plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 1 | /* |
| 2 | * |
| 3 | * Copyright (c) International Business Machines Corp., 2001 |
| 4 | * |
| 5 | * This program is free software; you can redistribute it and/or modify |
| 6 | * it under the terms of the GNU General Public License as published by |
| 7 | * the Free Software Foundation; either version 2 of the License, or |
| 8 | * (at your option) any later version. |
| 9 | * |
| 10 | * This program is distributed in the hope that it will be useful, |
| 11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| 13 | * the GNU General Public License for more details. |
| 14 | * |
| 15 | * You should have received a copy of the GNU General Public License |
| 16 | * along with this program; if not, write to the Free Software |
Wanlong Gao | 4548c6c | 2012-10-19 18:03:36 +0800 | [diff] [blame] | 17 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 18 | */ |
| 19 | |
| 20 | /* |
| 21 | * NAME |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 22 | * fcntl15.c |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 23 | * |
| 24 | * DESCRIPTION |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 25 | * Check that file locks are removed when file closed |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 26 | * |
| 27 | * ALGORITHM |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 28 | * Use three testcases to check removal of locks when a file is closed. |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 29 | * |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 30 | * Case 1: Parent opens a file and duplicates it, places locks using |
| 31 | * both file descriptors then closes one descriptor, all locks should |
| 32 | * be removed. |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 33 | * |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 34 | * Case 2: Open same file twice using(open), place locks using both |
| 35 | * descriptors then close on descriptor, locks on the file should be |
| 36 | * lost |
| 37 | * |
| 38 | * Case 3: Open file twice, one by each process, set the locks and have |
| 39 | * a child check the locks. Remove the first file and have the child |
| 40 | * check the locks. Remove the first file and have child check locks |
| 41 | * again. Only locks set on first file should have been removed |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 42 | * |
| 43 | * USAGE |
plars | 363a35f | 2002-02-18 22:10:07 +0000 | [diff] [blame] | 44 | * fcntl15 |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 45 | * |
| 46 | * HISTORY |
| 47 | * 07/2001 Ported by Wayne Boyer |
mridge | 562dd48 | 2004-05-11 21:54:47 +0000 | [diff] [blame] | 48 | * MODIFIED: - mridge@us.ibm.com -- changed getpid to syscall(get thread ID) for unique ID on NPTL threading |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 49 | * |
| 50 | * RESTRICTIONS |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 51 | * None |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 52 | */ |
| 53 | |
| 54 | #include <signal.h> |
| 55 | #include <fcntl.h> |
Garrett Cooper | 0a643cb | 2010-12-21 11:21:19 -0800 | [diff] [blame] | 56 | #include "test.h" |
mridge | db63921 | 2005-01-04 21:04:11 +0000 | [diff] [blame] | 57 | #include <sys/types.h> |
| 58 | #include <sys/wait.h> |
mridge | 562dd48 | 2004-05-11 21:54:47 +0000 | [diff] [blame] | 59 | #include <sys/types.h> |
| 60 | #include <sys/syscall.h> |
| 61 | #include <linux/unistd.h> |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 62 | |
| 63 | #define DATA "ABCDEFGHIJ" |
| 64 | #define DUP 0 |
| 65 | #define OPEN 1 |
| 66 | #define FORK_ 2 |
| 67 | |
plars | 363a35f | 2002-02-18 22:10:07 +0000 | [diff] [blame] | 68 | char *TCID = "fcntl15"; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 69 | int TST_TOTAL = 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 70 | |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 71 | static int parent, child1, child2, status; |
| 72 | static volatile sig_atomic_t parent_flag, child_flag, alarm_flag; |
| 73 | static char tmpname[40]; |
