xref: /netbsd-src/tests/kernel/t_proccwd.c (revision 173c420d5dcf1550dda870f481b203db5ccab4f1)
1*173c420dSkamil /*	$NetBSD: t_proccwd.c,v 1.2 2019/06/01 22:18:23 kamil Exp $	*/
2707a3080Skamil /*-
3707a3080Skamil  * Copyright (c) 2019 The NetBSD Foundation, Inc.
4707a3080Skamil  * All rights reserved.
5707a3080Skamil  *
6707a3080Skamil  * Redistribution and use in source and binary forms, with or without
7707a3080Skamil  * modification, are permitted provided that the following conditions
8707a3080Skamil  * are met:
9707a3080Skamil  * 1. Redistributions of source code must retain the above copyright
10707a3080Skamil  *    notice, this list of conditions and the following disclaimer.
11707a3080Skamil  * 2. Redistributions in binary form must reproduce the above copyright
12707a3080Skamil  *    notice, this list of conditions and the following disclaimer in the
13707a3080Skamil  *    documentation and/or other materials provided with the distribution.
14707a3080Skamil  *
15707a3080Skamil  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16707a3080Skamil  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17707a3080Skamil  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18707a3080Skamil  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19707a3080Skamil  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20707a3080Skamil  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21707a3080Skamil  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22707a3080Skamil  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23707a3080Skamil  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24707a3080Skamil  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25707a3080Skamil  * POSSIBILITY OF SUCH DAMAGE.
26707a3080Skamil  */
27707a3080Skamil 
28707a3080Skamil #include <sys/cdefs.h>
29707a3080Skamil __COPYRIGHT("@(#) Copyright (c) 2019\
30707a3080Skamil  The NetBSD Foundation, inc. All rights reserved.");
31*173c420dSkamil __RCSID("$NetBSD: t_proccwd.c,v 1.2 2019/06/01 22:18:23 kamil Exp $");
32707a3080Skamil 
33707a3080Skamil #include <sys/types.h>
34707a3080Skamil #include <sys/stat.h>
35707a3080Skamil #include <sys/sysctl.h>
36707a3080Skamil #include <sys/wait.h>
37707a3080Skamil 
38707a3080Skamil #include <errno.h>
39707a3080Skamil #include <stdio.h>
40707a3080Skamil #include <stdlib.h>
41707a3080Skamil #include <string.h>
42707a3080Skamil #include <err.h>
43707a3080Skamil 
44707a3080Skamil #include <atf-c.h>
45707a3080Skamil 
46707a3080Skamil static int
getproccwd(char * path,size_t * len,pid_t pid)47707a3080Skamil getproccwd(char *path, size_t *len, pid_t pid)
48707a3080Skamil {
49707a3080Skamil 	const int name[] = {
50707a3080Skamil 	    CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_CWD,
51707a3080Skamil 	};
52707a3080Skamil 
53707a3080Skamil      	return sysctl(name, __arraycount(name), path, len, NULL, 0);
54707a3080Skamil }
55707a3080Skamil 
56707a3080Skamil ATF_TC(prompt_pid);
ATF_TC_HEAD(prompt_pid,tc)57707a3080Skamil ATF_TC_HEAD(prompt_pid, tc)
58707a3080Skamil {
59707a3080Skamil 
60707a3080Skamil         atf_tc_set_md_var(tc, "descr",
61707a3080Skamil             "Prompt length of the current dir and assert that it is sane");
62707a3080Skamil }
63707a3080Skamil 
ATF_TC_BODY(prompt_pid,tc)64707a3080Skamil ATF_TC_BODY(prompt_pid, tc)
65707a3080Skamil {
66707a3080Skamil 	char buf[MAXPATHLEN];
