1 /*- 2 * Copyright (c) 2018 Aniket Pandey 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 1. Redistributions of source code must retain the above copyright 8 * notice, this list of conditions and the following disclaimer. 9 * 2. Redistributions in binary form must reproduce the above copyright 10 * notice, this list of conditions and the following disclaimer in the 11 * documentation and/or other materials provided with the distribution. 12 * 13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 14 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 16 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 17 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 18 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 19 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * SUCH DAMAGE. 24 * 25 * $FreeBSD$ 26 */ 27 28 #include <sys/param.h> 29 #include <sys/mount.h> 30 #include <sys/time.h> 31 32 #include <atf-c.h> 33 #include <fcntl.h> 34 #include <unistd.h> 35 36 #include "utils.h" 37 38 static pid_t pid; 39 static int filedesc; 40 static mode_t mode = 0777; 41 static struct pollfd fds[1]; 42 static char adregex[80]; 43 static const char *auclass = "ad"; 44 static const char *path = "fileforaudit"; 45 46 47 ATF_TC_WITH_CLEANUP(settimeofday_success); 48 ATF_TC_HEAD(settimeofday_success, tc) 49 { 50 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 51 "settimeofday(2) call"); 52 } 53 54 ATF_TC_BODY(settimeofday_success, tc) 55 { 56 pid = getpid(); 57 snprintf(adregex, sizeof(adregex), "settimeofday.*%d.*success", pid); 58 59 struct timeval tp; 60 struct timezone tzp; 61 ATF_REQUIRE_EQ(0, gettimeofday(&tp, &tzp)); 62 63 FILE *pipefd = setup(fds, auclass); 64 /* Setting the same time as obtained by gettimeofday(2) */ 65 ATF_REQUIRE_EQ(0, settimeofday(&tp, &tzp)); 66 check_audit(fds, adregex, pipefd); 67 } 68 69 ATF_TC_CLEANUP(settimeofday_success, tc) 70 { 71 cleanup(); 72 } 73 74 75 ATF_TC_WITH_CLEANUP(settimeofday_failure); 76 ATF_TC_HEAD(settimeofday_failure, tc) 77 { 78 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 79 "settimeofday(2) call"); 80 } 81 82 ATF_TC_BODY(settimeofday_failure, tc) 83 { 84 pid = getpid(); 85 snprintf(adregex, sizeof(adregex), "settimeofday.*%d.*failure", pid); 86 87 struct timeval tp; 88 struct timezone tzp; 89 ATF_REQUIRE_EQ(0, gettimeofday(&tp, &tzp)); 90 91 FILE *pipefd = setup(fds, auclass); 92 tp.tv_sec = -1; 93 /* Failure reason: Invalid value for tp.tv_sec; */ 94 ATF_REQUIRE_EQ(-1, settimeofday(&tp, &tzp)); 95 check_audit(fds, adregex, pipefd); 96 } 97 98 ATF_TC_CLEANUP(settimeofday_failure, tc) 99 { 100 cleanup(); 101 } 102 103 104 ATF_TC_WITH_CLEANUP(adjtime_success); 105 ATF_TC_HEAD(adjtime_success, tc) 106 { 107 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 108 "adjtime(2) call"); 109 } 110 111 ATF_TC_BODY(adjtime_success, tc) 112 { 113 pid = getpid(); 114 snprintf(adregex, sizeof(adregex), "adjtime.*%d.*return,success", pid); 115 116 FILE *pipefd = setup(fds, auclass); 117 /* We don't want to change the system time, hence NULL */ 118 ATF_REQUIRE_EQ(0, adjtime(NULL,NULL)); 119 check_audit(fds, adregex, pipefd); 120 } 121 122 ATF_TC_CLEANUP(adjtime_success, tc) 123 { 124 cleanup(); 125 } 126 127 128 ATF_TC_WITH_CLEANUP(adjtime_failure); 129 ATF_TC_HEAD(adjtime_failure, tc) 130 { 131 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 132 "adjtime(2) call"); 133 } 134 135 ATF_TC_BODY(adjtime_failure, tc) 136 { 137 pid = getpid(); 138 snprintf(adregex, sizeof(adregex), "adjtime.