| 74 | struct flock flock; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 75 | |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 76 | #ifdef UCLINUX |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 77 | static char *argv0; /* set by main, passed to self_exec */ |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 78 | #endif |
| 79 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 80 | /* |
| 81 | * cleanup() - performs all ONE TIME cleanup for this test at |
| 82 | * completion or premature exit. |
| 83 | */ |
Mike Frysinger | c57fba5 | 2014-04-09 18:56:30 -0400 | [diff] [blame] | 84 | void cleanup(void) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 85 | { |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 86 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 87 | } |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 88 | |
Mike Frysinger | e61ddba | 2014-04-09 23:24:32 -0400 | [diff] [blame] | 89 | void alarm_sig(int sig) |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 90 | { |
Mike Frysinger | e61ddba | 2014-04-09 23:24:32 -0400 | [diff] [blame] | 91 | signal(SIGALRM, alarm_sig); |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 92 | alarm_flag = 1; |
mridge | 562dd48 | 2004-05-11 21:54:47 +0000 | [diff] [blame] | 93 | if ((syscall(__NR_gettid)) == parent) { |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 94 | tst_resm(TINFO, "Alarm caught by parent"); |
| 95 | } else { |
| 96 | tst_resm(TINFO, "Alarm caught by child"); |
| 97 | } |
| 98 | } |
| 99 | |
Mike Frysinger | e61ddba | 2014-04-09 23:24:32 -0400 | [diff] [blame] | 100 | void child_sig(int sig) |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 101 | { |
Mike Frysinger | e61ddba | 2014-04-09 23:24:32 -0400 | [diff] [blame] | 102 | signal(SIGUSR1, child_sig); |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 103 | child_flag++; |
| 104 | } |
| 105 | |
Mike Frysinger | e61ddba | 2014-04-09 23:24:32 -0400 | [diff] [blame] | 106 | void parent_sig(int sig) |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 107 | { |
Mike Frysinger | e61ddba | 2014-04-09 23:24:32 -0400 | [diff] [blame] | 108 | signal(SIGUSR2, parent_sig); |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 109 | parent_flag++; |
| 110 | } |
| 111 | |
| 112 | int dochild1(int file_flag, int file_mode) |
| 113 | { |
| 114 | int fd_B; |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 115 | sigset_t newmask, zeromask, oldmask; |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 116 | |
| 117 | if ((fd_B = open(tmpname, file_flag, file_mode)) < 0) { |
| 118 | perror("open on child1 file failed"); |
| 119 | exit(1); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 120 | } |
| 121 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 122 | /* initialize lock structure for second 5 bytes of file */ |
| 123 | flock.l_type = F_WRLCK; |
| 124 | flock.l_whence = 0; |
| 125 | flock.l_start = 5L; |
| 126 | flock.l_len = 5L; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 127 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 128 | /* set lock on child file descriptor */ |
| 129 | if ((fcntl(fd_B, F_SETLK, &flock)) < 0) { |
| 130 | perror("child lock failed should have succeeded"); |
| 131 | exit(1); |
| 132 | } |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 133 | |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 134 | sigemptyset(&zeromask); |
| 135 | sigemptyset(&newmask); |
| 136 | sigaddset(&newmask, SIGUSR1); |
| 137 | sigaddset(&newmask, SIGUSR2); |
| 138 | sigaddset(&newmask, SIGALRM); |
| 139 | if (sigprocmask(SIG_BLOCK, &newmask, &oldmask) < 0) { |
| 140 | perror("child1 sigprocmask SIG_BLOCK fail"); |
| 141 | exit(1); |
| 142 | } |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 143 | /* |
| 144 | * send signal to parent here to tell parent we have locked the |
| 145 | * file, thus allowing parent to proceed |
| 146 | */ |
| 147 | if ((kill(parent, SIGUSR1)) < 0) { |
| 148 | perror("child1 signal to parent failed"); |
| 149 | exit(1); |
| 150 | } |
| 151 | |
| 152 | /* |
| 153 | * set alarm to break pause if parent fails to signal then spin till |
| 154 | * parent ready |
| 155 | */ |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 156 | alarm(60); |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 157 | while (parent_flag == 0 && alarm_flag == 0) |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 158 | sigsuspend(&zeromask); |
