xref: /freebsd/lib/libjail/jail.c (revision 6ae1554a5d9b318f8ad53ccc39fa5a961403da73)
1 /*-
2  * Copyright (c) 2009 James Gritton.
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  */
26 
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
29 
30 #include <sys/param.h>
31 #include <sys/types.h>
32 #include <sys/jail.h>
33 #include <sys/socket.h>
34 #include <sys/sysctl.h>
35 
36 #include <arpa/inet.h>
37 #include <netinet/in.h>
38 
39 #include <errno.h>
40 #include <inttypes.h>
41 #include <stdio.h>
42 #include <stdarg.h>
43 #include <stdlib.h>
44 #include <string.h>
45 
46 #include "jail.h"
47 
48 #define	SJPARAM		"security.jail.param"
49 
50 #define JPS_IN_ADDR	1
51 #define JPS_IN6_ADDR	2
52 
53 #define ARRAY_SANITY	5
54 #define ARRAY_SLOP	5
55 
56 
57 static int jailparam_import_enum(const char **values, int nvalues,
58     const char *valstr, size_t valsize, int *value);
59 static int jailparam_type(struct jailparam *jp);
60 static char *noname(const char *name);
61 static char *nononame(const char *name);
62 
63 char jail_errmsg[JAIL_ERRMSGLEN];
64 
65 static const char *bool_values[] = { "false", "true" };
66 static const char *jailsys_values[] = { "disable", "new", "inherit" };
67 
68 
69 /*
70  * Import a null-terminated parameter list and set a jail with the flags
71  * and parameters.
72  */
73 int
74 jail_setv(int flags, ...)
75 {
76 	va_list ap, tap;
77 	struct jailparam *jp;
78 	const char *name, *value;
79 	int njp, jid;
80 
81 	/* Create the parameter list and import the parameters. */
82 	va_start(ap, flags);
83 	va_copy(tap, ap);
84 	for (njp = 0; va_arg(tap, char *) != NULL; njp++)
85 		(void)va_arg(tap, char *);
86 	va_end(tap);
87 	jp = alloca(njp * sizeof(struct jailparam));
88 	for (njp = 0; (name = va_arg(ap, char *)) != NULL;) {
89 		value = va_arg(ap, char *);
90 		if (jailparam_init(jp + njp, name) < 0)
91 			goto error;
92 		if (jailparam_import(jp + njp++, value) < 0)
93 			goto error;
94 	}
95 	va_end(ap);
96 	jid = jailparam_set(jp, njp, flags);
97 	jailparam_free(jp, njp);
98 	return (jid);
99 
100  error:
101 	jailparam_free(jp, njp);
102 	va_end(ap);
103 	return (-1);
104 }
105 
106 /*
107  * Read a null-terminated parameter list, get the referenced jail, and export
108  * the parameters to the list.
109  */
110 int
111 jail_getv(int flags, ...)
112 {
113 	va_list ap, tap;
114 	struct jailparam *jp, *jp_lastjid, *jp_jid, *jp_name, *jp_key;
115 	char *valarg, *value;
116 	const char *name, *key_value, *lastjid_value, *jid_value, *name_value;
117 	int njp, i, jid;
118 
119 	/* Create the parameter list and find the key. */
120 	va_start(ap, flags);
121 	va_copy(tap, ap);
122 	for (njp = 0; va_arg(tap, char *) != NULL; njp++)
123 		(void)va_arg(tap, char *);
124 	va_end(tap);
125 
126 	jp = alloca(njp * sizeof(struct jailparam));
127 	va_copy(tap, ap);
128 	jp_lastjid = jp_jid = jp_name = NULL;
129 	lastjid_value = jid_value = name_value = NULL;
130 	for (njp = 0; (name = va_arg(tap, char *)) != NULL; njp++) {
131 		value = va_arg(tap, char *);
132 		if (jailparam_init(jp + njp, name) < 0) {
133 			va_end(tap);
134 			goto error;
135 		}
136 		if (!strcmp(jp[njp].jp_name, "lastjid")) {
137 			jp_lastjid = jp + njp;
138 			lastjid_value = value;
139 		} else if (!strcmp(jp[njp].jp_name, "jid")) {
140 			jp_jid = jp + njp;
141 			jid_value = value;
142 		} if (!strcmp(jp[njp].jp_name, "name")) {
143 			jp_name = jp + njp;
144 			name_value = value;
145 		}
146 	}
147 	va_end(tap);
148 	/* Import the key parameter. */
149 	if (jp_lastjid != NULL) {
150 		jp_key = jp_lastjid;
151 		key_value = lastjid_value;
152 	} else if (jp_jid != NULL && strtol(jid_value, NULL, 10) != 0) {
153 		jp_key = jp_jid;
154 		key_value = jid_value;
155 	} else if (jp_name != NULL) {
156 		jp_key = jp_name;
157 		key_value = name_value;
158 	} else {
159 		strlcpy(jail_errmsg, "no jail specified", JAIL_ERRMSGLEN);
160 		errno = ENOENT;
161 		goto error;
162 	}
163 	if (jailparam_import(jp_key, key_value) < 0)
164 		goto error;
165 	/* Get the jail and export the parameters. */
166 	jid = jailparam_get(jp, njp, flags);
167 	if (jid < 0)
168 		goto error;
169 	for (i = 0; i < njp; i++) {
170 		(void)va_arg(ap, char *);
171 		valarg = va_arg(ap, char *);
172 		if (jp + i != jp_key) {
173 			/* It's up to the caller to ensure there's room. */
174 			if ((jp[i].jp_ctltype & CTLTYPE) == CTLTYPE_STRING)
175 				strcpy(valarg, jp[i].jp_value);
176 			else {
177 				value = jailparam_export(jp + i);
178 				if (value == NULL)
179 					goto error;
180 				strcpy(valarg, value);
181 				free(value);
182 			}
183 		}
184 	}
185 	jailparam_free(jp, njp);
186 	va_end(ap);
187 	return (jid);
188 
189  error:
190 	jailparam_free(jp, njp);
191 	va_end(ap);
192 	return (-1);
193 }
194 
195 /*
196  * Return a list of all known parameters.
