003 File Manager
Current Path:
/usr/src/contrib/netbsd-tests/lib/libc/sys
usr
/
src
/
contrib
/
netbsd-tests
/
lib
/
libc
/
sys
/
📁
..
📄
t_access.c
(5.03 KB)
📄
t_bind.c
(2.37 KB)
📄
t_chroot.c
(6.75 KB)
📄
t_clock_gettime.c
(6.4 KB)
📄
t_clock_nanosleep.c
(2.38 KB)
📄
t_clone.c
(5.97 KB)
📄
t_connect.c
(3.88 KB)
📄
t_dup.c
(8.19 KB)
📄
t_fsync.c
(3.05 KB)
📄
t_getcontext.c
(4.02 KB)
📄
t_getgroups.c
(4.17 KB)
📄
t_getitimer.c
(5.41 KB)
📄
t_getlogin.c
(5.03 KB)
📄
t_getpid.c
(3.13 KB)
📄
t_getrusage.c
(4.92 KB)
📄
t_getsid.c
(2.96 KB)
📄
t_getsockname.c
(2.56 KB)
📄
t_gettimeofday.c
(2.64 KB)
📄
t_issetugid.c
(3.73 KB)
📄
t_kevent.c
(5.15 KB)
📄
t_kill.c
(6.3 KB)
📄
t_link.c
(5.49 KB)
📄
t_listen.c
(3.84 KB)
📄
t_lwp_create.c
(7.14 KB)
📄
t_lwp_ctl.c
(2.34 KB)
📄
t_mincore.c
(9.69 KB)
📄
t_minherit.c
(4.68 KB)
📄
t_mkdir.c
(5.12 KB)
📄
t_mkfifo.c
(5.8 KB)
📄
t_mknod.c
(4.95 KB)
📄
t_mlock.c
(10.41 KB)
📄
t_mmap.c
(14.12 KB)
📄
t_mprotect.c
(8.41 KB)
📄
t_msgctl.c
(8.06 KB)
📄
t_msgget.c
(6.71 KB)
📄
t_msgrcv.c
(7.68 KB)
📄
t_msgsnd.c
(7.64 KB)
📄
t_msync.c
(5.11 KB)
📄
t_nanosleep.c
(6.24 KB)
📄
t_pipe.c
(4.37 KB)
📄
t_pipe2.c
(5.45 KB)
📄
t_poll.c
(9.35 KB)
📄
t_posix_fadvise.c
(5.82 KB)
📄
t_posix_fallocate.c
(2.3 KB)
📄
t_recvmmsg.c
(4.88 KB)
📄
t_revoke.c
(4.55 KB)
📄
t_select.c
(4.88 KB)
📄
t_setrlimit.c
(11.54 KB)
📄
t_setuid.c
(3.08 KB)
📄
t_sigaction.c
(3.91 KB)
📄
t_sigqueue.c
(6.02 KB)
📄
t_sigtimedwait.c
(3.57 KB)
📄
t_socketpair.c
(5.18 KB)
📄
t_stat.c
(9.39 KB)
📄
t_swapcontext.c
(3.44 KB)
📄
t_timer_create.c
(7.47 KB)
📄
t_truncate.c
(4.51 KB)
📄
t_ucontext.c
(2.17 KB)
📄
t_umask.c
(4.18 KB)
📄
t_unlink.c
(3.95 KB)
📄
t_wait.c
(8.99 KB)
📄
t_wait_noproc.c
(7.43 KB)
📄
t_wait_noproc_wnohang.c
(1.49 KB)
📄
t_write.c
(5.22 KB)
Editing: t_kill.c
/* $NetBSD: t_kill.c,v 1.1 2011/07/07 06:57:53 jruoho Exp $ */ /*- * Copyright (c) 2011 The NetBSD Foundation, Inc. * All rights reserved. * * This code is derived from software contributed to The NetBSD Foundation * by Jukka Ruohonen. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #include <sys/cdefs.h> __RCSID("$NetBSD: t_kill.c,v 1.1 2011/07/07 06:57:53 jruoho Exp $"); #include <sys/wait.h> #include <errno.h> #include <limits.h> #include <pwd.h> #include <signal.h> #include <stdlib.h> #include <unistd.h> #include <atf-c.h> ATF_TC(kill_basic); ATF_TC_HEAD(kill_basic, tc) { atf_tc_set_md_var(tc, "descr", "Test that kill(2) works"); } ATF_TC_BODY(kill_basic, tc) { const int sig[] = { SIGHUP, SIGINT, SIGKILL, SIGTERM }; pid_t pid; size_t i; int sta; for (i = 0; i < __arraycount(sig); i++) { pid = fork(); ATF_REQUIRE(pid >= 0); switch (pid) { case 0: pause(); break; default: ATF_REQUIRE(kill(pid, sig[i]) == 0); } (void)wait(&sta); if (WIFSIGNALED(sta) == 0 || WTERMSIG(sta) != sig[i]) atf_tc_fail("kill(2) failed to kill child"); } } ATF_TC(kill_err); ATF_TC_HEAD(kill_err, tc) { atf_tc_set_md_var(tc, "descr", "Test error conditions of kill(2)"); } ATF_TC_BODY(kill_err, tc) { int rv, sta; pid_t pid; pid = fork(); ATF_REQUIRE(pid >= 0); if (pid == 0) { errno = 0; rv = kill(getpid(), -1); if (rv == 0 || errno != EINVAL) _exit(EINVAL); errno = 0; rv = kill(INT_MAX, SIGUSR1); if (rv == 0 || errno != ESRCH) _exit(ESRCH); _exit(EXIT_SUCCESS); } (void)wait(&sta); if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS) { if (WEXITSTATUS(sta) == EINVAL) atf_tc_fail("expected EINVAL, but kill(2) succeeded"); if (WEXITSTATUS(sta) == ESRCH) atf_tc_fail("expected ESRCH, but kill(2) succeeded"); atf_tc_fail("unknown error from kill(2)"); } } ATF_TC(kill_perm); ATF_TC_HEAD(kill_perm, tc) { atf_tc_set_md_var(tc, "descr", "Test kill(2) permissions"); atf_tc_set_md_var(tc, "require.user", "root"); } ATF_TC_BODY(kill_perm, tc) { struct passwd *pw; pid_t cpid, ppid; uid_t cuid = 0; uid_t puid = 0; int sta; /* * Test that kill(2) fails when called * for a PID owned by another user. */ pw = getpwnam("operator"); if (pw != NULL) cuid = pw->pw_uid; pw = getpwnam("nobody"); if (pw != NULL) puid = pw->pw_uid; if (cuid == 0 || puid == 0 || cuid == puid) atf_tc_fail("getpwnam(3) failed"); ppid = fork(); if (ppid < 0) _exit(EXIT_FAILURE); if (ppid == 0) { cpid = fork(); if (cpid < 0) _exit(EXIT_FAILURE); if (cpid == 0) { if (setuid(cuid) < 0) _exit(EXIT_FAILURE); else { (void)sleep(1); } _exit(EXIT_SUCCESS); } /* * Try to kill the child after having * set the real and effective UID. */ if (setuid(puid) != 0) _exit(EXIT_FAILURE); errno = 0; if (kill(cpid, SIGKILL) == 0) _exit(EPERM); if (errno != EPERM) _exit(EPERM); (void)waitpid(cpid, &sta, 0); _exit(EXIT_SUCCESS); } (void)waitpid(ppid, &sta, 0); if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) == EPERM) atf_tc_fail("killed a process of another user"); if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS) atf_tc_fail("unknown error from kill(2)"); } ATF_TC(kill_pgrp_neg); ATF_TC_HEAD(kill_pgrp_neg, tc) { atf_tc_set_md_var(tc, "descr", "Test kill(2) with process group, #2"); } ATF_TC_BODY(kill_pgrp_neg, tc) { const int maxiter = 3; pid_t cpid, ppid; int i, sta; ppid = fork(); ATF_REQUIRE(ppid >= 0); if (ppid == 0) { ATF_REQUIRE(setpgid(0, 0) == 0); for (i = 0; i < maxiter; i++) { cpid = fork(); ATF_REQUIRE(cpid >= 0); if (cpid == 0) pause(); } /* * Test the variant of killpg(3); if the process number * is negative but not -1, the signal should be sent to * all processes whose process group ID is equal to the * absolute value of the process number. */ ATF_REQUIRE(kill(-getpgrp(), SIGKILL) == 0); (void)sleep(1); _exit(EXIT_SUCCESS); } (void)waitpid(ppid, &sta, 0); if (WIFSIGNALED(sta) == 0 || WTERMSIG(sta) != SIGKILL) atf_tc_fail("failed to kill(2) a process group"); } ATF_TC(kill_pgrp_zero); ATF_TC_HEAD(kill_pgrp_zero, tc) { atf_tc_set_md_var(tc, "descr", "Test kill(2) with process group, #1"); } ATF_TC_BODY(kill_pgrp_zero, tc) { const int maxiter = 3; pid_t cpid, ppid; int i, sta; ppid = fork(); ATF_REQUIRE(ppid >= 0); if (ppid == 0) { ATF_REQUIRE(setpgid(0, 0) == 0); for (i = 0; i < maxiter; i++) { cpid = fork(); ATF_REQUIRE(cpid >= 0); if (cpid == 0) pause(); } /* * If the supplied process number is zero, * the signal should be sent to all processes * under the current process group. */ ATF_REQUIRE(kill(0, SIGKILL) == 0); (void)sleep(1); _exit(EXIT_SUCCESS); } (void)waitpid(ppid, &sta, 0); if (WIFSIGNALED(sta) == 0 || WTERMSIG(sta) != SIGKILL) atf_tc_fail("failed to kill(2) a process group"); } ATF_TP_ADD_TCS(tp) { ATF_TP_ADD_TC(tp, kill_basic); ATF_TP_ADD_TC(tp, kill_err); ATF_TP_ADD_TC(tp, kill_perm); ATF_TP_ADD_TC(tp, kill_pgrp_neg); ATF_TP_ADD_TC(tp, kill_pgrp_zero); return atf_no_error(); }
Upload File
Create Folder