*%d.*return,failure", pid); 139 140 FILE *pipefd = setup(fds, auclass); 141 ATF_REQUIRE_EQ(-1, adjtime((struct timeval *)(-1), NULL)); 142 check_audit(fds, adregex, pipefd); 143 } 144 145 ATF_TC_CLEANUP(adjtime_failure, tc) 146 { 147 cleanup(); 148 } 149 150 151 152 ATF_TC_WITH_CLEANUP(nfs_getfh_success); 153 ATF_TC_HEAD(nfs_getfh_success, tc) 154 { 155 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 156 "getfh(2) call"); 157 } 158 159 ATF_TC_BODY(nfs_getfh_success, tc) 160 { 161 fhandle_t fhp; 162 pid = getpid(); 163 snprintf(adregex, sizeof(adregex), "nfs_getfh.*%d.*ret.*success", pid); 164 165 /* File needs to exist to call getfh(2) */ 166 ATF_REQUIRE(filedesc = open(path, O_CREAT, mode) != -1); 167 FILE *pipefd = setup(fds, auclass); 168 ATF_REQUIRE_EQ(0, getfh(path, &fhp)); 169 check_audit(fds, adregex, pipefd); 170 close(filedesc); 171 } 172 173 ATF_TC_CLEANUP(nfs_getfh_success, tc) 174 { 175 cleanup(); 176 } 177 178 179 ATF_TC_WITH_CLEANUP(nfs_getfh_failure); 180 ATF_TC_HEAD(nfs_getfh_failure, tc) 181 { 182 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 183 "getfh(2) call"); 184 } 185 186 ATF_TC_BODY(nfs_getfh_failure, tc) 187 { 188 pid = getpid(); 189 snprintf(adregex, sizeof(adregex), "nfs_getfh.*%d.*ret.*failure", pid); 190 191 FILE *pipefd = setup(fds, auclass); 192 /* Failure reason: file does not exist */ 193 ATF_REQUIRE_EQ(-1, getfh(path, NULL)); 194 check_audit(fds, adregex, pipefd); 195 } 196 197 ATF_TC_CLEANUP(nfs_getfh_failure, tc) 198 { 199 cleanup(); 200 } 201 202 203 ATF_TC_WITH_CLEANUP(getauid_success); 204 ATF_TC_HEAD(getauid_success, tc) 205 { 206 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 207 "getauid(2) call"); 208 } 209 210 ATF_TC_BODY(getauid_success, tc) 211 { 212 au_id_t auid; 213 pid = getpid(); 214 snprintf(adregex, sizeof(adregex), "getauid.*%d.*return,success", pid); 215 216 FILE *pipefd = setup(fds, auclass); 217 ATF_REQUIRE_EQ(0, getauid(&auid)); 218 check_audit(fds, adregex, pipefd); 219 } 220 221 ATF_TC_CLEANUP(getauid_success, tc) 222 { 223 cleanup(); 224 } 225 226 227 ATF_TC_WITH_CLEANUP(getauid_failure); 228 ATF_TC_HEAD(getauid_failure, tc) 229 { 230 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 231 "getauid(2) call"); 232 } 233 234 ATF_TC_BODY(getauid_failure, tc) 235 { 236 pid = getpid(); 237 snprintf(adregex, sizeof(adregex), "getauid.*%d.*return,failure", pid); 238 239 FILE *pipefd = setup(fds, auclass); 240 /* Failure reason: Bad address */ 241 ATF_REQUIRE_EQ(-1, getauid(NULL)); 242 check_audit(fds, adregex, pipefd); 243 } 244 245 ATF_TC_CLEANUP(getauid_failure, tc) 246 { 247 cleanup(); 248 } 249 250 251 ATF_TC_WITH_CLEANUP(setauid_success); 252 ATF_TC_HEAD(setauid_success, tc) 253 { 254 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 255 "setauid(2) call"); 256 } 257 258 ATF_TC_BODY(setauid_success, tc) 259 { 260 au_id_t auid; 261 pid = getpid(); 262 snprintf(adregex, sizeof(adregex), "setauid.*%d.