xref: /minix3/tests/lib/libc/sys/t_revoke.c (revision 11be35a165022172ed3cea20f2b5df0307540b0e)
1*11be35a1SLionel Sambuc /* $NetBSD: t_revoke.c,v 1.1 2011/07/07 06:57:54 jruoho Exp $ */
2*11be35a1SLionel Sambuc 
3*11be35a1SLionel Sambuc /*-
4*11be35a1SLionel Sambuc  * Copyright (c) 2011 The NetBSD Foundation, Inc.
5*11be35a1SLionel Sambuc  * All rights reserved.
6*11be35a1SLionel Sambuc  *
7*11be35a1SLionel Sambuc  * This code is derived from software contributed to The NetBSD Foundation
8*11be35a1SLionel Sambuc  * by Jukka Ruohonen.
9*11be35a1SLionel Sambuc  *
10*11be35a1SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
11*11be35a1SLionel Sambuc  * modification, are permitted provided that the following conditions
12*11be35a1SLionel Sambuc  * are met:
13*11be35a1SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
14*11be35a1SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
15*11be35a1SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16*11be35a1SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17*11be35a1SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18*11be35a1SLionel Sambuc  *
19*11be35a1SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20*11be35a1SLionel Sambuc  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21*11be35a1SLionel Sambuc  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22*11be35a1SLionel Sambuc  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23*11be35a1SLionel Sambuc  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24*11be35a1SLionel Sambuc  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25*11be35a1SLionel Sambuc  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26*11be35a1SLionel Sambuc  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27*11be35a1SLionel Sambuc  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28*11be35a1SLionel Sambuc  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29*11be35a1SLionel Sambuc  * POSSIBILITY OF SUCH DAMAGE.
30*11be35a1SLionel Sambuc  */
31*11be35a1SLionel Sambuc #include <sys/cdefs.h>
32*11be35a1SLionel Sambuc __RCSID("$NetBSD: t_revoke.c,v 1.1 2011/07/07 06:57:54 jruoho Exp $");
33*11be35a1SLionel Sambuc 
34*11be35a1SLionel Sambuc #include <sys/resource.h>
35*11be35a1SLionel Sambuc #include <sys/wait.h>
36*11be35a1SLionel Sambuc 
37*11be35a1SLionel Sambuc #include <atf-c.h>
38*11be35a1SLionel Sambuc #include <fcntl.h>
39*11be35a1SLionel Sambuc #include <errno.h>
40*11be35a1SLionel Sambuc #include <pwd.h>
41*11be35a1SLionel Sambuc #include <stdio.h>
42*11be35a1SLionel Sambuc #include <stdlib.h>
43*11be35a1SLionel Sambuc #include <string.h>
44*11be35a1SLionel Sambuc #include <unistd.h>
45*11be35a1SLionel Sambuc 
46*11be35a1SLionel Sambuc static const char path[] = "revoke";
47*11be35a1SLionel Sambuc 
48*11be35a1SLionel Sambuc ATF_TC_WITH_CLEANUP(revoke_basic);
ATF_TC_HEAD(revoke_basic,tc)49*11be35a1SLionel Sambuc ATF_TC_HEAD(revoke_basic, tc)
50*11be35a1SLionel Sambuc {
51*11be35a1SLionel Sambuc 	atf_tc_set_md_var(tc, "descr", "A basic test of revoke(2)");
52*11be35a1SLionel Sambuc }
