From owner-svn-src-user@FreeBSD.ORG Tue Oct 22 07:16:21 2013 Return-Path: Delivered-To: svn-src-user@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 27ABD74; Tue, 22 Oct 2013 07:16:21 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 1491723CA; Tue, 22 Oct 2013 07:16:21 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r9M7GKUn094762; Tue, 22 Oct 2013 07:16:20 GMT (envelope-from pho@svn.freebsd.org) Received: (from pho@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r9M7GKZD094760; Tue, 22 Oct 2013 07:16:20 GMT (envelope-from pho@svn.freebsd.org) Message-Id: <201310220716.r9M7GKZD094760@svn.freebsd.org> From: Peter Holm Date: Tue, 22 Oct 2013 07:16:20 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r256876 - user/pho/stress2/misc X-SVN-Group: user MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Oct 2013 07:16:21 -0000 Author: pho Date: Tue Oct 22 07:16:20 2013 New Revision: 256876 URL: http://svnweb.freebsd.org/changeset/base/256876 Log: Added a regression test. Sponsored by: EMC / Isilon storage division Added: user/pho/stress2/misc/killpg.sh (contents, props changed) Added: user/pho/stress2/misc/killpg.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/killpg.sh Tue Oct 22 07:16:20 2013 (r256876) @@ -0,0 +1,161 @@ +#!/bin/sh + +# +# Copyright (c) 2013 EMC Corp. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in the +# documentation and/or other materials provided with the distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND +# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +# SUCH DAMAGE. +# +# $FreeBSD$ +# + +# Regression test for r241859: +# Return EPERM if processes were found but they were unable to be signaled. + +[ `id -u ` -ne 0 ] && echo "Must be root!" && exit 1 + +here=`pwd` +cd /tmp +sed '1,/^EOF/d' < $here/$0 > killpg.c +cc -o killpg -Wall -Wextra killpg.c +rm -f killpg.c + +/tmp/killpg + +rm -f /tmp/killpg +exit 0 +EOF +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +pid_t gid, pid; + +#define LOOPS 100 + +static void +hand(int i __unused) { /* handler */ + _exit(0); +} + +void +nlooper(void) +{ + int i; + + setproctitle("nlooper"); + setpgrp(0, getpid()); + for (i = 0; i < LOOPS; i++) { + if ((pid = fork()) == 0) { + signal(SIGINFO, hand); + if (arc4random() % 100 < 10) + usleep(arc4random() % 100); + _exit(0); + } + wait(NULL); + } + _exit(0); +} + +void +looper(void) +{ + int i; + + setproctitle("looper"); + setpgrp(0, getpid()); + for (i = 0; i < LOOPS; i++) { + if ((pid = fork()) == 0) { + signal(SIGINFO, hand); + if (arc4random() % 100 < 10) + usleep(arc4random() % 100); + _exit(0); + } + wait(NULL); + } + unlink("cont"); + _exit(0); +} + +void +killer(void) +{ + struct passwd *pw; + int i; + + setproctitle("killer"); + if ((pw = getpwnam("nobody")) == NULL) + err(1, "no such user: nobody"); + + if (setgroups(1, &pw->pw_gid) || + setegid(pw->pw_gid) || setgid(pw->pw_gid) || + seteuid(pw->pw_uid) || setuid(pw->pw_uid)) + err(1, "Can't drop privileges to \"nobody\""); + endpwent(); + + if ((gid = fork()) == 0) + nlooper(); /* nobody looper */ + + usleep(200); + i = 0; + for (;;) { + if (i++ > 1000) { + if (access("cont", R_OK) == -1) + break; + i = 0; + } + if (killpg(gid, SIGINFO) == -1) { + if (errno == EPERM) + continue; + warn("FAIL killpg"); + } + } + _exit(0); +} + +int +main(void) +{ + int fd; + + if ((fd = open("cont", O_RDWR | O_CREAT, 0666)) == -1) + err(1, "creat"); + close(fd); + signal(SIGINFO, SIG_IGN); + + if ((gid = fork()) == 0) + looper(); + if (fork() == 0) + killer(); + + wait(NULL); + wait(NULL); + + return (0); +}