf("pid %ld: revoking %s perms from %#lx:%ld "
2391b656366bSBruce Evans 		    "(max %s/cur %s)\n", (long)td->td_proc->p_pid,
2392b656366bSBruce Evans 		    prot2str(revokeperms), (u_long)vme->start,
2393b656366bSBruce Evans 		    (long)(vme->end - vme->start),
239495fab37eSRobert Watson 		    prot2str(vme->max_protection), prot2str(vme->protection));
239595fab37eSRobert Watson 		vm_map_lock_upgrade(map);
239695fab37eSRobert Watson 		/*
239795fab37eSRobert Watson 		 * This is the really simple case: if a map has more
239895fab37eSRobert Watson 		 * max_protection than is allowed, but it's not being
239995fab37eSRobert Watson 		 * actually used (that is, the current protection is
240095fab37eSRobert Watson 		 * still allowed), we can just wipe it out and do
240195fab37eSRobert Watson 		 * nothing more.
240295fab37eSRobert Watson 		 */
240395fab37eSRobert Watson 		if ((vme->protection & revokeperms) == 0) {
240495fab37eSRobert Watson 			vme->max_protection -= revokeperms;
240595fab37eSRobert Watson 		} else {
240695fab37eSRobert Watson 			if (revokeperms & VM_PROT_WRITE) {
240795fab37eSRobert Watson 				/*
240895fab37eSRobert Watson 				 * In the more complicated case, flush out all
240995fab37eSRobert Watson 				 * pending changes to the object then turn it
241095fab37eSRobert Watson 				 * copy-on-write.
241195fab37eSRobert Watson 				 */
241295fab37eSRobert Watson 				vm_object_reference(object);
241395fab37eSRobert Watson 				vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
241495fab37eSRobert Watson 				vm_object_page_clean(object,
241595fab37eSRobert Watson 				    OFF_TO_IDX(offset),
241695fab37eSRobert Watson 				    OFF_TO_IDX(offset + vme->end - vme->start +
241795fab37eSRobert Watson 					PAGE_MASK),
241895fab37eSRobert Watson 				    OBJPC_SYNC);
241995fab37eSRobert Watson 				VOP_UNLOCK(vp, 0, td);
242095fab37eSRobert Watson 				vm_object_deallocate(object);
242195fab37eSRobert Watson 				/*
242295fab37eSRobert Watson 				 * Why bother if there's no read permissions
242395fab37eSRobert Watson 				 * anymore?  For the rest, we need to leave
242495fab37eSRobert Watson 				 * the write permissions on for COW, or
242595fab37eSRobert Watson 				 * remove them entirely if configured to.
242695fab37eSRobert Watson 				 */
242795fab37eSRobert Watson 				if (!mac_mmap_revocation_via_cow) {
242895fab37eSRobert Watson 					vme->max_protection &= ~VM_PROT_WRITE;
242995fab37eSRobert Watson 					vme->protection &= ~VM_PROT_WRITE;
243095fab37eSRobert Watson 				} if ((revokeperms & VM_PROT_READ) == 0)
243195fab37eSRobert Watson 					vme->eflags |= MAP_ENTRY_COW |
243295fab37eSRobert Watson 					    MAP_ENTRY_NEEDS_COPY;
243395fab37eSRobert Watson 			}
243495fab37eSRobert Watson 			if (revokeperms & VM_PROT_EXECUTE) {
243595fab37eSRobert Watson 				vme->max_protection &= ~VM_PROT_EXECUTE;
243695fab37eSRobert Watson 				vme->protection &= ~VM_PROT_EXECUTE;
243795fab37eSRobert Watson 			}
243895fab37eSRobert Watson 			if (revokeperms & VM_PROT_READ) {
243995fab37eSRobert Watson 				vme->max_protection = 0;
244095fab37eSRobert Watson 				vme->protection = 0;
244195fab37eSRobert Watson 			}
244295fab37eSRobert Watson 			pmap_protect(map->pmap, vme->start, vme->end,
244395fab37eSRobert Watson 			    vme->protection & ~revokeperms);
244495fab37eSRobert Watson 			vm_map_simplify_entry(map, vme);
244595fab37eSRobert Watson 		}
244695fab37eSRobert Watson 		vm_map_lock_downgrade(map);
244795fab37eSRobert Watson 	}
244895fab37eSRobert Watson 	vm_map_unlock_read(map);
244995fab37eSRobert Watson }
245095fab37eSRobert Watson 
245195fab37eSRobert Watson /*
245295fab37eSRobert Watson  * When the subject's label changes, it may require revocation of privilege
245395fab37eSRobert Watson  * to mapped objects.  This can't be done on-the-fly later with a unified
245495fab37eSRobert Watson  * buffer cache.
245595fab37eSRobert Watson  */
245695fab37eSRobert Watson static void
245795fab37eSRobert Watson mac_relabel_cred(struct ucred *cred, struct label *newlabel)
245895fab37eSRobert Watson {
245995fab37eSRobert Watson 
246095fab37eSRobert Watson 	MAC_PERFORM(relabel_cred, cred, newlabel);
246195fab37eSRobert Watson }
246295fab37eSRobert Watson 
246395fab37eSRobert Watson void
246495fab37eSRobert Watson mac_relabel_vnode(struct ucred *cred, struct vnode *vp, struct label *newlabel)
246595fab37eSRobert Watson {
246695fab37eSRobert Watson 
246795fab37eSRobert Watson 	MAC_PERFORM(relabel_vnode, cred, vp, &vp->v_label, newlabel);
246895fab37eSRobert Watson }
246995fab37eSRobert Watson 
247095fab37eSRobert Watson void
247195fab37eSRobert Watson mac_create_ifnet(struct ifnet *ifnet)
247295fab37eSRobert Watson {
247395fab37eSRobert Watson 
247495fab37eSRobert Watson 	MAC_PERFORM(create_ifnet, ifnet, &ifnet->if_label);
247595fab37eSRobert Watson }
247695fab37eSRobert Watson 
247795fab37eSRobert Watson void
247895fab37eSRobert Watson mac_create_bpfdesc(struct ucred *cred, struct bpf_d *bpf_d)
247995fab37eSRobert Watson {
248095fab37eSRobert Watson 
248195fab37eSRobert Watson 	MAC_PERFORM(create_bpfdesc, cred, bpf_d, &bpf_d->bd_label);
248295fab37eSRobert Watson }
248395fab37eSRobert Watson 
248495fab37eSRobert Watson void
248595fab37eSRobert Watson mac_create_socket(struct ucred *cred, struct socket *socket)
248695fab37eSRobert Watson {
248795fab37eSRobert Watson 
248895fab37eSRobert Watson 	MAC_PERFORM(create_socket, cred, socket, &socket->so_label);
248995fab37eSRobert Watson }
249095fab37eSRobert Watson 
249195fab37eSRobert Watson void
249295fab37eSRobert Watson mac_create_pipe(struct ucred *cred, struct pipe *pipe)
249395fab37eSRobert Watson {
249495fab37eSRobert Watson 
249595fab37eSRobert Watson 	MAC_PERFORM(create_pipe, cred, pipe, pipe->pipe_label);
249695fab37eSRobert Watson }
249795fab37eSRobert Watson 
249895fab37eSRobert Watson void
249995fab37eSRobert Watson mac_create_socket_from_socket(struct socket *oldsocket,
250095fab37eSRobert Watson     struct socket *newsocket)
250195fab37eSRobert Watson {
250295fab37eSRobert Watson 
250395fab37eSRobert Watson 	MAC_PERFORM(create_socket_from_socket, oldsocket, &oldsocket->so_label,
250495fab37eSRobert Watson 	    newsocket, &newsocket->so_label);
250595fab37eSRobert Watson }
250695fab37eSRobert Watson 
250795fab37eSRobert Watson static void
250895fab37eSRobert Watson mac_relabel_socket(struct ucred *cred, struct socket *socket,
250995fab37eSRobert Watson     struct label *newlabel)
251095fab37eSRobert Watson {
251195fab37eSRobert Watson 
251295fab37eSRobert Watson 	MAC_PERFORM(relabel_socket, cred, socket, &socket->so_label, newlabel);
251395fab37eSRobert Watson }
251495fab37eSRobert Watson 
251595fab37eSRobert Watson static void
251695fab37eSRobert Watson mac_relabel_pipe(struct ucred *cred, struct pipe *pipe, struct label *newlabel)
251795fab37eSRobert Watson {
251895fab37eSRobert Watson 
251995fab37eSRobert Watson 	MAC_PERFORM(relabel_pipe, cred, pipe, pipe->pipe_label, newlabel);
252095fab37eSRobert Watson }
252195fab37eSRobert Watson 