53*11be35a1SLionel Sambuc 
ATF_TC_BODY(revoke_basic,tc)54*11be35a1SLionel Sambuc ATF_TC_BODY(revoke_basic, tc)
55*11be35a1SLionel Sambuc {
56*11be35a1SLionel Sambuc 	struct rlimit res;
57*11be35a1SLionel Sambuc 	char tmp[10];
58*11be35a1SLionel Sambuc 	size_t i, n;
59*11be35a1SLionel Sambuc 	int *buf;
60*11be35a1SLionel Sambuc 
61*11be35a1SLionel Sambuc 	(void)memset(&res, 0, sizeof(struct rlimit));
62*11be35a1SLionel Sambuc 	(void)getrlimit(RLIMIT_NOFILE, &res);
63*11be35a1SLionel Sambuc 
64*11be35a1SLionel Sambuc 	if ((n = res.rlim_cur / 10) == 0)
65*11be35a1SLionel Sambuc 		n = 10;
66*11be35a1SLionel Sambuc 
67*11be35a1SLionel Sambuc 	buf = calloc(n, sizeof(int));
68*11be35a1SLionel Sambuc 	ATF_REQUIRE(buf != NULL);
69*11be35a1SLionel Sambuc 
70*11be35a1SLionel Sambuc 	buf[0] = open(path, O_RDWR | O_CREAT, 0600);
71*11be35a1SLionel Sambuc 	ATF_REQUIRE(buf[0] >= 0);
72*11be35a1SLionel Sambuc 
73*11be35a1SLionel Sambuc 	for (i = 1; i < n; i++) {
74*11be35a1SLionel Sambuc 		buf[i] = open(path, O_RDWR);
75*11be35a1SLionel Sambuc 		ATF_REQUIRE(buf[i] >= 0);
76*11be35a1SLionel Sambuc 	}
77*11be35a1SLionel Sambuc 
78*11be35a1SLionel Sambuc 	ATF_REQUIRE(revoke(path) == 0);
79*11be35a1SLionel Sambuc 
80*11be35a1SLionel Sambuc 	for (i = 0; i < n; i++) {
81*11be35a1SLionel Sambuc 
82*11be35a1SLionel Sambuc 		ATF_REQUIRE(read(buf[i], tmp, sizeof(tmp)) == -1);
83*11be35a1SLionel Sambuc 
84*11be35a1SLionel Sambuc 		(void)close(buf[i]);
85*11be35a1SLionel Sambuc 	}
86*11be35a1SLionel Sambuc 
87*11be35a1SLionel Sambuc 	free(buf);
88*11be35a1SLionel Sambuc 
89*11be35a1SLionel Sambuc 	(void)unlink(path);
90*11be35a1SLionel Sambuc }
91*11be35a1SLionel Sambuc 
ATF_TC_CLEANUP(revoke_basic,tc)92*11be35a1SLionel Sambuc ATF_TC_CLEANUP(revoke_basic, tc)
93*11be35a1SLionel Sambuc {
94*11be35a1SLionel Sambuc 	(void)unlink(path);
95*11be35a1SLionel Sambuc }
96*11be35a1SLionel Sambuc 
97*11be35a1SLionel Sambuc ATF_TC(revoke_err);
ATF_TC_HEAD(revoke_err,tc)98*11be35a1SLionel Sambuc ATF_TC_HEAD(revoke_err, tc)
99*11be35a1SLionel Sambuc {
100*11be35a1SLionel Sambuc 	atf_tc_set_md_var(tc, "descr", "Test errors from revoke(2)");
101*11be35a1SLionel Sambuc 	atf_tc_set_md_var(tc, "require.user", "unprivileged");
102*11be35a1SLionel Sambuc }
103*11be35a1SLionel Sambuc 
ATF_TC_BODY(revoke_err,tc)104*11be35a1SLionel Sambuc ATF_TC_BODY(revoke_err, tc)
105*11be35a1SLionel Sambuc {
106*11be35a1SLionel Sambuc 	char buf[1024 + 1];	/* XXX: From the manual page... */
107*11be35a1SLionel Sambuc 
108*11be35a1SLionel Sambuc 	(void)memset(buf, 'x', sizeof(buf));
109*11be35a1SLionel Sambuc 
110*11be35a1SLionel Sambuc 	errno = 0;
111*11be35a1SLionel Sambuc 	ATF_REQUIRE_ERRNO(EFAULT, revoke((char *)-1) == -1);
112*11be35a1SLionel Sambuc 
113*11be35a1SLionel Sambuc 	errno = 0;
114*11be35a1SLionel Sambuc 	ATF_REQUIRE_ERRNO(ENAMETOOLONG, revoke(buf) == -1);
115*11be35a1SLionel Sambuc 
116*11be35a1SLionel Sambuc 	errno = 0;
117*11be35a1SLionel Sambuc 	ATF_REQUIRE_ERRNO(EPERM, revoke("/etc/passwd") == -1);
118*11be35a1SLionel Sambuc 
119*11be35a1SLionel Sambuc 	errno = 0;
