2 * Copyright (c) 2018 Aniket Pandey
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
14 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
16 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
17 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 #include <sys/param.h>
29 #include <sys/extattr.h>
30 #include <sys/ucred.h>
31 #include <sys/mount.h>
33 #include <sys/syscall.h>
41 static struct pollfd fds[1];
42 static mode_t mode = 0777;
45 static int filedesc, fhdesc;
46 static char extregex[80];
47 static char buff[] = "ezio";
48 static struct stat statbuff;
49 static struct statfs statfsbuff;
50 static const char *auclass = "fa";
51 static const char *name = "authorname";
52 static const char *path = "fileforaudit";
53 static const char *errpath = "dirdoesnotexist/fileforaudit";
54 static const char *successreg = "fileforaudit.*return,success";
55 static const char *failurereg = "fileforaudit.*return,failure";
58 ATF_TC_WITH_CLEANUP(stat_success);
59 ATF_TC_HEAD(stat_success, tc)
61 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
65 ATF_TC_BODY(stat_success, tc)
67 /* File needs to exist to call stat(2) */
68 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
69 FILE *pipefd = setup(fds, auclass);
70 ATF_REQUIRE_EQ(0, stat(path, &statbuff));
71 check_audit(fds, successreg, pipefd);
75 ATF_TC_CLEANUP(stat_success, tc)
81 ATF_TC_WITH_CLEANUP(stat_failure);
82 ATF_TC_HEAD(stat_failure, tc)
84 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
88 ATF_TC_BODY(stat_failure, tc)
90 FILE *pipefd = setup(fds, auclass);
91 /* Failure reason: file does not exist */
92 ATF_REQUIRE_EQ(-1, stat(errpath, &statbuff));
93 check_audit(fds, failurereg, pipefd);
96 ATF_TC_CLEANUP(stat_failure, tc)
102 ATF_TC_WITH_CLEANUP(lstat_success);
103 ATF_TC_HEAD(lstat_success, tc)
105 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
109 ATF_TC_BODY(lstat_success, tc)
111 /* Symbolic link needs to exist to call lstat(2) */
112 ATF_REQUIRE_EQ(0, symlink("symlink", path));
113 FILE *pipefd = setup(fds, auclass);
114 ATF_REQUIRE_EQ(0, lstat(path, &statbuff));
115 check_audit(fds, successreg, pipefd);
118 ATF_TC_CLEANUP(lstat_success, tc)
124 ATF_TC_WITH_CLEANUP(lstat_failure);
125 ATF_TC_HEAD(lstat_failure, tc)
127 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
131 ATF_TC_BODY(lstat_failure, tc)
133 FILE *pipefd = setup(fds, auclass);
134 /* Failure reason: symbolic link does not exist */
135 ATF_REQUIRE_EQ(-1, lstat(errpath, &statbuff));
136 check_audit(fds, failurereg, pipefd);
139 ATF_TC_CLEANUP(lstat_failure, tc)
145 ATF_TC_WITH_CLEANUP(fstat_success);
146 ATF_TC_HEAD(fstat_success, tc)
148 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
152 ATF_TC_BODY(fstat_success, tc)
154 /* File needs to exist to call fstat(2) */
155 ATF_REQUIRE((filedesc = open(path, O_CREAT | O_RDWR, mode)) != -1);
156 FILE *pipefd = setup(fds, auclass);
157 ATF_REQUIRE_EQ(0, fstat(filedesc, &statbuff));
159 snprintf(extregex, sizeof(extregex),
160 "fstat.*%jd.*return,success", (intmax_t)statbuff.st_ino);
161 check_audit(fds, extregex, pipefd);
165 ATF_TC_CLEANUP(fstat_success, tc)
171 ATF_TC_WITH_CLEANUP(fstat_failure);
172 ATF_TC_HEAD(fstat_failure, tc)
174 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
178 ATF_TC_BODY(fstat_failure, tc)
180 FILE *pipefd = setup(fds, auclass);
181 const char *regex = "fstat.*return,failure : Bad file descriptor";
182 /* Failure reason: bad file descriptor */
183 ATF_REQUIRE_EQ(-1, fstat(-1, &statbuff));
184 check_audit(fds, regex, pipefd);