252295fab37eSRobert Watson void
252395fab37eSRobert Watson mac_set_socket_peer_from_mbuf(struct mbuf *mbuf, struct socket *socket)
252495fab37eSRobert Watson {
252595fab37eSRobert Watson 
252695fab37eSRobert Watson 	MAC_PERFORM(set_socket_peer_from_mbuf, mbuf, &mbuf->m_pkthdr.label,
252795fab37eSRobert Watson 	    socket, &socket->so_peerlabel);
252895fab37eSRobert Watson }
252995fab37eSRobert Watson 
253095fab37eSRobert Watson void
253195fab37eSRobert Watson mac_set_socket_peer_from_socket(struct socket *oldsocket,
253295fab37eSRobert Watson     struct socket *newsocket)
253395fab37eSRobert Watson {
253495fab37eSRobert Watson 
253595fab37eSRobert Watson 	MAC_PERFORM(set_socket_peer_from_socket, oldsocket,
253695fab37eSRobert Watson 	    &oldsocket->so_label, newsocket, &newsocket->so_peerlabel);
253795fab37eSRobert Watson }
253895fab37eSRobert Watson 
253995fab37eSRobert Watson void
254095fab37eSRobert Watson mac_create_datagram_from_ipq(struct ipq *ipq, struct mbuf *datagram)
254195fab37eSRobert Watson {
254295fab37eSRobert Watson 
254395fab37eSRobert Watson 	MAC_PERFORM(create_datagram_from_ipq, ipq, &ipq->ipq_label,
254495fab37eSRobert Watson 	    datagram, &datagram->m_pkthdr.label);
254595fab37eSRobert Watson }
254695fab37eSRobert Watson 
254795fab37eSRobert Watson void
254895fab37eSRobert Watson mac_create_fragment(struct mbuf *datagram, struct mbuf *fragment)
254995fab37eSRobert Watson {
255095fab37eSRobert Watson 
255195fab37eSRobert Watson 	MAC_PERFORM(create_fragment, datagram, &datagram->m_pkthdr.label,
255295fab37eSRobert Watson 	    fragment, &fragment->m_pkthdr.label);
255395fab37eSRobert Watson }
255495fab37eSRobert Watson 
255595fab37eSRobert Watson void
255695fab37eSRobert Watson mac_create_ipq(struct mbuf *fragment, struct ipq *ipq)
255795fab37eSRobert Watson {
255895fab37eSRobert Watson 
255995fab37eSRobert Watson 	MAC_PERFORM(create_ipq, fragment, &fragment->m_pkthdr.label, ipq,
256095fab37eSRobert Watson 	    &ipq->ipq_label);
256195fab37eSRobert Watson }
256295fab37eSRobert Watson 
256395fab37eSRobert Watson void
256495fab37eSRobert Watson mac_create_mbuf_from_mbuf(struct mbuf *oldmbuf, struct mbuf *newmbuf)
256595fab37eSRobert Watson {
256695fab37eSRobert Watson 
256795fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_mbuf, oldmbuf, &oldmbuf->m_pkthdr.label,
256895fab37eSRobert Watson 	    newmbuf, &newmbuf->m_pkthdr.label);
256995fab37eSRobert Watson }
257095fab37eSRobert Watson 
257195fab37eSRobert Watson void
257295fab37eSRobert Watson mac_create_mbuf_from_bpfdesc(struct bpf_d *bpf_d, struct mbuf *mbuf)
257395fab37eSRobert Watson {
257495fab37eSRobert Watson 
257595fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_bpfdesc, bpf_d, &bpf_d->bd_label, mbuf,
257695fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
257795fab37eSRobert Watson }
257895fab37eSRobert Watson 
257995fab37eSRobert Watson void
258095fab37eSRobert Watson mac_create_mbuf_linklayer(struct ifnet *ifnet, struct mbuf *mbuf)
258195fab37eSRobert Watson {
258295fab37eSRobert Watson 
258395fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_linklayer, ifnet, &ifnet->if_label, mbuf,
258495fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
258595fab37eSRobert Watson }
258695fab37eSRobert Watson 
258795fab37eSRobert Watson void
258895fab37eSRobert Watson mac_create_mbuf_from_ifnet(struct ifnet *ifnet, struct mbuf *mbuf)
258995fab37eSRobert Watson {
259095fab37eSRobert Watson 
259195fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_ifnet, ifnet, &ifnet->if_label, mbuf,
259295fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
259395fab37eSRobert Watson }
259495fab37eSRobert Watson 
259595fab37eSRobert Watson void
259695fab37eSRobert Watson mac_create_mbuf_multicast_encap(struct mbuf *oldmbuf, struct ifnet *ifnet,
259795fab37eSRobert Watson     struct mbuf *newmbuf)
259895fab37eSRobert Watson {
259995fab37eSRobert Watson 
260095fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_multicast_encap, oldmbuf,
260195fab37eSRobert Watson 	    &oldmbuf->m_pkthdr.label, ifnet, &ifnet->if_label, newmbuf,
260295fab37eSRobert Watson 	    &newmbuf->m_pkthdr.label);
260395fab37eSRobert Watson }
260495fab37eSRobert Watson 
260595fab37eSRobert Watson void
260695fab37eSRobert Watson mac_create_mbuf_netlayer(struct mbuf *oldmbuf, struct mbuf *newmbuf)
260795fab37eSRobert Watson {
260895fab37eSRobert Watson 
260995fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_netlayer, oldmbuf, &oldmbuf->m_pkthdr.label,
261095fab37eSRobert Watson 	    newmbuf, &newmbuf->m_pkthdr.label);
261195fab37eSRobert Watson }
261295fab37eSRobert Watson 
261395fab37eSRobert Watson int
261495fab37eSRobert Watson mac_fragment_match(struct mbuf *fragment, struct ipq *ipq)
261595fab37eSRobert Watson {
261695fab37eSRobert Watson 	int result;
261795fab37eSRobert Watson 
261895fab37eSRobert Watson 	result = 1;
261995fab37eSRobert Watson 	MAC_BOOLEAN(fragment_match, &&, fragment, &fragment->m_pkthdr.label,
262095fab37eSRobert Watson 	    ipq, &ipq->ipq_label);
262195fab37eSRobert Watson 
262295fab37eSRobert Watson 	return (result);
262395fab37eSRobert Watson }
262495fab37eSRobert Watson 
262595fab37eSRobert Watson void
262695fab37eSRobert Watson mac_update_ipq(struct mbuf *fragment, struct ipq *ipq)
262795fab37eSRobert Watson {
262895fab37eSRobert Watson 
262995fab37eSRobert Watson 	MAC_PERFORM(update_ipq, fragment, &fragment->m_pkthdr.label, ipq,
263095fab37eSRobert Watson 	    &ipq->ipq_label);
263195fab37eSRobert Watson }
263295fab37eSRobert Watson 
263395fab37eSRobert Watson void
263495fab37eSRobert Watson mac_create_mbuf_from_socket(struct socket *socket, struct mbuf *mbuf)
263595fab37eSRobert Watson {
263695fab37eSRobert Watson 
263795fab37eSRobert Watson 	MAC_PERFORM(create_mbuf_from_socket, socket, &socket->so_label, mbuf,
263895fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
263995fab37eSRobert Watson }
264095fab37eSRobert Watson 
264195fab37eSRobert Watson void
264295fab37eSRobert Watson mac_create_mount(struct ucred *cred, struct mount *mp)
264395fab37eSRobert Watson {
264495fab37eSRobert Watson 
264595fab37eSRobert Watson 	MAC_PERFORM(create_mount, cred, mp, &mp->mnt_mntlabel,
264695fab37eSRobert Watson 	    &mp->mnt_fslabel);
264795fab37eSRobert Watson }
264895fab37eSRobert Watson 
264995fab37eSRobert Watson void
265095fab37eSRobert Watson mac_create_root_mount(struct ucred *cred, struct mount *mp)
265195fab37eSRobert Watson {
265295fab37eSRobert Watson 
265395fab37eSRobert Watson 	MAC_PERFORM(create_root_mount, cred, mp, &mp->mnt_mntlabel,
265495fab37eSRobert Watson 	    &mp->mnt_fslabel);
265595fab37eSRobert Watson }
265695fab37eSRobert Watson 
265795fab37eSRobert Watson int
265895fab37eSRobert Watson mac_check_bpfdesc_receive(struct bpf_d *bpf_d, struct ifnet *ifnet)
265995fab37eSRobert Watson {
266095fab37eSRobert Watson 	int error;
266195fab37eSRobert Watson 
266295fab37eSRobert Watson 	if (!mac_enforce_network)
266395fab37eSRobert Watson 		return (0);
