1f7f4e0f7SAlan SomersTESTSDIR= ${TESTSBASE}/sys/audit 2f7f4e0f7SAlan Somers 3f86d6517SAlan SomersATF_TESTS_C= file-attribute-access 45597d2a3SAlan SomersATF_TESTS_C+= file-attribute-modify 5f86d6517SAlan SomersATF_TESTS_C+= file-create 6a19dca2dSAlan SomersATF_TESTS_C+= file-delete 701e77fa0SAlan SomersATF_TESTS_C+= file-close 826f5ecb7SAlan SomersATF_TESTS_C+= file-write 98ec6562bSAlan SomersATF_TESTS_C+= file-read 10c41bbc0aSAlan SomersATF_TESTS_C+= open 114003d938SAlan SomersATF_TESTS_C+= ioctl 12ad2afa8cSAlan SomersATF_TESTS_C+= network 13d7d1ecc0SAlan SomersATF_TESTS_C+= inter-process 1449f52650SAlan SomersATF_TESTS_C+= administrative 15c907f24eSAlan SomersATF_TESTS_C+= process-control 1670eaeb36SAlan SomersATF_TESTS_C+= miscellaneous 17f7f4e0f7SAlan Somers 18f86d6517SAlan SomersSRCS.file-attribute-access+= file-attribute-access.c 19f86d6517SAlan SomersSRCS.file-attribute-access+= utils.c 206d203d2dSAlan SomersSRCS.file-attribute-modify+= file-attribute-modify.c 216d203d2dSAlan SomersSRCS.file-attribute-modify+= utils.c 22f7f4e0f7SAlan SomersSRCS.file-create+= file-create.c 23f7f4e0f7SAlan SomersSRCS.file-create+= utils.c 24a19dca2dSAlan SomersSRCS.file-delete+= file-delete.c 25a19dca2dSAlan SomersSRCS.file-delete+= utils.c 2601e77fa0SAlan SomersSRCS.file-close+= file-close.c 2701e77fa0SAlan SomersSRCS.file-close+= utils.c 2826f5ecb7SAlan SomersSRCS.file-write+= file-write.c 2926f5ecb7SAlan SomersSRCS.file-write+= utils.c 308ec6562bSAlan SomersSRCS.file-read+= file-read.c 318ec6562bSAlan SomersSRCS.file-read+= utils.c 32c41bbc0aSAlan SomersSRCS.open+= open.c 33c41bbc0aSAlan SomersSRCS.open+= utils.c 344003d938SAlan SomersSRCS.ioctl+= ioctl.c 354003d938SAlan SomersSRCS.ioctl+= utils.c 36ad2afa8cSAlan SomersSRCS.network+= network.c 37ad2afa8cSAlan SomersSRCS.network+= utils.c 38d7d1ecc0SAlan SomersSRCS.inter-process+= inter-process.c 39d7d1ecc0SAlan SomersSRCS.inter-process+= utils.c 4049f52650SAlan SomersSRCS.administrative+= administrative.c 4149f52650SAlan SomersSRCS.administrative+= utils.c 42c907f24eSAlan SomersSRCS.process-control+= process-control.c 43c907f24eSAlan SomersSRCS.process-control+= utils.c 4470eaeb36SAlan SomersSRCS.miscellaneous+= miscellaneous.c 4570eaeb36SAlan SomersSRCS.miscellaneous+= utils.c 46f7f4e0f7SAlan Somers 47f7f4e0f7SAlan SomersTEST_METADATA+= timeout="30" 48f7f4e0f7SAlan SomersTEST_METADATA+= required_user="root" 49df093aa9SAlex Richardson# Only one process can be auditing, if we attempt to run these tests in parallel 50df093aa9SAlex Richardson# some of them will fail to start auditing. 51df093aa9SAlex Richardson# TODO: it would be nice to be able to run them in parallel with other non-audit 52df093aa9SAlex Richardson# tests using some internal form of synchronization. 53df093aa9SAlex Richardson# TODO: In addititon to test failures, running in parallel can trigger a kernel 54df093aa9SAlex Richardson# panic: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=253616 55a19dca2dSAlan SomersTEST_METADATA+= is_exclusive="true" 56a8ca275bSEdward Tomasz NapieralaTEST_METADATA+= required_files="/etc/rc.d/auditd /dev/auditpipe" 57f7f4e0f7SAlan Somers 58*4621c4f2SEd MasteMK_PIE:= no # XXX libprivateauditd.a is not PIE 5901e77fa0SAlan SomersLDFLAGS+= -lbsm -lutil 60df093aa9SAlex RichardsonOPENBSMDIR=${SRCTOP}/contrib/openbsm 61df093aa9SAlex RichardsonCFLAGS+= -I${OPENBSMDIR} 62df093aa9SAlex RichardsonLDADD+= ${LIBAUDITD} 63f7f4e0f7SAlan Somers 648f462da4SOlivier CochardCFLAGS.process-control.c+= -I${SRCTOP}/tests 658f462da4SOlivier Cochard 66f7f4e0f7SAlan Somers.include <bsd.test.mk> 67