187 ATF_TC_CLEANUP(fstat_failure, tc)
193 ATF_TC_WITH_CLEANUP(fstatat_success);
194 ATF_TC_HEAD(fstatat_success, tc)
196 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
200 ATF_TC_BODY(fstatat_success, tc)
202 /* File or Symbolic link needs to exist to call lstat(2) */
203 ATF_REQUIRE_EQ(0, symlink("symlink", path));
204 FILE *pipefd = setup(fds, auclass);
205 ATF_REQUIRE_EQ(0, fstatat(AT_FDCWD, path, &statbuff,
206 AT_SYMLINK_NOFOLLOW));
207 check_audit(fds, successreg, pipefd);
210 ATF_TC_CLEANUP(fstatat_success, tc)
216 ATF_TC_WITH_CLEANUP(fstatat_failure);
217 ATF_TC_HEAD(fstatat_failure, tc)
219 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
223 ATF_TC_BODY(fstatat_failure, tc)
225 FILE *pipefd = setup(fds, auclass);
226 /* Failure reason: symbolic link does not exist */
227 ATF_REQUIRE_EQ(-1, fstatat(AT_FDCWD, path, &statbuff,
228 AT_SYMLINK_NOFOLLOW));
229 check_audit(fds, failurereg, pipefd);
232 ATF_TC_CLEANUP(fstatat_failure, tc)
238 ATF_TC_WITH_CLEANUP(statfs_success);
239 ATF_TC_HEAD(statfs_success, tc)
241 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
245 ATF_TC_BODY(statfs_success, tc)
247 /* File needs to exist to call statfs(2) */
248 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
249 FILE *pipefd = setup(fds, auclass);
250 ATF_REQUIRE_EQ(0, statfs(path, &statfsbuff));
251 check_audit(fds, successreg, pipefd);
255 ATF_TC_CLEANUP(statfs_success, tc)
261 ATF_TC_WITH_CLEANUP(statfs_failure);
262 ATF_TC_HEAD(statfs_failure, tc)
264 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
268 ATF_TC_BODY(statfs_failure, tc)
270 FILE *pipefd = setup(fds, auclass);
271 /* Failure reason: file does not exist */
272 ATF_REQUIRE_EQ(-1, statfs(errpath, &statfsbuff));
273 check_audit(fds, failurereg, pipefd);
276 ATF_TC_CLEANUP(statfs_failure, tc)
282 ATF_TC_WITH_CLEANUP(fstatfs_success);
283 ATF_TC_HEAD(fstatfs_success, tc)
285 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
289 ATF_TC_BODY(fstatfs_success, tc)
291 /* File needs to exist to call fstat(2) */
292 ATF_REQUIRE((filedesc = open(path, O_CREAT | O_RDWR, mode)) != -1);
293 /* Call stat(2) to store the Inode number of 'path' */
294 ATF_REQUIRE_EQ(0, stat(path, &statbuff));
295 FILE *pipefd = setup(fds, auclass);
296 ATF_REQUIRE_EQ(0, fstatfs(filedesc, &statfsbuff));
298 snprintf(extregex, sizeof(extregex), "fstatfs.*%jd.*return,success",
299 (intmax_t)statbuff.st_ino);
300 check_audit(fds, extregex, pipefd);
304 ATF_TC_CLEANUP(fstatfs_success, tc)
310 ATF_TC_WITH_CLEANUP(fstatfs_failure);
311 ATF_TC_HEAD(fstatfs_failure, tc)
313 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
317 ATF_TC_BODY(fstatfs_failure, tc)
319 FILE *pipefd = setup(fds, auclass);
320 const char *regex = "fstatfs.*return,failure : Bad file descriptor";
321 /* Failure reason: bad file descriptor */
322 ATF_REQUIRE_EQ(-1, fstatfs(-1, &statfsbuff));
323 check_audit(fds, regex, pipefd);
326 ATF_TC_CLEANUP(fstatfs_failure, tc)
332 ATF_TC_WITH_CLEANUP(getfsstat_success);
333 ATF_TC_HEAD(getfsstat_success, tc)
335 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
336 "getfsstat(2) call");
339 ATF_TC_BODY(getfsstat_success, tc)
342 snprintf(extregex, sizeof(extregex), "getfsstat.*%d.*success", pid);
344 FILE *pipefd = setup(fds, auclass);
345 ATF_REQUIRE(getfsstat(NULL, 0, MNT_NOWAIT) != -1);
346 check_audit(fds, extregex, pipefd);
349 ATF_TC_CLEANUP(getfsstat_success, tc)
355 ATF_TC_WITH_CLEANUP(getfsstat_failure);
356 ATF_TC_HEAD(getfsstat_failure, tc)
358 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
359 "getfsstat(2) call");