197  */
198 int
199 jailparam_all(struct jailparam **jpp)
200 {
201 	struct jailparam *jp, *tjp;
202 	size_t mlen1, mlen2, buflen;
203 	int njp, nlist;
204 	int mib1[CTL_MAXNAME], mib2[CTL_MAXNAME - 2];
205 	char buf[MAXPATHLEN];
206 
207 	njp = 0;
208 	nlist = 32;
209 	jp = malloc(nlist * sizeof(*jp));
210 	if (jp == NULL) {
211 		strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
212 		return (-1);
213 	}
214 	mib1[0] = 0;
215 	mib1[1] = 2;
216 	mlen1 = CTL_MAXNAME - 2;
217 	if (sysctlnametomib(SJPARAM, mib1 + 2, &mlen1) < 0) {
218 		snprintf(jail_errmsg, JAIL_ERRMSGLEN,
219 		    "sysctlnametomib(" SJPARAM "): %s", strerror(errno));
220 		goto error;
221 	}
222 	for (;; njp++) {
223 		/* Get the next parameter. */
224 		mlen2 = sizeof(mib2);
225 		if (sysctl(mib1, mlen1 + 2, mib2, &mlen2, NULL, 0) < 0) {
226 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
227 			    "sysctl(0.2): %s", strerror(errno));
228 			goto error;
229 		}
230 		if (mib2[0] != mib1[2] || mib2[1] != mib1[3] ||
231 		    mib2[2] != mib1[4])
232 			break;
233 		/* Convert it to an ascii name. */
234 		memcpy(mib1 + 2, mib2, mlen2);
235 		mlen1 = mlen2 / sizeof(int);
236 		mib1[1] = 1;
237 		buflen = sizeof(buf);
238 		if (sysctl(mib1, mlen1 + 2, buf, &buflen, NULL, 0) < 0) {
239 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
240 			    "sysctl(0.1): %s", strerror(errno));
241 			goto error;
242 		}
243 		if (buf[buflen - 2] == '.')
244 			buf[buflen - 2] = '\0';
245 		/* Add the parameter to the list */
246 		if (njp >= nlist) {
247 			nlist *= 2;
248 			tjp = realloc(jp, nlist * sizeof(*jp));
249 			if (tjp == NULL)
250 				goto error;
251 			jp = tjp;
252 		}
253 		if (jailparam_init(jp + njp, buf + sizeof(SJPARAM)) < 0)
254 			goto error;
255 		mib1[1] = 2;
256 	}
257 	jp = realloc(jp, njp * sizeof(*jp));
258 	*jpp = jp;
259 	return (njp);
260 
261  error:
262 	jailparam_free(jp, njp);
263 	free(jp);
264 	return (-1);
265 }
266 
267 /*
268  * Clear a jail parameter and copy in its name.
269  */
270 int
271 jailparam_init(struct jailparam *jp, const char *name)
272 {
273 
274 	memset(jp, 0, sizeof(*jp));
275 	jp->jp_name = strdup(name);
276 	if (jp->jp_name == NULL) {
277 		strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
278 		return (-1);
279 	}
280 	if (jailparam_type(jp) < 0) {
281 		jailparam_free(jp, 1);
282 		jp->jp_name = NULL;
283 		jp->jp_value = NULL;
284 		return (-1);
285 	}
286 	return (0);
287 }
288 
289 /*
290  * Put a name and value into a jail parameter element, converting the value
291  * to internal form.
