2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2023 The FreeBSD Foundation
6 * This software was developed by Mark Johnston under sponsorship from
7 * the FreeBSD Foundation.
10 #include <sys/types.h>
11 #include <sys/socket.h>
14 #include <netinet/in.h>
23 struct close_test_params {
24 struct sockaddr_storage sa;
31 close_test_client(void *arg)
33 struct close_test_params *p = arg;
37 buflen = p->msglen + 1;
39 ATF_REQUIRE(buf != NULL);
41 while (p->count-- > 0) {
45 s = socket(p->af, p->type, p->proto);
46 ATF_REQUIRE_MSG(s >= 0, "socket: %s", strerror(errno));
48 error = connect(s, (struct sockaddr *)&p->sa, p->sa.ss_len);
49 ATF_REQUIRE_MSG(error == 0, "connect: %s", strerror(errno));
51 n = recv(s, buf, buflen, MSG_WAITALL);
52 ATF_REQUIRE_MSG(n == (ssize_t)p->msglen,
53 "recv: %s", strerror(errno));
55 ATF_REQUIRE(close(s) == 0);
63 close_test(struct sockaddr *sa, unsigned int count, int af, int type, int proto)
65 struct close_test_params p;
71 s = socket(af, type, proto);
72 ATF_REQUIRE_MSG(s >= 0, "socket %s", strerror(errno));
74 ATF_REQUIRE_MSG(bind(s, sa, sa->sa_len) == 0,
75 "bind: %s", strerror(errno));
76 ATF_REQUIRE_MSG(listen(s, 1) == 0,
77 "listen: %s", strerror(errno));
78 ATF_REQUIRE_MSG(getsockname(s, sa, &(socklen_t){ sa->sa_len }) == 0,
79 "getsockname: %s", strerror(errno));
81 msg = "hello bonjour";
82 msglen = strlen(msg) + 1;
83 p = (struct close_test_params){
90 memcpy(&p.sa, sa, sa->sa_len);
91 error = pthread_create(&t, NULL, close_test_client, &p);
92 ATF_REQUIRE_MSG(error == 0, "pthread_create: %s", strerror(error));
98 cs = accept(s, NULL, NULL);
99 ATF_REQUIRE_MSG(cs >= 0, "accept: %s", strerror(errno));
101 n = send(cs, msg, msglen, 0);
102 ATF_REQUIRE_MSG(n == (ssize_t)msglen,
103 "send: %s", strerror(errno));
105 ATF_REQUIRE(close(cs) == 0);
108 ATF_REQUIRE(close(s) == 0);
109 ATF_REQUIRE(pthread_join(t, NULL) == 0);
113 * Make sure that closing a connection kicks a MSG_WAITALL recv() out of the
114 * syscall. See bugzilla PR 212716.
117 ATF_TC_HEAD(close_tcp, tc)
119 atf_tc_set_md_var(tc, "timeout", "10");
121 ATF_TC_BODY(close_tcp, tc)
123 struct sockaddr_in sin;
125 sin = (struct sockaddr_in){
126 .sin_len = sizeof(sin),
127 .sin_family = AF_INET,
128 .sin_addr = { htonl(INADDR_LOOPBACK) },
129 .sin_port = htons(0),
131 close_test((struct sockaddr *)&sin, 1000, AF_INET, SOCK_STREAM,
135 /* A variant of the above test for UNIX domain stream sockets. */
136 ATF_TC(close_unix_stream);
137 ATF_TC_HEAD(close_unix_stream, tc)
139 atf_tc_set_md_var(tc, "timeout", "10");
141 ATF_TC_BODY(close_unix_stream, tc)
143 struct sockaddr_un sun;
145 sun = (struct sockaddr_un){
146 .sun_len = sizeof(sun),
147 .sun_family = AF_UNIX,
148 .sun_path = "socket_msg_waitall_unix",
150 close_test((struct sockaddr *)&sun, 1000, AF_UNIX, SOCK_STREAM, 0);
151 ATF_REQUIRE_MSG(unlink(sun.sun_path) == 0,
152 "unlink: %s", strerror(errno));
155 /* A variant of the above test for UNIX domain seqpacket sockets. */
156 ATF_TC(close_unix_seqpacket);
157 ATF_TC_HEAD(close_unix_seqpacket, tc)
159 atf_tc_set_md_var(tc, "timeout", "10");
161 ATF_TC_BODY(close_unix_seqpacket, tc)
163 struct sockaddr_un sun;
165 sun = (struct sockaddr_un){
166 .sun_len = sizeof(sun),
167 .sun_family = AF_UNIX,
168 .sun_path = "socket_msg_waitall_unix",
170 close_test((struct sockaddr *)&sun, 1000, AF_UNIX, SOCK_SEQPACKET, 0);
171 ATF_REQUIRE_MSG(unlink(sun.sun_path) == 0,
172 "unlink: %s", strerror(errno));
177 ATF_TP_ADD_TC(tp, close_tcp);
178 ATF_TP_ADD_TC(tp, close_unix_stream);
179 ATF_TP_ADD_TC(tp, close_unix_seqpacket);
181 return (atf_no_error());