67707a3080Skamil 	char cwdbuf[MAXPATHLEN];
68707a3080Skamil 	size_t len, prompted_len;
69707a3080Skamil 	size_t i;
70707a3080Skamil 
71707a3080Skamil 	pid_t t[] = {
72707a3080Skamil 		-1,
73707a3080Skamil 		getpid(),
74707a3080Skamil 		1 /* /sbin/init */
75707a3080Skamil 	};
76707a3080Skamil 
77707a3080Skamil 	for (i = 0; i < __arraycount(t); i++) {
78707a3080Skamil 		len = 0;
79707a3080Skamil 		ATF_REQUIRE_EQ(getproccwd(NULL, &len, t[i]), 0);
80707a3080Skamil 
81707a3080Skamil 		prompted_len = len;
82707a3080Skamil 		ATF_REQUIRE_EQ(getproccwd(buf, &len, t[i]), 0);
83707a3080Skamil 
84707a3080Skamil 		ATF_REQUIRE_EQ(strlen(buf) + 1, prompted_len);
85707a3080Skamil 		ATF_REQUIRE(strlen(buf) > 0);
86707a3080Skamil 
87*173c420dSkamil 		if (t[i] == -1 || t[i] == getpid()) {
88707a3080Skamil 			getcwd(cwdbuf, MAXPATHLEN);
89707a3080Skamil 			ATF_REQUIRE_EQ(strcmp(buf, cwdbuf), 0);
90707a3080Skamil 			ATF_REQUIRE(strlen(buf) > strlen("/"));
91707a3080Skamil 		} else if (t[i] == 1) {
92707a3080Skamil 			ATF_REQUIRE_EQ(strcmp(buf, "/"), 0);
93707a3080Skamil 		}
94707a3080Skamil 	}
95707a3080Skamil }
96707a3080Skamil 
97707a3080Skamil ATF_TC(chroot);
ATF_TC_HEAD(chroot,tc)98707a3080Skamil ATF_TC_HEAD(chroot, tc)
99707a3080Skamil {
100707a3080Skamil 
101707a3080Skamil         atf_tc_set_md_var(tc, "descr",
102707a3080Skamil             "prompt length of the current dir and assert that it is right");
103707a3080Skamil 
104707a3080Skamil 	atf_tc_set_md_var(tc, "require.user", "root");
105707a3080Skamil }
106707a3080Skamil 
107707a3080Skamil #define ASSERT(x) do { if (!(x)) _exit(EXIT_FAILURE); } while (0)
108707a3080Skamil 
ATF_TC_BODY(chroot,tc)109707a3080Skamil ATF_TC_BODY(chroot, tc)
110707a3080Skamil {
111707a3080Skamil 	char buf[MAXPATHLEN];
112707a3080Skamil 	struct stat root_dir;
113707a3080Skamil 	struct stat cur_dir;
114707a3080Skamil 	size_t len;
115707a3080Skamil 	pid_t child, wpid;
116707a3080Skamil 	int status;
117707a3080Skamil 	int rv;
118707a3080Skamil 
119707a3080Skamil 	const pid_t pid_one = 1; /* /sbin/init */
120707a3080Skamil 
121707a3080Skamil 	ATF_REQUIRE(getcwd(buf, sizeof(buf)) != NULL);
122707a3080Skamil 
123707a3080Skamil 	ATF_REQUIRE_EQ(stat(buf, &cur_dir), 0);
124707a3080Skamil 	ATF_REQUIRE_EQ(stat("/", &root_dir), 0);
125707a3080Skamil 
126707a3080Skamil 	if (cur_dir.st_ino == root_dir.st_ino)
127707a3080Skamil 		atf_tc_skip("This test does not work in /");
128707a3080Skamil 
129707a3080Skamil 	child = atf_utils_fork();
130707a3080Skamil 	if (child == 0) {
131707a3080Skamil 		len = 0;
132707a3080Skamil 
133707a3080Skamil 		ASSERT(chroot(buf) == 0);
134707a3080Skamil 
135707a3080Skamil 		errno = 0;
136*173c420dSkamil 		rv = getproccwd(buf, &len, pid_one);
137707a3080Skamil 		ASSERT(rv == -1);
138707a3080Skamil 		ASSERT(errno == ENOENT);
139707a3080Skamil 
140707a3080Skamil 		_exit(EXIT_SUCCESS);
141707a3080Skamil 	}
142707a3080Skamil 	wpid = waitpid(child, &status, WEXITED);
143707a3080Skamil 	ATF_REQUIRE_EQ(wpid, child);
144707a3080Skamil 	ATF_REQUIRE_EQ(WEXITSTATUS(status), EXIT_SUCCESS);
145707a3080Skamil }
146707a3080Skamil 
ATF_TP_ADD_TCS(tp)147707a3080Skamil ATF_TP_ADD_TCS(tp)
148707a3080Skamil {
149707a3080Skamil 
150707a3080Skamil 	ATF_TP_ADD_TC(tp, prompt_pid);
151707a3080Skamil 	ATF_TP_ADD_TC(tp, chroot);
152707a3080Skamil 
153707a3080Skamil 	return atf_no_error();
154707a3080Skamil }
155