292  */
293 int
294 jailparam_import(struct jailparam *jp, const char *value)
295 {
296 	char *p, *ep, *tvalue;
297 	const char *avalue;
298 	int i, nval, fw;
299 
300 	if (value == NULL)
301 		return (0);
302 	if ((jp->jp_ctltype & CTLTYPE) == CTLTYPE_STRING) {
303 		jp->jp_value = strdup(value);
304 		if (jp->jp_value == NULL) {
305 			strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
306 			return (-1);
307 		}
308 		return (0);
309 	}
310 	nval = 1;
311 	if (jp->jp_elemlen) {
312 		if (value[0] == '\0' || (value[0] == '-' && value[1] == '\0')) {
313 			jp->jp_value = strdup("");
314 			if (jp->jp_value == NULL) {
315 				strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
316 				return (-1);
317 			}
318 			jp->jp_valuelen = 0;
319 			return (0);
320 		}
321 		for (p = strchr(value, ','); p; p = strchr(p + 1, ','))
322 			nval++;
323 		jp->jp_valuelen = jp->jp_elemlen * nval;
324 	}
325 	jp->jp_value = malloc(jp->jp_valuelen);
326 	if (jp->jp_value == NULL) {
327 		strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
328 		return (-1);
329 	}
330 	avalue = value;
331 	for (i = 0; i < nval; i++) {
332 		fw = nval == 1 ? strlen(avalue) : strcspn(avalue, ",");
333 		switch (jp->jp_ctltype & CTLTYPE) {
334 		case CTLTYPE_INT:
335 			if (jp->jp_flags & (JP_BOOL | JP_NOBOOL)) {
336 				if (!jailparam_import_enum(bool_values, 2,
337 				    avalue, fw, &((int *)jp->jp_value)[i])) {
338 					snprintf(jail_errmsg,
339 					    JAIL_ERRMSGLEN, "%s: "
340 					    "unknown boolean value \"%.*s\"",
341 					    jp->jp_name, fw, avalue);
342 					errno = EINVAL;
343 					goto error;
344 				}
345 				break;
346 			}
347 			if (jp->jp_flags & JP_JAILSYS) {
348 				/*
349 				 * Allow setting a jailsys parameter to "new"
350 				 * in a booleanesque fashion.
351 				 */
352 				if (value[0] == '\0')
353 					((int *)jp->jp_value)[i] = JAIL_SYS_NEW;
354 				else if (!jailparam_import_enum(jailsys_values,
355 				    sizeof(jailsys_values) /
356 				    sizeof(jailsys_values[0]), avalue, fw,
357 				    &((int *)jp->jp_value)[i])) {
358 					snprintf(jail_errmsg,
359 					    JAIL_ERRMSGLEN, "%s: "
360 					    "unknown jailsys value \"%.*s\"",
361 					    jp->jp_name, fw, avalue);
362 					errno = EINVAL;
363 					goto error;
364 				}
365 				break;
366 			}
367 			((int *)jp->jp_value)[i] = strtol(avalue, &ep, 10);
368 		integer_test:
369 			if (ep != avalue + fw) {
370 				snprintf(jail_errmsg, JAIL_ERRMSGLEN,
371 				    "%s: non-integer value \"%.*s\"",
372 				    jp->jp_name, fw, avalue);
373 				errno = EINVAL;
374 				goto error;
375 			}
376 			break;
377 		case CTLTYPE_UINT:
378 			((unsigned *)jp->jp_value)[i] =
379 			    strtoul(avalue, &ep, 10);
380 			goto integer_test;
381 		case CTLTYPE_LONG:
382 			((long *)jp->jp_value)[i] = strtol(avalue, &ep, 10);
383 			goto integer_test;
384 		case CTLTYPE_ULONG:
385 			((unsigned long *)jp->jp_value)[i] =
386 			    strtoul(avalue, &ep, 10);
387 			goto integer_test;
388 		case CTLTYPE_S64:
389 			((int64_t *)jp->jp_value)[i] =
390 			    strtoimax(avalue, &ep, 10);
391 			goto integer_test;
392 		case CTLTYPE_U64:
393 			((uint64_t *)jp->jp_value)[i] =
394 			    strtoumax(avalue, &ep, 10);
395 			goto integer_test;
396 		case CTLTYPE_STRUCT:
397 			tvalue = alloca(fw + 1);
398 			strlcpy(tvalue, avalue, fw + 1);
399 			switch (jp->jp_structtype) {
400 			case JPS_IN_ADDR:
401 				if (inet_pton(AF_INET, tvalue,
402 				    &((struct in_addr *)jp->jp_value)[i]) != 1)
403 				{
404 					snprintf(jail_errmsg,
405 					    JAIL_ERRMSGLEN,
406 					    "%s: not an IPv4 address: %s",
407 					    jp->jp_name, tvalue);
408 					errno = EINVAL;
409 					goto error;
410 				}
411 				break;
412 			case JPS_IN6_ADDR:
413 				if (inet_pton(AF_INET6, tvalue,
414 				    &((struct in6_addr *)jp->jp_value)[i]) != 1)
415 				{
416 					snprintf(jail_errmsg,
417 					    JAIL_ERRMSGLEN,
418 					    "%s: not an IPv6 address: %s",
419 					    jp->jp_name, tvalue);
420 					errno = EINVAL;
421 					goto error;
422 				}
423 				break;
424 			default:
425 				goto unknown_type;
426 			}
427 			break;
428 		default:
429 		unknown_type:
430 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
431 			    "unknown type for %s", jp->jp_name);
432 			errno = ENOENT;
433 			goto error;
434 		}
435 		avalue += fw + 1;
436 	}
437 	return (0);
438 
439  error:
440 	free(jp->jp_value);
441 	jp->jp_value = NULL;
442 	return (-1);
443 }
444 
445 static int
446 jailparam_import_enum(const char **values, int nvalues, const char *valstr,
447     size_t valsize, int *value)
448 {
449 	char *ep;
450 	int i;
451 
452 	for (i = 0; i < nvalues; i++)
453 		if (valsize == strlen(values[i]) &&
454 		    !strncasecmp(valstr, values[i], valsize)) {
455 			*value = i;
456 			return 1;
457 		}
458 	*value = strtol(valstr, &ep, 10);
459 	return (ep == valstr + valsize);
460 }
461 
462 /*
463  * Put a name and value into a jail parameter element, copying the value
464  * but not altering it.