362 ATF_TC_BODY(getfsstat_failure, tc)
364 const char *regex = "getfsstat.*return,failure : Invalid argument";
365 FILE *pipefd = setup(fds, auclass);
366 /* Failure reason: Invalid value for mode */
367 ATF_REQUIRE_EQ(-1, getfsstat(NULL, 0, -1));
368 check_audit(fds, regex, pipefd);
371 ATF_TC_CLEANUP(getfsstat_failure, tc)
377 ATF_TC_WITH_CLEANUP(lgetfh_success);
378 ATF_TC_HEAD(lgetfh_success, tc)
380 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
384 ATF_TC_BODY(lgetfh_success, tc)
386 /* Symbolic link needs to exist to get a file-handle */
387 ATF_REQUIRE_EQ(0, symlink("symlink", path));
388 const char *regex = "lgetfh.*return,success";
389 FILE *pipefd = setup(fds, "fa");
390 ATF_REQUIRE_EQ(0, lgetfh(path, &fht));
391 check_audit(fds, regex, pipefd);
394 ATF_TC_CLEANUP(lgetfh_success, tc)
400 ATF_TC_WITH_CLEANUP(lgetfh_failure);
401 ATF_TC_HEAD(lgetfh_failure, tc)
403 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
407 ATF_TC_BODY(lgetfh_failure, tc)
409 const char *regex = "lgetfh.*return,failure";
410 FILE *pipefd = setup(fds, "fa");
411 /* Failure reason: symbolic link does not exist */
412 ATF_REQUIRE_EQ(-1, lgetfh(errpath, &fht));
413 check_audit(fds, regex, pipefd);
416 ATF_TC_CLEANUP(lgetfh_failure, tc)
422 ATF_TC_WITH_CLEANUP(fhopen_success);
423 ATF_TC_HEAD(fhopen_success, tc)
425 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
429 ATF_TC_BODY(fhopen_success, tc)
432 snprintf(extregex, sizeof(extregex), "fhopen.*%d.*return,success", pid);
434 /* File needs to exist to get a file-handle */
435 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
436 /* Get the file handle to be passed to fhopen(2) */
437 ATF_REQUIRE_EQ(0, getfh(path, &fht));
439 FILE *pipefd = setup(fds, auclass);
440 ATF_REQUIRE((fhdesc = fhopen(&fht, O_RDWR)) != -1);
441 check_audit(fds, extregex, pipefd);
447 ATF_TC_CLEANUP(fhopen_success, tc)
453 ATF_TC_WITH_CLEANUP(fhopen_failure);
454 ATF_TC_HEAD(fhopen_failure, tc)
456 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
460 ATF_TC_BODY(fhopen_failure, tc)
462 const char *regex = "fhopen.*return,failure : Invalid argument";
463 FILE *pipefd = setup(fds, auclass);
465 * Failure reason: NULL does not represent any file handle
466 * and O_CREAT is not allowed as the flag for fhopen(2)
468 ATF_REQUIRE_EQ(-1, fhopen(NULL, O_CREAT));
469 check_audit(fds, regex, pipefd);
472 ATF_TC_CLEANUP(fhopen_failure, tc)
478 ATF_TC_WITH_CLEANUP(fhstat_success);
479 ATF_TC_HEAD(fhstat_success, tc)
481 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
485 ATF_TC_BODY(fhstat_success, tc)
488 snprintf(extregex, sizeof(extregex), "fhstat.*%d.*return,success", pid);
490 /* File needs to exist to get a file-handle */
491 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
492 /* Get the file handle to be passed to fhstat(2) */
493 ATF_REQUIRE_EQ(0, getfh(path, &fht));
495 FILE *pipefd = setup(fds, auclass);
496 ATF_REQUIRE_EQ(0, fhstat(&fht, &statbuff));
497 check_audit(fds, extregex, pipefd);
501 ATF_TC_CLEANUP(fhstat_success, tc)
507 ATF_TC_WITH_CLEANUP(fhstat_failure);
508 ATF_TC_HEAD(fhstat_failure, tc)
510 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
514 ATF_TC_BODY(fhstat_failure, tc)
516 const char *regex = "fhstat.*return,failure : Bad address";
517 FILE *pipefd = setup(fds, auclass);
518 /* Failure reason: NULL does not represent any file handle */
519 ATF_REQUIRE_EQ(-1, fhstat(NULL, NULL));
520 check_audit(fds, regex, pipefd);
523 ATF_TC_CLEANUP(fhstat_failure, tc)
529 ATF_TC_WITH_CLEANUP(fhstatfs_success);