| 159 | alarm((unsigned)0); |
| 160 | if (parent_flag != 1) { |
| 161 | perror("pause in child1 terminated without " |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 162 | "SIGUSR2 signal from parent"); |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 163 | exit(1); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 164 | } |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 165 | parent_flag = 0; |
| 166 | alarm_flag = 0; |
| 167 | if (sigprocmask(SIG_SETMASK, &oldmask, NULL) < 0) { |
| 168 | perror("child1 sigprocmask SIG_SETMASK fail"); |
| 169 | exit(1); |
| 170 | } |
subrata_modak | bdbaec5 | 2009-02-26 12:14:51 +0000 | [diff] [blame] | 171 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 172 | /* wait for child2 to complete then cleanup */ |
| 173 | sleep(10); |
| 174 | close(fd_B); |
| 175 | exit(0); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 176 | } |
| 177 | |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 178 | #ifdef UCLINUX |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 179 | int uc_file_flag, uc_file_mode, uc_dup_flag; |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 180 | |
Mike Frysinger | c57fba5 | 2014-04-09 18:56:30 -0400 | [diff] [blame] | 181 | void dochild1_uc(void) |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 182 | { |
| 183 | dochild1(uc_file_flag, uc_file_mode); |
| 184 | } |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 185 | |
Mike Frysinger | c57fba5 | 2014-04-09 18:56:30 -0400 | [diff] [blame] | 186 | void dochild2_uc(void) |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 187 | { |
| 188 | dochild2(uc_file_flag, uc_dup_flag); |
| 189 | } |
| 190 | #endif |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 191 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 192 | int dofork(int file_flag, int file_mode) |
| 193 | { |
| 194 | /* create child process */ |
mreed10 | 81534c3 | 2006-08-03 05:21:24 +0000 | [diff] [blame] | 195 | if ((child1 = FORK_OR_VFORK()) < 0) { |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 196 | perror("Fork failure"); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 197 | return 1; |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 198 | } |
| 199 | |
| 200 | /* child1 */ |
| 201 | if (child1 == 0) { |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 202 | #ifdef UCLINUX |
| 203 | if (self_exec(argv0, "nddds", 1, file_flag, file_mode, |
| 204 | parent, tmpname) < 0) { |
| 205 | perror("self_exec failure"); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 206 | return 1; |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 207 | } |
| 208 | #else |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 209 | dochild1(file_flag, file_mode); |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 210 | #endif |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 211 | } else { |
| 212 | /* |
| 213 | * need to wait for child1 to open, and lock the area of the |
| 214 | * file prior to continuing on from here |
| 215 | */ |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 216 | sigset_t newmask, zeromask, oldmask; |
| 217 | sigemptyset(&zeromask); |
| 218 | sigemptyset(&newmask); |
| 219 | sigaddset(&newmask, SIGUSR1); |
| 220 | sigaddset(&newmask, SIGUSR2); |
| 221 | sigaddset(&newmask, SIGALRM); |
| 222 | if (sigprocmask(SIG_BLOCK, &newmask, &oldmask) < 0) { |
| 223 | perror("parent sigprocmask SIG_BLOCK fail"); |
| 224 | exit(1); |
| 225 | } |
| 226 | |
| 227 | /* |
| 228 | * set alarm to break pause if parent fails to signal then spin till |
| 229 | * parent ready |
| 230 | */ |
| 231 | alarm(60); |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 232 | while (child_flag == 0 && alarm_flag == 0) |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 233 | sigsuspend(&zeromask); |
| 234 | alarm((unsigned)0); |
| 235 | if (child_flag != 1) { |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 236 | perror("parent paused without SIGUSR1 " "from child"); |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 237 | exit(1); |
| 238 | } |
| 239 | child_flag = 0; |
| 240 | alarm_flag = 0; |
