2 * Copyright (c) 2018 Aniket Pandey
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
14 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
16 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
17 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 #include <sys/param.h>
29 #include <sys/mount.h>
30 #include <sys/reboot.h>
32 #include <sys/sysctl.h>
34 #include <sys/timespec.h>
35 #include <sys/timex.h>
37 #include <bsm/audit.h>
38 #include <bsm/audit_kevents.h>
39 #include <ufs/ufs/quota.h>
52 /* Default argument for handling ENOSYS in auditon(2) functions */
53 static int auditon_def = 0;
54 static mode_t mode = 0777;
55 static struct pollfd fds[1];
56 static char adregex[80];
57 static const char *auclass = "ad";
58 static const char *path = "fileforaudit";
59 static const char *successreg = "fileforaudit.*return,success";
62 ATF_TC_WITH_CLEANUP(settimeofday_success);
63 ATF_TC_HEAD(settimeofday_success, tc)
65 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
66 "settimeofday(2) call");
69 ATF_TC_BODY(settimeofday_success, tc)
72 snprintf(adregex, sizeof(adregex), "settimeofday.*%d.*success", pid);
76 ATF_REQUIRE_EQ(0, gettimeofday(&tp, &tzp));
78 FILE *pipefd = setup(fds, auclass);
79 /* Setting the same time as obtained by gettimeofday(2) */
80 ATF_REQUIRE_EQ(0, settimeofday(&tp, &tzp));
81 check_audit(fds, adregex, pipefd);
84 ATF_TC_CLEANUP(settimeofday_success, tc)
90 ATF_TC_WITH_CLEANUP(settimeofday_failure);
91 ATF_TC_HEAD(settimeofday_failure, tc)
93 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
94 "settimeofday(2) call");
97 ATF_TC_BODY(settimeofday_failure, tc)
100 snprintf(adregex, sizeof(adregex), "settimeofday.*%d.*failure", pid);
104 ATF_REQUIRE_EQ(0, gettimeofday(&tp, &tzp));
106 FILE *pipefd = setup(fds, auclass);
108 /* Failure reason: Invalid value for tp.tv_sec; */
109 ATF_REQUIRE_EQ(-1, settimeofday(&tp, &tzp));
110 check_audit(fds, adregex, pipefd);
113 ATF_TC_CLEANUP(settimeofday_failure, tc)
119 ATF_TC_WITH_CLEANUP(clock_settime_success);
120 ATF_TC_HEAD(clock_settime_success, tc)
122 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
123 "clock_settime(2) call");
126 ATF_TC_BODY(clock_settime_success, tc)
129 snprintf(adregex, sizeof(adregex), "clock_settime.*%d.*success", pid);
132 ATF_REQUIRE_EQ(0, clock_gettime(CLOCK_REALTIME, &tp));
134 FILE *pipefd = setup(fds, auclass);
135 /* Setting the same time as obtained by clock_gettime(2) */
136 ATF_REQUIRE_EQ(0, clock_settime(CLOCK_REALTIME, &tp));
137 check_audit(fds, adregex, pipefd);
140 ATF_TC_CLEANUP(clock_settime_success, tc)
146 ATF_TC_WITH_CLEANUP(clock_settime_failure);
147 ATF_TC_HEAD(clock_settime_failure, tc)
149 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
150 "clock_settime(2) call");
153 ATF_TC_BODY(clock_settime_failure, tc)
156 snprintf(adregex, sizeof(adregex), "clock_settime.*%d.*failure", pid);
159 ATF_REQUIRE_EQ(0, clock_gettime(CLOCK_MONOTONIC, &tp));
161 FILE *pipefd = setup(fds, auclass);
162 /* Failure reason: cannot use CLOCK_MONOTONIC to set the system time */
163 ATF_REQUIRE_EQ(-1, clock_settime(CLOCK_MONOTONIC, &tp));
164 check_audit(fds, adregex, pipefd);
167 ATF_TC_CLEANUP(clock_settime_failure, tc)
173 ATF_TC_WITH_CLEANUP(adjtime_success);
174 ATF_TC_HEAD(adjtime_success, tc)
176 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
180 ATF_TC_BODY(adjtime_success, tc)
183 snprintf(adregex, sizeof(adregex), "adjtime.*%d.*return,success", pid);
185 FILE *pipefd = setup(fds, auclass);
186 /* We don't want to change the system time, hence NULL */
187 ATF_REQUIRE_EQ(0, adjtime(NULL, NULL));
188 check_audit(fds, adregex, pipefd);
191 ATF_TC_CLEANUP(adjtime_success, tc)
197 ATF_TC_WITH_CLEANUP(adjtime_failure);
198 ATF_TC_HEAD(adjtime_failure, tc)
200 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
204 ATF_TC_BODY(adjtime_failure, tc)
207 snprintf(adregex, sizeof(adregex), "adjtime.*%d.*return,failure", pid);
209 FILE *pipefd = setup(fds, auclass);
210 ATF_REQUIRE_EQ(-1, adjtime((struct timeval *)(-1), NULL));
211 check_audit(fds, adregex, pipefd);
214 ATF_TC_CLEANUP(adjtime_failure, tc)
220 ATF_TC_WITH_CLEANUP(ntp_adjtime_success);
221 ATF_TC_HEAD(ntp_adjtime_success, tc)
223 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
224 "ntp_adjtime(2) call");
227 ATF_TC_BODY(ntp_adjtime_success, tc)
229 struct timex timebuff;
230 bzero(&timebuff, sizeof(timebuff));
233 snprintf(adregex, sizeof(adregex), "ntp_adjtime.*%d.*success", pid);
235 FILE *pipefd = setup(fds, auclass);
236 ATF_REQUIRE(ntp_adjtime(&timebuff) != -1);
237 check_audit(fds, adregex, pipefd);
240 ATF_TC_CLEANUP(ntp_adjtime_success, tc)
246 ATF_TC_WITH_CLEANUP(ntp_adjtime_failure);
247 ATF_TC_HEAD(ntp_adjtime_failure, tc)
249 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
250 "ntp_adjtime(2) call");
253 ATF_TC_BODY(ntp_adjtime_failure, tc)
256 snprintf(adregex, sizeof(adregex), "ntp_adjtime.*%d.*failure", pid);
258 FILE *pipefd = setup(fds, auclass);
259 ATF_REQUIRE_EQ(-1, ntp_adjtime(NULL));
260 check_audit(fds, adregex, pipefd);
263 ATF_TC_CLEANUP(ntp_adjtime_failure, tc)
