1/*- 2 * Copyright (c) 2006 nCircle Network Security, Inc. 3 * Copyright (c) 2007 Robert N. M. Watson 4 * All rights reserved. 5 * 6 * This software was developed by Robert N. M. Watson for the TrustedBSD 7 * Project under contract to nCircle Network Security, Inc. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR, NCIRCLE NETWORK SECURITY, 22 * INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 24 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 25 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 26 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 27 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 28 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 * 30 * $FreeBSD$ 31 */ 32 33/* 34 * Check that privilege is required to set the sticky bit on a file but not a 35 * directory. 36 */ 37 38#include <sys/stat.h> 39 40#include <err.h> 41#include <errno.h> 42#include <unistd.h> 43 44#include "main.h" 45 46char fpath[1024]; 47int fpath_initialized; 48 49char dpath[1024]; 50int dpath_initialized; 51 52int 53priv_vfs_stickyfile_dir_fowner_setup(int asroot, int injail, 54 struct test *test) 55{ 56 57 setup_dir("priv_vfs_stickyfile_fowner_setup: dpath", dpath, 58 UID_OWNER, GID_OWNER, 0700); 59 dpath_initialized = 1; 60 return (0); 61} 62 63int 64priv_vfs_stickyfile_dir_fother_setup(int asroot, int injail, 65 struct test *test) 66{ 67 68 setup_dir("priv_vfs_stickyfile_fother_setup: dpath", dpath, 69 UID_OTHER, GID_OTHER, 0700); 70 dpath_initialized = 1; 71 return (0); 72} 73 74int 75priv_vfs_stickyfile_file_fowner_setup(int asroot, int injail, 76 struct test *test) 77{ 78 79 setup_file("priv_vfs_stickyfile_fowner_setup: fpath", fpath, 80 UID_OWNER, GID_OWNER, 0600); 81 fpath_initialized = 1; 82 return (0); 83} 84 85int 86priv_vfs_stickyfile_file_fother_setup(int asroot, int injail, 87 struct test *test) 88{ 89 90 setup_file("priv_vfs_stickyfile_fother_setup: fpath", fpath, 91 UID_OTHER, GID_OTHER, 0600); 92 fpath_initialized = 1; 93 return (0); 94} 95 96void 97priv_vfs_stickyfile_dir_fowner(int asroot, int injail, struct test *test) 98{ 99 int error; 100 101 error = chmod(dpath, 0700 | S_ISTXT); 102 if (asroot && injail) 103 expect("priv_vfs_stickyfile_dir_fowner(root, jail)", error, 104 0, 0); 105 if (asroot && !injail) 106 expect("priv_vfs_stickyfile_dir_fowner(root, !jail)", error, 107 0, 0); 108 if (!asroot && injail) 109 expect("priv_vfs_stickyfile_dir_fowner(!root, jail)", error, 110 0, 0); 111 if (!asroot && !injail) 112 expect("priv_vfs_stickyfile_dir_fowner(!root, !jail)", error, 113 0, 0); 114} 115 116void 117priv_vfs_stickyfile_dir_fother(int asroot, int injail, struct test *test) 118{ 119 int error; 120 121 error = chmod(dpath, 0700 | S_ISTXT); 122 if (asroot && injail) 123 expect("priv_vfs_stickyfile_dir_fother(root, jail)", error, 124 0, 0); 125 if (asroot && !injail) 126 expect("priv_vfs_stickyfile_dir_fother(root, !jail)", error, 127 0, 0); 128 if (!asroot && injail) 129 expect("priv_vfs_stickyfile_dir_fother(!root, jail)", error, 130 -1, EPERM); 131 if (!asroot && !injail) 132 expect("priv_vfs_stickyfile_dir_fother(!root, !jail)", error, 133 -1, EPERM); 134} 135 136void 137priv_vfs_stickyfile_file_fowner(int asroot, int injail, struct test *test) 138{ 139 int error; 140 141 error = chmod(fpath, 0600 | S_ISTXT); 142 if (asroot && injail) 143 expect("priv_vfs_stickyfile_file_fowner(root, jail)", error, 144 0, 0); 145 if (asroot && !injail) 146 expect("priv_vfs_stickyfile_file_fowner(root, !jail)", error, 147 0, 0); 148 if (!asroot && injail) 149 expect("priv_vfs_stickyfile_file_fowner(!root, jail)", error, 150 -1, EFTYPE); 151 if (!asroot && !injail) 152 expect("priv_vfs_stickyfile_file_fowner(!root, !jail)", error, 153 -1, EFTYPE); 154} 155 156void 157priv_vfs_stickyfile_file_fother(int asroot, int injail, struct test *test) 158{ 159 int error; 160 161 error = chmod(fpath, 0600 | S_ISTXT); 162 if (asroot && injail) 163 expect("priv_vfs_stickyfile_file_fother(root, jail)", error, 164 0, 0); 165 if (asroot && !injail) 166 expect("priv_vfs_stickyfile_file_fother(root, !jail)", error, 167 0, 0); 168 if (!asroot && injail) 169 expect("priv_vfs_stickyfile_file_fother(!root, jail)", error, 170 -1, EPERM); 171 if (!asroot && !injail) 172 expect("priv_vfs_stickyfile_file_fother(!root, !jail)", error, 173 -1, EPERM); 174} 175 176void 177priv_vfs_stickyfile_dir_cleanup(int asroot, int injail, struct test *test) 178{ 179 180 if (dpath_initialized) { 181 (void)rmdir(dpath); 182 dpath_initialized = 0; 183 } 184} 185 186void 187priv_vfs_stickyfile_file_cleanup(int asroot, int injail, struct test *test) 188{ 189 190 if (fpath_initialized) { 191 (void)unlink(fpath); 192 fpath_initialized = 0; 193 } 194} 195