465  */
466 int
467 jailparam_import_raw(struct jailparam *jp, void *value, size_t valuelen)
468 {
469 
470 	jp->jp_value = value;
471 	jp->jp_valuelen = valuelen;
472 	jp->jp_flags |= JP_RAWVALUE;
473 	return (0);
474 }
475 
476 /*
477  * Run the jail_set and jail_get system calls on a parameter list.
478  */
479 int
480 jailparam_set(struct jailparam *jp, unsigned njp, int flags)
481 {
482 	struct iovec *jiov;
483 	char *nname;
484 	int i, jid, bool0;
485 	unsigned j;
486 
487 	jiov = alloca(sizeof(struct iovec) * 2 * (njp + 1));
488 	bool0 = 0;
489 	for (i = j = 0; j < njp; j++) {
490 		jiov[i].iov_base = jp[j].jp_name;
491 		jiov[i].iov_len = strlen(jp[j].jp_name) + 1;
492 		i++;
493 		if (jp[j].jp_flags & (JP_BOOL | JP_NOBOOL)) {
494 			/*
495 			 * Set booleans without values.  If one has a value of
496 			 * zero, change it to (or from) its "no" counterpart.
497 			 */
498 			jiov[i].iov_base = NULL;
499 			jiov[i].iov_len = 0;
500 			if (jp[j].jp_value != NULL &&
501 			    jp[j].jp_valuelen == sizeof(int) &&
502 			    !*(int *)jp[j].jp_value) {
503 				bool0 = 1;
504 				nname = jp[j].jp_flags & JP_BOOL
505 				    ? noname(jp[j].jp_name)
506 				    : nononame(jp[j].jp_name);
507 				if (nname == NULL) {
508 					njp = j;
509 					jid = -1;
510 					goto done;
511 				}
512 				jiov[i - 1].iov_base = nname;
513 				jiov[i - 1].iov_len = strlen(nname) + 1;
514 
515 			}
516 		} else {
517 			/*
518 			 * Try to fill in missing values with an empty string.
519 			 */
520 			if (jp[j].jp_value == NULL && jp[j].jp_valuelen > 0 &&
521 			    jailparam_import(jp + j, "") < 0) {
522 				njp = j;
523 				jid = -1;
524 				goto done;
525 			}
526 			jiov[i].iov_base = jp[j].jp_value;
527 			jiov[i].iov_len =
528 			    (jp[j].jp_ctltype & CTLTYPE) == CTLTYPE_STRING
529 			    ? strlen(jp[j].jp_value) + 1
530 			    : jp[j].jp_valuelen;
531 		}
532 		i++;
533 	}
534 	jiov[i].iov_base = __DECONST(char *, "errmsg");
535 	jiov[i].iov_len = sizeof("errmsg");
536 	i++;
537 	jiov[i].iov_base = jail_errmsg;
538 	jiov[i].iov_len = JAIL_ERRMSGLEN;
539 	i++;
540 	jail_errmsg[0] = 0;
541 	jid = jail_set(jiov, i, flags);
542 	if (jid < 0 && !jail_errmsg[0])
543 		snprintf(jail_errmsg, sizeof(jail_errmsg), "jail_set: %s",
544 		    strerror(errno));
545  done:
546 	if (bool0)
547 		for (j = 0; j < njp; j++)
548 			if ((jp[j].jp_flags & (JP_BOOL | JP_NOBOOL)) &&
549 			    jp[j].jp_value != NULL &&
550 			    jp[j].jp_valuelen == sizeof(int) &&
551 			    !*(int *)jp[j].jp_value)
552 				free(jiov[j * 2].iov_base);
553 	return (jid);
554 }
555 
556 int
557 jailparam_get(struct jailparam *jp, unsigned njp, int flags)
558 {
559 	struct iovec *jiov;
560 	struct jailparam *jp_lastjid, *jp_jid, *jp_name, *jp_key;
561 	int i, ai, ki, jid, arrays, sanity;
562 	unsigned j;
563 
564 	/*
565 	 * Get the types for all parameters.
566 	 * Find the key and any array parameters.