269 ATF_TC_WITH_CLEANUP(nfs_getfh_success);
270 ATF_TC_HEAD(nfs_getfh_success, tc)
272 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
276 ATF_TC_BODY(nfs_getfh_success, tc)
280 snprintf(adregex, sizeof(adregex), "nfs_getfh.*%d.*ret.*success", pid);
282 /* File needs to exist to call getfh(2) */
283 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
284 FILE *pipefd = setup(fds, auclass);
285 ATF_REQUIRE_EQ(0, getfh(path, &fhp));
286 check_audit(fds, adregex, pipefd);
290 ATF_TC_CLEANUP(nfs_getfh_success, tc)
296 ATF_TC_WITH_CLEANUP(nfs_getfh_failure);
297 ATF_TC_HEAD(nfs_getfh_failure, tc)
299 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
303 ATF_TC_BODY(nfs_getfh_failure, tc)
306 snprintf(adregex, sizeof(adregex), "nfs_getfh.*%d.*ret.*failure", pid);
308 FILE *pipefd = setup(fds, auclass);
309 /* Failure reason: file does not exist */
310 ATF_REQUIRE_EQ(-1, getfh(path, NULL));
311 check_audit(fds, adregex, pipefd);
314 ATF_TC_CLEANUP(nfs_getfh_failure, tc)
320 ATF_TC_WITH_CLEANUP(auditctl_success);
321 ATF_TC_HEAD(auditctl_success, tc)
323 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
327 ATF_TC_BODY(auditctl_success, tc)
329 /* File needs to exist in order to call auditctl(2) */
330 ATF_REQUIRE((filedesc = open(path, O_CREAT | O_WRONLY, mode)) != -1);
331 FILE *pipefd = setup(fds, auclass);
332 ATF_REQUIRE_EQ(0, auditctl(path));
333 check_audit(fds, successreg, pipefd);
337 ATF_TC_CLEANUP(auditctl_success, tc)
340 * auditctl(2) disables audit log at /var/audit and initiates auditing
341 * at the configured path. To reset this, we need to stop and start the
342 * auditd(8) again. Here, we check if auditd(8) was running already
343 * before the test started. If so, we stop and start it again.
345 system("service auditd onestop > /dev/null 2>&1");
346 if (!atf_utils_file_exists("started_auditd"))
347 system("service auditd onestart > /dev/null 2>&1");
351 ATF_TC_WITH_CLEANUP(auditctl_failure);
352 ATF_TC_HEAD(auditctl_failure, tc)
354 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
358 ATF_TC_BODY(auditctl_failure, tc)
361 snprintf(adregex, sizeof(adregex), "auditctl.*%d.*return,failure", pid);
363 FILE *pipefd = setup(fds, auclass);
364 /* Failure reason: file does not exist */
365 ATF_REQUIRE_EQ(-1, auditctl(NULL));
366 check_audit(fds, adregex, pipefd);
369 ATF_TC_CLEANUP(auditctl_failure, tc)
375 ATF_TC_WITH_CLEANUP(acct_success);
376 ATF_TC_HEAD(acct_success, tc)
378 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
380 atf_tc_set_md_var(tc, "require.files",
381 "/etc/rc.d/accounting /etc/rc.d/auditd");
384 ATF_TC_BODY(acct_success, tc)
386 int acctinfo, filedesc2;
387 size_t len = sizeof(acctinfo);
388 const char *acctname = "kern.acct_configured";
389 ATF_REQUIRE_EQ(0, sysctlbyname(acctname, &acctinfo, &len, NULL, 0));
391 /* File needs to exist to start system accounting */
392 ATF_REQUIRE((filedesc = open(path, O_CREAT | O_RDWR, mode)) != -1);
395 * acctinfo = 0: System accounting was disabled
396 * acctinfo = 1: System accounting was enabled
399 ATF_REQUIRE((filedesc2 = open("acct_ok", O_CREAT, mode)) != -1);
404 snprintf(adregex, sizeof(adregex),
405 "acct.*%s.*%d.*return,success", path, pid);
408 * We temporarily switch the accounting record to a file at
409 * our own configured path in order to confirm acct(2)'s successful
410 * auditing. Then we set everything back to its original state.
412 FILE *pipefd = setup(fds, auclass);
413 ATF_REQUIRE_EQ(0, acct(path));
414 check_audit(fds, adregex, pipefd);
418 ATF_TC_CLEANUP(acct_success, tc)
420 /* Reset accounting configured path */
421 ATF_REQUIRE_EQ(0, system("service accounting onestop"));
422 if (atf_utils_file_exists("acct_ok")) {
423 ATF_REQUIRE_EQ(0, system("service accounting onestart"));
429 ATF_TC_WITH_CLEANUP(acct_failure);
430 ATF_TC_HEAD(acct_failure, tc)
432 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
436 ATF_TC_BODY(acct_failure, tc)
439 snprintf(adregex, sizeof(adregex), "acct.*%d.*return,failure", pid);
441 FILE *pipefd = setup(fds, auclass);
442 /* Failure reason: File does not exist */
443 ATF_REQUIRE_EQ(-1, acct(path));
444 check_audit(fds, adregex, pipefd);
447 ATF_TC_CLEANUP(acct_failure, tc)
453 ATF_TC_WITH_CLEANUP(getauid_success);
454 ATF_TC_HEAD(getauid_success, tc)
456 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
460 ATF_TC_BODY(getauid_success, tc)
464 snprintf(adregex, sizeof(adregex), "getauid.*%d.*return,success", pid);
466 FILE *pipefd = setup(fds, auclass);
467 ATF_REQUIRE_EQ(0, getauid(&auid));
468 check_audit(fds, adregex, pipefd);
471 ATF_TC_CLEANUP(getauid_success, tc)
477 ATF_TC_WITH_CLEANUP(getauid_failure);
478 ATF_TC_HEAD(getauid_failure, tc)
480 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
484 ATF_TC_BODY(getauid_failure, tc)
487 snprintf(adregex, sizeof(adregex), "getauid.*%d.*return,failure", pid);
489 FILE *pipefd = setup(fds, auclass);
490 /* Failure reason: Bad address */
491 ATF_REQUIRE_EQ(-1, getauid(NULL));
492 check_audit(fds, adregex, pipefd);
495 ATF_TC_CLEANUP(getauid_failure, tc)
501 ATF_TC_WITH_CLEANUP(setauid_success);