| 241 | if (sigprocmask(SIG_SETMASK, &oldmask, NULL) < 0) { |
| 242 | perror("parent sigprocmask SIG_SETMASK fail"); |
| 243 | exit(1); |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 244 | } |
| 245 | } |
subrata_modak | 43337a3 | 2009-02-26 11:43:51 +0000 | [diff] [blame] | 246 | return 0; |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 247 | } |
| 248 | |
| 249 | int dochild2(int file_flag, int file_mode, int dup_flag) |
| 250 | { |
| 251 | int fd_C; |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 252 | sigset_t newmask, zeromask, oldmask; |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 253 | |
| 254 | if ((fd_C = open(tmpname, file_flag, file_mode)) < 0) { |
| 255 | perror("open on child2 file failed"); |
| 256 | exit(1); |
| 257 | } |
| 258 | |
| 259 | /* initialize lock structure for first 5 bytes of file */ |
| 260 | flock.l_type = F_WRLCK; |
| 261 | flock.l_whence = 0; |
| 262 | flock.l_start = 0L; |
| 263 | flock.l_len = 5L; |
| 264 | |
| 265 | /* Set lock on child file descriptor */ |
| 266 | if ((fcntl(fd_C, F_SETLK, &flock)) >= 0) { |
| 267 | tst_resm(TFAIL, "First child2 lock succeeded should " |
| 268 | "have failed"); |
| 269 | exit(1); |
| 270 | } |
| 271 | |
| 272 | /* initialize lock structure for second 5 bytes of file */ |
| 273 | flock.l_type = F_WRLCK; |
| 274 | flock.l_whence = 0; |
| 275 | flock.l_start = 5L; |
| 276 | flock.l_len = 5L; |
subrata_modak | bdbaec5 | 2009-02-26 12:14:51 +0000 | [diff] [blame] | 277 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 278 | /* set lock on child file descriptor */ |
| 279 | if ((fcntl(fd_C, F_SETLK, &flock)) >= 0) { |
| 280 | tst_resm(TFAIL, "second child2 lock succeeded should have " |
| 281 | "failed"); |
| 282 | exit(1); |
| 283 | } |
| 284 | |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 285 | sigemptyset(&zeromask); |
| 286 | sigemptyset(&newmask); |
| 287 | sigaddset(&newmask, SIGUSR1); |
| 288 | sigaddset(&newmask, SIGUSR2); |
| 289 | sigaddset(&newmask, SIGALRM); |
| 290 | if (sigprocmask(SIG_BLOCK, &newmask, &oldmask) < 0) { |
| 291 | perror("child2 sigprocmask SIG_BLOCK fail"); |
| 292 | exit(1); |
| 293 | } |
| 294 | /* |
| 295 | * send signal to parent here to tell parent we have locked the |
| 296 | * file, thus allowing parent to proceed |
| 297 | */ |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 298 | if ((kill(parent, SIGUSR1)) < 0) { |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 299 | perror("child2 signal to parent failed"); |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 300 | exit(1); |
| 301 | } |
| 302 | |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 303 | /* |
| 304 | * set alarm to break pause if parent fails to signal then spin till |
| 305 | * parent ready |
| 306 | */ |
| 307 | alarm(60); |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 308 | while (parent_flag == 0 && alarm_flag == 0) |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 309 | sigsuspend(&zeromask); |
| 310 | alarm((unsigned)0); |
| 311 | if (parent_flag != 1) { |
| 312 | perror("pause in child2 terminated without " |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 313 | "SIGUSR2 signal from parent"); |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 314 | exit(1); |
| 315 | } |
| 316 | parent_flag = 0; |
| 317 | alarm_flag = 0; |
| 318 | if (sigprocmask(SIG_SETMASK, &oldmask, NULL) < 0) { |
| 319 | perror("child2 sigprocmask SIG_SETMASK fail"); |
| 320 | exit(1); |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 321 | } |
| 322 | |
| 323 | /* initialize lock structure for first 5 bytes of file */ |
| 324 | flock.l_type = F_WRLCK; |
| 325 | flock.l_whence = 0; |
| 326 | flock.l_start = 0L; |
| 327 | flock.l_len = 5L; |
| 328 | |
| 329 | /* set lock on child file descriptor */ |
| 330 | if ((fcntl(fd_C, F_SETLK, &flock)) < 0) { |
| 331 | tst_resm(TFAIL, "third child2 lock failed should have " |
| 332 | "succeeded"); |
| 333 | exit(1); |
| 334 | } |
| 335 | |
| 336 | /* Initialize lock structure for second 5 bytes of file */ |
| 337 | flock.l_type = F_WRLCK; |
| 338 | flock.l_whence = 0; |
| 339 | flock.l_start = 5L; |
| 340 | flock.l_len = 5L; |
| 341 | |
| 342 | /* set lock on child file descriptor */ |
