bhyve: avoid applying capsicum capabilities to file that was not opened
When using -l option targeting file that can't be opened (ie. nmdm module is not loaded and /dev/nmdm* is specified) bhyve tries to apply capsicum capabilities to a file that was not opened. Enclose that code in an if statement and only run it on correctly opened descriptor also providing meaningful message in case of an error. Submitted by: Pawel Biernacki <pawel.biernacki@gmail.com> Reviewed by: grehan, emaste Sponsoied by: Mysterious Code Ltd. Differential Revision: D12985
This commit is contained in:
parent
baaa6ec7ed
commit
569aaa3b97
@ -678,20 +678,24 @@ uart_set_backend(struct uart_softc *sc, const char *opts)
|
||||
if (retval == 0)
|
||||
retval = fcntl(sc->tty.fd, F_SETFL, O_NONBLOCK);
|
||||
|
||||
if (retval == 0) {
|
||||
#ifndef WITHOUT_CAPSICUM
|
||||
cap_rights_init(&rights, CAP_EVENT, CAP_IOCTL, CAP_READ, CAP_WRITE);
|
||||
if (cap_rights_limit(sc->tty.fd, &rights) == -1 && errno != ENOSYS)
|
||||
errx(EX_OSERR, "Unable to apply rights for sandbox");
|
||||
if (cap_ioctls_limit(sc->tty.fd, cmds, nitems(cmds)) == -1 && errno != ENOSYS)
|
||||
errx(EX_OSERR, "Unable to apply rights for sandbox");
|
||||
if (!uart_stdio) {
|
||||
if (caph_limit_stdin() == -1 && errno != ENOSYS)
|
||||
cap_rights_init(&rights, CAP_EVENT, CAP_IOCTL, CAP_READ,
|
||||
CAP_WRITE);
|
||||
if (cap_rights_limit(sc->tty.fd, &rights) == -1 &&
|
||||
errno != ENOSYS)
|
||||
errx(EX_OSERR, "Unable to apply rights for sandbox");
|
||||
}
|
||||
if (cap_ioctls_limit(sc->tty.fd, cmds, nitems(cmds)) == -1 &&
|
||||
errno != ENOSYS)
|
||||
errx(EX_OSERR, "Unable to apply rights for sandbox");
|
||||
if (!uart_stdio) {
|
||||
if (caph_limit_stdin() == -1 && errno != ENOSYS)
|
||||
errx(EX_OSERR,
|
||||
"Unable to apply rights for sandbox");
|
||||
}
|
||||
#endif
|
||||
|
||||
if (retval == 0)
|
||||
uart_opentty(sc);
|
||||
}
|
||||
|
||||
return (retval);
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user