502 ATF_TC_HEAD(setauid_success, tc)
504 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
508 ATF_TC_BODY(setauid_success, tc)
512 snprintf(adregex, sizeof(adregex), "setauid.*%d.*return,success", pid);
513 ATF_REQUIRE_EQ(0, getauid(&auid));
515 FILE *pipefd = setup(fds, auclass);
516 ATF_REQUIRE_EQ(0, setauid(&auid));
517 check_audit(fds, adregex, pipefd);
520 ATF_TC_CLEANUP(setauid_success, tc)
526 ATF_TC_WITH_CLEANUP(setauid_failure);
527 ATF_TC_HEAD(setauid_failure, tc)
529 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
533 ATF_TC_BODY(setauid_failure, tc)
536 snprintf(adregex, sizeof(adregex), "setauid.*%d.*return,failure", pid);
538 FILE *pipefd = setup(fds, auclass);
539 /* Failure reason: Bad address */
540 ATF_REQUIRE_EQ(-1, setauid(NULL));
541 check_audit(fds, adregex, pipefd);
544 ATF_TC_CLEANUP(setauid_failure, tc)
550 ATF_TC_WITH_CLEANUP(getaudit_success);
551 ATF_TC_HEAD(getaudit_success, tc)
553 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
557 ATF_TC_BODY(getaudit_success, tc)
560 auditinfo_t auditinfo;
561 snprintf(adregex, sizeof(adregex), "getaudit.*%d.*return,success", pid);
563 FILE *pipefd = setup(fds, auclass);
564 ATF_REQUIRE_EQ(0, getaudit(&auditinfo));
565 check_audit(fds, adregex, pipefd);
568 ATF_TC_CLEANUP(getaudit_success, tc)
574 ATF_TC_WITH_CLEANUP(getaudit_failure);
575 ATF_TC_HEAD(getaudit_failure, tc)
577 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
581 ATF_TC_BODY(getaudit_failure, tc)
584 snprintf(adregex, sizeof(adregex), "getaudit.*%d.*return,failure", pid);
586 FILE *pipefd = setup(fds, auclass);
587 /* Failure reason: Bad address */
588 ATF_REQUIRE_EQ(-1, getaudit(NULL));
589 check_audit(fds, adregex, pipefd);
592 ATF_TC_CLEANUP(getaudit_failure, tc)
598 ATF_TC_WITH_CLEANUP(setaudit_success);
599 ATF_TC_HEAD(setaudit_success, tc)
601 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
605 ATF_TC_BODY(setaudit_success, tc)
608 auditinfo_t auditinfo;
609 snprintf(adregex, sizeof(adregex), "setaudit.*%d.*return,success", pid);
610 ATF_REQUIRE_EQ(0, getaudit(&auditinfo));
612 FILE *pipefd = setup(fds, auclass);
613 ATF_REQUIRE_EQ(0, setaudit(&auditinfo));
614 check_audit(fds, adregex, pipefd);
617 ATF_TC_CLEANUP(setaudit_success, tc)
623 ATF_TC_WITH_CLEANUP(setaudit_failure);
624 ATF_TC_HEAD(setaudit_failure, tc)
626 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
630 ATF_TC_BODY(setaudit_failure, tc)
633 snprintf(adregex, sizeof(adregex), "setaudit.*%d.*return,failure", pid);
635 FILE *pipefd = setup(fds, auclass);
636 /* Failure reason: Bad address */
637 ATF_REQUIRE_EQ(-1, setaudit(NULL));
638 check_audit(fds, adregex, pipefd);
641 ATF_TC_CLEANUP(setaudit_failure, tc)
647 ATF_TC_WITH_CLEANUP(getaudit_addr_success);
648 ATF_TC_HEAD(getaudit_addr_success, tc)
650 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
651 "getaudit_addr(2) call");
654 ATF_TC_BODY(getaudit_addr_success, tc)
657 auditinfo_addr_t auditinfo;
658 snprintf(adregex, sizeof(adregex),
659 "getaudit_addr.*%d.*return,success", pid);
661 FILE *pipefd = setup(fds, auclass);
662 ATF_REQUIRE_EQ(0, getaudit_addr(&auditinfo, sizeof(auditinfo)));
663 check_audit(fds, adregex, pipefd);
666 ATF_TC_CLEANUP(getaudit_addr_success, tc)
672 ATF_TC_WITH_CLEANUP(getaudit_addr_failure);
673 ATF_TC_HEAD(getaudit_addr_failure, tc)
675 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
676 "getaudit_addr(2) call");
679 ATF_TC_BODY(getaudit_addr_failure, tc)
682 snprintf(adregex, sizeof(adregex),
683 "getaudit_addr.*%d.*return,failure", pid);
685 FILE *pipefd = setup(fds, auclass);
686 /* Failure reason: Bad address */
687 ATF_REQUIRE_EQ(-1, getaudit_addr(NULL, 0));
688 check_audit(fds, adregex, pipefd);
691 ATF_TC_CLEANUP(getaudit_addr_failure, tc)
697 ATF_TC_WITH_CLEANUP(setaudit_addr_success);
698 ATF_TC_HEAD(setaudit_addr_success, tc)
700 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
701 "setaudit_addr(2) call");
704 ATF_TC_BODY(setaudit_addr_success, tc)
707 auditinfo_addr_t auditinfo;
708 snprintf(adregex, sizeof(adregex),
709 "setaudit_addr.*%d.*return,success", pid);
711 ATF_REQUIRE_EQ(0, getaudit_addr(&auditinfo, sizeof(auditinfo)));
712 FILE *pipefd = setup(fds, auclass);
713 ATF_REQUIRE_EQ(0, setaudit_addr(&auditinfo, sizeof(auditinfo)));
714 check_audit(fds, adregex, pipefd);
717 ATF_TC_CLEANUP(setaudit_addr_success, tc)
723 ATF_TC_WITH_CLEANUP(setaudit_addr_failure);
724 ATF_TC_HEAD(setaudit_addr_failure, tc)
726 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
727 "setaudit_addr(2) call");
730 ATF_TC_BODY(setaudit_addr_failure, tc)
733 snprintf(adregex, sizeof(adregex),
734 "setaudit_addr.*%d.*return,failure", pid);
736 FILE *pipefd = setup(fds, auclass);
737 /* Failure reason: Bad address */
738 ATF_REQUIRE_EQ(-1, setaudit_addr(NULL, 0));
739 check_audit(fds, adregex, pipefd);
742 ATF_TC_CLEANUP(setaudit_addr_failure, tc)
748 * Note: The test-case uses A_GETFSIZE as the command argument but since it is
749 * not an independent audit event, it will be used to check the default mode
750 * auditing of auditon(2) system call.
