1*173c420dSkamil /* $NetBSD: t_proccwd.c,v 1.2 2019/06/01 22:18:23 kamil Exp $ */
2707a3080Skamil /*-
3707a3080Skamil * Copyright (c) 2019 The NetBSD Foundation, Inc.
4707a3080Skamil * All rights reserved.
5707a3080Skamil *
6707a3080Skamil * Redistribution and use in source and binary forms, with or without
7707a3080Skamil * modification, are permitted provided that the following conditions
8707a3080Skamil * are met:
9707a3080Skamil * 1. Redistributions of source code must retain the above copyright
10707a3080Skamil * notice, this list of conditions and the following disclaimer.
11707a3080Skamil * 2. Redistributions in binary form must reproduce the above copyright
12707a3080Skamil * notice, this list of conditions and the following disclaimer in the
13707a3080Skamil * documentation and/or other materials provided with the distribution.
14707a3080Skamil *
15707a3080Skamil * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16707a3080Skamil * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17707a3080Skamil * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18707a3080Skamil * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19707a3080Skamil * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20707a3080Skamil * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21707a3080Skamil * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22707a3080Skamil * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23707a3080Skamil * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24707a3080Skamil * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25707a3080Skamil * POSSIBILITY OF SUCH DAMAGE.
26707a3080Skamil */
27707a3080Skamil
28707a3080Skamil #include <sys/cdefs.h>
29707a3080Skamil __COPYRIGHT("@(#) Copyright (c) 2019\
30707a3080Skamil The NetBSD Foundation, inc. All rights reserved.");
31*173c420dSkamil __RCSID("$NetBSD: t_proccwd.c,v 1.2 2019/06/01 22:18:23 kamil Exp $");
32707a3080Skamil
33707a3080Skamil #include <sys/types.h>
34707a3080Skamil #include <sys/stat.h>
35707a3080Skamil #include <sys/sysctl.h>
36707a3080Skamil #include <sys/wait.h>
37707a3080Skamil
38707a3080Skamil #include <errno.h>
39707a3080Skamil #include <stdio.h>
40707a3080Skamil #include <stdlib.h>
41707a3080Skamil #include <string.h>
42707a3080Skamil #include <err.h>
43707a3080Skamil
44707a3080Skamil #include <atf-c.h>
45707a3080Skamil
46707a3080Skamil static int
getproccwd(char * path,size_t * len,pid_t pid)47707a3080Skamil getproccwd(char *path, size_t *len, pid_t pid)
48707a3080Skamil {
49707a3080Skamil const int name[] = {
50707a3080Skamil CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_CWD,
51707a3080Skamil };
52707a3080Skamil
53707a3080Skamil return sysctl(name, __arraycount(name), path, len, NULL, 0);
54707a3080Skamil }
55707a3080Skamil
56707a3080Skamil ATF_TC(prompt_pid);
ATF_TC_HEAD(prompt_pid,tc)57707a3080Skamil ATF_TC_HEAD(prompt_pid, tc)
58707a3080Skamil {
59707a3080Skamil
60707a3080Skamil atf_tc_set_md_var(tc, "descr",
61707a3080Skamil "Prompt length of the current dir and assert that it is sane");
62707a3080Skamil }
63707a3080Skamil
ATF_TC_BODY(prompt_pid,tc)64707a3080Skamil ATF_TC_BODY(prompt_pid, tc)
65707a3080Skamil {
66707a3080Skamil char buf[MAXPATHLEN];