530 ATF_TC_HEAD(fhstatfs_success, tc)
532 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
536 ATF_TC_BODY(fhstatfs_success, tc)
539 snprintf(extregex, sizeof(extregex), "fhstatfs.*%d.*success", pid);
541 /* File needs to exist to get a file-handle */
542 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
543 /* Get the file handle to be passed to fhstatfs(2) */
544 ATF_REQUIRE_EQ(0, getfh(path, &fht));
546 FILE *pipefd = setup(fds, auclass);
547 ATF_REQUIRE_EQ(0, fhstatfs(&fht, &statfsbuff));
548 check_audit(fds, extregex, pipefd);
552 ATF_TC_CLEANUP(fhstatfs_success, tc)
558 ATF_TC_WITH_CLEANUP(fhstatfs_failure);
559 ATF_TC_HEAD(fhstatfs_failure, tc)
561 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
565 ATF_TC_BODY(fhstatfs_failure, tc)
567 const char *regex = "fhstatfs.*return,failure : Bad address";
568 FILE *pipefd = setup(fds, auclass);
569 /* Failure reason: NULL does not represent any file handle */
570 ATF_REQUIRE_EQ(-1, fhstatfs(NULL, NULL));
571 check_audit(fds, regex, pipefd);
574 ATF_TC_CLEANUP(fhstatfs_failure, tc)
580 ATF_TC_WITH_CLEANUP(access_success);
581 ATF_TC_HEAD(access_success, tc)
583 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
587 ATF_TC_BODY(access_success, tc)
589 /* File needs to exist to call access(2) */
590 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
591 FILE *pipefd = setup(fds, auclass);
592 ATF_REQUIRE_EQ(0, access(path, F_OK));
593 check_audit(fds, successreg, pipefd);
597 ATF_TC_CLEANUP(access_success, tc)
603 ATF_TC_WITH_CLEANUP(access_failure);
604 ATF_TC_HEAD(access_failure, tc)
606 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
610 ATF_TC_BODY(access_failure, tc)
612 FILE *pipefd = setup(fds, auclass);
613 /* Failure reason: file does not exist */
614 ATF_REQUIRE_EQ(-1, access(errpath, F_OK));
615 check_audit(fds, failurereg, pipefd);
618 ATF_TC_CLEANUP(access_failure, tc)
624 ATF_TC_WITH_CLEANUP(eaccess_success);
625 ATF_TC_HEAD(eaccess_success, tc)
627 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
631 ATF_TC_BODY(eaccess_success, tc)
633 /* File needs to exist to call eaccess(2) */
634 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
635 FILE *pipefd = setup(fds, auclass);
636 ATF_REQUIRE_EQ(0, eaccess(path, F_OK));
637 check_audit(fds, successreg, pipefd);
641 ATF_TC_CLEANUP(eaccess_success, tc)
647 ATF_TC_WITH_CLEANUP(eaccess_failure);
648 ATF_TC_HEAD(eaccess_failure, tc)
650 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
654 ATF_TC_BODY(eaccess_failure, tc)
656 FILE *pipefd = setup(fds, auclass);
657 /* Failure reason: file does not exist */
658 ATF_REQUIRE_EQ(-1, eaccess(errpath, F_OK));
659 check_audit(fds, failurereg, pipefd);
662 ATF_TC_CLEANUP(eaccess_failure, tc)
668 ATF_TC_WITH_CLEANUP(faccessat_success);
669 ATF_TC_HEAD(faccessat_success, tc)
671 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
672 "faccessat(2) call");
675 ATF_TC_BODY(faccessat_success, tc)
677 /* File needs to exist to call faccessat(2) */
678 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
679 FILE *pipefd = setup(fds, auclass);
680 ATF_REQUIRE_EQ(0, faccessat(AT_FDCWD, path, F_OK, AT_EACCESS));
681 check_audit(fds, successreg, pipefd);
685 ATF_TC_CLEANUP(faccessat_success, tc)
691 ATF_TC_WITH_CLEANUP(faccessat_failure);
692 ATF_TC_HEAD(faccessat_failure, tc)
694 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
695 "faccessat(2) call");
698 ATF_TC_BODY(faccessat_failure, tc)
700 FILE *pipefd = setup(fds, auclass);
701 /* Failure reason: file does not exist */