752 * Please See: sys/security/audit/audit_bsm_klib.c
753 * function(): au_event_t auditon_command_event() :: case A_GETFSIZE:
755 ATF_TC_WITH_CLEANUP(auditon_default_success);
756 ATF_TC_HEAD(auditon_default_success, tc)
758 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
762 ATF_TC_BODY(auditon_default_success, tc)
764 au_fstat_t fsize_arg;
765 bzero(&fsize_arg, sizeof(au_fstat_t));
768 snprintf(adregex, sizeof(adregex), "auditon.*%d.*return,success", pid);
770 FILE *pipefd = setup(fds, auclass);
771 ATF_REQUIRE_EQ(0, auditon(A_GETFSIZE, &fsize_arg, sizeof(fsize_arg)));
772 check_audit(fds, adregex, pipefd);
775 ATF_TC_CLEANUP(auditon_default_success, tc)
781 ATF_TC_WITH_CLEANUP(auditon_default_failure);
782 ATF_TC_HEAD(auditon_default_failure, tc)
784 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
788 ATF_TC_BODY(auditon_default_failure, tc)
791 snprintf(adregex, sizeof(adregex), "auditon.*%d.*return,failure", pid);
793 FILE *pipefd = setup(fds, auclass);
794 /* Failure reason: Invalid argument */
795 ATF_REQUIRE_EQ(-1, auditon(A_GETFSIZE, NULL, 0));
796 check_audit(fds, adregex, pipefd);
799 ATF_TC_CLEANUP(auditon_default_failure, tc)
805 ATF_TC_WITH_CLEANUP(auditon_getpolicy_success);
806 ATF_TC_HEAD(auditon_getpolicy_success, tc)
808 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
809 "auditon(2) call for cmd: A_GETPOLICY");
812 ATF_TC_BODY(auditon_getpolicy_success, tc)
816 snprintf(adregex, sizeof(adregex), "GPOLICY command.*%d.*success", pid);
818 FILE *pipefd = setup(fds, auclass);
819 ATF_REQUIRE_EQ(0, auditon(A_GETPOLICY, &aupolicy, sizeof(aupolicy)));
820 check_audit(fds, adregex, pipefd);
823 ATF_TC_CLEANUP(auditon_getpolicy_success, tc)
829 ATF_TC_WITH_CLEANUP(auditon_getpolicy_failure);
830 ATF_TC_HEAD(auditon_getpolicy_failure, tc)
832 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
833 "auditon(2) call for cmd: A_GETPOLICY");
836 ATF_TC_BODY(auditon_getpolicy_failure, tc)
839 snprintf(adregex, sizeof(adregex), "GPOLICY command.*%d.*failure", pid);
841 FILE *pipefd = setup(fds, auclass);
842 /* Failure reason: Invalid argument */
843 ATF_REQUIRE_EQ(-1, auditon(A_GETPOLICY, NULL, 0));
844 check_audit(fds, adregex, pipefd);
847 ATF_TC_CLEANUP(auditon_getpolicy_failure, tc)
853 ATF_TC_WITH_CLEANUP(auditon_setpolicy_success);
854 ATF_TC_HEAD(auditon_setpolicy_success, tc)
856 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
857 "auditon(2) call for cmd: A_SETPOLICY");
860 ATF_TC_BODY(auditon_setpolicy_success, tc)
864 snprintf(adregex, sizeof(adregex), "SPOLICY command.*%d.*success", pid);
866 /* Retrieve the current auditing policy, to be used with A_SETPOLICY */
867 ATF_REQUIRE_EQ(0, auditon(A_GETPOLICY, &aupolicy, sizeof(aupolicy)));
868 FILE *pipefd = setup(fds, auclass);
869 ATF_REQUIRE_EQ(0, auditon(A_SETPOLICY, &aupolicy, sizeof(aupolicy)));
870 check_audit(fds, adregex, pipefd);
873 ATF_TC_CLEANUP(auditon_setpolicy_success, tc)
879 ATF_TC_WITH_CLEANUP(auditon_setpolicy_failure);
880 ATF_TC_HEAD(auditon_setpolicy_failure, tc)
882 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
883 "auditon(2) call for cmd: A_SETPOLICY");
886 ATF_TC_BODY(auditon_setpolicy_failure, tc)
889 snprintf(adregex, sizeof(adregex), "SPOLICY command.*%d.*failure", pid);
891 FILE *pipefd = setup(fds, auclass);
892 /* Failure reason: Invalid argument */
893 ATF_REQUIRE_EQ(-1, auditon(A_SETPOLICY, NULL, 0));
894 check_audit(fds, adregex, pipefd);
897 ATF_TC_CLEANUP(auditon_setpolicy_failure, tc)
903 ATF_TC_WITH_CLEANUP(auditon_getkmask_success);
904 ATF_TC_HEAD(auditon_getkmask_success, tc)
906 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
907 "auditon(2) call for cmd: A_GETKMASK");
910 ATF_TC_BODY(auditon_getkmask_success, tc)
914 snprintf(adregex, sizeof(adregex), "get kernel mask.*%d.*success", pid);
916 bzero(&evmask, sizeof(evmask));
917 FILE *pipefd = setup(fds, auclass);
918 ATF_REQUIRE_EQ(0, auditon(A_GETKMASK, &evmask, sizeof(evmask)));
919 check_audit(fds, adregex, pipefd);
922 ATF_TC_CLEANUP(auditon_getkmask_success, tc)
928 ATF_TC_WITH_CLEANUP(auditon_getkmask_failure);
929 ATF_TC_HEAD(auditon_getkmask_failure, tc)
931 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
932 "auditon(2) call for cmd: A_GETKMASK");
935 ATF_TC_BODY(auditon_getkmask_failure, tc)
938 snprintf(adregex, sizeof(adregex), "get kernel mask.*%d.*failure", pid);
940 FILE *pipefd = setup(fds, auclass);
941 /* Failure reason: Invalid au_mask_t structure */