| 343 | if (dup_flag == FORK_) { |
| 344 | if ((fcntl(fd_C, F_SETLK, &flock)) >= 0) { |
| 345 | tst_resm(TFAIL, "fourth child2 lock succeeded " |
| 346 | "should have failed"); |
| 347 | exit(1); |
| 348 | } |
| 349 | } else { |
| 350 | if ((fcntl(fd_C, F_SETLK, &flock)) < 0) { |
| 351 | tst_resm(TFAIL, "fourth child2 lock failed " |
| 352 | "should have succeeded"); |
| 353 | exit(1); |
| 354 | } |
| 355 | } |
| 356 | close(fd_C); |
| 357 | exit(0); |
| 358 | } |
| 359 | |
| 360 | /* |
| 361 | * setup() - performs all ONE TIME setup for this test. |
| 362 | */ |
Mike Frysinger | c57fba5 | 2014-04-09 18:56:30 -0400 | [diff] [blame] | 363 | void setup(void) |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 364 | { |
Garrett Cooper | 2c28215 | 2010-12-16 00:55:50 -0800 | [diff] [blame] | 365 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 366 | tst_sig(FORK, DEF_HANDLER, cleanup); |
| 367 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 368 | TEST_PAUSE; |
| 369 | } |
| 370 | |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 371 | int run_test(int file_flag, int file_mode, int dup_flag) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 372 | { |
| 373 | int fd_A, fd_B; |
Garrett Cooper | 1e6f5a6 | 2010-12-19 09:58:10 -0800 | [diff] [blame] | 374 | fd_B = -1; |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 375 | sigset_t newmask, zeromask, oldmask; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 376 | |
| 377 | /* setup to catch SIGUSR1 signal from child process */ |
| 378 | if ((signal(SIGUSR1, child_sig)) == SIG_ERR) { |
| 379 | perror("Signal setup for SIGUSR1 failed"); |
| 380 | } |
| 381 | |
| 382 | /* setup to catch SIGUSR2 signal from parent */ |
| 383 | if ((signal(SIGUSR2, parent_sig)) == SIG_ERR) { |
| 384 | perror("Signal setup for SIGUSR1 failed"); |
| 385 | } |
| 386 | |
mridge | 562dd48 | 2004-05-11 21:54:47 +0000 | [diff] [blame] | 387 | parent = syscall(__NR_gettid); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 388 | |
| 389 | tst_tmpdir(); |
| 390 | /* setup temporary file name */ |
plars | 363a35f | 2002-02-18 22:10:07 +0000 | [diff] [blame] | 391 | sprintf(tmpname, "fcntl15.%d", parent); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 392 | |
| 393 | /* initialize signal flags */ |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 394 | child_flag = parent_flag = alarm_flag = 0; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 395 | |
| 396 | if ((fd_A = open(tmpname, file_flag, file_mode)) < 0) { |
| 397 | perror("open first parent file failed"); |
| 398 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 399 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 400 | } |
| 401 | |
| 402 | /* write some data to the file */ |
| 403 | (void)write(fd_A, DATA, 10); |
| 404 | |
| 405 | if (dup_flag) { |
| 406 | if (dup_flag == FORK_) { |
| 407 | dofork(file_flag, file_mode); |
| 408 | } else { |
| 409 | if ((fd_B = open(tmpname, file_flag, file_mode)) < 0) { |
| 410 | perror("open second parent file failed"); |
| 411 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 412 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 413 | } |
| 414 | } |
| 415 | } else { |
| 416 | /* create a second file descriptor from first file */ |
| 417 | if ((fd_B = fcntl(fd_A, F_DUPFD, 0)) < 0) { |
| 418 | perror("dup of second parent file failed"); |
| 419 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 420 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 421 | } |
| 422 | } |
| 423 | |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 424 | /* |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 425 | * initialize lock structure for first lock on first |
| 426 | * 5 bytes of file |
| 427 | */ |
| 428 | flock.l_type = F_WRLCK; |
| 429 | flock.l_whence = 0; |
| 430 | flock.l_start = 0L; |
| 431 | flock.l_len = 5L; |
| 432 | |
| 433 | /* set lock on first file descriptor */ |
| 434 | if ((fcntl(fd_A, F_SETLK, &flock)) < 0) { |
| 435 | perror("Attempt to set first parent lock failed"); |
| 436 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 437 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 438 | } |
| 439 | |
| 440 | if (dup_flag != FORK_) { |