567 	 */
568 	jiov = alloca(sizeof(struct iovec) * 2 * (njp + 1));
569 	jp_lastjid = jp_jid = jp_name = NULL;
570 	arrays = 0;
571 	for (ai = j = 0; j < njp; j++) {
572 		if (!strcmp(jp[j].jp_name, "lastjid"))
573 			jp_lastjid = jp + j;
574 		else if (!strcmp(jp[j].jp_name, "jid"))
575 			jp_jid = jp + j;
576 		else if (!strcmp(jp[j].jp_name, "name"))
577 			jp_name = jp + j;
578 		else if (jp[j].jp_elemlen && !(jp[j].jp_flags & JP_RAWVALUE)) {
579 			arrays = 1;
580 			jiov[ai].iov_base = jp[j].jp_name;
581 			jiov[ai].iov_len = strlen(jp[j].jp_name) + 1;
582 			ai++;
583 			jiov[ai].iov_base = NULL;
584 			jiov[ai].iov_len = 0;
585 			ai++;
586 		}
587 	}
588 	jp_key = jp_lastjid ? jp_lastjid :
589 	    jp_jid && jp_jid->jp_valuelen == sizeof(int) &&
590 	    jp_jid->jp_value && *(int *)jp_jid->jp_value ? jp_jid : jp_name;
591 	if (jp_key == NULL || jp_key->jp_value == NULL) {
592 		strlcpy(jail_errmsg, "no jail specified", JAIL_ERRMSGLEN);
593 		errno = ENOENT;
594 		return (-1);
595 	}
596 	ki = ai;
597 	jiov[ki].iov_base = jp_key->jp_name;
598 	jiov[ki].iov_len = strlen(jp_key->jp_name) + 1;
599 	ki++;
600 	jiov[ki].iov_base = jp_key->jp_value;
601 	jiov[ki].iov_len = (jp_key->jp_ctltype & CTLTYPE) == CTLTYPE_STRING
602 	    ? strlen(jp_key->jp_value) + 1 : jp_key->jp_valuelen;
603 	ki++;
604 	jiov[ki].iov_base = __DECONST(char *, "errmsg");
605 	jiov[ki].iov_len = sizeof("errmsg");
606 	ki++;
607 	jiov[ki].iov_base = jail_errmsg;
608 	jiov[ki].iov_len = JAIL_ERRMSGLEN;
609 	ki++;
610 	jail_errmsg[0] = 0;
611 	if (arrays && jail_get(jiov, ki, flags) < 0) {
612 		if (!jail_errmsg[0])
613 			snprintf(jail_errmsg, sizeof(jail_errmsg),
614 			    "jail_get: %s", strerror(errno));
615 		return (-1);
616 	}
617 	/* Allocate storage for all parameters. */
618 	for (ai = j = 0, i = ki; j < njp; j++) {
619 		if (jp[j].jp_elemlen && !(jp[j].jp_flags & JP_RAWVALUE)) {
620 			ai++;
621 			jiov[ai].iov_len += jp[j].jp_elemlen * ARRAY_SLOP;
622 			if (jp[j].jp_valuelen >= jiov[ai].iov_len)
623 				jiov[ai].iov_len = jp[j].jp_valuelen;
624 			else {
625 				jp[j].jp_valuelen = jiov[ai].iov_len;
626 				if (jp[j].jp_value != NULL)
627 					free(jp[j].jp_value);
628 				jp[j].jp_value = malloc(jp[j].jp_valuelen);
629 				if (jp[j].jp_value == NULL) {
630 					strerror_r(errno, jail_errmsg,
631 					    JAIL_ERRMSGLEN);
632 					return (-1);
633 				}
634 			}
635 			jiov[ai].iov_base = jp[j].jp_value;
636 			memset(jiov[ai].iov_base, 0, jiov[ai].iov_len);
637 			ai++;
638 		} else if (jp + j != jp_key) {
639 			jiov[i].iov_base = jp[j].jp_name;
640 			jiov[i].iov_len = strlen(jp[j].jp_name) + 1;
641 			i++;
642 			if (jp[j].jp_value == NULL &&
643 			    !(jp[j].jp_flags & JP_RAWVALUE)) {
644 				jp[j].jp_value = malloc(jp[j].jp_valuelen);
645 				if (jp[j].jp_value == NULL) {
646 					strerror_r(errno, jail_errmsg,
647 					    JAIL_ERRMSGLEN);
648 					return (-1);
649 				}
650 			}
651 			jiov[i].iov_base = jp[j].jp_value;
652 			jiov[i].iov_len = jp[j].jp_valuelen;
653 			memset(jiov[i].iov_base, 0, jiov[i].iov_len);
654 			i++;
655 		}
656 	}
657 	/*
658 	 * Get the prison.  If there are array elements, retry a few times
659 	 * in case their sizes changed from under us.