120*11be35a1SLionel Sambuc 	ATF_REQUIRE_ERRNO(ENOENT, revoke("/etc/xxx/yyy") == -1);
121*11be35a1SLionel Sambuc }
122*11be35a1SLionel Sambuc 
123*11be35a1SLionel Sambuc ATF_TC_WITH_CLEANUP(revoke_perm);
ATF_TC_HEAD(revoke_perm,tc)124*11be35a1SLionel Sambuc ATF_TC_HEAD(revoke_perm, tc)
125*11be35a1SLionel Sambuc {
126*11be35a1SLionel Sambuc 	atf_tc_set_md_var(tc, "descr", "Test permissions revoke(2)");
127*11be35a1SLionel Sambuc 	atf_tc_set_md_var(tc, "require.user", "root");
128*11be35a1SLionel Sambuc }
129*11be35a1SLionel Sambuc 
ATF_TC_BODY(revoke_perm,tc)130*11be35a1SLionel Sambuc ATF_TC_BODY(revoke_perm, tc)
131*11be35a1SLionel Sambuc {
132*11be35a1SLionel Sambuc 	struct passwd *pw;
133*11be35a1SLionel Sambuc 	int fd, sta;
134*11be35a1SLionel Sambuc 	pid_t pid;
135*11be35a1SLionel Sambuc 
136*11be35a1SLionel Sambuc 	pw = getpwnam("nobody");
137*11be35a1SLionel Sambuc 	fd = open(path, O_RDWR | O_CREAT, 0600);
138*11be35a1SLionel Sambuc 
139*11be35a1SLionel Sambuc 	ATF_REQUIRE(fd >= 0);
140*11be35a1SLionel Sambuc 	ATF_REQUIRE(pw != NULL);
141*11be35a1SLionel Sambuc 	ATF_REQUIRE(revoke(path) == 0);
142*11be35a1SLionel Sambuc 
143*11be35a1SLionel Sambuc 	pid = fork();
144*11be35a1SLionel Sambuc 	ATF_REQUIRE(pid >= 0);
145*11be35a1SLionel Sambuc 
146*11be35a1SLionel Sambuc 	if (pid == 0) {
147*11be35a1SLionel Sambuc 
148*11be35a1SLionel Sambuc 		if (setuid(pw->pw_uid) != 0)
149*11be35a1SLionel Sambuc 			_exit(EXIT_FAILURE);
150*11be35a1SLionel Sambuc 
151*11be35a1SLionel Sambuc 		errno = 0;
152*11be35a1SLionel Sambuc 
153*11be35a1SLionel Sambuc 		if (revoke(path) == 0)
154*11be35a1SLionel Sambuc 			_exit(EXIT_FAILURE);
155*11be35a1SLionel Sambuc 
156*11be35a1SLionel Sambuc 		if (errno != EACCES)
157*11be35a1SLionel Sambuc 			_exit(EXIT_FAILURE);
158*11be35a1SLionel Sambuc 
159*11be35a1SLionel Sambuc 		if (close(fd) != 0)
160*11be35a1SLionel Sambuc 			_exit(EXIT_FAILURE);
161*11be35a1SLionel Sambuc 
162*11be35a1SLionel Sambuc 		_exit(EXIT_SUCCESS);
163*11be35a1SLionel Sambuc 	}
164*11be35a1SLionel Sambuc 
165*11be35a1SLionel Sambuc 	(void)wait(&sta);
166*11be35a1SLionel Sambuc 
167*11be35a1SLionel Sambuc 	if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS)
168*11be35a1SLionel Sambuc 		atf_tc_fail("revoke(2) did not obey permissions");
169*11be35a1SLionel Sambuc 
170*11be35a1SLionel Sambuc 	ATF_REQUIRE(unlink(path) == 0);
171*11be35a1SLionel Sambuc }
172*11be35a1SLionel Sambuc 
ATF_TC_CLEANUP(revoke_perm,tc)173*11be35a1SLionel Sambuc ATF_TC_CLEANUP(revoke_perm, tc)
174*11be35a1SLionel Sambuc {
175*11be35a1SLionel Sambuc 	(void)unlink(path);
176*11be35a1SLionel Sambuc }
177*11be35a1SLionel Sambuc 
ATF_TP_ADD_TCS(tp)178*11be35a1SLionel Sambuc ATF_TP_ADD_TCS(tp)
179*11be35a1SLionel Sambuc {
180*11be35a1SLionel Sambuc 
181*11be35a1SLionel Sambuc 	ATF_TP_ADD_TC(tp, revoke_basic);
182*11be35a1SLionel Sambuc 	ATF_TP_ADD_TC(tp, revoke_err);
183*11be35a1SLionel Sambuc 	ATF_TP_ADD_TC(tp, revoke_perm);
184*11be35a1SLionel Sambuc 
185*11be35a1SLionel Sambuc 	return atf_no_error();
186*11be35a1SLionel Sambuc }
187