266495fab37eSRobert Watson 
266595fab37eSRobert Watson 	MAC_CHECK(check_bpfdesc_receive, bpf_d, &bpf_d->bd_label, ifnet,
266695fab37eSRobert Watson 	    &ifnet->if_label);
266795fab37eSRobert Watson 
266895fab37eSRobert Watson 	return (error);
266995fab37eSRobert Watson }
267095fab37eSRobert Watson 
267195fab37eSRobert Watson static int
267295fab37eSRobert Watson mac_check_cred_relabel(struct ucred *cred, struct label *newlabel)
267395fab37eSRobert Watson {
267495fab37eSRobert Watson 	int error;
267595fab37eSRobert Watson 
267695fab37eSRobert Watson 	MAC_CHECK(check_cred_relabel, cred, newlabel);
267795fab37eSRobert Watson 
267895fab37eSRobert Watson 	return (error);
267995fab37eSRobert Watson }
268095fab37eSRobert Watson 
268195fab37eSRobert Watson int
268295fab37eSRobert Watson mac_check_cred_visible(struct ucred *u1, struct ucred *u2)
268395fab37eSRobert Watson {
268495fab37eSRobert Watson 	int error;
268595fab37eSRobert Watson 
268695fab37eSRobert Watson 	if (!mac_enforce_process)
268795fab37eSRobert Watson 		return (0);
268895fab37eSRobert Watson 
268995fab37eSRobert Watson 	MAC_CHECK(check_cred_visible, u1, u2);
269095fab37eSRobert Watson 
269195fab37eSRobert Watson 	return (error);
269295fab37eSRobert Watson }
269395fab37eSRobert Watson 
269495fab37eSRobert Watson int
269595fab37eSRobert Watson mac_check_ifnet_transmit(struct ifnet *ifnet, struct mbuf *mbuf)
269695fab37eSRobert Watson {
269795fab37eSRobert Watson 	int error;
269895fab37eSRobert Watson 
269995fab37eSRobert Watson 	if (!mac_enforce_network)
270095fab37eSRobert Watson 		return (0);
270195fab37eSRobert Watson 
270295fab37eSRobert Watson 	KASSERT(mbuf->m_flags & M_PKTHDR, ("packet has no pkthdr"));
270395fab37eSRobert Watson 	if (!(mbuf->m_pkthdr.label.l_flags & MAC_FLAG_INITIALIZED))
270495fab37eSRobert Watson 		printf("%s%d: not initialized\n", ifnet->if_name,
270595fab37eSRobert Watson 		    ifnet->if_unit);
270695fab37eSRobert Watson 
270795fab37eSRobert Watson 	MAC_CHECK(check_ifnet_transmit, ifnet, &ifnet->if_label, mbuf,
270895fab37eSRobert Watson 	    &mbuf->m_pkthdr.label);
270995fab37eSRobert Watson 
271095fab37eSRobert Watson 	return (error);
271195fab37eSRobert Watson }
271295fab37eSRobert Watson 
271395fab37eSRobert Watson int
271495fab37eSRobert Watson mac_check_mount_stat(struct ucred *cred, struct mount *mount)
271595fab37eSRobert Watson {
271695fab37eSRobert Watson 	int error;
271795fab37eSRobert Watson 
271895fab37eSRobert Watson 	if (!mac_enforce_fs)
271995fab37eSRobert Watson 		return (0);
272095fab37eSRobert Watson 
272195fab37eSRobert Watson 	MAC_CHECK(check_mount_stat, cred, mount, &mount->mnt_mntlabel);
272295fab37eSRobert Watson 
272395fab37eSRobert Watson 	return (error);
272495fab37eSRobert Watson }
272595fab37eSRobert Watson 
272695fab37eSRobert Watson int
272795fab37eSRobert Watson mac_check_pipe_ioctl(struct ucred *cred, struct pipe *pipe, unsigned long cmd,
272895fab37eSRobert Watson     void *data)
272995fab37eSRobert Watson {
273095fab37eSRobert Watson 	int error;
273195fab37eSRobert Watson 
27321aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
27331aa37f53SRobert Watson 
27341aa37f53SRobert Watson 	if (!mac_enforce_pipe)
27351aa37f53SRobert Watson 		return (0);
27361aa37f53SRobert Watson 
273795fab37eSRobert Watson 	MAC_CHECK(check_pipe_ioctl, cred, pipe, pipe->pipe_label, cmd, data);
273895fab37eSRobert Watson 
273995fab37eSRobert Watson 	return (error);
274095fab37eSRobert Watson }
274195fab37eSRobert Watson 
274295fab37eSRobert Watson int
2743c024c3eeSRobert Watson mac_check_pipe_poll(struct ucred *cred, struct pipe *pipe)
274495fab37eSRobert Watson {
274595fab37eSRobert Watson 	int error;
274695fab37eSRobert Watson 
27471aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
27481aa37f53SRobert Watson 
27491aa37f53SRobert Watson 	if (!mac_enforce_pipe)
27501aa37f53SRobert Watson 		return (0);
27511aa37f53SRobert Watson 
2752c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_poll, cred, pipe, pipe->pipe_label);
2753c024c3eeSRobert Watson 
2754c024c3eeSRobert Watson 	return (error);
2755c024c3eeSRobert Watson }
2756c024c3eeSRobert Watson 
2757c024c3eeSRobert Watson int
2758c024c3eeSRobert Watson mac_check_pipe_read(struct ucred *cred, struct pipe *pipe)
2759c024c3eeSRobert Watson {
2760c024c3eeSRobert Watson 	int error;
2761c024c3eeSRobert Watson 
27621aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
27631aa37f53SRobert Watson 
27641aa37f53SRobert Watson 	if (!mac_enforce_pipe)
27651aa37f53SRobert Watson 		return (0);
27661aa37f53SRobert Watson 
2767c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_read, cred, pipe, pipe->pipe_label);
276895fab37eSRobert Watson 
276995fab37eSRobert Watson 	return (error);
277095fab37eSRobert Watson }
277195fab37eSRobert Watson 
277295fab37eSRobert Watson static int
277395fab37eSRobert Watson mac_check_pipe_relabel(struct ucred *cred, struct pipe *pipe,
277495fab37eSRobert Watson     struct label *newlabel)
277595fab37eSRobert Watson {
277695fab37eSRobert Watson 	int error;
277795fab37eSRobert Watson 
27781aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
27791aa37f53SRobert Watson 
27801aa37f53SRobert Watson 	if (!mac_enforce_pipe)
27811aa37f53SRobert Watson 		return (0);
27821aa37f53SRobert Watson 
278395fab37eSRobert Watson 	MAC_CHECK(check_pipe_relabel, cred, pipe, pipe->pipe_label, newlabel);
278495fab37eSRobert Watson 
278595fab37eSRobert Watson 	return (error);
278695fab37eSRobert Watson }
278795fab37eSRobert Watson 
278895fab37eSRobert Watson int
2789c024c3eeSRobert Watson mac_check_pipe_stat(struct ucred *cred, struct pipe *pipe)
2790c024c3eeSRobert Watson {
2791c024c3eeSRobert Watson 	int error;
2792c024c3eeSRobert Watson 
27931aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
27941aa37f53SRobert Watson 
27951aa37f53SRobert Watson 	if (!mac_enforce_pipe)
27961aa37f53SRobert Watson 		return (0);
27971aa37f53SRobert Watson 
2798c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_stat, cred, pipe, pipe->pipe_label);
2799c024c3eeSRobert Watson 
2800c024c3eeSRobert Watson 	return (error);
2801c024c3eeSRobert Watson }
2802c024c3eeSRobert Watson 
2803c024c3eeSRobert Watson int
2804c024c3eeSRobert Watson mac_check_pipe_write(struct ucred *cred, struct pipe *pipe)
2805c024c3eeSRobert Watson {
2806c024c3eeSRobert Watson 	int error;
2807c024c3eeSRobert Watson 
28081aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
28091aa37f53SRobert Watson 
28101aa37f53SRobert Watson 	if (!mac_enforce_pipe)
28111aa37f53SRobert Watson 		return (0);
28121aa37f53SRobert Watson 
2813c024c3eeSRobert Watson 	MAC_CHECK(check_pipe_write, cred, pipe, pipe->pipe_label);
2814c024c3eeSRobert Watson 
2815c024c3eeSRobert Watson 	return (error);
2816c024c3eeSRobert Watson }
2817c024c3eeSRobert Watson 
2818c024c3eeSRobert Watson int
281995fab37eSRobert Watson mac_check_proc_debug(struct ucred *cred, struct proc *proc)
282095fab37eSRobert Watson {
282195fab37eSRobert Watson 	int error;
282295fab37eSRobert Watson 