*return,success", pid); 263 ATF_REQUIRE_EQ(0, getauid(&auid)); 264 265 FILE *pipefd = setup(fds, auclass); 266 ATF_REQUIRE_EQ(0, setauid(&auid)); 267 check_audit(fds, adregex, pipefd); 268 } 269 270 ATF_TC_CLEANUP(setauid_success, tc) 271 { 272 cleanup(); 273 } 274 275 276 ATF_TC_WITH_CLEANUP(setauid_failure); 277 ATF_TC_HEAD(setauid_failure, tc) 278 { 279 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 280 "setauid(2) call"); 281 } 282 283 ATF_TC_BODY(setauid_failure, tc) 284 { 285 pid = getpid(); 286 snprintf(adregex, sizeof(adregex), "setauid.*%d.*return,failure", pid); 287 288 FILE *pipefd = setup(fds, auclass); 289 /* Failure reason: Bad address */ 290 ATF_REQUIRE_EQ(-1, setauid(NULL)); 291 check_audit(fds, adregex, pipefd); 292 } 293 294 ATF_TC_CLEANUP(setauid_failure, tc) 295 { 296 cleanup(); 297 } 298 299 300 ATF_TC_WITH_CLEANUP(getaudit_success); 301 ATF_TC_HEAD(getaudit_success, tc) 302 { 303 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 304 "getaudit(2) call"); 305 } 306 307 ATF_TC_BODY(getaudit_success, tc) 308 { 309 pid = getpid(); 310 auditinfo_t auditinfo; 311 snprintf(adregex, sizeof(adregex), "getaudit.*%d.*return,success", pid); 312 313 FILE *pipefd = setup(fds, auclass); 314 ATF_REQUIRE_EQ(0, getaudit(&auditinfo)); 315 check_audit(fds, adregex, pipefd); 316 } 317 318 ATF_TC_CLEANUP(getaudit_success, tc) 319 { 320 cleanup(); 321 } 322 323 324 ATF_TC_WITH_CLEANUP(getaudit_failure); 325 ATF_TC_HEAD(getaudit_failure, tc) 326 { 327 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 328 "getaudit(2) call"); 329 } 330 331 ATF_TC_BODY(getaudit_failure, tc) 332 { 333 pid = getpid(); 334 snprintf(adregex, sizeof(adregex), "getaudit.*%d.*return,failure", pid); 335 336 FILE *pipefd = setup(fds, auclass); 337 /* Failure reason: Bad address */ 338 ATF_REQUIRE_EQ(-1, getaudit(NULL)); 339 check_audit(fds, adregex, pipefd); 340 } 341 342 ATF_TC_CLEANUP(getaudit_failure, tc) 343 { 344 cleanup(); 345 } 346 347 348 ATF_TC_WITH_CLEANUP(setaudit_success); 349 ATF_TC_HEAD(setaudit_success, tc) 350 { 351 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 352 "setaudit(2) call"); 353 } 354 355 ATF_TC_BODY(setaudit_success, tc) 356 { 357 pid = getpid(); 358 auditinfo_t auditinfo; 359 snprintf(adregex, sizeof(adregex), "setaudit.*%d.*return,success", pid); 360 ATF_REQUIRE_EQ(0, getaudit(&auditinfo)); 361 362 FILE *pipefd = setup(fds, auclass); 363 ATF_REQUIRE_EQ(0, setaudit(&auditinfo)); 364 check_audit(fds, adregex, pipefd); 365 } 366 367 ATF_TC_CLEANUP(setaudit_success, tc) 368 { 369 cleanup(); 370 } 371 372 373 ATF_TC_WITH_CLEANUP(setaudit_failure); 374 ATF_TC_HEAD(setaudit_failure, tc) 375 { 376 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 377 "setaudit(2) call"); 378 } 379 380 ATF_TC_BODY(setaudit_failure, tc) 381 { 382 pid = getpid(); 383 snprintf(adregex, sizeof(adregex), "setaudit.*%d.*return,failure", pid); 384 385 FILE *pipefd = setup(fds, auclass); 386 /* Failure reason: Bad address */ 387 ATF_REQUIRE_EQ(-1, setaudit(NULL)); 388 check_audit(fds, adregex, pipefd); 389 } 390 391 ATF_TC_CLEANUP(setaudit_failure, tc) 392 { 393 cleanup(); 394 } 395 396 397 ATF_TC_WITH_CLEANUP(getaudit_addr_success); 398 ATF_TC_HEAD(getaudit_addr_success, tc) 399 { 400 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 401 "getaudit_addr(2) call"); 402 } 403 404 ATF_TC_BODY(getaudit_addr_success, tc) 405 { 406 pid = getpid(); 407 auditinfo_addr_t auditinfo; 408 snprintf(adregex, sizeof(adregex), 409 "getaudit_addr.