702 ATF_REQUIRE_EQ(-1, faccessat(AT_FDCWD, errpath, F_OK, AT_EACCESS));
703 check_audit(fds, failurereg, pipefd);
706 ATF_TC_CLEANUP(faccessat_failure, tc)
712 ATF_TC_WITH_CLEANUP(pathconf_success);
713 ATF_TC_HEAD(pathconf_success, tc)
715 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
719 ATF_TC_BODY(pathconf_success, tc)
721 /* File needs to exist to call pathconf(2) */
722 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
723 FILE *pipefd = setup(fds, auclass);
724 /* Get the maximum number of bytes of filename */
725 ATF_REQUIRE(pathconf(path, _PC_NAME_MAX) != -1);
726 check_audit(fds, successreg, pipefd);
730 ATF_TC_CLEANUP(pathconf_success, tc)
736 ATF_TC_WITH_CLEANUP(pathconf_failure);
737 ATF_TC_HEAD(pathconf_failure, tc)
739 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
743 ATF_TC_BODY(pathconf_failure, tc)
745 FILE *pipefd = setup(fds, auclass);
746 /* Failure reason: file does not exist */
747 ATF_REQUIRE_EQ(-1, pathconf(errpath, _PC_NAME_MAX));
748 check_audit(fds, failurereg, pipefd);
751 ATF_TC_CLEANUP(pathconf_failure, tc)
757 ATF_TC_WITH_CLEANUP(lpathconf_success);
758 ATF_TC_HEAD(lpathconf_success, tc)
760 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
761 "lpathconf(2) call");
764 ATF_TC_BODY(lpathconf_success, tc)
766 /* Symbolic link needs to exist to call lpathconf(2) */
767 ATF_REQUIRE_EQ(0, symlink("symlink", path));
768 FILE *pipefd = setup(fds, auclass);
769 /* Get the maximum number of bytes of symlink's name */
770 ATF_REQUIRE(lpathconf(path, _PC_SYMLINK_MAX) != -1);
771 check_audit(fds, successreg, pipefd);
774 ATF_TC_CLEANUP(lpathconf_success, tc)
780 ATF_TC_WITH_CLEANUP(lpathconf_failure);
781 ATF_TC_HEAD(lpathconf_failure, tc)
783 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
784 "lpathconf(2) call");
787 ATF_TC_BODY(lpathconf_failure, tc)
789 FILE *pipefd = setup(fds, auclass);
790 /* Failure reason: symbolic link does not exist */
791 ATF_REQUIRE_EQ(-1, lpathconf(errpath, _PC_SYMLINK_MAX));
792 check_audit(fds, failurereg, pipefd);
795 ATF_TC_CLEANUP(lpathconf_failure, tc)
801 ATF_TC_WITH_CLEANUP(fpathconf_success);
802 ATF_TC_HEAD(fpathconf_success, tc)
804 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
805 "fpathconf(2) call");
808 ATF_TC_BODY(fpathconf_success, tc)
811 snprintf(extregex, sizeof(extregex), "fpathconf.*%d.*success", pid);
813 /* File needs to exist to call fpathconf(2) */
814 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
815 FILE *pipefd = setup(fds, auclass);
816 /* Get the maximum number of bytes of filename */
817 ATF_REQUIRE(fpathconf(filedesc, _PC_NAME_MAX) != -1);
818 check_audit(fds, extregex, pipefd);
822 ATF_TC_CLEANUP(fpathconf_success, tc)
828 ATF_TC_WITH_CLEANUP(fpathconf_failure);
829 ATF_TC_HEAD(fpathconf_failure, tc)
831 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
832 "fpathconf(2) call");
835 ATF_TC_BODY(fpathconf_failure, tc)
837 FILE *pipefd = setup(fds, auclass);
838 const char *regex = "fpathconf.*return,failure : Bad file descriptor";
839 /* Failure reason: Bad file descriptor */
840 ATF_REQUIRE_EQ(-1, fpathconf(-1, _PC_NAME_MAX));
841 check_audit(fds, regex, pipefd);
844 ATF_TC_CLEANUP(fpathconf_failure, tc)
850 ATF_TC_WITH_CLEANUP(extattr_get_file_success);
851 ATF_TC_HEAD(extattr_get_file_success, tc)
853 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
854 "extattr_get_file(2) call");
857 ATF_TC_BODY(extattr_get_file_success, tc)
859 /* File needs to exist to call extattr_get_file(2) */
860 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
861 /* Set an extended attribute to be retrieved later on */