| 441 | /* initialize lock structure for last 5 bytes of file */ |
| 442 | flock.l_type = F_WRLCK; |
| 443 | flock.l_whence = 0; |
| 444 | flock.l_start = 5L; |
| 445 | flock.l_len = 5L; |
| 446 | |
| 447 | /* set lock on second file descriptor */ |
| 448 | if ((fcntl(fd_B, F_SETLK, &flock)) < 0) { |
| 449 | perror("Attempt to set second parent lock failed"); |
| 450 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 451 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 452 | } |
| 453 | } |
| 454 | |
| 455 | /* create child process */ |
subrata_modak | bdbaec5 | 2009-02-26 12:14:51 +0000 | [diff] [blame] | 456 | if ((child2 = FORK_OR_VFORK()) < 0) { |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 457 | perror("Fork failure"); |
| 458 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 459 | return 1; |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 460 | } else if (child2 == 0) { /* child */ |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 461 | #ifdef UCLINUX |
| 462 | if (self_exec(argv0, "ndddds", 2, file_flag, file_mode, |
Wanlong Gao | 354ebb4 | 2012-12-07 10:10:04 +0800 | [diff] [blame] | 463 | dup_flag, parent, tmpname) < 0) |
| 464 | tst_brkm(TBROK | TERRNO, NULL, "self_exec failed"); |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 465 | #else |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 466 | dochild2(file_flag, file_mode, dup_flag); |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 467 | #endif |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 468 | } |
| 469 | |
| 470 | /* parent */ |
| 471 | |
| 472 | /* |
| 473 | * Set alarm to break pause if child fails to signal then spin till |
| 474 | * child is ready |
| 475 | */ |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 476 | |
| 477 | sigemptyset(&zeromask); |
| 478 | sigemptyset(&newmask); |
| 479 | sigaddset(&newmask, SIGUSR1); |
| 480 | sigaddset(&newmask, SIGUSR2); |
| 481 | sigaddset(&newmask, SIGALRM); |
| 482 | if (sigprocmask(SIG_BLOCK, &newmask, &oldmask) < 0) { |
| 483 | perror("parent sigprocmask SIG_BLOCK fail"); |
| 484 | exit(1); |
| 485 | } |
| 486 | |
| 487 | /* |
| 488 | * set alarm to break pause if parent fails to signal then spin till |
| 489 | * parent ready |
| 490 | */ |
| 491 | alarm(60); |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 492 | while (child_flag == 0 && alarm_flag == 0) |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 493 | sigsuspend(&zeromask); |
| 494 | alarm((unsigned)0); |
| 495 | if (child_flag != 1) { |
subrata_modak | 56207ce | 2009-03-23 13:35:39 +0000 | [diff] [blame] | 496 | perror("parent paused without SIGUSR1 " "from child"); |
robbiew | d00d651 | 2005-01-11 16:05:34 +0000 | [diff] [blame] | 497 | exit(1); |
| 498 | } |
| 499 | child_flag = 0; |
| 500 | alarm_flag = 0; |
| 501 | if (sigprocmask(SIG_SETMASK, &oldmask, NULL) < 0) { |
| 502 | perror("parent sigprocmask SIG_SETMASK fail"); |
| 503 | exit(1); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 504 | } |
| 505 | |
| 506 | /* close the first file then signal child to test locks */ |
| 507 | close(fd_A); |
| 508 | if ((kill(child2, SIGUSR2)) < 0) { |
| 509 | perror("Signal to child2 failed"); |
| 510 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 511 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 512 | } |
| 513 | |
| 514 | if (dup_flag == FORK_) { |
| 515 | if ((kill(child1, SIGUSR2)) < 0) { |
| 516 | perror("Signal to child1 failed"); |
| 517 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 518 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 519 | } |
| 520 | } |
| 521 | /* wait for child to complete then cleanup */ |
| 522 | while ((wait(&status)) > 0) { |
| 523 | if (status >> 8 != 0) { |
| 524 | tst_resm(TFAIL, "Expected 0 got %d", status >> 8); |
| 525 | tst_rmdir(); |
subrata_modak | 134e896 | 2009-02-26 11:46:54 +0000 | [diff] [blame] | 526 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 527 | } |
| 528 | } |
| 529 | if (dup_flag != FORK_) { |
| 530 | close(fd_B); |
| 531 | } |
| 532 | unlink(tmpname); |
| 533 | tst_rmdir(); |
subrata_modak | 43337a3 | 2009-02-26 11:43:51 +0000 | [diff] [blame] | 534 | return 0; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 535 | } |