2823b12baf55SRobert Watson 	PROC_LOCK_ASSERT(proc, MA_OWNED);
2824b12baf55SRobert Watson 
282595fab37eSRobert Watson 	if (!mac_enforce_process)
282695fab37eSRobert Watson 		return (0);
282795fab37eSRobert Watson 
282895fab37eSRobert Watson 	MAC_CHECK(check_proc_debug, cred, proc);
282995fab37eSRobert Watson 
283095fab37eSRobert Watson 	return (error);
283195fab37eSRobert Watson }
283295fab37eSRobert Watson 
283395fab37eSRobert Watson int
283495fab37eSRobert Watson mac_check_proc_sched(struct ucred *cred, struct proc *proc)
283595fab37eSRobert Watson {
283695fab37eSRobert Watson 	int error;
283795fab37eSRobert Watson 
2838b12baf55SRobert Watson 	PROC_LOCK_ASSERT(proc, MA_OWNED);
2839b12baf55SRobert Watson 
284095fab37eSRobert Watson 	if (!mac_enforce_process)
284195fab37eSRobert Watson 		return (0);
284295fab37eSRobert Watson 
284395fab37eSRobert Watson 	MAC_CHECK(check_proc_sched, cred, proc);
284495fab37eSRobert Watson 
284595fab37eSRobert Watson 	return (error);
284695fab37eSRobert Watson }
284795fab37eSRobert Watson 
284895fab37eSRobert Watson int
284995fab37eSRobert Watson mac_check_proc_signal(struct ucred *cred, struct proc *proc, int signum)
285095fab37eSRobert Watson {
285195fab37eSRobert Watson 	int error;
285295fab37eSRobert Watson 
2853b12baf55SRobert Watson 	PROC_LOCK_ASSERT(proc, MA_OWNED);
2854b12baf55SRobert Watson 
285595fab37eSRobert Watson 	if (!mac_enforce_process)
285695fab37eSRobert Watson 		return (0);
285795fab37eSRobert Watson 
285895fab37eSRobert Watson 	MAC_CHECK(check_proc_signal, cred, proc, signum);
285995fab37eSRobert Watson 
286095fab37eSRobert Watson 	return (error);
286195fab37eSRobert Watson }
286295fab37eSRobert Watson 
286395fab37eSRobert Watson int
286495fab37eSRobert Watson mac_check_socket_bind(struct ucred *ucred, struct socket *socket,
286595fab37eSRobert Watson     struct sockaddr *sockaddr)
286695fab37eSRobert Watson {
286795fab37eSRobert Watson 	int error;
286895fab37eSRobert Watson 
286995fab37eSRobert Watson 	if (!mac_enforce_socket)
287095fab37eSRobert Watson 		return (0);
287195fab37eSRobert Watson 
287295fab37eSRobert Watson 	MAC_CHECK(check_socket_bind, ucred, socket, &socket->so_label,
287395fab37eSRobert Watson 	    sockaddr);
287495fab37eSRobert Watson 
287595fab37eSRobert Watson 	return (error);
287695fab37eSRobert Watson }
287795fab37eSRobert Watson 
287895fab37eSRobert Watson int
287995fab37eSRobert Watson mac_check_socket_connect(struct ucred *cred, struct socket *socket,
288095fab37eSRobert Watson     struct sockaddr *sockaddr)
288195fab37eSRobert Watson {
288295fab37eSRobert Watson 	int error;
288395fab37eSRobert Watson 
288495fab37eSRobert Watson 	if (!mac_enforce_socket)
288595fab37eSRobert Watson 		return (0);
288695fab37eSRobert Watson 
288795fab37eSRobert Watson 	MAC_CHECK(check_socket_connect, cred, socket, &socket->so_label,
288895fab37eSRobert Watson 	    sockaddr);
288995fab37eSRobert Watson 
289095fab37eSRobert Watson 	return (error);
289195fab37eSRobert Watson }
289295fab37eSRobert Watson 
289395fab37eSRobert Watson int
2894d61198e4SRobert Watson mac_check_socket_deliver(struct socket *socket, struct mbuf *mbuf)
2895d61198e4SRobert Watson {
2896d61198e4SRobert Watson 	int error;
2897d61198e4SRobert Watson 
2898d61198e4SRobert Watson 	if (!mac_enforce_socket)
2899d61198e4SRobert Watson 		return (0);
2900d61198e4SRobert Watson 
2901d61198e4SRobert Watson 	MAC_CHECK(check_socket_deliver, socket, &socket->so_label, mbuf,
2902d61198e4SRobert Watson 	    &mbuf->m_pkthdr.label);
2903d61198e4SRobert Watson 
2904d61198e4SRobert Watson 	return (error);
2905d61198e4SRobert Watson }
2906d61198e4SRobert Watson 
2907d61198e4SRobert Watson int
290895fab37eSRobert Watson mac_check_socket_listen(struct ucred *cred, struct socket *socket)
290995fab37eSRobert Watson {
291095fab37eSRobert Watson 	int error;
291195fab37eSRobert Watson 
291295fab37eSRobert Watson 	if (!mac_enforce_socket)
291395fab37eSRobert Watson 		return (0);
291495fab37eSRobert Watson 
291595fab37eSRobert Watson 	MAC_CHECK(check_socket_listen, cred, socket, &socket->so_label);
291695fab37eSRobert Watson 	return (error);
291795fab37eSRobert Watson }
291895fab37eSRobert Watson 
291995fab37eSRobert Watson static int
292095fab37eSRobert Watson mac_check_socket_relabel(struct ucred *cred, struct socket *socket,
292195fab37eSRobert Watson     struct label *newlabel)
292295fab37eSRobert Watson {
292395fab37eSRobert Watson 	int error;
292495fab37eSRobert Watson 
292595fab37eSRobert Watson 	MAC_CHECK(check_socket_relabel, cred, socket, &socket->so_label,
292695fab37eSRobert Watson 	    newlabel);
292795fab37eSRobert Watson 
292895fab37eSRobert Watson 	return (error);
292995fab37eSRobert Watson }
293095fab37eSRobert Watson 
293195fab37eSRobert Watson int
293295fab37eSRobert Watson mac_check_socket_visible(struct ucred *cred, struct socket *socket)
293395fab37eSRobert Watson {
293495fab37eSRobert Watson 	int error;
293595fab37eSRobert Watson 
293695fab37eSRobert Watson 	if (!mac_enforce_socket)
293795fab37eSRobert Watson 		return (0);
293895fab37eSRobert Watson 
293995fab37eSRobert Watson 	MAC_CHECK(check_socket_visible, cred, socket, &socket->so_label);
294095fab37eSRobert Watson 
294195fab37eSRobert Watson 	return (error);
294295fab37eSRobert Watson }
294395fab37eSRobert Watson 
294495fab37eSRobert Watson int
294595fab37eSRobert Watson mac_ioctl_ifnet_get(struct ucred *cred, struct ifreq *ifr,
294695fab37eSRobert Watson     struct ifnet *ifnet)
294795fab37eSRobert Watson {
294895fab37eSRobert Watson 	struct mac label;
294995fab37eSRobert Watson 	int error;
295095fab37eSRobert Watson 
295195fab37eSRobert Watson 	error = mac_externalize(&ifnet->if_label, &label);
295295fab37eSRobert Watson 	if (error)
295395fab37eSRobert Watson 		return (error);
295495fab37eSRobert Watson 
295595fab37eSRobert Watson 	return (copyout(&label, ifr->ifr_ifru.ifru_data, sizeof(label)));
295695fab37eSRobert Watson }
295795fab37eSRobert Watson 
295895fab37eSRobert Watson int
295995fab37eSRobert Watson mac_ioctl_ifnet_set(struct ucred *cred, struct ifreq *ifr,
296095fab37eSRobert Watson     struct ifnet *ifnet)
296195fab37eSRobert Watson {
296295fab37eSRobert Watson 	struct mac newlabel;
296395fab37eSRobert Watson 	struct label intlabel;
296495fab37eSRobert Watson 	int error;
296595fab37eSRobert Watson 
296695fab37eSRobert Watson 	error = copyin(ifr->ifr_ifru.ifru_data, &newlabel, sizeof(newlabel));
296795fab37eSRobert Watson 	if (error)
296895fab37eSRobert Watson 		return (error);
296995fab37eSRobert Watson 
297095fab37eSRobert Watson 	error = mac_internalize(&intlabel, &newlabel);
297195fab37eSRobert Watson 	if (error)
297295fab37eSRobert Watson 		return (error);
297395fab37eSRobert Watson 
297495fab37eSRobert Watson 	/*
297595fab37eSRobert Watson 	 * XXX: Note that this is a redundant privilege check, since
297695fab37eSRobert Watson 	 * policies impose this check themselves if required by the
297795fab37eSRobert Watson 	 * policy.  Eventually, this should go away.
