svn commit: r269801 - user/pho/stress2/misc
Peter Holm
pho at FreeBSD.org
Mon Aug 11 06:55:42 UTC 2014
Author: pho
Date: Mon Aug 11 06:55:41 2014
New Revision: 269801
URL: http://svnweb.freebsd.org/changeset/base/269801
Log:
Added two socketpair(2) regression tests.
Sponsored by: EMC / Isilon storage division
Added:
user/pho/stress2/misc/socketpair.sh (contents, props changed)
user/pho/stress2/misc/socketpair2.sh (contents, props changed)
Added: user/pho/stress2/misc/socketpair.sh
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ user/pho/stress2/misc/socketpair.sh Mon Aug 11 06:55:41 2014 (r269801)
@@ -0,0 +1,103 @@
+#!/bin/sh
+
+#
+# Copyright (c) 2012 Peter Holm <pho at FreeBSD.org>
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+# $FreeBSD$
+#
+
+# Page fault due to recursion. Fixed in r216150.
+
+. ../default.cfg
+
+here=`pwd`
+cd /tmp
+sed '1,/^EOF/d' < $here/$0 > socketpair.c
+cc -o socketpair -Wall -Wextra -O2 socketpair.c
+rm -f socketpair.c
+[ -d $RUNDIR ] || mkdir -p $RUNDIR
+cd $RUNDIR
+
+ulimit -b 10485760
+/tmp/socketpair
+
+cd $here
+rm -f /tmp/socketpair
+exit 0
+EOF
+/* From http://lkml.org/lkml/2010/11/25/8 */
+
+#include <errno.h>
+#include <fcntl.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/mount.h>
+#include <sys/socket.h>
+#include <sys/un.h>
+#include <sys/wait.h>
+#include <unistd.h>
+
+static int
+send_fd(int unix_fd, int fd)
+{
+ struct msghdr msgh;
+ struct cmsghdr *cmsg;
+ char buf[CMSG_SPACE(sizeof(fd))];
+ memset(&msgh, 0, sizeof(msgh));
+ memset(buf, 0, sizeof(buf));
+
+ msgh.msg_control = buf;
+ msgh.msg_controllen = sizeof(buf);
+
+ cmsg = CMSG_FIRSTHDR(&msgh);
+ cmsg->cmsg_len = CMSG_LEN(sizeof(fd));
+ cmsg->cmsg_level = SOL_SOCKET;
+ cmsg->cmsg_type = SCM_RIGHTS;
+
+ msgh.msg_controllen = cmsg->cmsg_len;
+
+ memcpy(CMSG_DATA(cmsg), &fd, sizeof(fd));
+ return sendmsg(unix_fd, &msgh, 0);
+}
+
+int
+main()
+{
+ int fd[2], ff[2];
+
+ if (socketpair(PF_UNIX, SOCK_SEQPACKET, 0, fd) == -1)
+ return 1;
+ for (;;) {
+ if (socketpair(PF_UNIX, SOCK_SEQPACKET, 0, ff) == -1)
+ return 2;
+ send_fd(ff[0], fd[0]);
+ send_fd(ff[0], fd[1]);
+ close(fd[1]);
+ close(fd[0]);
+ fd[0] = ff[0];
+ fd[1] = ff[1];
+ }
+}
Added: user/pho/stress2/misc/socketpair2.sh
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ user/pho/stress2/misc/socketpair2.sh Mon Aug 11 06:55:41 2014 (r269801)
@@ -0,0 +1,275 @@
+#!/bin/sh
+
+#
+# Copyright (c) 2014 EMC Corp.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+# $FreeBSD$
+#
+
+# Default unix domain socket limits causes hang:
+# 1001 880 871 0 52 0 5780 1524 keglimit D+ 0 0:00.35 /tmp/socketpair2
+
+# Test scenario by peter@
+
+# Fixed in r269489.
+
+. ../default.cfg
+
+here=`pwd`
+cd /tmp
+sed '1,/^EOF/d' < $here/$0 > socketpair2.c
+cc -o socketpair2 -Wall -Wextra -O2 socketpair2.c || exit
+rm -f socketpair2.c
+
+/tmp/socketpair2 > /dev/null 2>&1
+
+rm -f /tmp/socketpair2
+exit 0
+EOF
+/*
+ Peter Wemm <peter wemm org>
+
+ Some systems seem to base how much can be written to the pipe based
+ on the size of the socket receive buffer (read-side), while others
+ on the size of the socket send buffer (send-side).