942 ATF_REQUIRE_EQ(-1, auditon(A_GETKMASK, NULL, 0));
943 check_audit(fds, adregex, pipefd);
946 ATF_TC_CLEANUP(auditon_getkmask_failure, tc)
952 ATF_TC_WITH_CLEANUP(auditon_setkmask_success);
953 ATF_TC_HEAD(auditon_setkmask_success, tc)
955 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
956 "auditon(2) call for cmd: A_SETKMASK");
959 ATF_TC_BODY(auditon_setkmask_success, tc)
963 snprintf(adregex, sizeof(adregex), "set kernel mask.*%d.*success", pid);
965 /* Retrieve the current audit mask to be used with A_SETKMASK */
966 bzero(&evmask, sizeof(evmask));
967 ATF_REQUIRE_EQ(0, auditon(A_GETKMASK, &evmask, sizeof(evmask)));
969 FILE *pipefd = setup(fds, auclass);
970 ATF_REQUIRE_EQ(0, auditon(A_SETKMASK, &evmask, sizeof(evmask)));
971 check_audit(fds, adregex, pipefd);
974 ATF_TC_CLEANUP(auditon_setkmask_success, tc)
980 ATF_TC_WITH_CLEANUP(auditon_setkmask_failure);
981 ATF_TC_HEAD(auditon_setkmask_failure, tc)
983 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
984 "auditon(2) call for cmd: A_SETKMASK");
987 ATF_TC_BODY(auditon_setkmask_failure, tc)
990 snprintf(adregex, sizeof(adregex), "set kernel mask.*%d.*failure", pid);
992 FILE *pipefd = setup(fds, auclass);
993 /* Failure reason: Invalid au_mask_t structure */
994 ATF_REQUIRE_EQ(-1, auditon(A_SETKMASK, NULL, 0));
995 check_audit(fds, adregex, pipefd);
998 ATF_TC_CLEANUP(auditon_setkmask_failure, tc)
1004 ATF_TC_WITH_CLEANUP(auditon_getqctrl_success);
1005 ATF_TC_HEAD(auditon_getqctrl_success, tc)
1007 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1008 "auditon(2) call for cmd: A_GETQCTRL");
1011 ATF_TC_BODY(auditon_getqctrl_success, tc)
1015 snprintf(adregex, sizeof(adregex), "GQCTRL command.*%d.*success", pid);
1017 bzero(&evqctrl, sizeof(evqctrl));
1018 FILE *pipefd = setup(fds, auclass);
1019 ATF_REQUIRE_EQ(0, auditon(A_GETQCTRL, &evqctrl, sizeof(evqctrl)));
1020 check_audit(fds, adregex, pipefd);
1023 ATF_TC_CLEANUP(auditon_getqctrl_success, tc)
1029 ATF_TC_WITH_CLEANUP(auditon_getqctrl_failure);
1030 ATF_TC_HEAD(auditon_getqctrl_failure, tc)
1032 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1033 "auditon(2) call for cmd: A_GETQCTRL");
1036 ATF_TC_BODY(auditon_getqctrl_failure, tc)
1039 snprintf(adregex, sizeof(adregex), "GQCTRL command.*%d.*failure", pid);
1041 FILE *pipefd = setup(fds, auclass);
1042 /* Failure reason: Invalid au_qctrl_t structure */
1043 ATF_REQUIRE_EQ(-1, auditon(A_GETQCTRL, NULL, 0));
1044 check_audit(fds, adregex, pipefd);
1047 ATF_TC_CLEANUP(auditon_getqctrl_failure, tc)
1053 ATF_TC_WITH_CLEANUP(auditon_setqctrl_success);
1054 ATF_TC_HEAD(auditon_setqctrl_success, tc)
1056 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1057 "auditon(2) call for cmd: A_SETKMASK");
1060 ATF_TC_BODY(auditon_setqctrl_success, tc)
1064 snprintf(adregex, sizeof(adregex), "SQCTRL command.*%d.*success", pid);
1066 /* Retrieve the current audit mask to be used with A_SETQCTRL */
1067 bzero(&evqctrl, sizeof(evqctrl));
1068 ATF_REQUIRE_EQ(0, auditon(A_GETQCTRL, &evqctrl, sizeof(evqctrl)));
1070 FILE *pipefd = setup(fds, auclass);
1071 ATF_REQUIRE_EQ(0, auditon(A_SETQCTRL, &evqctrl, sizeof(evqctrl)));
1072 check_audit(fds, adregex, pipefd);
1075 ATF_TC_CLEANUP(auditon_setqctrl_success, tc)
1081 ATF_TC_WITH_CLEANUP(auditon_setqctrl_failure);
1082 ATF_TC_HEAD(auditon_setqctrl_failure, tc)
1084 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1085 "auditon(2) call for cmd: A_SETKMASK");
1088 ATF_TC_BODY(auditon_setqctrl_failure, tc)
1091 snprintf(adregex, sizeof(adregex), "SQCTRL command.*%d.*failure", pid);
1093 FILE *pipefd = setup(fds, auclass);
1094 /* Failure reason: Invalid au_qctrl_t structure */
1095 ATF_REQUIRE_EQ(-1, auditon(A_SETQCTRL, NULL, 0));
1096 check_audit(fds, adregex, pipefd);
1099 ATF_TC_CLEANUP(auditon_setqctrl_failure, tc)
1105 ATF_TC_WITH_CLEANUP(auditon_getclass_success);
1106 ATF_TC_HEAD(auditon_getclass_success, tc)
1108 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1109 "auditon(2) call for cmd: A_GETCLASS");
1112 ATF_TC_BODY(auditon_getclass_success, tc)
1115 au_evclass_map_t evclass;
1116 snprintf(adregex, sizeof(adregex), "get event class.*%d.*success", pid);
1118 /* Initialize evclass to get the event-class mapping for auditon(2) */
1119 evclass.ec_number = AUE_AUDITON;
1120 evclass.ec_class = 0;
1121 FILE *pipefd = setup(fds, auclass);
1122 ATF_REQUIRE_EQ(0, auditon(A_GETCLASS, &evclass, sizeof(evclass)));