297895fab37eSRobert Watson 	 */
297995fab37eSRobert Watson 	error = suser_cred(cred, 0);
298095fab37eSRobert Watson 	if (error)
298195fab37eSRobert Watson 		goto out;
298295fab37eSRobert Watson 
298395fab37eSRobert Watson 	MAC_CHECK(check_ifnet_relabel, cred, ifnet, &ifnet->if_label,
298495fab37eSRobert Watson 	    &intlabel);
298595fab37eSRobert Watson 	if (error)
298695fab37eSRobert Watson 		goto out;
298795fab37eSRobert Watson 
298895fab37eSRobert Watson 	MAC_PERFORM(relabel_ifnet, cred, ifnet, &ifnet->if_label, &intlabel);
298995fab37eSRobert Watson 
299095fab37eSRobert Watson out:
299195fab37eSRobert Watson 	mac_destroy_temp(&intlabel);
299295fab37eSRobert Watson 	return (error);
299395fab37eSRobert Watson }
299495fab37eSRobert Watson 
299595fab37eSRobert Watson void
299695fab37eSRobert Watson mac_create_devfs_vnode(struct devfs_dirent *de, struct vnode *vp)
299795fab37eSRobert Watson {
299895fab37eSRobert Watson 
299995fab37eSRobert Watson 	MAC_PERFORM(create_devfs_vnode, de, &de->de_label, vp, &vp->v_label);
300095fab37eSRobert Watson }
300195fab37eSRobert Watson 
300295fab37eSRobert Watson void
300395fab37eSRobert Watson mac_create_devfs_device(dev_t dev, struct devfs_dirent *de)
300495fab37eSRobert Watson {
300595fab37eSRobert Watson 
300695fab37eSRobert Watson 	MAC_PERFORM(create_devfs_device, dev, de, &de->de_label);
300795fab37eSRobert Watson }
300895fab37eSRobert Watson 
300974e62b1bSRobert Watson void
301074e62b1bSRobert Watson mac_create_devfs_symlink(struct ucred *cred, struct devfs_dirent *dd,
301174e62b1bSRobert Watson     struct devfs_dirent *de)
301274e62b1bSRobert Watson {
301374e62b1bSRobert Watson 
301474e62b1bSRobert Watson 	MAC_PERFORM(create_devfs_symlink, cred, dd, &dd->de_label, de,
301574e62b1bSRobert Watson 	    &de->de_label);
301674e62b1bSRobert Watson }
301774e62b1bSRobert Watson 
301895fab37eSRobert Watson static int
301995fab37eSRobert Watson mac_stdcreatevnode_ea(struct vnode *vp)
302095fab37eSRobert Watson {
302195fab37eSRobert Watson 	int error;
302295fab37eSRobert Watson 
302395fab37eSRobert Watson 	MAC_CHECK(stdcreatevnode_ea, vp, &vp->v_label);
302495fab37eSRobert Watson 
302595fab37eSRobert Watson 	return (error);
302695fab37eSRobert Watson }
302795fab37eSRobert Watson 
302895fab37eSRobert Watson void
302995fab37eSRobert Watson mac_create_devfs_directory(char *dirname, int dirnamelen,
303095fab37eSRobert Watson     struct devfs_dirent *de)
303195fab37eSRobert Watson {
303295fab37eSRobert Watson 
303395fab37eSRobert Watson 	MAC_PERFORM(create_devfs_directory, dirname, dirnamelen, de,
303495fab37eSRobert Watson 	    &de->de_label);
303595fab37eSRobert Watson }
303695fab37eSRobert Watson 
303795fab37eSRobert Watson /*
303895fab37eSRobert Watson  * When a new vnode is created, this call will initialize its label.
303995fab37eSRobert Watson  */
304095fab37eSRobert Watson void
304195fab37eSRobert Watson mac_create_vnode(struct ucred *cred, struct vnode *parent,
304295fab37eSRobert Watson     struct vnode *child)
304395fab37eSRobert Watson {
304495fab37eSRobert Watson 	int error;
304595fab37eSRobert Watson 
304695fab37eSRobert Watson 	ASSERT_VOP_LOCKED(parent, "mac_create_vnode");
304795fab37eSRobert Watson 	ASSERT_VOP_LOCKED(child, "mac_create_vnode");
304895fab37eSRobert Watson 
304995fab37eSRobert Watson 	error = vn_refreshlabel(parent, cred);
305095fab37eSRobert Watson 	if (error) {
305195fab37eSRobert Watson 		printf("mac_create_vnode: vn_refreshlabel returned %d\n",
305295fab37eSRobert Watson 		    error);
305395fab37eSRobert Watson 		printf("mac_create_vnode: using old vnode label\n");
305495fab37eSRobert Watson 	}
305595fab37eSRobert Watson 
305695fab37eSRobert Watson 	MAC_PERFORM(create_vnode, cred, parent, &parent->v_label, child,
305795fab37eSRobert Watson 	    &child->v_label);
305895fab37eSRobert Watson }
305995fab37eSRobert Watson 
306095fab37eSRobert Watson int
306195fab37eSRobert Watson mac_setsockopt_label_set(struct ucred *cred, struct socket *so,
306295fab37eSRobert Watson     struct mac *extmac)
306395fab37eSRobert Watson {
306495fab37eSRobert Watson 	struct label intlabel;
306595fab37eSRobert Watson 	int error;
306695fab37eSRobert Watson 
306795fab37eSRobert Watson 	error = mac_internalize(&intlabel, extmac);
306895fab37eSRobert Watson 	if (error)
306995fab37eSRobert Watson 		return (error);
307095fab37eSRobert Watson 
307195fab37eSRobert Watson 	mac_check_socket_relabel(cred, so, &intlabel);
307295fab37eSRobert Watson 	if (error) {
307395fab37eSRobert Watson 		mac_destroy_temp(&intlabel);
307495fab37eSRobert Watson 		return (error);
307595fab37eSRobert Watson 	}
307695fab37eSRobert Watson 
307795fab37eSRobert Watson 	mac_relabel_socket(cred, so, &intlabel);
307895fab37eSRobert Watson 
307995fab37eSRobert Watson 	mac_destroy_temp(&intlabel);
308095fab37eSRobert Watson 	return (0);
308195fab37eSRobert Watson }
308295fab37eSRobert Watson 
308395fab37eSRobert Watson int
308495fab37eSRobert Watson mac_pipe_label_set(struct ucred *cred, struct pipe *pipe, struct label *label)
308595fab37eSRobert Watson {
308695fab37eSRobert Watson 	int error;
308795fab37eSRobert Watson 
30881aa37f53SRobert Watson 	PIPE_LOCK_ASSERT(pipe, MA_OWNED);
30891aa37f53SRobert Watson 
309095fab37eSRobert Watson 	error = mac_check_pipe_relabel(cred, pipe, label);
309195fab37eSRobert Watson 	if (error)
309295fab37eSRobert Watson 		return (error);
309395fab37eSRobert Watson 
309495fab37eSRobert Watson 	mac_relabel_pipe(cred, pipe, label);
309595fab37eSRobert Watson 
309695fab37eSRobert Watson 	return (0);
309795fab37eSRobert Watson }
309895fab37eSRobert Watson 
309995fab37eSRobert Watson int
310095fab37eSRobert Watson mac_getsockopt_label_get(struct ucred *cred, struct socket *so,
310195fab37eSRobert Watson     struct mac *extmac)
310295fab37eSRobert Watson {
310395fab37eSRobert Watson 
310495fab37eSRobert Watson 	return (mac_externalize(&so->so_label, extmac));
310595fab37eSRobert Watson }
310695fab37eSRobert Watson 
310795fab37eSRobert Watson int
310895fab37eSRobert Watson mac_getsockopt_peerlabel_get(struct ucred *cred, struct socket *so,
310995fab37eSRobert Watson     struct mac *extmac)
311095fab37eSRobert Watson {
311195fab37eSRobert Watson 
311295fab37eSRobert Watson 	return (mac_externalize(&so->so_peerlabel, extmac));
311395fab37eSRobert Watson }
311495fab37eSRobert Watson 
311595fab37eSRobert Watson /*
311695fab37eSRobert Watson  * Implementation of VOP_SETLABEL() that relies on extended attributes
311795fab37eSRobert Watson  * to store label data.  Can be referenced by filesystems supporting
311895fab37eSRobert Watson  * extended attributes.
