mirror of
https://github.com/checkpoint-restore/criu
synced 2025-08-22 09:58:09 +00:00
246 lines
4.1 KiB
C
246 lines
4.1 KiB
C
#include "zdtmtst.h"
|
|
|
|
#ifdef ZDTM_IPV4V6
|
|
#define ZDTM_FAMILY AF_INET
|
|
#define ZDTM_SRV_FAMILY AF_INET6
|
|
#elif defined(ZDTM_IPV6)
|
|
#define ZDTM_FAMILY AF_INET6
|
|
#define ZDTM_SRV_FAMILY AF_INET6
|
|
#else
|
|
#define ZDTM_FAMILY AF_INET
|
|
#define ZDTM_SRV_FAMILY AF_INET
|
|
#endif
|
|
|
|
const char *test_doc = "Check sockets in the TCP_CLOSING state\n";
|
|
const char *test_author = "Andrey Vagin <avagin@parallels.com";
|
|
|
|
#include <stdio.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <stdlib.h>
|
|
#include <signal.h>
|
|
#include <fcntl.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/tcp.h>
|
|
|
|
static int port = 8880;
|
|
|
|
#define BUF_SIZE 4096
|
|
|
|
int fill_sock_buf(int fd)
|
|
{
|
|
char zdtm[512];
|
|
int flags;
|
|
int size;
|
|
int ret;
|
|
|
|
memset(zdtm, 5, sizeof(zdtm));
|
|
|
|
flags = fcntl(fd, F_GETFL, 0);
|
|
if (flags == -1) {
|
|
pr_perror("Can't get flags");
|
|
return -1;
|
|
}
|
|
if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) == -1) {
|
|
pr_perror("Can't set flags");
|
|
return -1;
|
|
}
|
|
|
|
size = 0;
|
|
while (1) {
|
|
ret = write(fd, zdtm, sizeof(zdtm));
|
|
if (ret == -1) {
|
|
if (errno == EAGAIN)
|
|
break;
|
|
pr_perror("write");
|
|
return -1;
|
|
}
|
|
size += ret;
|
|
}
|
|
|
|
if (fcntl(fd, F_SETFL, flags) == -1) {
|
|
pr_perror("Can't set flags");
|
|
return -1;
|
|
}
|
|
|
|
test_msg("snd_size = %d\n", size);
|
|
|
|
return size;
|
|
}
|
|
|
|
static int clean_sk_buf(int fd)
|
|
{
|
|
int size, ret;
|
|
char buf[BUF_SIZE];
|
|
|
|
size = 0;
|
|
while (1) {
|
|
ret = read(fd, buf, sizeof(buf));
|
|
if (ret == -1) {
|
|
pr_perror("read");
|
|
return -11;
|
|
}
|
|
|
|
if (ret == 0)
|
|
break;
|
|
|
|
size += ret;
|
|
}
|
|
|
|
test_msg("rcv_size = %d\n", size);
|
|
|
|
return size;
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
char *newns = getenv("ZDTM_NEWNS");
|
|
int fd, fd_s, ctl_fd;
|
|
pid_t extpid;
|
|
int pfd[2];
|
|
int ret, snd_size = 0, rcv_size = 0;
|
|
|
|
if (newns)
|
|
test_init(argc, argv);
|
|
|
|
if (pipe(pfd)) {
|
|
pr_perror("pipe() failed");
|
|
return 1;
|
|
}
|
|
|
|
extpid = fork();
|
|
if (extpid < 0) {
|
|
pr_perror("fork() failed");
|
|
return 1;
|
|
} else if (extpid == 0) {
|
|
int size = 0;
|
|
char c;
|
|
|
|
if (!newns)
|
|
test_ext_init(argc, argv);
|
|
|
|
close(pfd[1]);
|
|
if (read(pfd[0], &port, sizeof(port)) != sizeof(port)) {
|
|
pr_perror("Can't read port");
|
|
return 1;
|
|
}
|
|
|
|
fd = tcp_init_client(ZDTM_FAMILY, "127.0.0.1", port);
|
|
if (fd < 0)
|
|
return 1;
|
|
|
|
ctl_fd = tcp_init_client(ZDTM_FAMILY, "127.0.0.1", port);
|
|
if (ctl_fd < 0)
|
|
return 1;
|
|
|
|
size = fill_sock_buf(fd);
|
|
if (size <= 0)
|
|
return 1;
|
|
|
|
if (shutdown(fd, SHUT_WR) == -1) {
|
|
pr_perror("shutdown");
|
|
return 1;
|
|
}
|
|
|
|
if (write(ctl_fd, &size, sizeof(size)) != sizeof(size)) {
|
|
pr_perror("write");
|
|
return 1;
|
|
}
|
|
|
|
if (read(ctl_fd, &c, 1) != 0) {
|
|
pr_perror("read");
|
|
return 1;
|
|
}
|
|
|
|
size = clean_sk_buf(fd);
|
|
if (size < 0)
|
|
return 1;
|
|
|
|
write(ctl_fd, &size, sizeof(size));
|
|
close(fd);
|
|
|
|
return 0;
|
|
}
|
|
|
|
if (!newns)
|
|
test_init(argc, argv);
|
|
|
|
if ((fd_s = tcp_init_server(ZDTM_SRV_FAMILY, &port)) < 0) {
|
|
pr_err("initializing server failed\n");
|
|
return 1;
|
|
}
|
|
|
|
close(pfd[0]);
|
|
if (write(pfd[1], &port, sizeof(port)) != sizeof(port)) {
|
|
pr_perror("Can't send port");
|
|
return 1;
|
|
}
|
|
close(pfd[1]);
|
|
|
|
/*
|
|
* parent is server of TCP connection
|
|
*/
|
|
fd = tcp_accept_server(fd_s);
|
|
if (fd < 0) {
|
|
pr_err("can't accept client connection\n");
|
|
return 1;
|
|
}
|
|
|
|
ctl_fd = tcp_accept_server(fd_s);
|
|
if (ctl_fd < 0) {
|
|
pr_err("can't accept client connection\n");
|
|
return 1;
|
|
}
|
|
|
|
snd_size = fill_sock_buf(fd);
|
|
if (snd_size <= 0)
|
|
return 1;
|
|
|
|
if (shutdown(fd, SHUT_WR) == -1) {
|
|
pr_perror("shutdown");
|
|
return 1;
|
|
}
|
|
|
|
if (read(ctl_fd, &ret, sizeof(ret)) != sizeof(ret)) {
|
|
pr_perror("read");
|
|
return 1;
|
|
}
|
|
|
|
rcv_size = clean_sk_buf(fd);
|
|
|
|
if (ret != rcv_size) {
|
|
fail("The child sent %d bytes, but the parent received %d bytes", ret, rcv_size);
|
|
return 1;
|
|
}
|
|
|
|
sleep(1);
|
|
|
|
test_daemon();
|
|
test_waitsig();
|
|
|
|
if (read(fd, &ret, sizeof(ret))) {
|
|
pr_perror("read");
|
|
return 1;
|
|
}
|
|
|
|
if (shutdown(ctl_fd, SHUT_WR) == -1) {
|
|
pr_perror("shutdown");
|
|
return 1;
|
|
}
|
|
|
|
if (read(ctl_fd, &ret, sizeof(ret)) != sizeof(ret)) {
|
|
pr_perror("read");
|
|
return 1;
|
|
}
|
|
|
|
if (ret != snd_size) {
|
|
fail("The parent sent %d bytes, but the child received %d bytes", snd_size, ret);
|
|
return 1;
|
|
}
|
|
|
|
pass();
|
|
return 0;
|
|
}
|