summaryrefslogtreecommitdiff
path: root/lib/libutil/tests/forkpty_test.c
blob: 3e54cf3101500b601edf446dfb6a7b5c6f5f24df (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
/*-
 * Copyright (c) 2023 Klara, Inc.
 *
 * SPDX-License-Identifier: BSD-2-Clause
 */

#include <sys/resource.h>
#include <sys/wait.h>

#include <errno.h>
#include <libutil.h>
#include <unistd.h>

#include <atf-c.h>

ATF_TC(forkfail);
ATF_TC_HEAD(forkfail, tc)
{
	atf_tc_set_md_var(tc, "descr", "Check for fd leak when fork() fails");
	atf_tc_set_md_var(tc, "require.user", "unprivileged");
}

ATF_TC_BODY(forkfail, tc)
{
	struct rlimit orl, nrl;
	pid_t pid;
	int prevfd, fd, pty;

	/* set process limit to 1 so fork() will fail */
	ATF_REQUIRE_EQ(0, getrlimit(RLIMIT_NPROC, &orl));
	nrl = orl;
	nrl.rlim_cur = 1;
	ATF_REQUIRE_EQ(0, setrlimit(RLIMIT_NPROC, &nrl));
	/* check first free fd */
	ATF_REQUIRE((fd = dup(0)) > 0);
	ATF_REQUIRE_EQ(0, close(fd));
	/* attempt forkpty() */
	pid = forkpty(&pty, NULL, NULL, NULL);
	if (pid == 0) {
		/* child - fork() unexpectedly succeeded */
		_exit(0);
	}
	ATF_CHECK_ERRNO(EAGAIN, pid < 0);
	if (pid > 0) {
		/* parent - fork() unexpectedly succeeded */
		(void)waitpid(pid, NULL, 0);
	}
	/* check that first free fd hasn't changed */
	prevfd = fd;
	ATF_REQUIRE((fd = dup(0)) > 0);
	ATF_CHECK_EQ(prevfd, fd);
}

ATF_TP_ADD_TCS(tp)
{
	ATF_TP_ADD_TC(tp, forkfail);
	return (atf_no_error());
}