311995fab37eSRobert Watson  */
312095fab37eSRobert Watson int
312195fab37eSRobert Watson vop_stdsetlabel_ea(struct vop_setlabel_args *ap)
312295fab37eSRobert Watson {
312395fab37eSRobert Watson 	struct vnode *vp = ap->a_vp;
312495fab37eSRobert Watson 	struct label *intlabel = ap->a_label;
312595fab37eSRobert Watson 	struct mac extmac;
312695fab37eSRobert Watson 	int error;
312795fab37eSRobert Watson 
312895fab37eSRobert Watson 	ASSERT_VOP_LOCKED(vp, "vop_stdsetlabel_ea");
312995fab37eSRobert Watson 
313095fab37eSRobert Watson 	/*
313195fab37eSRobert Watson 	 * XXX: Eventually call out to EA check/set calls here.
313295fab37eSRobert Watson 	 * Be particularly careful to avoid race conditions,
313395fab37eSRobert Watson 	 * consistency problems, and stability problems when
313495fab37eSRobert Watson 	 * dealing with multiple EAs.  In particular, we require
313595fab37eSRobert Watson 	 * the ability to write multiple EAs on the same file in
313695fab37eSRobert Watson 	 * a single transaction, which the current EA interface
313795fab37eSRobert Watson 	 * does not provide.
313895fab37eSRobert Watson 	 */
313995fab37eSRobert Watson 
314095fab37eSRobert Watson 	error = mac_externalize(intlabel, &extmac);
314195fab37eSRobert Watson 	if (error)
314295fab37eSRobert Watson 		return (error);
314395fab37eSRobert Watson 
314495fab37eSRobert Watson 	error = vn_extattr_set(vp, IO_NODELOCKED,
314595fab37eSRobert Watson 	    FREEBSD_MAC_EXTATTR_NAMESPACE, FREEBSD_MAC_EXTATTR_NAME,
314695fab37eSRobert Watson 	    sizeof(extmac), (char *)&extmac, curthread);
314795fab37eSRobert Watson 	if (error)
314895fab37eSRobert Watson 		return (error);
314995fab37eSRobert Watson 
315095fab37eSRobert Watson 	mac_relabel_vnode(ap->a_cred, vp, intlabel);
315195fab37eSRobert Watson 
3152e6e370a7SJeff Roberson 	vp->v_vflag |= VV_CACHEDLABEL;
315395fab37eSRobert Watson 
315495fab37eSRobert Watson 	return (0);
315595fab37eSRobert Watson }
315695fab37eSRobert Watson 
315795fab37eSRobert Watson static int
315895fab37eSRobert Watson vn_setlabel(struct vnode *vp, struct label *intlabel, struct ucred *cred)
315995fab37eSRobert Watson {
316095fab37eSRobert Watson 	int error;
316195fab37eSRobert Watson 
316295fab37eSRobert Watson 	if (vp->v_mount == NULL) {
316395fab37eSRobert Watson 		/* printf("vn_setlabel: null v_mount\n"); */
316406be2aaaSNate Lawson 		if (vp->v_type != VNON)
316506be2aaaSNate Lawson 			printf("vn_setlabel: null v_mount with non-VNON\n");
316695fab37eSRobert Watson 		return (EBADF);
316795fab37eSRobert Watson 	}
316895fab37eSRobert Watson 
316995fab37eSRobert Watson 	if ((vp->v_mount->mnt_flag & MNT_MULTILABEL) == 0)
317095fab37eSRobert Watson 		return (EOPNOTSUPP);
317195fab37eSRobert Watson 
317295fab37eSRobert Watson 	/*
317395fab37eSRobert Watson 	 * Multi-phase commit.  First check the policies to confirm the
317495fab37eSRobert Watson 	 * change is OK.  Then commit via the filesystem.  Finally,
317595fab37eSRobert Watson 	 * update the actual vnode label.  Question: maybe the filesystem
317695fab37eSRobert Watson 	 * should update the vnode at the end as part of VOP_SETLABEL()?
317795fab37eSRobert Watson 	 */
317895fab37eSRobert Watson 	error = mac_check_vnode_relabel(cred, vp, intlabel);
317995fab37eSRobert Watson 	if (error)
318095fab37eSRobert Watson 		return (error);
318195fab37eSRobert Watson 
318295fab37eSRobert Watson 	/*
318395fab37eSRobert Watson 	 * VADMIN provides the opportunity for the filesystem to make
318495fab37eSRobert Watson 	 * decisions about who is and is not able to modify labels
318595fab37eSRobert Watson 	 * and protections on files.  This might not be right.  We can't
318695fab37eSRobert Watson 	 * assume VOP_SETLABEL() will do it, because we might implement
318795fab37eSRobert Watson 	 * that as part of vop_stdsetlabel_ea().
318895fab37eSRobert Watson 	 */
318995fab37eSRobert Watson 	error = VOP_ACCESS(vp, VADMIN, cred, curthread);
319095fab37eSRobert Watson 	if (error)
319195fab37eSRobert Watson 		return (error);
319295fab37eSRobert Watson 
319395fab37eSRobert Watson 	error = VOP_SETLABEL(vp, intlabel, cred, curthread);
319495fab37eSRobert Watson 	if (error)
319595fab37eSRobert Watson 		return (error);
319695fab37eSRobert Watson 
319795fab37eSRobert Watson 	return (0);
319895fab37eSRobert Watson }
319995fab37eSRobert Watson 
320095fab37eSRobert Watson /*
320195fab37eSRobert Watson  * MPSAFE
320295fab37eSRobert Watson  */
320395fab37eSRobert Watson int
320495fab37eSRobert Watson __mac_get_proc(struct thread *td, struct __mac_get_proc_args *uap)
320595fab37eSRobert Watson {
320695fab37eSRobert Watson 	struct mac extmac;
320795fab37eSRobert Watson 	int error;
320895fab37eSRobert Watson 
320995fab37eSRobert Watson 	error = mac_externalize(&td->td_ucred->cr_label, &extmac);
321095fab37eSRobert Watson 	if (error == 0)
321195fab37eSRobert Watson 		error = copyout(&extmac, SCARG(uap, mac_p), sizeof(extmac));
321295fab37eSRobert Watson 
321395fab37eSRobert Watson 	return (error);
321495fab37eSRobert Watson }
321595fab37eSRobert Watson 
321695fab37eSRobert Watson /*
321795fab37eSRobert Watson  * MPSAFE
321895fab37eSRobert Watson  */
321995fab37eSRobert Watson int
322095fab37eSRobert Watson __mac_set_proc(struct thread *td, struct __mac_set_proc_args *uap)
322195fab37eSRobert Watson {
322295fab37eSRobert Watson 	struct ucred *newcred, *oldcred;
322395fab37eSRobert Watson 	struct proc *p;
322495fab37eSRobert Watson 	struct mac extmac;
322595fab37eSRobert Watson 	struct label intlabel;
322695fab37eSRobert Watson 	int error;
322795fab37eSRobert Watson 
322895fab37eSRobert Watson 	error = copyin(SCARG(uap, mac_p), &extmac, sizeof(extmac));
322995fab37eSRobert Watson 	if (error)
323095fab37eSRobert Watson 		return (error);
323195fab37eSRobert Watson 
323295fab37eSRobert Watson 	error = mac_internalize(&intlabel, &extmac);
323395fab37eSRobert Watson 	if (error)
323495fab37eSRobert Watson 		return (error);
323595fab37eSRobert Watson 
323695fab37eSRobert Watson 	newcred = crget();
323795fab37eSRobert Watson 
323895fab37eSRobert Watson 	p = td->td_proc;
323995fab37eSRobert Watson 	PROC_LOCK(p);
324095fab37eSRobert Watson 	oldcred = p->p_ucred;
324195fab37eSRobert Watson 
324295fab37eSRobert Watson 	error = mac_check_cred_relabel(oldcred, &intlabel);
324395fab37eSRobert Watson 	if (error) {
324495fab37eSRobert Watson 		PROC_UNLOCK(p);
324595fab37eSRobert Watson 		mac_destroy_temp(&intlabel);
324695fab37eSRobert Watson 		crfree(newcred);
324795fab37eSRobert Watson 		return (error);
324895fab37eSRobert Watson 	}
324995fab37eSRobert Watson 
325095fab37eSRobert Watson 	setsugid(p);
325195fab37eSRobert Watson 	crcopy(newcred, oldcred);
325295fab37eSRobert Watson 	mac_relabel_cred(newcred, &intlabel);
325395fab37eSRobert Watson 	p->p_ucred = newcred;
3254e5cb5e37SRobert Watson 
3255e5cb5e37SRobert Watson 	/*
3256e5cb5e37SRobert Watson 	 * Grab additional reference for use while revoking mmaps, prior
3257e5cb5e37SRobert Watson 	 * to releasing the proc lock and sharing the cred.
