diff options
Diffstat (limited to 'tools/regression/priv/priv_vfs_chroot.c')
-rw-r--r-- | tools/regression/priv/priv_vfs_chroot.c | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/tools/regression/priv/priv_vfs_chroot.c b/tools/regression/priv/priv_vfs_chroot.c new file mode 100644 index 0000000..06c36d4 --- /dev/null +++ b/tools/regression/priv/priv_vfs_chroot.c @@ -0,0 +1,63 @@ +/*- + * Copyright (c) 2006 nCircle Network Security, Inc. + * All rights reserved. + * + * This software was developed by Robert N. M. Watson for the TrustedBSD + * Project under contract to nCircle Network Security, Inc. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR, NCIRCLE NETWORK SECURITY, + * INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED + * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR + * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING + * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS + * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + * + * $FreeBSD$ + */ + +/* + * Test that chroot() requires privilege; try with, and without. Do a no-op + * chroot() to "/". + * + * XXXRW: Would also be good to check fchroot() permission, but that is not + * exposed via the BSD API. + */ + +#include <err.h> +#include <errno.h> +#include <unistd.h> + +#include "main.h" + +void +priv_vfs_chroot(void) +{ + int error; + + assert_root(); + + if (chroot("/") < 0) + err(-1, "chroot(\"/\") as root"); + + set_euid(UID_OTHER); + + error = chroot("/"); + if (error == 0) + errx(-1, "chroot(\"/\") succeeded as !root"); + if (errno != EPERM) + err(-1, "chroot(\"/\") wrong errno %d as !root", errno); +} |