1# 2# Copyright 2022 Mateusz Piotrowski <0mp@FreeBSD.org> 3# 4# SPDX-License-Identifier: BSD-2-Clause 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions 8# are met: 9# 1. Redistributions of source code must retain the above copyright 10# notice, this list of conditions and the following disclaimer. 11# 2. Redistributions in binary form must reproduce the above copyright 12# notice, this list of conditions and the following disclaimer in the 13# documentation and/or other materials provided with the distribution. 14# 15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25# SUCH DAMAGE. 26# 27 28atf_test_case oomprotect_all 29oomprotect_all_head() 30{ 31 atf_set "descr" "Verify that \${name}_oomprotect=all protects " \ 32 "the command and all its current and future children" 33 atf_set "require.user" "root" # For protect(1). 34} 35 36oomprotect_all_body() 37{ 38 if [ "$(sysctl -n security.jail.jailed)" != 0 ]; then 39 atf_skip "protect(1) cannot be used in a jail" 40 fi 41 42 __name="$(atf_get ident)" 43 __pidfile="$(mktemp -t "${__name}.pid")" 44 __childpidfile="$(mktemp -t "${__name}.childpid")" 45 __script=$(mktemp -t "${__name}.script") 46 47 cat >> "$__script" <<-'LITERAL' 48 . /etc/rc.subr 49 name="$1" 50 pidfile="$2" 51 _childpidfile="$3" 52 _rc_arg="$4" 53 setvar "${name}_oomprotect" all 54 command="/usr/sbin/daemon" 55 command_args="-P $pidfile -p $_childpidfile -- /bin/sleep 5" 56 run_rc_command "$_rc_arg" 57 LITERAL 58 59 atf_check -s exit:0 -o inline:"Starting ${__name}.\n" -e empty \ 60 /bin/sh "$__script" "$__name" "$__pidfile" "$__childpidfile" onestart 61 atf_check -s exit:0 -o match:'^..1..... .......1$' -e empty \ 62 ps -p "$(cat "$__pidfile")" -ax -o flags,flags2 63 atf_check -s exit:0 -o match:'^..1..... .......1$' -e empty \ 64 ps -p "$(cat "$__childpidfile")" -ax -o flags,flags2 65 atf_check -s exit:0 -o ignore -e empty \ 66 /bin/sh "$__script" "$__name" "$__pidfile" "$__childpidfile" onestop 67} 68 69atf_test_case oomprotect_yes 70oomprotect_yes_head() 71{ 72 atf_set "descr" "Verify that \${name}_oomprotect=yes protects " \ 73 "the command but not its children" 74 atf_set "require.user" "root" # For protect(1). 75} 76 77oomprotect_yes_body() 78{ 79 if [ "$(sysctl -n security.jail.jailed)" != 0 ]; then 80 atf_skip "protect(1) cannot be used in a jail" 81 fi 82 83 __name="$(atf_get ident)" 84 __pidfile="$(mktemp -t "${__name}.pid")" 85 __script=$(mktemp -t "${__name}.script") 86 87 cat >> "$__script" <<-'LITERAL' 88 . /etc/rc.subr 89 name="$1" 90 pidfile="$2" 91 _rc_arg="$3" 92 setvar "${name}_oomprotect" yes 93 procname="/bin/sleep" 94 command="/usr/sbin/daemon" 95 command_args="-p $pidfile -- $procname 5" 96 run_rc_command "$_rc_arg" 97 LITERAL 98 99 atf_check -s exit:0 -o inline:"Starting ${__name}.\n" -e empty \ 100 /bin/sh "$__script" "$__name" "$__pidfile" onestart 101 atf_check -s exit:0 -o match:'^..1..... .......0$' -e empty \ 102 ps -p "$(cat "$__pidfile")" -ax -o flags,flags2 103 atf_check -s exit:0 -o ignore -e empty \ 104 /bin/sh "$__script" "$__name" "$__pidfile" onestop 105} 106 107atf_init_test_cases() 108{ 109 atf_add_test_case oomprotect_all 110 atf_add_test_case oomprotect_yes 111} 112