3258e5cb5e37SRobert Watson 	 */
3259e5cb5e37SRobert Watson 	crhold(newcred);
326095fab37eSRobert Watson 	PROC_UNLOCK(p);
3261e5cb5e37SRobert Watson 
326216140035SRobert Watson 	mtx_lock(&Giant);
3263e5cb5e37SRobert Watson 	mac_cred_mmapped_drop_perms(td, newcred);
326416140035SRobert Watson 	mtx_unlock(&Giant);
3265e5cb5e37SRobert Watson 
3266e5cb5e37SRobert Watson 	crfree(newcred);	/* Free revocation reference. */
326795fab37eSRobert Watson 	crfree(oldcred);
326895fab37eSRobert Watson 	mac_destroy_temp(&intlabel);
326995fab37eSRobert Watson 	return (0);
327095fab37eSRobert Watson }
327195fab37eSRobert Watson 
327295fab37eSRobert Watson /*
327395fab37eSRobert Watson  * MPSAFE
327495fab37eSRobert Watson  */
327595fab37eSRobert Watson int
327695fab37eSRobert Watson __mac_get_fd(struct thread *td, struct __mac_get_fd_args *uap)
327795fab37eSRobert Watson {
327895fab37eSRobert Watson 	struct file *fp;
327995fab37eSRobert Watson 	struct mac extmac;
328095fab37eSRobert Watson 	struct vnode *vp;
328195fab37eSRobert Watson 	struct pipe *pipe;
328295fab37eSRobert Watson 	int error;
328395fab37eSRobert Watson 
328495fab37eSRobert Watson 	mtx_lock(&Giant);
328595fab37eSRobert Watson 
328695fab37eSRobert Watson 	error = fget(td, SCARG(uap, fd), &fp);
328795fab37eSRobert Watson 	if (error)
328895fab37eSRobert Watson 		goto out;
328995fab37eSRobert Watson 
329095fab37eSRobert Watson 	switch (fp->f_type) {
329195fab37eSRobert Watson 	case DTYPE_FIFO:
329295fab37eSRobert Watson 	case DTYPE_VNODE:
329395fab37eSRobert Watson 		vp = (struct vnode *)fp->f_data;
329495fab37eSRobert Watson 
329595fab37eSRobert Watson 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
329695fab37eSRobert Watson 		error = vn_refreshlabel(vp, td->td_ucred);
329795fab37eSRobert Watson 		if (error == 0)
329895fab37eSRobert Watson 			error = mac_externalize(&vp->v_label, &extmac);
329995fab37eSRobert Watson 		VOP_UNLOCK(vp, 0, td);
330095fab37eSRobert Watson 		break;
330195fab37eSRobert Watson 	case DTYPE_PIPE:
330295fab37eSRobert Watson 		pipe = (struct pipe *)fp->f_data;
330395fab37eSRobert Watson 		error = mac_externalize(pipe->pipe_label, &extmac);
330495fab37eSRobert Watson 		break;
330595fab37eSRobert Watson 	default:
330695fab37eSRobert Watson 		error = EINVAL;
330795fab37eSRobert Watson 	}
330895fab37eSRobert Watson 
330995fab37eSRobert Watson 	if (error == 0)
331095fab37eSRobert Watson 		error = copyout(&extmac, SCARG(uap, mac_p), sizeof(extmac));
331195fab37eSRobert Watson 
331295fab37eSRobert Watson 	fdrop(fp, td);
331395fab37eSRobert Watson 
331495fab37eSRobert Watson out:
331595fab37eSRobert Watson 	mtx_unlock(&Giant);
331695fab37eSRobert Watson 	return (error);
331795fab37eSRobert Watson }
331895fab37eSRobert Watson 
331995fab37eSRobert Watson /*
332095fab37eSRobert Watson  * MPSAFE
332195fab37eSRobert Watson  */
332295fab37eSRobert Watson int
332395fab37eSRobert Watson __mac_get_file(struct thread *td, struct __mac_get_file_args *uap)
332495fab37eSRobert Watson {
332595fab37eSRobert Watson 	struct nameidata nd;
332695fab37eSRobert Watson 	struct mac extmac;
332795fab37eSRobert Watson 	int error;
332895fab37eSRobert Watson 
332995fab37eSRobert Watson 	mtx_lock(&Giant);
333095fab37eSRobert Watson 	NDINIT(&nd, LOOKUP, LOCKLEAF | FOLLOW, UIO_USERSPACE,
333195fab37eSRobert Watson 	    SCARG(uap, path_p), td);
333295fab37eSRobert Watson 	error = namei(&nd);
333395fab37eSRobert Watson 	if (error)
333495fab37eSRobert Watson 		goto out;
333595fab37eSRobert Watson 
333695fab37eSRobert Watson 	error = vn_refreshlabel(nd.ni_vp, td->td_ucred);
333795fab37eSRobert Watson 	if (error == 0)
333895fab37eSRobert Watson 		error = mac_externalize(&nd.ni_vp->v_label, &extmac);
333995fab37eSRobert Watson 	NDFREE(&nd, 0);
334095fab37eSRobert Watson 	if (error)
334195fab37eSRobert Watson 		goto out;
334295fab37eSRobert Watson 
334395fab37eSRobert Watson 	error = copyout(&extmac, SCARG(uap, mac_p), sizeof(extmac));
334495fab37eSRobert Watson 
334595fab37eSRobert Watson out:
334695fab37eSRobert Watson 	mtx_unlock(&Giant);
334795fab37eSRobert Watson 	return (error);
334895fab37eSRobert Watson }
334995fab37eSRobert Watson 
335095fab37eSRobert Watson /*
335195fab37eSRobert Watson  * MPSAFE
335295fab37eSRobert Watson  */
335395fab37eSRobert Watson int
335495fab37eSRobert Watson __mac_set_fd(struct thread *td, struct __mac_set_fd_args *uap)
335595fab37eSRobert Watson {
335695fab37eSRobert Watson 	struct file *fp;
335795fab37eSRobert Watson 	struct mac extmac;
335895fab37eSRobert Watson 	struct label intlabel;
335995fab37eSRobert Watson 	struct mount *mp;
336095fab37eSRobert Watson 	struct vnode *vp;
336195fab37eSRobert Watson 	struct pipe *pipe;
336295fab37eSRobert Watson 	int error;
336395fab37eSRobert Watson 
336495fab37eSRobert Watson 	mtx_lock(&Giant);
336595fab37eSRobert Watson 	error = fget(td, SCARG(uap, fd), &fp);
336695fab37eSRobert Watson 	if (error)
336795fab37eSRobert Watson 		goto out1;
336895fab37eSRobert Watson 
336995fab37eSRobert Watson 	error = copyin(SCARG(uap, mac_p), &extmac, sizeof(extmac));
337095fab37eSRobert Watson 	if (error)
337195fab37eSRobert Watson 		goto out2;
337295fab37eSRobert Watson 
337395fab37eSRobert Watson 	error = mac_internalize(&intlabel, &extmac);
337495fab37eSRobert Watson 	if (error)
337595fab37eSRobert Watson 		goto out2;
337695fab37eSRobert Watson 
337795fab37eSRobert Watson 	switch (fp->f_type) {
337895fab37eSRobert Watson 	case DTYPE_FIFO:
337995fab37eSRobert Watson 	case DTYPE_VNODE:
338095fab37eSRobert Watson 		vp = (struct vnode *)fp->f_data;
338195fab37eSRobert Watson 		error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
338295fab37eSRobert Watson 		if (error != 0)
338395fab37eSRobert Watson 			break;
338495fab37eSRobert Watson 
338595fab37eSRobert Watson 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
338695fab37eSRobert Watson 		error = vn_setlabel(vp, &intlabel, td->td_ucred);
338795fab37eSRobert Watson 		VOP_UNLOCK(vp, 0, td);
338895fab37eSRobert Watson 		vn_finished_write(mp);
338995fab37eSRobert Watson 		mac_destroy_temp(&intlabel);
339095fab37eSRobert Watson 		break;
339195fab37eSRobert Watson 	case DTYPE_PIPE:
