Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 | /* * Copyright (c) 2004 Apple Computer, Inc. All rights reserved. * * @APPLE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this * file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_LICENSE_HEADER_END@ */ #include <sys/types.h> #include <sys/acl.h> #include <errno.h> #include <sys/syscall.h> #include <unistd.h> #include <fcntl.h> #include <string.h> static int _mkfilex_np(int opcode, const char *path, int flags, filesec_t fsec) { uid_t owner = KAUTH_UID_NONE; gid_t group = KAUTH_GID_NONE; mode_t mode = 0; size_t size = 0; int fsacl_used = 0; struct kauth_filesec *fsacl = NULL; struct kauth_filesec static_filesec; /* handle extended security data */ if (fsec != NULL) { /* fetch basic parameters */ if ((filesec_get_property(fsec, FILESEC_OWNER, &owner) != 0) && (errno != ENOENT)) return(-1); if ((filesec_get_property(fsec, FILESEC_GROUP, &group) != 0) && (errno != ENOENT)) return(-1); if ((filesec_get_property(fsec, FILESEC_MODE, &mode) != 0) && (errno != ENOENT)) return(-1); /* try to fetch the ACL */ if (((filesec_get_property(fsec, FILESEC_ACL_RAW, &fsacl) != 0) || (filesec_get_property(fsec, FILESEC_ACL_ALLOCSIZE, &size) != 0)) && (errno != ENOENT)) return(-1); /* only valid for chmod */ if (fsacl == _FILESEC_REMOVE_ACL) { errno = EINVAL; return(-1); } /* no ACL, use local filesec */ if (fsacl == NULL) { bzero(&static_filesec, sizeof(static_filesec)); fsacl = &static_filesec; fsacl->fsec_magic = KAUTH_FILESEC_MAGIC; fsacl->fsec_entrycount = KAUTH_FILESEC_NOACL; } else { fsacl_used = 1; } /* grab the owner and group UUID if present */ if (filesec_get_property(fsec, FILESEC_UUID, &fsacl->fsec_owner) != 0) { if (errno != ENOENT) return(-1); bzero(&fsacl->fsec_owner, sizeof(fsacl->fsec_owner)); } else { fsacl_used = 1; } if (filesec_get_property(fsec, FILESEC_GRPUUID, &fsacl->fsec_group) != 0) { if (errno != ENOENT) return(-1); bzero(&fsacl->fsec_group, sizeof(fsacl->fsec_group)); } else { fsacl_used = 1; } /* after all this, if we didn't find anything that needs it, don't pass it in */ if (!fsacl_used) fsacl = NULL; } if (opcode == SYS_open_extended) { return(syscall(opcode, path, flags, owner, group, mode, fsacl)); } else { return(syscall(opcode, path, owner, group, mode, fsacl)); } } int openx_np(const char *path, int flags, filesec_t fsec) { /* optimise for the simple case */ if (!(flags & O_CREAT) || (fsec == NULL)) return(open(path, flags)); return(_mkfilex_np(SYS_open_extended, path, flags, fsec)); } int mkfifox_np(const char *path, filesec_t fsec) { return(_mkfilex_np(SYS_mkfifo_extended, path, 0, fsec)); } int mkdirx_np(const char *path, filesec_t fsec) { return(_mkfilex_np(SYS_mkdir_extended, path, 0, fsec)); } |