xref: /freebsd/tools/regression/sockets/sblock/sblock.c (revision ddd5b8e9b4d8957fce018c520657cdfa4ecffad3)
1 /*-
2  * Copyright (c) 2007 Robert N. M. Watson
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  *
26  * $FreeBSD$
27  */
28 
29 /*
30  * Sockets serialize I/O in each direction in order to avoid interlacing of
31  * I/O by multiple processes or threcvs recving or sending the socket.  This
32  * is done using some form of kernel lock (varies by kernel version), called
33  * "sblock" in FreeBSD.  However, to avoid unkillable processes waiting on
34  * I/O that may be entirely controlled by a remote network endpoint, that
35  * lock acquisition must be interruptible.
36  *
37  * To test this, set up a local domain stream socket pair and a set of three
38  * processes.  Two processes block in recv(), the first on sbwait (wait for
39  * I/O), and the second on the sblock waiting for the first to finish.  A
40  * third process is responsible for signalling the second process, then
41  * writing to the socket.  Depending on the error returned in the second
42  * process, we can tell whether the sblock wait was interrupted, or if
43  * instead the process only woke up when the write was performed.
44  */
45 
46 #include <sys/socket.h>
47 
48 #include <err.h>
49 #include <errno.h>
50 #include <signal.h>
51 #include <stdio.h>
52 #include <stdlib.h>
53 #include <unistd.h>
54 
55 static int interrupted;
56 static void
57 signal_handler(int signum)
58 {
59 
60 	interrupted++;
61 }
62 
63 /*
64  * Process that will perform a blocking recv on a UNIX domain socket.  This
65  * should return one byte of data.
66  */
67 static void
68 blocking_recver(int fd)
69 {
70 	ssize_t len;
71 	char ch;
72 
73 	len = recv(fd, &ch, sizeof(ch), 0);
74 	if (len < 0)
75 		err(-1, "FAIL: blocking_recver: recv");
76 	if (len == 0)
77 		errx(-1, "FAIL: blocking_recver: recv: eof");
78 	if (len != 1)
79 		errx(-1, "FAIL: blocking_recver: recv: %zd bytes", len);
80 	if (interrupted)
81 		errx(-1, "FAIL: blocking_recver: interrupted wrong pid");
82 }
83 
84 /*
85  * Process that will perform a locking recv on a UNIX domain socket.
86  *
87  * This is where we figure out if the test worked or not.  If it has failed,
88  * then recv() will return EOF, as the close() arrives before the signal,
89  * meaning that the wait for the sblock was not interrupted; if it has
90  * succeeded, we get EINTR as the signal interrupts the lock request.
91  */
92 static void
93 locking_recver(int fd)
94 {
95 	ssize_t len;
96 	char ch;
97 
98 	if (sleep(1) < 0)
99 		err(-1, "FAIL: locking_recver: sleep");
100 	len = recv(fd, &ch, sizeof(ch), 0);
101 	if (len < 0 && errno != EINTR)
102 		err(-1, "FAIL: locking_recver: recv");
103 	if (len < 0 && errno == EINTR) {
104 		fprintf(stderr, "PASS\n");
105 		exit(0);
106 	}
107 	if (len == 0)
108 		errx(-1, "FAIL: locking_recver: recv: eof");
109 	if (!interrupted)
110 		errx(-1, "FAIL: locking_recver: not interrupted");
111 }
112 
113 static void
114 signaller(pid_t locking_recver_pid, int fd)
115 {
116 	ssize_t len;
117 	char ch;
118 
119 	if (sleep(2) < 0) {
120 		warn("signaller sleep(2)");
121 		return;
122 	}
123 	if (kill(locking_recver_pid, SIGHUP) < 0) {
124 		warn("signaller kill(%d)", locking_recver_pid);
125 		return;
126 	}
127 	if (sleep(1) < 0) {
128 		warn("signaller sleep(1)");
129 		return;
130 	}
131 	len = send(fd, &ch, sizeof(ch), 0);
132 	if (len < 0) {
133 		warn("signaller send");
134 		return;
135 	}
136 	if (len != sizeof(ch)) {
137 		warnx("signaller send ret %zd", len);
138 		return;
139 	}
140 	if (close(fd) < 0) {
141 		warn("signaller close");
142 		return;
143 	}
144 	if (sleep(1) < 0) {
145 		warn("signaller sleep(1)");
146 		return;
147 	}
148 }
149 
150 int
151 main(int argc, char *argv[])
152 {
153 	int error, fds[2], recver_fd, sender_fd;
154 	pid_t blocking_recver_pid;
155 	pid_t locking_recver_pid;
156 	struct sigaction sa;
157 
158 	if (sigaction(SIGHUP, NULL, &sa) < 0)
159 		err(-1, "FAIL: sigaction(SIGHUP, NULL, &sa)");
160 
161 	sa.sa_handler = signal_handler;
162 	if (sa.sa_flags & SA_RESTART)
163 		printf("SIGHUP restartable by default (cleared)\n");
164 	sa.sa_flags &= ~SA_RESTART;
165 
166 	if (sigaction(SIGHUP, &sa, NULL) < 0)
167 		err(-1, "FAIL: sigaction(SIGHUP, &sa, NULL)");
168 
169 #if 0
170 	if (signal(SIGHUP, signal_handler) == SIG_ERR)
171 		err(-1, "FAIL: signal(SIGHUP)");
172 #endif
173 
174 	if (socketpair(PF_LOCAL, SOCK_STREAM, 0, fds) < 0)
175 		err(-1, "FAIL: socketpair(PF_LOCAL, SOGK_STREAM, 0)");
176 
177 	sender_fd = fds[0];
178 	recver_fd = fds[1];
179 
180 	blocking_recver_pid = fork();
181 	if (blocking_recver_pid < 0)
182 		err(-1, "FAIL: fork");
183 	if (blocking_recver_pid == 0) {
184 		close(sender_fd);
185 		blocking_recver(recver_fd);
186 		exit(0);
187 	}
188 
189 	locking_recver_pid = fork();
190 	if (locking_recver_pid < 0) {
191 		error = errno;
192 		kill(blocking_recver_pid, SIGKILL);
193 		errno = error;
194 		err(-1, "FAIL: fork");
195 	}
196 	if (locking_recver_pid == 0) {
197 		close(sender_fd);
198 		locking_recver(recver_fd);
199 		exit(0);
200 	}
201 
202 	signaller(locking_recver_pid, sender_fd);
203 
204 	kill(blocking_recver_pid, SIGKILL);
205 	kill(locking_recver_pid, SIGKILL);
206 	exit(0);
207 }
208