1 /*- 2 * Copyright (c) 2006 nCircle Network Security, Inc. 3 * Copyright (c) 2007 Robert N. M. Watson 4 * All rights reserved. 5 * 6 * This software was developed by Robert N. M. Watson for the TrustedBSD 7 * Project under contract to nCircle Network Security, Inc. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR, NCIRCLE NETWORK SECURITY, 22 * INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 24 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 25 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 26 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 27 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 28 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 */ 30 31 /* 32 * Check that privilege is required to set the sticky bit on a file but not a 33 * directory. 34 */ 35 36 #include <sys/stat.h> 37 38 #include <err.h> 39 #include <errno.h> 40 #include <unistd.h> 41 42 #include "main.h" 43 44 char fpath[1024]; 45 int fpath_initialized; 46 47 char dpath[1024]; 48 int dpath_initialized; 49 50 int 51 priv_vfs_stickyfile_dir_fowner_setup(int asroot, int injail, 52 struct test *test) 53 { 54 55 setup_dir("priv_vfs_stickyfile_fowner_setup: dpath", dpath, 56 UID_OWNER, GID_OWNER, 0700); 57 dpath_initialized = 1; 58 return (0); 59 } 60 61 int 62 priv_vfs_stickyfile_dir_fother_setup(int asroot, int injail, 63 struct test *test) 64 { 65 66 setup_dir("priv_vfs_stickyfile_fother_setup: dpath", dpath, 67 UID_OTHER, GID_OTHER, 0700); 68 dpath_initialized = 1; 69 return (0); 70 } 71 72 int 73 priv_vfs_stickyfile_file_fowner_setup(int asroot, int injail, 74 struct test *test) 75 { 76 77 setup_file("priv_vfs_stickyfile_fowner_setup: fpath", fpath, 78 UID_OWNER, GID_OWNER, 0600); 79 fpath_initialized = 1; 80 return (0); 81 } 82 83 int 84 priv_vfs_stickyfile_file_fother_setup(int asroot, int injail, 85 struct test *test) 86 { 87 88 setup_file("priv_vfs_stickyfile_fother_setup: fpath", fpath, 89 UID_OTHER, GID_OTHER, 0600); 90 fpath_initialized = 1; 91 return (0); 92 } 93 94 void 95 priv_vfs_stickyfile_dir_fowner(int asroot, int injail, struct test *test) 96 { 97 int error; 98 99 error = chmod(dpath, 0700 | S_ISTXT); 100 if (asroot && injail) 101 expect("priv_vfs_stickyfile_dir_fowner(root, jail)", error, 102 0, 0); 103 if (asroot && !injail) 104 expect("priv_vfs_stickyfile_dir_fowner(root, !jail)", error, 105 0, 0); 106 if (!asroot && injail) 107 expect("priv_vfs_stickyfile_dir_fowner(!root, jail)", error, 108 0, 0); 109 if (!asroot && !injail) 110 expect("priv_vfs_stickyfile_dir_fowner(!root, !jail)", error, 111 0, 0); 112 } 113 114 void 115 priv_vfs_stickyfile_dir_fother(int asroot, int injail, struct test *test) 116 { 117 int error; 118 119 error = chmod(dpath, 0700 | S_ISTXT); 120 if (asroot && injail) 121 expect("priv_vfs_stickyfile_dir_fother(root, jail)", error, 122 0, 0); 123 if (asroot && !injail) 124 expect("priv_vfs_stickyfile_dir_fother(root, !jail)", error, 125 0, 0); 126 if (!asroot && injail) 127 expect("priv_vfs_stickyfile_dir_fother(!root, jail)", error, 128 -1, EPERM); 129 if (!asroot && !injail) 130 expect("priv_vfs_stickyfile_dir_fother(!root, !jail)", error, 131 -1, EPERM); 132 } 133 134 void 135 priv_vfs_stickyfile_file_fowner(int asroot, int injail, struct test *test) 136 { 137 int error; 138 139 error = chmod(fpath, 0600 | S_ISTXT); 140 if (asroot && injail) 141 expect("priv_vfs_stickyfile_file_fowner(root, jail)", error, 142 0, 0); 143 if (asroot && !injail) 144 expect("priv_vfs_stickyfile_file_fowner(root, !jail)", error, 145 0, 0); 146 if (!asroot && injail) 147 expect("priv_vfs_stickyfile_file_fowner(!root, jail)", error, 148 -1, EFTYPE); 149 if (!asroot && !injail) 150 expect("priv_vfs_stickyfile_file_fowner(!root, !jail)", error, 151 -1, EFTYPE); 152 } 153 154 void 155 priv_vfs_stickyfile_file_fother(int asroot, int injail, struct test *test) 156 { 157 int error; 158 159 error = chmod(fpath, 0600 | S_ISTXT); 160 if (asroot && injail) 161 expect("priv_vfs_stickyfile_file_fother(root, jail)", error, 162 0, 0); 163 if (asroot && !injail) 164 expect("priv_vfs_stickyfile_file_fother(root, !jail)", error, 165 0, 0); 166 if (!asroot && injail) 167 expect("priv_vfs_stickyfile_file_fother(!root, jail)", error, 168 -1, EPERM); 169 if (!asroot && !injail) 170 expect("priv_vfs_stickyfile_file_fother(!root, !jail)", error, 171 -1, EPERM); 172 } 173 174 void 175 priv_vfs_stickyfile_dir_cleanup(int asroot, int injail, struct test *test) 176 { 177 178 if (dpath_initialized) { 179 (void)rmdir(dpath); 180 dpath_initialized = 0; 181 } 182 } 183 184 void 185 priv_vfs_stickyfile_file_cleanup(int asroot, int injail, struct test *test) 186 { 187 188 if (fpath_initialized) { 189 (void)unlink(fpath); 190 fpath_initialized = 0; 191 } 192 } 193