priv_audit_getaudit.c revision 172106
1172106Srwatson/*- 2172106Srwatson * Copyright (c) 2007 Robert M. M. Watson 3172106Srwatson * All rights reserved. 4172106Srwatson * 5172106Srwatson * This software was developed by Robert N. M. Watson for the TrustedBSD 6172106Srwatson * Project. 7172106Srwatson * 8172106Srwatson * Redistribution and use in source and binary forms, with or without 9172106Srwatson * modification, are permitted provided that the following conditions 10172106Srwatson * are met: 11172106Srwatson * 1. Redistributions of source code must retain the above copyright 12172106Srwatson * notice, this list of conditions and the following disclaimer. 13172106Srwatson * 2. Redistributions in binary form must reproduce the above copyright 14172106Srwatson * notice, this list of conditions and the following disclaimer in the 15172106Srwatson * documentation and/or other materials provided with the distribution. 16172106Srwatson * 17172106Srwatson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18172106Srwatson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19172106Srwatson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20172106Srwatson * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR, NCIRCLE NETWORK SECURITY, 21172106Srwatson * INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 22172106Srwatson * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 23172106Srwatson * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 24172106Srwatson * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 25172106Srwatson * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 26172106Srwatson * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 27172106Srwatson * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 28172106Srwatson * 29172106Srwatson * $FreeBSD: head/tools/regression/priv/priv_audit_getaudit.c 172106 2007-09-09 23:08:39Z rwatson $ 30172106Srwatson */ 31172106Srwatson 32172106Srwatson/* 33172106Srwatson * Confirm that privilege is required to query process audit state. 34172106Srwatson */ 35172106Srwatson 36172106Srwatson#include <sys/types.h> 37172106Srwatson 38172106Srwatson#include <bsm/audit.h> 39172106Srwatson 40172106Srwatson#include <err.h> 41172106Srwatson#include <errno.h> 42172106Srwatson#include <stdio.h> 43172106Srwatson 44172106Srwatson#include "main.h" 45172106Srwatson 46172106Srwatsonint 47172106Srwatsonpriv_audit_getaudit_setup(int asroot, int injail, struct test *test) 48172106Srwatson{ 49172106Srwatson 50172106Srwatson /* 51172106Srwatson * XXXRW: It would be nice if we checked for audit being configured 52172106Srwatson * here. 53172106Srwatson */ 54172106Srwatson return (0); 55172106Srwatson} 56172106Srwatson 57172106Srwatsonvoid 58172106Srwatsonpriv_audit_getaudit(int asroot, int injail, struct test *test) 59172106Srwatson{ 60172106Srwatson auditinfo_t ai; 61172106Srwatson int error; 62172106Srwatson 63172106Srwatson error = getaudit(&ai); 64172106Srwatson if (asroot && injail) 65172106Srwatson expect("priv_audit_getaudit(asroot, injail)", error, -1, 66172106Srwatson ENOSYS); 67172106Srwatson if (asroot && !injail) 68172106Srwatson expect("priv_audit_getaudit(asroot, !injail)", error, 0, 0); 69172106Srwatson if (!asroot && injail) 70172106Srwatson expect("priv_audit_getaudit(!asroot, injail)", error, -1, 71172106Srwatson ENOSYS); 72172106Srwatson if (!asroot && !injail) 73172106Srwatson expect("priv_audit_getaudit(!asroot, !injail)", error, -1, 74172106Srwatson EPERM); 75172106Srwatson} 76172106Srwatson 77172106Srwatsonvoid 78172106Srwatsonpriv_audit_getaudit_addr(int asroot, int injail, struct test *test) 79172106Srwatson{ 80172106Srwatson auditinfo_addr_t aia; 81172106Srwatson int error; 82172106Srwatson 83172106Srwatson error = getaudit_addr(&aia, sizeof(aia)); 84172106Srwatson if (asroot && injail) 85172106Srwatson expect("priv_audit_getaudit_addr(asroot, injail)", error, -1, 86172106Srwatson ENOSYS); 87172106Srwatson if (asroot && !injail) 88172106Srwatson expect("priv_audit_getaudit_addr(asroot, !injail)", error, 0, 89172106Srwatson 0); 90172106Srwatson if (!asroot && injail) 91172106Srwatson expect("priv_audit_getaudit_addr(!asroot, injail)", error, 92172106Srwatson -1, ENOSYS); 93172106Srwatson if (!asroot && !injail) 94172106Srwatson expect("priv_audit_getaudit_addr(!asroot, !injail)", error, 95172106Srwatson -1, EPERM); 96172106Srwatson} 97172106Srwatson 98172106Srwatsonvoid 99172106Srwatsonpriv_audit_getaudit_cleanup(int asroot, int injail, struct test *test) 100172106Srwatson{ 101172106Srwatson 102172106Srwatson} 103