203 lines
4.4 KiB
C
203 lines
4.4 KiB
C
/*
|
|
* Copyright (c) 2016 Fujitsu Ltd.
|
|
* Author: Guangwen Feng <fenggw-fnst@cn.fujitsu.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
* the GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program.
|
|
*/
|
|
|
|
/*
|
|
* Description:
|
|
* Basic test for epoll_pwait(2).
|
|
* 1) epoll_pwait(2) with sigmask argument allows the caller to
|
|
* safely wait until either a file descriptor becomes ready
|
|
* or the timeout expires.
|
|
* 2) epoll_pwait(2) with NULL sigmask argument fails if
|
|
* interrupted by a signal handler, epoll_pwait(2) should
|
|
* return -1 and set errno to EINTR.
|
|
*/
|
|
|
|
#include <sys/epoll.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
|
|
#include "test.h"
|
|
#include "epoll_pwait.h"
|
|
#include "safe_macros.h"
|
|
|
|
char *TCID = "epoll_pwait01";
|
|
int TST_TOTAL = 2;
|
|
|
|
static int epfd, fds[2];
|
|
static sigset_t signalset;
|
|
static struct epoll_event epevs;
|
|
static struct sigaction sa;
|
|
|
|
static void setup(void);
|
|
static void verify_sigmask(void);
|
|
static void verify_nonsigmask(void);
|
|
static void sighandler(int sig LTP_ATTRIBUTE_UNUSED);
|
|
static void do_test(sigset_t *);
|
|
static void do_child(void);
|
|
static void cleanup(void);
|
|
|
|
int main(int ac, char **av)
|
|
{
|
|
int lc;
|
|
|
|
tst_parse_opts(ac, av, NULL, NULL);
|
|
|
|
setup();
|
|
|
|
for (lc = 0; TEST_LOOPING(lc); lc++) {
|
|
tst_count = 0;
|
|
|
|
do_test(&signalset);
|
|
do_test(NULL);
|
|
}
|
|
|
|
cleanup();
|
|
tst_exit();
|
|
}
|
|
|
|
static void setup(void)
|
|
{
|
|
if ((tst_kvercmp(2, 6, 19)) < 0) {
|
|
tst_brkm(TCONF, NULL, "This test can only run on kernels "
|
|
"that are 2.6.19 or higher");
|
|
}
|
|
|
|
tst_sig(FORK, DEF_HANDLER, cleanup);
|
|
|
|
TEST_PAUSE;
|
|
|
|
if (sigemptyset(&signalset) == -1)
|
|
tst_brkm(TFAIL | TERRNO, NULL, "sigemptyset() failed");
|
|
|
|
if (sigaddset(&signalset, SIGUSR1) == -1)
|
|
tst_brkm(TFAIL | TERRNO, NULL, "sigaddset() failed");
|
|
|
|
sa.sa_flags = 0;
|
|
sa.sa_handler = sighandler;
|
|
if (sigemptyset(&sa.sa_mask) == -1)
|
|
tst_brkm(TFAIL | TERRNO, NULL, "sigemptyset() failed");
|
|
|
|
if (sigaction(SIGUSR1, &sa, NULL) == -1)
|
|
tst_brkm(TFAIL | TERRNO, NULL, "sigaction() failed");
|
|
|
|
SAFE_PIPE(NULL, fds);
|
|
|
|
epfd = epoll_create(1);
|
|
if (epfd == -1) {
|
|
tst_brkm(TBROK | TERRNO, cleanup,
|
|
"failed to create epoll instance");
|
|
}
|
|
|
|
epevs.events = EPOLLIN;
|
|
epevs.data.fd = fds[0];
|
|
|
|
if (epoll_ctl(epfd, EPOLL_CTL_ADD, fds[0], &epevs) == -1) {
|
|
tst_brkm(TBROK | TERRNO, cleanup,
|
|
"failed to register epoll target");
|
|
}
|
|
}
|
|
|
|
static void verify_sigmask(void)
|
|
{
|
|
if (TEST_RETURN == -1) {
|
|
tst_resm(TFAIL | TTERRNO, "epoll_pwait() failed");
|
|
return;
|
|
}
|
|
|
|
if (TEST_RETURN != 1) {
|
|
tst_resm(TFAIL, "epoll_pwait() returned %li, expected 1",
|
|
TEST_RETURN);
|
|
return;
|
|
}
|
|
|
|
tst_resm(TPASS, "epoll_pwait(sigmask) blocked signal");
|
|
}
|
|
|
|
static void verify_nonsigmask(void)
|
|
{
|
|
if (TEST_RETURN != -1) {
|
|
tst_resm(TFAIL, "epoll_wait() succeeded unexpectedly");
|
|
return;
|
|
}
|
|
|
|
if (TEST_ERRNO == EINTR) {
|
|
tst_resm(TPASS | TTERRNO, "epoll_wait() failed as expected");
|
|
} else {
|
|
tst_resm(TFAIL | TTERRNO, "epoll_wait() failed unexpectedly, "
|
|
"expected EINTR");
|
|
}
|
|
}
|
|
|
|
static void sighandler(int sig LTP_ATTRIBUTE_UNUSED)
|
|
{
|
|
|
|
}
|
|
|
|
static void do_test(sigset_t *sigmask)
|
|
{
|
|
pid_t cpid;
|
|
char b;
|
|
|
|
cpid = tst_fork();
|
|
if (cpid < 0)
|
|
tst_brkm(TBROK | TERRNO, cleanup, "fork() failed");
|
|
|
|
if (cpid == 0)
|
|
do_child();
|
|
|
|
TEST(epoll_pwait(epfd, &epevs, 1, -1, sigmask));
|
|
|
|
if (sigmask != NULL)
|
|
verify_sigmask();
|
|
else
|
|
verify_nonsigmask();
|
|
|
|
SAFE_READ(cleanup, 1, fds[0], &b, 1);
|
|
|
|
tst_record_childstatus(cleanup, cpid);
|
|
}
|
|
|
|
static void do_child(void)
|
|
{
|
|
if (tst_process_state_wait2(getppid(), 'S') != 0) {
|
|
tst_brkm(TBROK | TERRNO, cleanup,
|
|
"failed to wait for parent process's state");
|
|
}
|
|
|
|
SAFE_KILL(cleanup, getppid(), SIGUSR1);
|
|
usleep(10000);
|
|
SAFE_WRITE(cleanup, 1, fds[1], "w", 1);
|
|
|
|
cleanup();
|
|
tst_exit();
|
|
}
|
|
|
|
static void cleanup(void)
|
|
{
|
|
if (epfd > 0 && close(epfd))
|
|
tst_resm(TWARN | TERRNO, "failed to close epfd");
|
|
|
|
if (close(fds[0]))
|
|
tst_resm(TWARN | TERRNO, "close(fds[0]) failed");
|
|
|
|
if (close(fds[1]))
|
|
tst_resm(TWARN | TERRNO, "close(fds[1]) failed");
|
|
}
|