1123 check_audit(fds, adregex, pipefd);
1126 ATF_TC_CLEANUP(auditon_getclass_success, tc)
1132 ATF_TC_WITH_CLEANUP(auditon_getclass_failure);
1133 ATF_TC_HEAD(auditon_getclass_failure, tc)
1135 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1136 "auditon(2) call for cmd: A_GETCLASS");
1139 ATF_TC_BODY(auditon_getclass_failure, tc)
1142 snprintf(adregex, sizeof(adregex), "get event class.*%d.*failure", pid);
1144 FILE *pipefd = setup(fds, auclass);
1145 /* Failure reason: Invalid au_evclass_map_t structure */
1146 ATF_REQUIRE_EQ(-1, auditon(A_GETCLASS, NULL, 0));
1147 check_audit(fds, adregex, pipefd);
1150 ATF_TC_CLEANUP(auditon_getclass_failure, tc)
1156 ATF_TC_WITH_CLEANUP(auditon_setclass_success);
1157 ATF_TC_HEAD(auditon_setclass_success, tc)
1159 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1160 "auditon(2) call for cmd: A_SETCLASS");
1163 ATF_TC_BODY(auditon_setclass_success, tc)
1166 au_evclass_map_t evclass;
1167 snprintf(adregex, sizeof(adregex), "set event class.*%d.*success", pid);
1169 /* Initialize evclass and get the event-class mapping for auditon(2) */
1170 evclass.ec_number = AUE_AUDITON;
1171 evclass.ec_class = 0;
1172 ATF_REQUIRE_EQ(0, auditon(A_GETCLASS, &evclass, sizeof(evclass)));
1174 FILE *pipefd = setup(fds, auclass);
1175 ATF_REQUIRE_EQ(0, auditon(A_SETCLASS, &evclass, sizeof(evclass)));
1176 check_audit(fds, adregex, pipefd);
1179 ATF_TC_CLEANUP(auditon_setclass_success, tc)
1185 ATF_TC_WITH_CLEANUP(auditon_setclass_failure);
1186 ATF_TC_HEAD(auditon_setclass_failure, tc)
1188 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1189 "auditon(2) call for cmd: A_SETCLASS");
1192 ATF_TC_BODY(auditon_setclass_failure, tc)
1195 snprintf(adregex, sizeof(adregex), "set event class.*%d.*failure", pid);
1197 FILE *pipefd = setup(fds, auclass);
1198 /* Failure reason: Invalid au_evclass_map_t structure */
1199 ATF_REQUIRE_EQ(-1, auditon(A_SETCLASS, NULL, 0));
1200 check_audit(fds, adregex, pipefd);
1203 ATF_TC_CLEANUP(auditon_setclass_failure, tc)
1209 ATF_TC_WITH_CLEANUP(auditon_getcond_success);
1210 ATF_TC_HEAD(auditon_getcond_success, tc)
1212 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1213 "auditon(2) call for cmd: A_GETCOND");
1216 ATF_TC_BODY(auditon_getcond_success, tc)
1220 snprintf(adregex, sizeof(adregex), "get audit state.*%d.*success", pid);
1222 FILE *pipefd = setup(fds, auclass);
1223 ATF_REQUIRE_EQ(0, auditon(A_GETCOND, &auditcond, sizeof(auditcond)));
1224 check_audit(fds, adregex, pipefd);
1227 ATF_TC_CLEANUP(auditon_getcond_success, tc)
1233 ATF_TC_WITH_CLEANUP(auditon_getcond_failure);
1234 ATF_TC_HEAD(auditon_getcond_failure, tc)
1236 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1237 "auditon(2) call for cmd: A_GETCOND");
1240 ATF_TC_BODY(auditon_getcond_failure, tc)
1243 snprintf(adregex, sizeof(adregex), "get audit state.*%d.*failure", pid);
1245 FILE *pipefd = setup(fds, auclass);
1246 /* Failure reason: Invalid argument */
1247 ATF_REQUIRE_EQ(-1, auditon(A_GETCOND, NULL, 0));
1248 check_audit(fds, adregex, pipefd);
1251 ATF_TC_CLEANUP(auditon_getcond_failure, tc)
1257 ATF_TC_WITH_CLEANUP(auditon_setcond_success);
1258 ATF_TC_HEAD(auditon_setcond_success, tc)
1260 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1261 "auditon(2) call for cmd: A_SETCOND");
1264 ATF_TC_BODY(auditon_setcond_success, tc)
1266 int auditcond = AUC_AUDITING;
1268 snprintf(adregex, sizeof(adregex), "set audit state.*%d.*success", pid);
1270 FILE *pipefd = setup(fds, auclass);
1271 /* At this point auditd is running, so the audit state is AUC_AUDITING */
1272 ATF_REQUIRE_EQ(0, auditon(A_SETCOND, &auditcond, sizeof(auditcond)));
1273 check_audit(fds, adregex, pipefd);
1276 ATF_TC_CLEANUP(auditon_setcond_success, tc)
1282 ATF_TC_WITH_CLEANUP(auditon_setcond_failure);
1283 ATF_TC_HEAD(auditon_setcond_failure, tc)
1285 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1286 "auditon(2) call for cmd: A_SETCOND");
1289 ATF_TC_BODY(auditon_setcond_failure, tc)
1292 snprintf(adregex, sizeof(adregex), "set audit state.*%d.*failure", pid);
1294 FILE *pipefd = setup(fds, auclass);
1295 /* Failure reason: Invalid argument */
1296 ATF_REQUIRE_EQ(-1, auditon(A_SETCOND, NULL, 0));
1297 check_audit(fds, adregex, pipefd);
1300 ATF_TC_CLEANUP(auditon_setcond_failure, tc)
1306 * Following test-cases for auditon(2) are all in failure mode only as although
1307 * auditable, they have not been implemented and return ENOSYS whenever called.