+
+ This little hack tries to make an educated guess as to what is the
+ case on this particular system.
+*/
+
+#include <sys/types.h>
+#include <sys/socket.h>
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include <fcntl.h>
+#include <errno.h>
+
+#ifndef MIN
+#define MIN(a,b) ((a) < (b) ? (a) : (b))
+#endif /* !MIN */
+
+#ifndef MAX
+#define MAX(a,b) ((a) > (b) ? (a) : (b))
+#endif /* !MAX */
+
+#if NEED_AF_LOCAL
+#define AF_LOCAL AF_UNIX
+#endif /* NEED_AF_LOCAL */
+
+#define PACKETSIZE (1024)
+
+#define SEND_PIPE (0)
+#define RECV_PIPE (1)
+
+#define EXIT_SENDSIDE (1)
+#define EXIT_READSIDE (0) /* looking for readside - exit 0 */
+#define EXIT_UNKNOWN (1)
+
+static void
+setsockets(const int doreverse, const size_t packetsize,
+ const int s, const int r,
+ size_t *sndbuf, size_t *sndbuf_set,
+ size_t *rcvbuf, size_t *rcvbuf_set);
+
+static size_t
+sendtest(const int s, const char *buf, const size_t buflen);
+
+int
+main(void)
+{
+ size_t sent, packetcount, sndbuf, sndbuf_set, rcvbuf, rcvbuf_set;
+ char buf[PACKETSIZE - 64]; /* allow for some padding between messages. */
+ int datapipev[2];
+
+ if (socketpair(AF_LOCAL, SOCK_DGRAM, 0, datapipev) != 0) {
+ perror("socketpair()");
+ exit(EXIT_UNKNOWN);
+ }
+
+ setsockets(0,
+ PACKETSIZE,
+ datapipev[SEND_PIPE],
+ datapipev[RECV_PIPE],
+ &sndbuf, &sndbuf_set,
+ &rcvbuf, &rcvbuf_set);
+
+ packetcount = MIN(sndbuf, sndbuf_set) / PACKETSIZE;
+ fprintf(stderr, "Requested sndbuf to be %ld, is %ld. "
+ "Requested rcvbuf to be %ld, is %ld.\n"
+ "Calculated packetcount is %lu\n",
+ (long)sndbuf, (long)sndbuf_set,
+ (long)rcvbuf, (long)rcvbuf_set, (unsigned long)packetcount);
+
+ sent = sendtest(datapipev[SEND_PIPE], buf, sizeof(buf));
+ if (sent >= (size_t)sndbuf) {
+ fprintf(stderr, "status determined by send-side\n");
+ return EXIT_SENDSIDE;
+ }
+
+ /*
+ * Try the reverse. Perhaps this system wants a large rcvbuf rather than
+ * a large sndbuf.
+ */
+ close(datapipev[SEND_PIPE]);
+ close(datapipev[RECV_PIPE]);
+
+ if (socketpair(AF_LOCAL, SOCK_DGRAM, 0, datapipev) != 0) {
+ perror("socketpair()");
+ exit(EXIT_UNKNOWN);
+ }
+
+ setsockets(1,
+ PACKETSIZE,
+ datapipev[SEND_PIPE],
+ datapipev[RECV_PIPE],
+ &sndbuf, &sndbuf_set,
+ &rcvbuf, &rcvbuf_set);
+
+ packetcount = MIN(rcvbuf, rcvbuf_set) / PACKETSIZE;
+ fprintf(stderr, "Requested sndbuf to be %ld, is %ld. "
+ "Requested rcvbuf to be %ld, is %ld.\n"
+ "Calculated packetcount is %lu\n",
+ (long)sndbuf, (long)sndbuf_set,
+ (long)rcvbuf, (long)rcvbuf_set, (unsigned long)packetcount);
+
+ sent = sendtest(datapipev[SEND_PIPE], buf, sizeof(buf));
+ if (sent >= (size_t)rcvbuf) {
+ fprintf(stderr, "status determined by read-side\n");
+ return EXIT_READSIDE;
+ }
+
+ fprintf(stderr, "status is unknown\n");
+ return EXIT_UNKNOWN;
+}
+
+static void
+setsockets(doreverse, packetsize, s, r, sndbuf, sndbuf_set, rcvbuf, rcvbuf_set)
