2 # Copyright 2022 Mateusz Piotrowski <0mp@FreeBSD.org>
4 # SPDX-License-Identifier: BSD-2-Clause
6 # Redistribution and use in source and binary forms, with or without
7 # modification, are permitted provided that the following conditions
9 # 1. Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
11 # 2. Redistributions in binary form must reproduce the above copyright
12 # notice, this list of conditions and the following disclaimer in the
13 # documentation and/or other materials provided with the distribution.
15 # THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 # ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 atf_test_case oomprotect_all
31 atf_set
"descr" "Verify that \${name}_oomprotect=all protects " \
32 "the command and all its current and future children"
33 atf_set
"require.user" "root" # For protect(1).
38 if [ "$(sysctl -n security.jail.jailed)" != 0 ]; then
39 atf_skip
"protect(1) cannot be used in a jail"
42 __name
="$(atf_get ident)"
43 __pidfile
="$(mktemp -t "${__name}.pid
")"
44 __childpidfile
="$(mktemp -t "${__name}.childpid
")"
45 __script
=$
(mktemp
-t "${__name}.script")
47 cat >> "$__script" <<-'LITERAL'
53 setvar "${name}_oomprotect" all
54 command="/usr/sbin/daemon"
55 command_args="-P $pidfile -p $_childpidfile -- /bin/sleep 5"
56 run_rc_command "$_rc_arg"
59 atf_check
-s exit:0 -o inline
:"Starting ${__name}.\n" -e empty \
60 /bin
/sh
"$__script" "$__name" "$__pidfile" "$__childpidfile" onestart
61 atf_check
-s exit:0 -o match
:'^..1..... .......1$' -e empty \
62 ps
-p "$(cat "$__pidfile")" -ax -o flags
,flags2
63 atf_check
-s exit:0 -o match
:'^..1..... .......1$' -e empty \
64 ps
-p "$(cat "$__childpidfile")" -ax -o flags
,flags2
65 atf_check
-s exit:0 -o ignore
-e empty \
66 /bin
/sh
"$__script" "$__name" "$__pidfile" "$__childpidfile" onestop
69 atf_test_case oomprotect_yes
72 atf_set
"descr" "Verify that \${name}_oomprotect=yes protects " \
73 "the command but not its children"
74 atf_set
"require.user" "root" # For protect(1).
79 if [ "$(sysctl -n security.jail.jailed)" != 0 ]; then
80 atf_skip
"protect(1) cannot be used in a jail"
83 __name
="$(atf_get ident)"
84 __pidfile
="$(mktemp -t "${__name}.pid
")"
85 __script
=$
(mktemp
-t "${__name}.script")
87 cat >> "$__script" <<-'LITERAL'
92 setvar "${name}_oomprotect" yes
94 command="/usr/sbin/daemon"
95 command_args="-p $pidfile -- $procname 5"
96 run_rc_command "$_rc_arg"
99 atf_check
-s exit:0 -o inline
:"Starting ${__name}.\n" -e empty \
100 /bin
/sh
"$__script" "$__name" "$__pidfile" onestart
101 atf_check
-s exit:0 -o match
:'^..1..... .......0$' -e empty \
102 ps
-p "$(cat "$__pidfile")" -ax -o flags
,flags2
103 atf_check
-s exit:0 -o ignore
-e empty \
104 /bin
/sh
"$__script" "$__name" "$__pidfile" onestop
107 atf_init_test_cases
()
109 atf_add_test_case oomprotect_all
110 atf_add_test_case oomprotect_yes