660 	 */
661 	for (sanity = 0;; sanity++) {
662 		jid = jail_get(jiov, i, flags);
663 		if (jid >= 0 || !arrays || sanity == ARRAY_SANITY ||
664 		    errno != EINVAL || jail_errmsg[0])
665 			break;
666 		for (ai = j = 0; j < njp; j++) {
667 			if (jp[j].jp_elemlen &&
668 			    !(jp[j].jp_flags & JP_RAWVALUE)) {
669 				ai++;
670 				jiov[ai].iov_base = NULL;
671 				jiov[ai].iov_len = 0;
672 				ai++;
673 			}
674 		}
675 		if (jail_get(jiov, ki, flags) < 0)
676 			break;
677 		for (ai = j = 0; j < njp; j++) {
678 			if (jp[j].jp_elemlen &&
679 			    !(jp[j].jp_flags & JP_RAWVALUE)) {
680 				ai++;
681 				jiov[ai].iov_len +=
682 				    jp[j].jp_elemlen * ARRAY_SLOP;
683 				if (jp[j].jp_valuelen >= jiov[ai].iov_len)
684 					jiov[ai].iov_len = jp[j].jp_valuelen;
685 				else {
686 					jp[j].jp_valuelen = jiov[ai].iov_len;
687 					if (jp[j].jp_value != NULL)
688 						free(jp[j].jp_value);
689 					jp[j].jp_value =
690 					    malloc(jiov[ai].iov_len);
691 					if (jp[j].jp_value == NULL) {
692 						strerror_r(errno, jail_errmsg,
693 						    JAIL_ERRMSGLEN);
694 						return (-1);
695 					}
696 				}
697 				jiov[ai].iov_base = jp[j].jp_value;
698 				memset(jiov[ai].iov_base, 0, jiov[ai].iov_len);
699 				ai++;
700 			}
701 		}
702 	}
703 	if (jid < 0 && !jail_errmsg[0])
704 		snprintf(jail_errmsg, sizeof(jail_errmsg),
705 		    "jail_get: %s", strerror(errno));
706 	for (ai = j = 0, i = ki; j < njp; j++) {
707 		if (jp[j].jp_elemlen && !(jp[j].jp_flags & JP_RAWVALUE)) {
708 			ai++;
709 			jp[j].jp_valuelen = jiov[ai].iov_len;
710 			ai++;
711 		} else if (jp + j != jp_key) {
712 			i++;
713 			jp[j].jp_valuelen = jiov[i].iov_len;
714 			i++;
715 		}
716 	}
717 	return (jid);
718 }
719 
720 /*
721  * Convert a jail parameter's value to external form.
722  */
723 char *
724 jailparam_export(struct jailparam *jp)
725 {
726 	size_t *valuelens;
727 	char *value, *tvalue, **values;
728 	size_t valuelen;
729 	int i, nval, ival;
730 	char valbuf[INET6_ADDRSTRLEN];
731 
732 	if ((jp->jp_ctltype & CTLTYPE) == CTLTYPE_STRING) {
733 		value = strdup(jp->jp_value);
734 		if (value == NULL)
735 			strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
736 		return (value);
737 	}
738 	nval = jp->jp_elemlen ? jp->jp_valuelen / jp->jp_elemlen : 1;
739 	if (nval == 0) {
740 		value = strdup("");
741 		if (value == NULL)
742 			strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
743 		return (value);
744 	}
745 	values = alloca(nval * sizeof(char *));
746 	valuelens = alloca(nval * sizeof(size_t));
747 	valuelen = 0;
748 	for (i = 0; i < nval; i++) {
749 		switch (jp->jp_ctltype & CTLTYPE) {
750 		case CTLTYPE_INT:
751 			ival = ((int *)jp->jp_value)[i];
752 			if ((jp->jp_flags & (JP_BOOL | JP_NOBOOL)) &&
753 			    (unsigned)ival < 2) {
754 				strlcpy(valbuf, bool_values[ival],
755 				    sizeof(valbuf));
756 				break;
757 			}
758 			if ((jp->jp_flags & JP_JAILSYS) &&
759 			    (unsigned)ival < sizeof(jailsys_values) /
760 			    sizeof(jailsys_values[0])) {
761 				strlcpy(valbuf, jailsys_values[ival],
762 				    sizeof(valbuf));
763 				break;
764 			}
765 			snprintf(valbuf, sizeof(valbuf), "%d", ival);
766 			break;
767 		case CTLTYPE_UINT:
768 			snprintf(valbuf, sizeof(valbuf), "%u",
769 			    ((unsigned *)jp->jp_value)[i]);
770 			break;
771 		case CTLTYPE_LONG:
772 			snprintf(valbuf, sizeof(valbuf), "%ld",
773 			    ((long *)jp->jp_value)[i]);
774 			break;
775 		case CTLTYPE_ULONG:
776 			snprintf(valbuf, sizeof(valbuf), "%lu",
777 			    ((unsigned long *)jp->jp_value)[i]);
778 			break;
779 		case CTLTYPE_S64:
780 			snprintf(valbuf, sizeof(valbuf), "%jd",
781 			    (intmax_t)((int64_t *)jp->jp_value)[i]);
782 			break;
783 		case CTLTYPE_U64:
784 			snprintf(valbuf, sizeof(valbuf), "%ju",
785 			    (uintmax_t)((uint64_t *)jp->jp_value)[i]);
786 			break;
787 		case CTLTYPE_STRUCT:
788 			switch (jp->jp_structtype) {
789 			case JPS_IN_ADDR:
790 				if (inet_ntop(AF_INET,
791 				    &((struct in_addr *)jp->jp_value)[i],
792 				    valbuf, sizeof(valbuf)) == NULL) {
793 					strerror_r(errno, jail_errmsg,
794 					    JAIL_ERRMSGLEN);
795 					return (NULL);
796 				}
797 				break;
798 			case JPS_IN6_ADDR:
799 				if (inet_ntop(AF_INET6,
800 				    &((struct in6_addr *)jp->jp_value)[i],
801 				    valbuf, sizeof(valbuf)) == NULL) {
802 					strerror_r(errno, jail_errmsg,
803 					    JAIL_ERRMSGLEN);
804 					return (NULL);
805 				}
806 				break;
807 			default:
808 				goto unknown_type;
809 			}
810 			break;
811 		default:
812 		unknown_type:
813 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
814 			    "unknown type for %s", jp->jp_name);
815 			errno = ENOENT;
816 			return (NULL);
817 		}
818 		valuelens[i] = strlen(valbuf) + 1;
819 		valuelen += valuelens[i];
820 		values[i] = alloca(valuelens[i]);
821 		strcpy(values[i], valbuf);
822 	}
823 	value = malloc(valuelen);
824 	if (value == NULL)
825 		strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
826 	else {
827 		tvalue = value;
828 		for (i = 0; i < nval; i++) {
829 			strcpy(tvalue, values[i]);
830 			if (i < nval - 1) {
831 				tvalue += valuelens[i];
832 				tvalue[-1] = ',';
833 			}
834 		}
835 	}
836 	return (value);
837 }
838 
839 /*
840  * Free the contents of a jail parameter list (but not the list itself).