339295fab37eSRobert Watson 		pipe = (struct pipe *)fp->f_data;
33931aa37f53SRobert Watson 		PIPE_LOCK(pipe);
339495fab37eSRobert Watson 		error = mac_pipe_label_set(td->td_ucred, pipe, &intlabel);
33951aa37f53SRobert Watson 		PIPE_UNLOCK(pipe);
339695fab37eSRobert Watson 		break;
339795fab37eSRobert Watson 	default:
339895fab37eSRobert Watson 		error = EINVAL;
339995fab37eSRobert Watson 	}
340095fab37eSRobert Watson 
340195fab37eSRobert Watson out2:
340295fab37eSRobert Watson 	fdrop(fp, td);
340395fab37eSRobert Watson out1:
340495fab37eSRobert Watson 	mtx_unlock(&Giant);
340595fab37eSRobert Watson 	return (error);
340695fab37eSRobert Watson }
340795fab37eSRobert Watson 
340895fab37eSRobert Watson /*
340995fab37eSRobert Watson  * MPSAFE
341095fab37eSRobert Watson  */
341195fab37eSRobert Watson int
341295fab37eSRobert Watson __mac_set_file(struct thread *td, struct __mac_set_file_args *uap)
341395fab37eSRobert Watson {
341495fab37eSRobert Watson 	struct nameidata nd;
341595fab37eSRobert Watson 	struct mac extmac;
341695fab37eSRobert Watson 	struct label intlabel;
341795fab37eSRobert Watson 	struct mount *mp;
341895fab37eSRobert Watson 	int error;
341995fab37eSRobert Watson 
342095fab37eSRobert Watson 	mtx_lock(&Giant);
342195fab37eSRobert Watson 
342295fab37eSRobert Watson 	error = copyin(SCARG(uap, mac_p), &extmac, sizeof(extmac));
342395fab37eSRobert Watson 	if (error)
342495fab37eSRobert Watson 		goto out;
342595fab37eSRobert Watson 
342695fab37eSRobert Watson 	error = mac_internalize(&intlabel, &extmac);
342795fab37eSRobert Watson 	if (error)
342895fab37eSRobert Watson 		goto out;
342995fab37eSRobert Watson 
343095fab37eSRobert Watson 	NDINIT(&nd, LOOKUP, LOCKLEAF | FOLLOW, UIO_USERSPACE,
343195fab37eSRobert Watson 	    SCARG(uap, path_p), td);
343295fab37eSRobert Watson 	error = namei(&nd);
343395fab37eSRobert Watson 	if (error)
343495fab37eSRobert Watson 		goto out2;
343595fab37eSRobert Watson 	error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH);
343695fab37eSRobert Watson 	if (error)
343795fab37eSRobert Watson 		goto out2;
343895fab37eSRobert Watson 
343995fab37eSRobert Watson 	error = vn_setlabel(nd.ni_vp, &intlabel, td->td_ucred);
344095fab37eSRobert Watson 
344195fab37eSRobert Watson 	vn_finished_write(mp);
344295fab37eSRobert Watson out2:
344395fab37eSRobert Watson 	mac_destroy_temp(&intlabel);
344495fab37eSRobert Watson 	NDFREE(&nd, 0);
344595fab37eSRobert Watson out:
344695fab37eSRobert Watson 	mtx_unlock(&Giant);
344795fab37eSRobert Watson 	return (error);
344895fab37eSRobert Watson }
344995fab37eSRobert Watson 
345027f2eac7SRobert Watson int
345127f2eac7SRobert Watson mac_syscall(struct thread *td, struct mac_syscall_args *uap)
345227f2eac7SRobert Watson {
345327f2eac7SRobert Watson 	struct mac_policy_conf *mpc;
345427f2eac7SRobert Watson 	char target[MAC_MAX_POLICY_NAME];
345527f2eac7SRobert Watson 	int error;
345627f2eac7SRobert Watson 
345727f2eac7SRobert Watson 	error = copyinstr(SCARG(uap, policy), target, sizeof(target), NULL);
345827f2eac7SRobert Watson 	if (error)
345927f2eac7SRobert Watson 		return (error);
346027f2eac7SRobert Watson 
346127f2eac7SRobert Watson 	error = ENOSYS;
346227f2eac7SRobert Watson 	MAC_POLICY_LIST_BUSY();
346327f2eac7SRobert Watson 	LIST_FOREACH(mpc, &mac_policy_list, mpc_list) {
346427f2eac7SRobert Watson 		if (strcmp(mpc->mpc_name, target) == 0 &&
346527f2eac7SRobert Watson 		    mpc->mpc_ops->mpo_syscall != NULL) {
346627f2eac7SRobert Watson 			error = mpc->mpc_ops->mpo_syscall(td,
346727f2eac7SRobert Watson 			    SCARG(uap, call), SCARG(uap, arg));
346827f2eac7SRobert Watson 			goto out;
346927f2eac7SRobert Watson 		}
347027f2eac7SRobert Watson 	}
347127f2eac7SRobert Watson 
347227f2eac7SRobert Watson out:
347327f2eac7SRobert Watson 	MAC_POLICY_LIST_UNBUSY();
347427f2eac7SRobert Watson 	return (error);
347527f2eac7SRobert Watson }
347627f2eac7SRobert Watson 
347795fab37eSRobert Watson SYSINIT(mac, SI_SUB_MAC, SI_ORDER_FIRST, mac_init, NULL);
347895fab37eSRobert Watson SYSINIT(mac_late, SI_SUB_MAC_LATE, SI_ORDER_FIRST, mac_late_init, NULL);
347995fab37eSRobert Watson 
348095fab37eSRobert Watson #else /* !MAC */
34817bc82500SRobert Watson 
34827bc82500SRobert Watson int
34837bc82500SRobert Watson __mac_get_proc(struct thread *td, struct __mac_get_proc_args *uap)
34847bc82500SRobert Watson {
34857bc82500SRobert Watson 
34867bc82500SRobert Watson 	return (ENOSYS);
34877bc82500SRobert Watson }
34887bc82500SRobert Watson 
34897bc82500SRobert Watson int
34907bc82500SRobert Watson __mac_set_proc(struct thread *td, struct __mac_set_proc_args *uap)
34917bc82500SRobert Watson {
34927bc82500SRobert Watson 
34937bc82500SRobert Watson 	return (ENOSYS);
34947bc82500SRobert Watson }
34957bc82500SRobert Watson 
34967bc82500SRobert Watson int
34977bc82500SRobert Watson __mac_get_fd(struct thread *td, struct __mac_get_fd_args *uap)
34987bc82500SRobert Watson {
34997bc82500SRobert Watson 
35007bc82500SRobert Watson 	return (ENOSYS);
35017bc82500SRobert Watson }
35027bc82500SRobert Watson 
35037bc82500SRobert Watson int
35047bc82500SRobert Watson __mac_get_file(struct thread *td, struct __mac_get_file_args *uap)
35057bc82500SRobert Watson {
35067bc82500SRobert Watson 
35077bc82500SRobert Watson 	return (ENOSYS);
35087bc82500SRobert Watson }
35097bc82500SRobert Watson 
35107bc82500SRobert Watson int
35117bc82500SRobert Watson __mac_set_fd(struct thread *td, struct __mac_set_fd_args *uap)
35127bc82500SRobert Watson {
35137bc82500SRobert Watson 
35147bc82500SRobert Watson 	return (ENOSYS);
35157bc82500SRobert Watson }
35167bc82500SRobert Watson 
35177bc82500SRobert Watson int
35187bc82500SRobert Watson __mac_set_file(struct thread *td, struct __mac_set_file_args *uap)
35197bc82500SRobert Watson {
35207bc82500SRobert Watson 
35217bc82500SRobert Watson 	return (ENOSYS);
35227bc82500SRobert Watson }
352395fab37eSRobert Watson 
352427f2eac7SRobert Watson int
352527f2eac7SRobert Watson mac_syscall(struct thread *td, struct mac_syscall_args *uap)
352627f2eac7SRobert Watson {
352727f2eac7SRobert Watson 
352827f2eac7SRobert Watson 	return (ENOSYS);
352927f2eac7SRobert Watson }
353027f2eac7SRobert Watson 
353195fab37eSRobert Watson #endif /* !MAC */
3532