1162271Srwatson/*-
2162271Srwatson * Copyright (c) 2006 nCircle Network Security, Inc.
3172106Srwatson * Copyright (c) 2007 Robert N. M. Watson
4162271Srwatson * All rights reserved.
5162271Srwatson *
6162271Srwatson * This software was developed by Robert N. M. Watson for the TrustedBSD
7162271Srwatson * Project under contract to nCircle Network Security, Inc.
8162271Srwatson *
9162271Srwatson * Redistribution and use in source and binary forms, with or without
10162271Srwatson * modification, are permitted provided that the following conditions
11162271Srwatson * are met:
12162271Srwatson * 1. Redistributions of source code must retain the above copyright
13162271Srwatson *    notice, this list of conditions and the following disclaimer.
14162271Srwatson * 2. Redistributions in binary form must reproduce the above copyright
15162271Srwatson *    notice, this list of conditions and the following disclaimer in the
16162271Srwatson *    documentation and/or other materials provided with the distribution.
17162271Srwatson *
18162271Srwatson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19162271Srwatson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20162271Srwatson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21162271Srwatson * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR, NCIRCLE NETWORK SECURITY,
22162271Srwatson * INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23162271Srwatson * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
24162271Srwatson * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
25162271Srwatson * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
26162271Srwatson * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
27162271Srwatson * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
28162271Srwatson * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29162271Srwatson *
30162271Srwatson * $FreeBSD$
31162271Srwatson */
32162271Srwatson
33162271Srwatson/*
34172106Srwatson * Confirm that calls to fhopen() require non-jailed priilege.  We create a
35172106Srwatson * temporary file and grab the file handle using getfh() before starting.
36162271Srwatson */
37162271Srwatson
38162271Srwatson#include <sys/param.h>
39162271Srwatson#include <sys/mount.h>
40162271Srwatson
41162271Srwatson#include <err.h>
42162271Srwatson#include <errno.h>
43162271Srwatson#include <fcntl.h>
44162271Srwatson#include <unistd.h>
45162271Srwatson
46162271Srwatson#include "main.h"
47162271Srwatson
48172106Srwatsonstatic char fpath[1024];
49172106Srwatsonstatic int fpath_initialized;
50172106Srwatsonstatic fhandle_t fh;
51172106Srwatson
52172106Srwatsonint
53172106Srwatsonpriv_vfs_fhopen_setup(int asroot, int injail, struct test *test)
54162271Srwatson{
55162271Srwatson
56172106Srwatson	setup_file("private_vfs_fhopen_setup: fpath", fpath, UID_ROOT,
57172106Srwatson	    GID_WHEEL, 0644);
58172106Srwatson	fpath_initialized = 1;
59162271Srwatson	if (getfh(fpath, &fh) < 0) {
60172106Srwatson		warn("priv_vfs_fhopen_setup: getfh(%s)", fpath);
61172106Srwatson		return (-1);
62162271Srwatson	}
63172106Srwatson	return (0);
64172106Srwatson}
65162271Srwatson
66172106Srwatsonvoid
67172106Srwatsonpriv_vfs_fhopen(int asroot, int injail, struct test *test)
68172106Srwatson{
69172106Srwatson	int errno_saved, error, fd;
70162271Srwatson
71162271Srwatson	fd = fhopen(&fh, O_RDONLY);
72162271Srwatson	if (fd >= 0) {
73172106Srwatson		error = 0;
74172106Srwatson		errno_saved = errno;
75162271Srwatson		close(fd);
76172106Srwatson		errno = errno_saved;
77172106Srwatson	} else
78172106Srwatson		error = -1;
79172106Srwatson	if (asroot && injail)
80172106Srwatson		expect("priv_vfs_fhopen(asroot, injail)", error, -1, EPERM);
81172106Srwatson	if (asroot && !injail)
82172106Srwatson		expect("priv_vfs_fhopen(asroot, !injail)", error, 0, 0);
83172106Srwatson	if (!asroot && injail)
84172106Srwatson		expect("priv_vfs_fhopen(!asroot, injail)", error, -1, EPERM);
85172106Srwatson	if (!asroot && !injail)
86172106Srwatson		expect("priv_vfs_fhopen(!asroot, !injail)", error, -1, EPERM);
87172106Srwatson}
88172106Srwatson
89172106Srwatsonvoid
90172106Srwatsonpriv_vfs_fhopen_cleanup(int asroot, int injail, struct test *test)
91172106Srwatson{
92172106Srwatson
93172106Srwatson	if (fpath_initialized) {
94172106Srwatson		(void)unlink(fpath);
95172106Srwatson		fpath_initialized = 0;
96162271Srwatson	}
97162271Srwatson}
98