841  */
842 void
843 jailparam_free(struct jailparam *jp, unsigned njp)
844 {
845 	unsigned j;
846 
847 	for (j = 0; j < njp; j++) {
848 		free(jp[j].jp_name);
849 		if (!(jp[j].jp_flags & JP_RAWVALUE))
850 			free(jp[j].jp_value);
851 	}
852 }
853 
854 /*
855  * Find a parameter's type and size from its MIB.
856  */
857 static int
858 jailparam_type(struct jailparam *jp)
859 {
860 	char *p, *name, *nname;
861 	size_t miblen, desclen;
862 	int i, isarray;
863 	struct {
864 	    int i;
865 	    char s[MAXPATHLEN];
866 	} desc;
867 	int mib[CTL_MAXNAME];
868 
869 	/* The "lastjid" parameter isn't real. */
870 	name = jp->jp_name;
871 	if (!strcmp(name, "lastjid")) {
872 		jp->jp_valuelen = sizeof(int);
873 		jp->jp_ctltype = CTLTYPE_INT | CTLFLAG_WR;
874 		return (0);
875 	}
876 
877 	/* Find the sysctl that describes the parameter. */
878 	mib[0] = 0;
879 	mib[1] = 3;
880 	snprintf(desc.s, sizeof(desc.s), SJPARAM ".%s", name);
881 	miblen = sizeof(mib) - 2 * sizeof(int);
882 	if (sysctl(mib, 2, mib + 2, &miblen, desc.s, strlen(desc.s)) < 0) {
883 		if (errno != ENOENT) {
884 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
885 			    "sysctl(0.3.%s): %s", name, strerror(errno));
886 			return (-1);
887 		}
888 		/*
889 		 * The parameter probably doesn't exist.  But it might be
890 		 * the "no" counterpart to a boolean.
891 		 */
892 		nname = nononame(name);
893 		if (nname == NULL) {
894 		unknown_parameter:
895 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
896 			    "unknown parameter: %s", jp->jp_name);
897 			errno = ENOENT;
898 			return (-1);
899 		}
900 		name = alloca(strlen(nname) + 1);
901 		strcpy(name, nname);
902 		free(nname);
903 		snprintf(desc.s, sizeof(desc.s), SJPARAM ".%s", name);
904 		miblen = sizeof(mib) - 2 * sizeof(int);
905 		if (sysctl(mib, 2, mib + 2, &miblen, desc.s,
906 		    strlen(desc.s)) < 0)
907 			goto unknown_parameter;
908 		jp->jp_flags |= JP_NOBOOL;
909 	}
910  mib_desc:
911 	mib[1] = 4;
912 	desclen = sizeof(desc);
913 	if (sysctl(mib, (miblen / sizeof(int)) + 2, &desc, &desclen,
914 	    NULL, 0) < 0) {
915 		snprintf(jail_errmsg, JAIL_ERRMSGLEN,
916 		    "sysctl(0.4.%s): %s", name, strerror(errno));
917 		return (-1);
918 	}
919 	jp->jp_ctltype = desc.i;
920 	/* If this came from removing a "no", it better be a boolean. */
921 	if (jp->jp_flags & JP_NOBOOL) {
922 		if ((desc.i & CTLTYPE) == CTLTYPE_INT && desc.s[0] == 'B') {
923 			jp->jp_valuelen = sizeof(int);
924 			return (0);
925 		}
926 		else if ((desc.i & CTLTYPE) != CTLTYPE_NODE)
927 			goto unknown_parameter;
928 	}
929 	/* See if this is an array type. */
930 	p = strchr(desc.s, '\0');
931 	isarray  = 0;
932 	if (p - 2 < desc.s || strcmp(p - 2, ",a"))
933 		isarray = 0;
934 	else {
935 		isarray = 1;
936 		p[-2] = 0;
937 	}
938 	/* Look for types we understand. */
939 	switch (desc.i & CTLTYPE) {
940 	case CTLTYPE_INT:
941 		if (desc.s[0] == 'B')
942 			jp->jp_flags |= JP_BOOL;
943 		else if (!strcmp(desc.s, "E,jailsys"))
944 			jp->jp_flags |= JP_JAILSYS;
945 	case CTLTYPE_UINT:
946 		jp->jp_valuelen = sizeof(int);
947 		break;
948 	case CTLTYPE_LONG:
949 	case CTLTYPE_ULONG:
950 		jp->jp_valuelen = sizeof(long);
951 		break;
952 	case CTLTYPE_S64:
953 	case CTLTYPE_U64:
954 		jp->jp_valuelen = sizeof(int64_t);
955 		break;
956 	case CTLTYPE_STRING:
957 		desc.s[0] = 0;