862 ATF_REQUIRE_EQ(sizeof(buff), extattr_set_file(path,
863 EXTATTR_NAMESPACE_USER, name, buff, sizeof(buff)));
865 /* Prepare the regex to be checked in the audit record */
866 snprintf(extregex, sizeof(extregex),
867 "extattr_get_file.*%s.*%s.*return,success", path, name);
869 FILE *pipefd = setup(fds, auclass);
870 ATF_REQUIRE_EQ(sizeof(buff), extattr_get_file(path,
871 EXTATTR_NAMESPACE_USER, name, NULL, 0));
872 check_audit(fds, extregex, pipefd);
876 ATF_TC_CLEANUP(extattr_get_file_success, tc)
882 ATF_TC_WITH_CLEANUP(extattr_get_file_failure);
883 ATF_TC_HEAD(extattr_get_file_failure, tc)
885 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
886 "extattr_get_file(2) call");
889 ATF_TC_BODY(extattr_get_file_failure, tc)
891 /* Prepare the regex to be checked in the audit record */
892 snprintf(extregex, sizeof(extregex),
893 "extattr_get_file.*%s.*%s.*failure", path, name);
895 FILE *pipefd = setup(fds, auclass);
896 /* Failure reason: file does not exist */
897 ATF_REQUIRE_EQ(-1, extattr_get_file(path,
898 EXTATTR_NAMESPACE_USER, name, NULL, 0));
899 check_audit(fds, extregex, pipefd);
902 ATF_TC_CLEANUP(extattr_get_file_failure, tc)
908 ATF_TC_WITH_CLEANUP(extattr_get_fd_success);
909 ATF_TC_HEAD(extattr_get_fd_success, tc)
911 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
912 "extattr_get_fd(2) call");
915 ATF_TC_BODY(extattr_get_fd_success, tc)
917 /* File needs to exist to call extattr_get_fd(2) */
918 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
919 /* Set an extended attribute to be retrieved later on */
920 ATF_REQUIRE_EQ(sizeof(buff), extattr_set_file(path,
921 EXTATTR_NAMESPACE_USER, name, buff, sizeof(buff)));
923 /* Prepare the regex to be checked in the audit record */
924 snprintf(extregex, sizeof(extregex),
925 "extattr_get_fd.*%s.*return,success", name);
927 FILE *pipefd = setup(fds, auclass);
928 ATF_REQUIRE_EQ(sizeof(buff), extattr_get_fd(filedesc,
929 EXTATTR_NAMESPACE_USER, name, NULL, 0));
930 check_audit(fds, extregex, pipefd);
934 ATF_TC_CLEANUP(extattr_get_fd_success, tc)
940 ATF_TC_WITH_CLEANUP(extattr_get_fd_failure);
941 ATF_TC_HEAD(extattr_get_fd_failure, tc)
943 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
944 "extattr_get_fd(2) call");
947 ATF_TC_BODY(extattr_get_fd_failure, tc)
949 /* Prepare the regex to be checked in the audit record */
950 snprintf(extregex, sizeof(extregex),
951 "extattr_get_fd.*%s.*return,failure : Bad file descriptor", name);
953 FILE *pipefd = setup(fds, auclass);
954 /* Failure reason: Invalid file descriptor */
955 ATF_REQUIRE_EQ(-1, extattr_get_fd(-1,
956 EXTATTR_NAMESPACE_USER, name, NULL, 0));
957 check_audit(fds, extregex, pipefd);
960 ATF_TC_CLEANUP(extattr_get_fd_failure, tc)
966 ATF_TC_WITH_CLEANUP(extattr_get_link_success);
967 ATF_TC_HEAD(extattr_get_link_success, tc)
969 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
970 "extattr_get_link(2) call");
973 ATF_TC_BODY(extattr_get_link_success, tc)
975 /* Symbolic link needs to exist to call extattr_get_link(2) */
976 ATF_REQUIRE_EQ(0, symlink("symlink", path));
977 /* Set an extended attribute to be retrieved later on */
978 ATF_REQUIRE_EQ(sizeof(buff), extattr_set_link(path,
979 EXTATTR_NAMESPACE_USER, name, buff, sizeof(buff)));
981 /* Prepare the regex to be checked in the audit record */
982 snprintf(extregex, sizeof(extregex),
983 "extattr_get_link.*%s.*%s.*return,success", path, name);
985 FILE *pipefd = setup(fds, auclass);
986 ATF_REQUIRE_EQ(sizeof(buff), extattr_get_link(path,
