1*8a272653SPeter Holm#!/bin/sh 2*8a272653SPeter Holm 3*8a272653SPeter Holm# 4*8a272653SPeter Holm# Copyright (c) 2017 Dell EMC Isilon 5*8a272653SPeter Holm# All rights reserved. 6*8a272653SPeter Holm# 7*8a272653SPeter Holm# Redistribution and use in source and binary forms, with or without 8*8a272653SPeter Holm# modification, are permitted provided that the following conditions 9*8a272653SPeter Holm# are met: 10*8a272653SPeter Holm# 1. Redistributions of source code must retain the above copyright 11*8a272653SPeter Holm# notice, this list of conditions and the following disclaimer. 12*8a272653SPeter Holm# 2. Redistributions in binary form must reproduce the above copyright 13*8a272653SPeter Holm# notice, this list of conditions and the following disclaimer in the 14*8a272653SPeter Holm# documentation and/or other materials provided with the distribution. 15*8a272653SPeter Holm# 16*8a272653SPeter Holm# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 17*8a272653SPeter Holm# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18*8a272653SPeter Holm# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19*8a272653SPeter Holm# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 20*8a272653SPeter Holm# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21*8a272653SPeter Holm# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22*8a272653SPeter Holm# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23*8a272653SPeter Holm# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24*8a272653SPeter Holm# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25*8a272653SPeter Holm# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26*8a272653SPeter Holm# SUCH DAMAGE. 27*8a272653SPeter Holm# 28*8a272653SPeter Holm 29*8a272653SPeter Holm# Copy of link.sh with leak detection added 30*8a272653SPeter Holm 31*8a272653SPeter Holm[ `id -u ` -ne 0 ] && echo "Must be root!" && exit 1 32*8a272653SPeter Holm 33*8a272653SPeter Holm. ../default.cfg 34*8a272653SPeter Holm 35*8a272653SPeter Holmhere=`pwd` 36*8a272653SPeter Holmcd /tmp 37*8a272653SPeter Holmsed '1,/^EOF/d' < $here/link.sh > link.c 38*8a272653SPeter Holmmycc -o link -Wall -Wextra -O2 -g link.c || exit 1 39*8a272653SPeter Holmrm -f link.c 40*8a272653SPeter Holm 41*8a272653SPeter Holmmount | grep $mntpoint | grep -q /dev/md && umount -f $mntpoint 42*8a272653SPeter Holm[ -c /dev/md$mdstart ] && mdconfig -d -u $mdstart 43*8a272653SPeter Holm 44*8a272653SPeter Holmmdconfig -a -t swap -s 1g -u $mdstart || exit 1 45*8a272653SPeter Holmbsdlabel -w md$mdstart auto 46*8a272653SPeter Holmnewfs $newfs_flags md${mdstart}$part > /dev/null 47*8a272653SPeter Holmmount /dev/md${mdstart}$part $mntpoint 48*8a272653SPeter Holm 49*8a272653SPeter Holmdaemon sh -c "(cd $here/../testcases/swap; ./swap -t 5m -i 20 -h -l 100)" \ 50*8a272653SPeter Holm > /dev/null 2>&1 51*8a272653SPeter Holm/tmp/link $mntpoint > /dev/null 2>&1 & 52*8a272653SPeter Holm 53*8a272653SPeter Holmm1=`vmstat -m | awk '/ mount/ {print $2}'` 54*8a272653SPeter Holmfor i in `jot 100`; do 55*8a272653SPeter Holm umount -f $mntpoint && 56*8a272653SPeter Holm mount /dev/md${mdstart}$part $mntpoint 57*8a272653SPeter Holm sleep .1 58*8a272653SPeter Holmdone 59*8a272653SPeter Holmm2=`vmstat -m | awk '/ mount/ {print $2}'` 60*8a272653SPeter Holmpkill -9 link 61*8a272653SPeter Holmwhile pgrep -q swap; do 62*8a272653SPeter Holm pkill -9 swap 63*8a272653SPeter Holmdone 64*8a272653SPeter Holmwait 65*8a272653SPeter Holm 66*8a272653SPeter Holmwhile mount | grep $mntpoint | grep -q /dev/md; do 67*8a272653SPeter Holm umount $mntpoint || sleep 1 68*8a272653SPeter Holmdone 69*8a272653SPeter Holmmdconfig -d -u $mdstart 70*8a272653SPeter Holm 71*8a272653SPeter Holm[ -d "$mntpoint" ] && (cd $mntpoint && find . -delete) 72*8a272653SPeter Holmrm -f /tmp/link 73*8a272653SPeter Holmleak=$((m2 - m1)) 74*8a272653SPeter Holm[ $leak -gt 2 ] && 75*8a272653SPeter Holm { echo "Leaked $leak InUse \"mount\""; s=1; vmstat -m | \ 76*8a272653SPeter Holm sed -n '1p;/ mount/p'; } || 77*8a272653SPeter Holm s=0 78*8a272653SPeter Holmexit $s 79