*%d.*return,success", pid); 410 411 FILE *pipefd = setup(fds, auclass); 412 ATF_REQUIRE_EQ(0, getaudit_addr(&auditinfo, sizeof(auditinfo))); 413 check_audit(fds, adregex, pipefd); 414 } 415 416 ATF_TC_CLEANUP(getaudit_addr_success, tc) 417 { 418 cleanup(); 419 } 420 421 422 ATF_TC_WITH_CLEANUP(getaudit_addr_failure); 423 ATF_TC_HEAD(getaudit_addr_failure, tc) 424 { 425 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 426 "getaudit_addr(2) call"); 427 } 428 429 ATF_TC_BODY(getaudit_addr_failure, tc) 430 { 431 pid = getpid(); 432 snprintf(adregex, sizeof(adregex), 433 "getaudit_addr.*%d.*return,failure", pid); 434 435 FILE *pipefd = setup(fds, auclass); 436 /* Failure reason: Bad address */ 437 ATF_REQUIRE_EQ(-1, getaudit_addr(NULL, 0)); 438 check_audit(fds, adregex, pipefd); 439 } 440 441 ATF_TC_CLEANUP(getaudit_addr_failure, tc) 442 { 443 cleanup(); 444 } 445 446 447 ATF_TC_WITH_CLEANUP(setaudit_addr_success); 448 ATF_TC_HEAD(setaudit_addr_success, tc) 449 { 450 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful " 451 "setaudit_addr(2) call"); 452 } 453 454 ATF_TC_BODY(setaudit_addr_success, tc) 455 { 456 pid = getpid(); 457 auditinfo_addr_t auditinfo; 458 snprintf(adregex, sizeof(adregex), 459 "setaudit_addr.*%d.*return,success", pid); 460 461 ATF_REQUIRE_EQ(0, getaudit_addr(&auditinfo, sizeof(auditinfo))); 462 FILE *pipefd = setup(fds, auclass); 463 ATF_REQUIRE_EQ(0, setaudit_addr(&auditinfo, sizeof(auditinfo))); 464 check_audit(fds, adregex, pipefd); 465 } 466 467 ATF_TC_CLEANUP(setaudit_addr_success, tc) 468 { 469 cleanup(); 470 } 471 472 473 ATF_TC_WITH_CLEANUP(setaudit_addr_failure); 474 ATF_TC_HEAD(setaudit_addr_failure, tc) 475 { 476 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful " 477 "setaudit_addr(2) call"); 478 } 479 480 ATF_TC_BODY(setaudit_addr_failure, tc) 481 { 482 pid = getpid(); 483 snprintf(adregex, sizeof(adregex), 484 "setaudit_addr.*%d.*return,failure", pid); 485 486 FILE *pipefd = setup(fds, auclass); 487 /* Failure reason: Bad address */ 488 ATF_REQUIRE_EQ(-1, setaudit_addr(NULL, 0)); 489 check_audit(fds, adregex, pipefd); 490 } 491 492 ATF_TC_CLEANUP(setaudit_addr_failure, tc) 493 { 494 cleanup(); 495 } 496 497 498 ATF_TP_ADD_TCS(tp) 499 { 500 ATF_TP_ADD_TC(tp, settimeofday_success); 501 ATF_TP_ADD_TC(tp, settimeofday_failure); 502 ATF_TP_ADD_TC(tp, adjtime_success); 503 ATF_TP_ADD_TC(tp, adjtime_failure); 504 505 ATF_TP_ADD_TC(tp, nfs_getfh_success); 506 ATF_TP_ADD_TC(tp, nfs_getfh_failure); 507 508 ATF_TP_ADD_TC(tp, getauid_success); 509 ATF_TP_ADD_TC(tp, getauid_failure); 510 ATF_TP_ADD_TC(tp, setauid_success); 511 ATF_TP_ADD_TC(tp, setauid_failure); 512 513 ATF_TP_ADD_TC(tp, getaudit_success); 514 ATF_TP_ADD_TC(tp, getaudit_failure); 515 ATF_TP_ADD_TC(tp, setaudit_success); 516 ATF_TP_ADD_TC(tp, setaudit_failure); 517 518 ATF_TP_ADD_TC(tp, getaudit_addr_success); 519 ATF_TP_ADD_TC(tp, getaudit_addr_failure); 520 ATF_TP_ADD_TC(tp, setaudit_addr_success); 521 ATF_TP_ADD_TC(tp, setaudit_addr_failure); 522 523 return (atf_no_error()); 524 } 525