| 536 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 537 | int main(int ac, char **av) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 538 | { |
Cyril Hrubis | 89af32a | 2012-10-24 16:39:11 +0200 | [diff] [blame] | 539 | int lc; |
Cyril Hrubis | 0b9589f | 2014-05-27 17:40:33 +0200 | [diff] [blame] | 540 | const char *msg; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 541 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 542 | int fail = 0; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 543 | |
Garrett Cooper | 45e285d | 2010-11-22 12:19:25 -0800 | [diff] [blame] | 544 | if ((msg = parse_opts(ac, av, NULL, NULL)) != NULL) { |
Garrett Cooper | 60fa801 | 2010-11-22 13:50:58 -0800 | [diff] [blame] | 545 | tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 546 | } |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 547 | #ifdef UCLINUX |
| 548 | maybe_run_child(&dochild1_uc, "nddds", 1, &uc_file_flag, |
| 549 | &uc_file_mode, &parent, tmpname); |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 550 | maybe_run_child(&dochild2_uc, "nddds", 1, &uc_file_flag, |
| 551 | &uc_file_mode, &uc_dup_flag, &parent, tmpname); |
robbiew | d34d581 | 2005-07-11 22:28:09 +0000 | [diff] [blame] | 552 | argv0 = av[0]; |
| 553 | #endif |
| 554 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 555 | setup(); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 556 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 557 | /* Check for looping state if -i option is given */ |
| 558 | for (lc = 0; TEST_LOOPING(lc); lc++) { |
Caspar Zhang | d59a659 | 2013-03-07 14:59:12 +0800 | [diff] [blame] | 559 | /* reset tst_count in case we are looping */ |
| 560 | tst_count = 0; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 561 | |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 562 | /* Set up to catch alarm signal */ |
| 563 | if ((signal(SIGALRM, alarm_sig)) == SIG_ERR) { |
| 564 | perror("SIGALRM signal set up failed"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 565 | exit(1); |
| 566 | } |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 567 | |
mridge | db63921 | 2005-01-04 21:04:11 +0000 | [diff] [blame] | 568 | /* //block1: */ |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 569 | tst_resm(TINFO, "Entering block 1"); |
| 570 | if (run_test(O_CREAT | O_RDWR | O_TRUNC, 0777, DUP)) { |
| 571 | tst_resm(TINFO, "Test 1: test with \"dup\" FAILED"); |
| 572 | fail = 1; |
| 573 | } else { |
| 574 | tst_resm(TINFO, "Test 1: test with \"dup\" PASSED"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 575 | } |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 576 | tst_resm(TINFO, "Exiting block 1"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 577 | |
mridge | db63921 | 2005-01-04 21:04:11 +0000 | [diff] [blame] | 578 | /* //block2: */ |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 579 | tst_resm(TINFO, "Entering block 2"); |
| 580 | if (run_test(O_CREAT | O_RDWR | O_TRUNC, 0777, OPEN)) { |
| 581 | tst_resm(TINFO, "Test 2: test with \"open\" FAILED"); |
| 582 | fail = 1; |
| 583 | } else { |
| 584 | tst_resm(TINFO, "Test 2: test with \"open\" PASSED"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 585 | } |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 586 | tst_resm(TINFO, "Exiting block 2"); |
| 587 | |
mridge | db63921 | 2005-01-04 21:04:11 +0000 | [diff] [blame] | 588 | /* //block3: */ |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 589 | tst_resm(TINFO, "Entering block 3"); |
| 590 | if (run_test(O_CREAT | O_RDWR | O_TRUNC, 0777, FORK_)) { |
| 591 | tst_resm(TINFO, "Test 3: test with \"fork\" FAILED"); |
| 592 | fail = 1; |
| 593 | } else { |
| 594 | tst_resm(TINFO, "Test 3: test with \"fork\" PASSED"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 595 | } |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 596 | tst_resm(TINFO, "Exiting block 3"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 597 | } |
robbiew | b3f0d5d | 2003-03-25 22:57:02 +0000 | [diff] [blame] | 598 | cleanup(); |
Garrett Cooper | 2c28215 | 2010-12-16 00:55:50 -0800 | [diff] [blame] | 599 | tst_exit(); |
Garrett Cooper | 4fac290 | 2010-12-21 11:53:17 -0800 | [diff] [blame] | 600 | } |