987 EXTATTR_NAMESPACE_USER, name, NULL, 0));
988 check_audit(fds, extregex, pipefd);
991 ATF_TC_CLEANUP(extattr_get_link_success, tc)
997 ATF_TC_WITH_CLEANUP(extattr_get_link_failure);
998 ATF_TC_HEAD(extattr_get_link_failure, tc)
1000 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1001 "extattr_get_link(2) call");
1004 ATF_TC_BODY(extattr_get_link_failure, tc)
1006 /* Prepare the regex to be checked in the audit record */
1007 snprintf(extregex, sizeof(extregex),
1008 "extattr_get_link.*%s.*%s.*failure", path, name);
1009 FILE *pipefd = setup(fds, auclass);
1010 /* Failure reason: symbolic link does not exist */
1011 ATF_REQUIRE_EQ(-1, extattr_get_link(path,
1012 EXTATTR_NAMESPACE_USER, name, NULL, 0));
1013 check_audit(fds, extregex, pipefd);
1016 ATF_TC_CLEANUP(extattr_get_link_failure, tc)
1022 ATF_TC_WITH_CLEANUP(extattr_list_file_success);
1023 ATF_TC_HEAD(extattr_list_file_success, tc)
1025 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1026 "extattr_list_file(2) call");
1029 ATF_TC_BODY(extattr_list_file_success, tc)
1032 /* File needs to exist to call extattr_list_file(2) */
1033 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
1035 FILE *pipefd = setup(fds, auclass);
1036 ATF_REQUIRE((readbuff = extattr_list_file(path,
1037 EXTATTR_NAMESPACE_USER, NULL, 0)) != -1);
1038 /* Prepare the regex to be checked in the audit record */
1039 snprintf(extregex, sizeof(extregex),
1040 "extattr_list_file.*%s.*return,success,%d", path, readbuff);
1041 check_audit(fds, extregex, pipefd);
1044 ATF_TC_CLEANUP(extattr_list_file_success, tc)
1050 ATF_TC_WITH_CLEANUP(extattr_list_file_failure);
1051 ATF_TC_HEAD(extattr_list_file_failure, tc)
1053 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1054 "extattr_list_file(2) call");
1057 ATF_TC_BODY(extattr_list_file_failure, tc)
1059 /* Prepare the regex to be checked in the audit record */
1060 snprintf(extregex, sizeof(extregex),
1061 "extattr_list_file.*%s.*return,failure", path);
1063 FILE *pipefd = setup(fds, auclass);
1064 /* Failure reason: file does not exist */
1065 ATF_REQUIRE_EQ(-1, extattr_list_file(path,
1066 EXTATTR_NAMESPACE_USER, NULL, 0));
1067 check_audit(fds, extregex, pipefd);
1070 ATF_TC_CLEANUP(extattr_list_file_failure, tc)
1076 ATF_TC_WITH_CLEANUP(extattr_list_fd_success);
1077 ATF_TC_HEAD(extattr_list_fd_success, tc)
1079 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1080 "extattr_list_fd(2) call");
1083 ATF_TC_BODY(extattr_list_fd_success, tc)
1086 /* File needs to exist to call extattr_list_fd(2) */
1087 ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
1089 FILE *pipefd = setup(fds, auclass);
1090 ATF_REQUIRE((readbuff = extattr_list_fd(filedesc,
1091 EXTATTR_NAMESPACE_USER, NULL, 0)) != -1);
1092 /* Prepare the regex to be checked in the audit record */
1093 snprintf(extregex, sizeof(extregex),
1094 "extattr_list_fd.*return,success,%d", readbuff);
1095 check_audit(fds, extregex, pipefd);
1099 ATF_TC_CLEANUP(extattr_list_fd_success, tc)
1105 ATF_TC_WITH_CLEANUP(extattr_list_fd_failure);
1106 ATF_TC_HEAD(extattr_list_fd_failure, tc)
1108 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1109 "extattr_list_fd(2) call");
1112 ATF_TC_BODY(extattr_list_fd_failure, tc)
1114 /* Prepare the regex to be checked in the audit record */
1115 snprintf(extregex, sizeof(extregex),
1116 "extattr_list_fd.*return,failure : Bad file descriptor");
1118 FILE *pipefd = setup(fds, auclass);
1119 /* Failure reason: Invalid file descriptor */
1121 extattr_list_fd(-1, EXTATTR_NAMESPACE_USER, NULL, 0));
1122 check_audit(fds, extregex, pipefd);