+ const int doreverse;
+ const size_t packetsize;
+ const int s;
+ const int r;
+ size_t *sndbuf, *sndbuf_set;
+ size_t *rcvbuf, *rcvbuf_set;
+{
+ socklen_t len;
+ int p;
+
+ if ((p = fcntl(s, F_GETFL, 0)) == -1
+ || fcntl(s, F_SETFL, p | O_NONBLOCK) == -1
+ || fcntl(r, F_SETFL, p | O_NONBLOCK) == -1) {
+ perror("fcntl(F_SETFL/F_GETFL, O_NONBLOCK) failed");
+ exit(EXIT_UNKNOWN);
+ }
+
+ len = sizeof(*sndbuf_set);
+
+ if (doreverse) {
+ *sndbuf = packetsize;
+ if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, sndbuf, sizeof(*sndbuf)) != 0) {
+ perror("setsockopt(SO_SNDBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+
+ if (getsockopt(s, SOL_SOCKET, SO_SNDBUF, sndbuf_set, &len) != 0) {
+ perror("getsockopt(SO_SNDBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+
+ *rcvbuf = *sndbuf_set * 10;
+ if (setsockopt(r, SOL_SOCKET, SO_RCVBUF, rcvbuf, sizeof(*rcvbuf)) != 0) {
+ perror("setsockopt(SO_RCVBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+ }
+ else {
+ *rcvbuf = packetsize;
+ if (setsockopt(r, SOL_SOCKET, SO_RCVBUF, rcvbuf, sizeof(*rcvbuf)) != 0) {
+ perror("setsockopt(SO_RCVBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+
+ if (getsockopt(r, SOL_SOCKET, SO_RCVBUF, rcvbuf_set, &len) != 0) {
+ perror("getsockopt(SO_RCVBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+
+ *sndbuf = *rcvbuf_set * 10;
+ if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, sndbuf, sizeof(*sndbuf)) != 0) {
+ perror("setsockopt(SO_SNDBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+ }
+
+ if (getsockopt(s, SOL_SOCKET, SO_SNDBUF, sndbuf_set, &len) != 0
+ || getsockopt(r, SOL_SOCKET, SO_RCVBUF, rcvbuf_set, &len) != 0) {
+ perror("getsockopt(SO_SNDBUF/SO_RCVBUF)");
+ exit(EXIT_UNKNOWN);
+ }
+
+ fprintf(stderr, "sndbuf is %lu, rcvbuf is %lu\n",
+ (unsigned long)*sndbuf_set, (unsigned long)*rcvbuf_set);
+
+ if (doreverse) {
+ if (*rcvbuf_set < *rcvbuf) {
+ fprintf(stderr, "failed to set rcvbuf to %lu. Is %lu\n",
+ (unsigned long)*rcvbuf, (unsigned long)*rcvbuf_set);
+ exit(EXIT_UNKNOWN);
+ }
+ }
+ else {
+ if (*sndbuf_set < *sndbuf) {
+ fprintf(stderr, "failed to set sndbuf to %lu (is %lu)\n",
+ (unsigned long)*sndbuf, (unsigned long)*sndbuf_set);
+ exit(EXIT_UNKNOWN);
+ }
+ }
+}
+
+static size_t
+sendtest(s, buf, buflen)
+ const int s;
+ const char *buf;
+ const size_t buflen;
+{
+ ssize_t rc;
+ int i;
+
+ i = 1;
+ errno = 0;
+ while (errno == 0) {
+ if ((rc = sendto(s, buf, buflen, 0, NULL, 0)) != (ssize_t)buflen)
+ fprintf(stderr, "sendto(2) failed on iteration %d, sent %ld/%lu. "
+ "Total bytes sent: %lu. Error on last packet: %s\n",
+ i, (long)rc, (unsigned long)buflen,
+ (unsigned long)(i * buflen + MAX(rc, 0)), strerror(errno));
+ else
+ ++i;
+ }
+
+ return (size_t)(i * buflen + MAX(rc, 0));
+}
More information about the svn-src-user
mailing list