priv_audit_setaudit.c revision 172106
1172106Srwatson/*- 2172106Srwatson * Copyright (c) 2007 Robert M. M. Watson 3172106Srwatson * All rights reserved. 4172106Srwatson * 5172106Srwatson * This software was developed by Robert N. M. Watson for the TrustedBSD 6172106Srwatson * Project. 7172106Srwatson * 8172106Srwatson * Redistribution and use in source and binary forms, with or without 9172106Srwatson * modification, are permitted provided that the following conditions 10172106Srwatson * are met: 11172106Srwatson * 1. Redistributions of source code must retain the above copyright 12172106Srwatson * notice, this list of conditions and the following disclaimer. 13172106Srwatson * 2. Redistributions in binary form must reproduce the above copyright 14172106Srwatson * notice, this list of conditions and the following disclaimer in the 15172106Srwatson * documentation and/or other materials provided with the distribution. 16172106Srwatson * 17172106Srwatson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18172106Srwatson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19172106Srwatson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20172106Srwatson * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR, NCIRCLE NETWORK SECURITY, 21172106Srwatson * INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 22172106Srwatson * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 23172106Srwatson * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 24172106Srwatson * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 25172106Srwatson * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 26172106Srwatson * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 27172106Srwatson * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 28172106Srwatson * 29172106Srwatson * $FreeBSD: head/tools/regression/priv/priv_audit_setaudit.c 172106 2007-09-09 23:08:39Z rwatson $ 30172106Srwatson */ 31172106Srwatson 32172106Srwatson/* 33172106Srwatson * Confirm privilege is required to set process audit properties; we first 34172106Srwatson * query current properties so that the attempted operation is a no-op. 35172106Srwatson */ 36172106Srwatson 37172106Srwatson#include <sys/types.h> 38172106Srwatson 39172106Srwatson#include <bsm/audit.h> 40172106Srwatson 41172106Srwatson#include <err.h> 42172106Srwatson#include <errno.h> 43172106Srwatson#include <stdio.h> 44172106Srwatson 45172106Srwatson#include "main.h" 46172106Srwatson 47172106Srwatsonstatic auditinfo_t ai; 48172106Srwatsonstatic auditinfo_addr_t aia; 49172106Srwatson 50172106Srwatsonint 51172106Srwatsonpriv_audit_setaudit_setup(int asroot, int injail, struct test *test) 52172106Srwatson{ 53172106Srwatson 54172106Srwatson if (getaudit(&ai) < 0) { 55172106Srwatson warn("priv_audit_setaudit_setup: getaudit"); 56172106Srwatson return (-1); 57172106Srwatson } 58172106Srwatson if (getaudit_addr(&aia, sizeof(aia)) < 0) { 59172106Srwatson warn("priv_audit_setaudit_setup: getaudit_addr"); 60172106Srwatson return (-1); 61172106Srwatson } 62172106Srwatson 63172106Srwatson return (0); 64172106Srwatson} 65172106Srwatson 66172106Srwatsonvoid 67172106Srwatsonpriv_audit_setaudit(int asroot, int injail, struct test *test) 68172106Srwatson{ 69172106Srwatson int error; 70172106Srwatson 71172106Srwatson error = setaudit(&ai); 72172106Srwatson if (asroot && injail) 73172106Srwatson expect("priv_audit_setaudit(asroot, injail)", error, -1, 74172106Srwatson ENOSYS); 75172106Srwatson if (asroot && !injail) 76172106Srwatson expect("priv_audit_setaudit(asroot, !injail)", error, 0, 0); 77172106Srwatson if (!asroot && injail) 78172106Srwatson expect("priv_audit_setaudit(!asroot, injail)", error, -1, 79172106Srwatson ENOSYS); 80172106Srwatson if (!asroot && !injail) 81172106Srwatson expect("priv_audit_setaudit(!asroot, !injail)", error, -1, 82172106Srwatson EPERM); 83172106Srwatson} 84172106Srwatson 85172106Srwatsonvoid 86172106Srwatsonpriv_audit_setaudit_addr(int asroot, int injail, struct test *test) 87172106Srwatson{ 88172106Srwatson int error; 89172106Srwatson 90172106Srwatson error = setaudit_addr(&aia, sizeof(aia)); 91172106Srwatson if (asroot && injail) 92172106Srwatson expect("priv_audit_setaudit_addr(asroot, injail)", error, -1, 93172106Srwatson ENOSYS); 94172106Srwatson if (asroot && !injail) 95172106Srwatson expect("priv_audit_setaudit_addr(asroot, !injail)", error, 0, 96172106Srwatson 0); 97172106Srwatson if (!asroot && injail) 98172106Srwatson expect("priv_audit_setaudit_addr(!asroot, injail)", error, 99172106Srwatson -1, ENOSYS); 100172106Srwatson if (!asroot && !injail) 101172106Srwatson expect("priv_audit_setaudit_addr(!asroot, !injail)", error, 102172106Srwatson -1, EPERM); 103172106Srwatson} 104172106Srwatson 105172106Srwatsonvoid 106172106Srwatsonpriv_audit_setaudit_cleanup(int asroot, int injail, struct test *test) 107172106Srwatson{ 108172106Srwatson 109172106Srwatson} 110