67707a3080Skamil char cwdbuf[MAXPATHLEN];
68707a3080Skamil size_t len, prompted_len;
69707a3080Skamil size_t i;
70707a3080Skamil
71707a3080Skamil pid_t t[] = {
72707a3080Skamil -1,
73707a3080Skamil getpid(),
74707a3080Skamil 1 /* /sbin/init */
75707a3080Skamil };
76707a3080Skamil
77707a3080Skamil for (i = 0; i < __arraycount(t); i++) {
78707a3080Skamil len = 0;
79707a3080Skamil ATF_REQUIRE_EQ(getproccwd(NULL, &len, t[i]), 0);
80707a3080Skamil
81707a3080Skamil prompted_len = len;
82707a3080Skamil ATF_REQUIRE_EQ(getproccwd(buf, &len, t[i]), 0);
83707a3080Skamil
84707a3080Skamil ATF_REQUIRE_EQ(strlen(buf) + 1, prompted_len);
85707a3080Skamil ATF_REQUIRE(strlen(buf) > 0);
86707a3080Skamil
87*173c420dSkamil if (t[i] == -1 || t[i] == getpid()) {
88707a3080Skamil getcwd(cwdbuf, MAXPATHLEN);
89707a3080Skamil ATF_REQUIRE_EQ(strcmp(buf, cwdbuf), 0);
90707a3080Skamil ATF_REQUIRE(strlen(buf) > strlen("/"));
91707a3080Skamil } else if (t[i] == 1) {
92707a3080Skamil ATF_REQUIRE_EQ(strcmp(buf, "/"), 0);
93707a3080Skamil }
94707a3080Skamil }
95707a3080Skamil }
96707a3080Skamil
97707a3080Skamil ATF_TC(chroot);
ATF_TC_HEAD(chroot,tc)98707a3080Skamil ATF_TC_HEAD(chroot, tc)
99707a3080Skamil {
100707a3080Skamil
101707a3080Skamil atf_tc_set_md_var(tc, "descr",
102707a3080Skamil "prompt length of the current dir and assert that it is right");
103707a3080Skamil
104707a3080Skamil atf_tc_set_md_var(tc, "require.user", "root");
105707a3080Skamil }
106707a3080Skamil
107707a3080Skamil #define ASSERT(x) do { if (!(x)) _exit(EXIT_FAILURE); } while (0)
108707a3080Skamil
ATF_TC_BODY(chroot,tc)109707a3080Skamil ATF_TC_BODY(chroot, tc)
110707a3080Skamil {
111707a3080Skamil char buf[MAXPATHLEN];
112707a3080Skamil struct stat root_dir;
113707a3080Skamil struct stat cur_dir;
114707a3080Skamil size_t len;
115707a3080Skamil pid_t child, wpid;
116707a3080Skamil int status;
117707a3080Skamil int rv;
118707a3080Skamil
119707a3080Skamil const pid_t pid_one = 1; /* /sbin/init */
120707a3080Skamil
121707a3080Skamil ATF_REQUIRE(getcwd(buf, sizeof(buf)) != NULL);
122707a3080Skamil
123707a3080Skamil ATF_REQUIRE_EQ(stat(buf, &cur_dir), 0);
124707a3080Skamil ATF_REQUIRE_EQ(stat("/", &root_dir), 0);
125707a3080Skamil
126707a3080Skamil if (cur_dir.st_ino == root_dir.st_ino)
127707a3080Skamil atf_tc_skip("This test does not work in /");
128707a3080Skamil
129707a3080Skamil child = atf_utils_fork();
130707a3080Skamil if (child == 0) {
131707a3080Skamil len = 0;
132707a3080Skamil
133707a3080Skamil ASSERT(chroot(buf) == 0);
134707a3080Skamil
135707a3080Skamil errno = 0;
136*173c420dSkamil rv = getproccwd(buf, &len, pid_one);
137707a3080Skamil ASSERT(rv == -1);
138707a3080Skamil ASSERT(errno == ENOENT);
139707a3080Skamil
140707a3080Skamil _exit(EXIT_SUCCESS);
141707a3080Skamil }
142707a3080Skamil wpid = waitpid(child, &status, WEXITED);
143707a3080Skamil ATF_REQUIRE_EQ(wpid, child);
144707a3080Skamil ATF_REQUIRE_EQ(WEXITSTATUS(status), EXIT_SUCCESS);
145707a3080Skamil }
146707a3080Skamil
ATF_TP_ADD_TCS(tp)147707a3080Skamil ATF_TP_ADD_TCS(tp)
148707a3080Skamil {
149707a3080Skamil
150707a3080Skamil ATF_TP_ADD_TC(tp, prompt_pid);
151707a3080Skamil ATF_TP_ADD_TC(tp, chroot);
152707a3080Skamil
153707a3080Skamil return atf_no_error();
154707a3080Skamil }
155