1125 ATF_TC_CLEANUP(extattr_list_fd_failure, tc)
1131 ATF_TC_WITH_CLEANUP(extattr_list_link_success);
1132 ATF_TC_HEAD(extattr_list_link_success, tc)
1134 atf_tc_set_md_var(tc, "descr", "Tests the audit of a successful "
1135 "extattr_list_link(2) call");
1138 ATF_TC_BODY(extattr_list_link_success, tc)
1141 /* Symbolic link needs to exist to call extattr_list_link(2) */
1142 ATF_REQUIRE_EQ(0, symlink("symlink", path));
1143 FILE *pipefd = setup(fds, auclass);
1145 ATF_REQUIRE((readbuff = extattr_list_link(path,
1146 EXTATTR_NAMESPACE_USER, NULL, 0)) != -1);
1147 /* Prepare the regex to be checked in the audit record */
1148 snprintf(extregex, sizeof(extregex),
1149 "extattr_list_link.*%s.*return,success,%d", path, readbuff);
1150 check_audit(fds, extregex, pipefd);
1153 ATF_TC_CLEANUP(extattr_list_link_success, tc)
1159 ATF_TC_WITH_CLEANUP(extattr_list_link_failure);
1160 ATF_TC_HEAD(extattr_list_link_failure, tc)
1162 atf_tc_set_md_var(tc, "descr", "Tests the audit of an unsuccessful "
1163 "extattr_list_link(2) call");
1166 ATF_TC_BODY(extattr_list_link_failure, tc)
1168 /* Prepare the regex to be checked in the audit record */
1169 snprintf(extregex, sizeof(extregex),
1170 "extattr_list_link.*%s.*failure", path);
1171 FILE *pipefd = setup(fds, auclass);
1172 /* Failure reason: symbolic link does not exist */
1173 ATF_REQUIRE_EQ(-1, extattr_list_link(path,
1174 EXTATTR_NAMESPACE_USER, NULL, 0));
1175 check_audit(fds, extregex, pipefd);
1178 ATF_TC_CLEANUP(extattr_list_link_failure, tc)
1186 ATF_TP_ADD_TC(tp, stat_success);
1187 ATF_TP_ADD_TC(tp, stat_failure);
1188 ATF_TP_ADD_TC(tp, lstat_success);
1189 ATF_TP_ADD_TC(tp, lstat_failure);
1190 ATF_TP_ADD_TC(tp, fstat_success);
1191 ATF_TP_ADD_TC(tp, fstat_failure);
1192 ATF_TP_ADD_TC(tp, fstatat_success);
1193 ATF_TP_ADD_TC(tp, fstatat_failure);
1195 ATF_TP_ADD_TC(tp, statfs_success);
1196 ATF_TP_ADD_TC(tp, statfs_failure);
1197 ATF_TP_ADD_TC(tp, fstatfs_success);
1198 ATF_TP_ADD_TC(tp, fstatfs_failure);
1200 ATF_TP_ADD_TC(tp, getfsstat_success);
1201 ATF_TP_ADD_TC(tp, getfsstat_failure);
1203 ATF_TP_ADD_TC(tp, lgetfh_success);
1204 ATF_TP_ADD_TC(tp, lgetfh_failure);
1205 ATF_TP_ADD_TC(tp, fhopen_success);
1206 ATF_TP_ADD_TC(tp, fhopen_failure);
1207 ATF_TP_ADD_TC(tp, fhstat_success);
1208 ATF_TP_ADD_TC(tp, fhstat_failure);
1209 ATF_TP_ADD_TC(tp, fhstatfs_success);
1210 ATF_TP_ADD_TC(tp, fhstatfs_failure);
1212 ATF_TP_ADD_TC(tp, access_success);
1213 ATF_TP_ADD_TC(tp, access_failure);
1214 ATF_TP_ADD_TC(tp, eaccess_success);
1215 ATF_TP_ADD_TC(tp, eaccess_failure);
1216 ATF_TP_ADD_TC(tp, faccessat_success);
1217 ATF_TP_ADD_TC(tp, faccessat_failure);
1219 ATF_TP_ADD_TC(tp, pathconf_success);
1220 ATF_TP_ADD_TC(tp, pathconf_failure);
1221 ATF_TP_ADD_TC(tp, lpathconf_success);
1222 ATF_TP_ADD_TC(tp, lpathconf_failure);
1223 ATF_TP_ADD_TC(tp, fpathconf_success);
1224 ATF_TP_ADD_TC(tp, fpathconf_failure);
1226 ATF_TP_ADD_TC(tp, extattr_get_file_success);
1227 ATF_TP_ADD_TC(tp, extattr_get_file_failure);
1228 ATF_TP_ADD_TC(tp, extattr_get_fd_success);
1229 ATF_TP_ADD_TC(tp, extattr_get_fd_failure);
1230 ATF_TP_ADD_TC(tp, extattr_get_link_success);
1231 ATF_TP_ADD_TC(tp, extattr_get_link_failure);
1233 ATF_TP_ADD_TC(tp, extattr_list_file_success);
1234 ATF_TP_ADD_TC(tp, extattr_list_file_failure);
1235 ATF_TP_ADD_TC(tp, extattr_list_fd_success);
1236 ATF_TP_ADD_TC(tp, extattr_list_fd_failure);
1237 ATF_TP_ADD_TC(tp, extattr_list_link_success);
1238 ATF_TP_ADD_TC(tp, extattr_list_link_failure);
1240 return (atf_no_error());