1309 * Commands: A_GETCWD A_GETCAR A_GETSTAT A_SETSTAT A_SETUMASK A_SETSMASK
1312 ATF_TC_WITH_CLEANUP(auditon_getcwd_failure);
1313 ATF_TC_HEAD(auditon_getcwd_failure, tc)
1315 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1316 "auditon(2) call for cmd: A_GETCWD");
1319 ATF_TC_BODY(auditon_getcwd_failure, tc)
1322 snprintf(adregex, sizeof(adregex), "get cwd.*%d.*failure", pid);
1324 FILE *pipefd = setup(fds, auclass);
1325 ATF_REQUIRE_ERRNO(ENOSYS, auditon(A_GETCWD, &auditon_def,
1326 sizeof(auditon_def)) == -1);
1327 check_audit(fds, adregex, pipefd);
1330 ATF_TC_CLEANUP(auditon_getcwd_failure, tc)
1336 ATF_TC_WITH_CLEANUP(auditon_getcar_failure);
1337 ATF_TC_HEAD(auditon_getcar_failure, tc)
1339 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1340 "auditon(2) call for cmd: A_GETCAR");
1343 ATF_TC_BODY(auditon_getcar_failure, tc)
1346 snprintf(adregex, sizeof(adregex), "get car.*%d.*failure", pid);
1348 FILE *pipefd = setup(fds, auclass);
1349 ATF_REQUIRE_ERRNO(ENOSYS, auditon(A_GETCAR, &auditon_def,
1350 sizeof(auditon_def)) == -1);
1351 check_audit(fds, adregex, pipefd);
1354 ATF_TC_CLEANUP(auditon_getcar_failure, tc)
1360 ATF_TC_WITH_CLEANUP(auditon_getstat_failure);
1361 ATF_TC_HEAD(auditon_getstat_failure, tc)
1363 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1364 "auditon(2) call for cmd: A_GETSTAT");
1367 ATF_TC_BODY(auditon_getstat_failure, tc)
1370 snprintf(adregex, sizeof(adregex),
1371 "get audit statistics.*%d.*return,failure", pid);
1373 FILE *pipefd = setup(fds, auclass);
1374 ATF_REQUIRE_ERRNO(ENOSYS, auditon(A_GETSTAT, &auditon_def,
1375 sizeof(auditon_def)) == -1);
1376 check_audit(fds, adregex, pipefd);
1379 ATF_TC_CLEANUP(auditon_getstat_failure, tc)
1385 ATF_TC_WITH_CLEANUP(auditon_setstat_failure);
1386 ATF_TC_HEAD(auditon_setstat_failure, tc)
1388 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1389 "auditon(2) call for cmd: A_SETSTAT");
1392 ATF_TC_BODY(auditon_setstat_failure, tc)
1395 snprintf(adregex, sizeof(adregex),
1396 "set audit statistics.*%d.*return,failure", pid);
1398 FILE *pipefd = setup(fds, auclass);
1399 ATF_REQUIRE_ERRNO(ENOSYS, auditon(A_SETSTAT, &auditon_def,
1400 sizeof(auditon_def)) == -1);
1401 check_audit(fds, adregex, pipefd);
1404 ATF_TC_CLEANUP(auditon_setstat_failure, tc)
1410 ATF_TC_WITH_CLEANUP(auditon_setumask_failure);
1411 ATF_TC_HEAD(auditon_setumask_failure, tc)
1413 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1414 "auditon(2) call for cmd: A_SETUMASK");
1417 ATF_TC_BODY(auditon_setumask_failure, tc)
1420 snprintf(adregex, sizeof(adregex),
1421 "set mask per uid.*%d.*return,failure", pid);
1423 FILE *pipefd = setup(fds, auclass);
1424 ATF_REQUIRE_ERRNO(ENOSYS, auditon(A_SETUMASK, &auditon_def,
1425 sizeof(auditon_def)) == -1);
1426 check_audit(fds, adregex, pipefd);
1429 ATF_TC_CLEANUP(auditon_setumask_failure, tc)
1435 ATF_TC_WITH_CLEANUP(auditon_setsmask_failure);
1436 ATF_TC_HEAD(auditon_setsmask_failure, tc)
1438 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1439 "auditon(2) call for cmd: A_SETSMASK");
1442 ATF_TC_BODY(auditon_setsmask_failure, tc)
1445 snprintf(adregex, sizeof(adregex),
1446 "set mask per session.*%d.*return,failure", pid);
1448 FILE *pipefd = setup(fds, auclass);
1449 ATF_REQUIRE_ERRNO(ENOSYS, auditon(A_SETSMASK, &auditon_def,
1450 sizeof(auditon_def)) == -1);
1451 check_audit(fds, adregex, pipefd);
1454 ATF_TC_CLEANUP(auditon_setsmask_failure, tc)
1461 * Audit of reboot(2) cannot be tested in normal conditions as we don't want
1462 * to reboot the system while running the tests
1466 ATF_TC_WITH_CLEANUP(reboot_failure);
1467 ATF_TC_HEAD(reboot_failure, tc)
1469 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1473 ATF_TC_BODY(reboot_failure, tc)
1476 snprintf(adregex, sizeof(adregex), "reboot.*%d.*return,failure", pid);
1478 FILE *pipefd = setup(fds, auclass);
1479 ATF_REQUIRE_EQ(-1, reboot(-1));
1480 check_audit(fds, adregex, pipefd);
1483 ATF_TC_CLEANUP(reboot_failure, tc)
1490 * Audit of quotactl(2) cannot be tested in normal conditions as we don't want
1491 * to tamper with filesystem quotas
1495 ATF_TC_WITH_CLEANUP(quotactl_failure);
1496 ATF_TC_HEAD(quotactl_failure, tc)
1498 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1499 "quotactl(2) call");
1502 ATF_TC_BODY(quotactl_failure, tc)
1505 snprintf(adregex, sizeof(adregex), "quotactl.*%d.*return,failure", pid);
1507 FILE *pipefd = setup(fds, auclass);
1508 ATF_REQUIRE_EQ(-1, quotactl(NULL, 0, 0, NULL));
1509 check_audit(fds, adregex, pipefd);
1512 ATF_TC_CLEANUP(quotactl_failure, tc)