958 		desclen = sizeof(desc.s);
959 		if (sysctl(mib + 2, miblen / sizeof(int), desc.s, &desclen,
960 		    NULL, 0) < 0) {
961 			snprintf(jail_errmsg, JAIL_ERRMSGLEN,
962 			    "sysctl(" SJPARAM ".%s): %s", name,
963 			    strerror(errno));
964 			return (-1);
965 		}
966 		jp->jp_valuelen = strtoul(desc.s, NULL, 10);
967 		break;
968 	case CTLTYPE_STRUCT:
969 		if (!strcmp(desc.s, "S,in_addr")) {
970 			jp->jp_structtype = JPS_IN_ADDR;
971 			jp->jp_valuelen = sizeof(struct in_addr);
972 		} else if (!strcmp(desc.s, "S,in6_addr")) {
973 			jp->jp_structtype = JPS_IN6_ADDR;
974 			jp->jp_valuelen = sizeof(struct in6_addr);
975 		} else {
976 			desclen = 0;
977 			if (sysctl(mib + 2, miblen / sizeof(int),
978 			    NULL, &jp->jp_valuelen, NULL, 0) < 0) {
979 				snprintf(jail_errmsg, JAIL_ERRMSGLEN,
980 				    "sysctl(" SJPARAM ".%s): %s", name,
981 				    strerror(errno));
982 				return (-1);
983 			}
984 		}
985 		break;
986 	case CTLTYPE_NODE:
987 		/*
988 		 * A node might be described by an empty-named child,
989 		 * which would be immediately before or after the node itself.
990 		 */
991 		mib[1] = 1;
992 		miblen += sizeof(int);
993 		for (i = -1; i <= 1; i += 2) {
994 			mib[(miblen / sizeof(int)) + 1] =
995 			    mib[(miblen / sizeof(int))] + i;
996 			desclen = sizeof(desc.s);
997 			if (sysctl(mib, (miblen / sizeof(int)) + 2, desc.s,
998 			    &desclen, NULL, 0) < 0) {
999 				if (errno == ENOENT)
1000 					continue;
1001 				snprintf(jail_errmsg, JAIL_ERRMSGLEN,
1002 				    "sysctl(0.1): %s", strerror(errno));
1003 				return (-1);
1004 			}
1005 			if (desclen == sizeof(SJPARAM) + strlen(name) + 2 &&
1006 			    memcmp(SJPARAM ".", desc.s, sizeof(SJPARAM)) == 0 &&
1007 			    memcmp(name, desc.s + sizeof(SJPARAM),
1008 			    desclen - sizeof(SJPARAM) - 2) == 0 &&
1009 			    desc.s[desclen - 2] == '.')
1010 				goto mib_desc;
1011 		}
1012 		goto unknown_parameter;
1013 	default:
1014 		snprintf(jail_errmsg, JAIL_ERRMSGLEN,
1015 		    "unknown type for %s", jp->jp_name);
1016 		errno = ENOENT;
1017 		return (-1);
1018 	}
1019 	if (isarray) {
1020 		jp->jp_elemlen = jp->jp_valuelen;
1021 		jp->jp_valuelen = 0;
1022 	}
1023 	return (0);
1024 }
1025 
1026 /*
1027  * Change a boolean parameter name into its "no" counterpart or vice versa.
1028  */
1029 static char *
1030 noname(const char *name)
1031 {
1032 	char *nname, *p;
1033 
1034 	nname = malloc(strlen(name) + 3);
1035 	if (nname == NULL) {
1036 		strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
1037 		return (NULL);
1038 	}
1039 	p = strrchr(name, '.');
1040 	if (p != NULL)
1041 		sprintf(nname, "%.*s.no%s", (int)(p - name), name, p + 1);
1042 	else
1043 		sprintf(nname, "no%s", name);
1044 	return (nname);
1045 }
1046 
1047 static char *
1048 nononame(const char *name)
1049 {
1050 	char *p, *nname;
1051 
1052 	p = strrchr(name, '.');
1053 	if (strncmp(p ? p + 1 : name, "no", 2)) {
1054 		snprintf(jail_errmsg, sizeof(jail_errmsg),
1055 		    "mismatched boolean: %s", name);
1056 		errno = EINVAL;
1057 		return (NULL);
1058 	}
1059 	nname = malloc(strlen(name) - 1);
1060 	if (nname == NULL) {
1061 		strerror_r(errno, jail_errmsg, JAIL_ERRMSGLEN);
1062 		return (NULL);
1063 	}
1064 	if (p != NULL)
1065 		sprintf(nname, "%.*s.%s", (int)(p - name), name, p + 3);
1066 	else
1067 		strcpy(nname, name + 2);
1068 	return (nname);
1069 }
1070