1518 ATF_TC_WITH_CLEANUP(mount_failure);
1519 ATF_TC_HEAD(mount_failure, tc)
1521 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1525 ATF_TC_BODY(mount_failure, tc)
1528 snprintf(adregex, sizeof(adregex), "mount.*%d.*return,failure", pid);
1530 FILE *pipefd = setup(fds, auclass);
1531 ATF_REQUIRE_EQ(-1, mount(NULL, NULL, 0, NULL));
1532 check_audit(fds, adregex, pipefd);
1535 ATF_TC_CLEANUP(mount_failure, tc)
1541 ATF_TC_WITH_CLEANUP(nmount_failure);
1542 ATF_TC_HEAD(nmount_failure, tc)
1544 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1548 ATF_TC_BODY(nmount_failure, tc)
1551 snprintf(adregex, sizeof(adregex), "nmount.*%d.*return,failure", pid);
1553 FILE *pipefd = setup(fds, auclass);
1554 ATF_REQUIRE_EQ(-1, nmount(NULL, 0, 0));
1555 check_audit(fds, adregex, pipefd);
1558 ATF_TC_CLEANUP(nmount_failure, tc)
1564 ATF_TC_WITH_CLEANUP(swapon_failure);
1565 ATF_TC_HEAD(swapon_failure, tc)
1567 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1571 ATF_TC_BODY(swapon_failure, tc)
1574 snprintf(adregex, sizeof(adregex), "swapon.*%d.*return,failure", pid);
1576 FILE *pipefd = setup(fds, auclass);
1577 /* Failure reason: Block device required */
1578 ATF_REQUIRE_EQ(-1, swapon(path));
1579 check_audit(fds, adregex, pipefd);
1582 ATF_TC_CLEANUP(swapon_failure, tc)
1588 ATF_TC_WITH_CLEANUP(swapoff_failure);
1589 ATF_TC_HEAD(swapoff_failure, tc)
1591 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1595 ATF_TC_BODY(swapoff_failure, tc)
1598 snprintf(adregex, sizeof(adregex), "swapoff.*%d.*return,failure", pid);
1600 FILE *pipefd = setup(fds, auclass);
1601 /* Failure reason: Block device required */
1602 ATF_REQUIRE_EQ(-1, swapoff(path));
1603 check_audit(fds, adregex, pipefd);
1606 ATF_TC_CLEANUP(swapoff_failure, tc)
1614 ATF_TP_ADD_TC(tp, settimeofday_success);
1615 ATF_TP_ADD_TC(tp, settimeofday_failure);
1616 ATF_TP_ADD_TC(tp, clock_settime_success);
1617 ATF_TP_ADD_TC(tp, clock_settime_failure);
1618 ATF_TP_ADD_TC(tp, adjtime_success);
1619 ATF_TP_ADD_TC(tp, adjtime_failure);
1620 ATF_TP_ADD_TC(tp, ntp_adjtime_success);
1621 ATF_TP_ADD_TC(tp, ntp_adjtime_failure);
1623 ATF_TP_ADD_TC(tp, nfs_getfh_success);
1624 ATF_TP_ADD_TC(tp, nfs_getfh_failure);
1625 ATF_TP_ADD_TC(tp, acct_success);
1626 ATF_TP_ADD_TC(tp, acct_failure);
1627 ATF_TP_ADD_TC(tp, auditctl_success);
1628 ATF_TP_ADD_TC(tp, auditctl_failure);
1630 ATF_TP_ADD_TC(tp, getauid_success);
1631 ATF_TP_ADD_TC(tp, getauid_failure);
1632 ATF_TP_ADD_TC(tp, setauid_success);
1633 ATF_TP_ADD_TC(tp, setauid_failure);
1635 ATF_TP_ADD_TC(tp, getaudit_success);
1636 ATF_TP_ADD_TC(tp, getaudit_failure);
1637 ATF_TP_ADD_TC(tp, setaudit_success);
1638 ATF_TP_ADD_TC(tp, setaudit_failure);
1640 ATF_TP_ADD_TC(tp, getaudit_addr_success);
1641 ATF_TP_ADD_TC(tp, getaudit_addr_failure);
1642 ATF_TP_ADD_TC(tp, setaudit_addr_success);
1643 ATF_TP_ADD_TC(tp, setaudit_addr_failure);
1645 ATF_TP_ADD_TC(tp, auditon_default_success);
1646 ATF_TP_ADD_TC(tp, auditon_default_failure);
1648 ATF_TP_ADD_TC(tp, auditon_getpolicy_success);
1649 ATF_TP_ADD_TC(tp, auditon_getpolicy_failure);
1650 ATF_TP_ADD_TC(tp, auditon_setpolicy_success);
1651 ATF_TP_ADD_TC(tp, auditon_setpolicy_failure);
1653 ATF_TP_ADD_TC(tp, auditon_getkmask_success);
1654 ATF_TP_ADD_TC(tp, auditon_getkmask_failure);
1655 ATF_TP_ADD_TC(tp, auditon_setkmask_success);
1656 ATF_TP_ADD_TC(tp, auditon_setkmask_failure);
1658 ATF_TP_ADD_TC(tp, auditon_getqctrl_success);
1659 ATF_TP_ADD_TC(tp, auditon_getqctrl_failure);
1660 ATF_TP_ADD_TC(tp, auditon_setqctrl_success);
1661 ATF_TP_ADD_TC(tp, auditon_setqctrl_failure);
1663 ATF_TP_ADD_TC(tp, auditon_getclass_success);
1664 ATF_TP_ADD_TC(tp, auditon_getclass_failure);
1665 ATF_TP_ADD_TC(tp, auditon_setclass_success);
1666 ATF_TP_ADD_TC(tp, auditon_setclass_failure);
1668 ATF_TP_ADD_TC(tp, auditon_getcond_success);
1669 ATF_TP_ADD_TC(tp, auditon_getcond_failure);
1670 ATF_TP_ADD_TC(tp, auditon_setcond_success);
1671 ATF_TP_ADD_TC(tp, auditon_setcond_failure);
1673 ATF_TP_ADD_TC(tp, auditon_getcwd_failure);
1674 ATF_TP_ADD_TC(tp, auditon_getcar_failure);
1675 ATF_TP_ADD_TC(tp, auditon_getstat_failure);
1676 ATF_TP_ADD_TC(tp, auditon_setstat_failure);
1677 ATF_TP_ADD_TC(tp, auditon_setumask_failure);
1678 ATF_TP_ADD_TC(tp, auditon_setsmask_failure);
1680 ATF_TP_ADD_TC(tp, reboot_failure);
1681 ATF_TP_ADD_TC(tp, quotactl_failure);
1682 ATF_TP_ADD_TC(tp, mount_failure);
1683 ATF_TP_ADD_TC(tp, nmount_failure);
1684 ATF_TP_ADD_TC(tp, swapon_failure);
1685 ATF_TP_ADD_TC(tp, swapoff_failure);
1687 return (atf_no_error());