xref: /f-stack/dpdk/app/test/process.h (revision 2d9fd380)
14418919fSjohnjiang /* SPDX-License-Identifier: BSD-3-Clause
24418919fSjohnjiang  * Copyright(c) 2010-2014 Intel Corporation
34418919fSjohnjiang  */
44418919fSjohnjiang 
54418919fSjohnjiang #ifndef _PROCESS_H_
64418919fSjohnjiang #define _PROCESS_H_
74418919fSjohnjiang 
84418919fSjohnjiang #include <errno.h>  /* errno */
94418919fSjohnjiang #include <limits.h> /* PATH_MAX */
104418919fSjohnjiang #include <libgen.h> /* basename et al */
114418919fSjohnjiang #include <stdlib.h> /* NULL */
124418919fSjohnjiang #include <string.h> /* strerror */
134418919fSjohnjiang #include <unistd.h> /* readlink */
144418919fSjohnjiang #include <dirent.h>
154418919fSjohnjiang #include <sys/wait.h>
164418919fSjohnjiang 
174418919fSjohnjiang #include <rte_string_fns.h> /* strlcpy */
184418919fSjohnjiang 
194418919fSjohnjiang #ifdef RTE_EXEC_ENV_FREEBSD
204418919fSjohnjiang #define self "curproc"
214418919fSjohnjiang #define exe "file"
224418919fSjohnjiang #else
234418919fSjohnjiang #define self "self"
244418919fSjohnjiang #define exe "exe"
254418919fSjohnjiang #endif
264418919fSjohnjiang 
27*2d9fd380Sjfb8856606 #ifdef RTE_LIB_PDUMP
28*2d9fd380Sjfb8856606 #ifdef RTE_NET_RING
294418919fSjohnjiang #include <pthread.h>
304418919fSjohnjiang extern void *send_pkts(void *empty);
314418919fSjohnjiang extern uint16_t flag_for_send_pkts;
324418919fSjohnjiang #endif
334418919fSjohnjiang #endif
344418919fSjohnjiang 
354418919fSjohnjiang /*
364418919fSjohnjiang  * launches a second copy of the test process using the given argv parameters,
374418919fSjohnjiang  * which should include argv[0] as the process name. To identify in the
384418919fSjohnjiang  * subprocess the source of the call, the env_value parameter is set in the
394418919fSjohnjiang  * environment as $RTE_TEST
404418919fSjohnjiang  */
414418919fSjohnjiang static inline int
process_dup(const char * const argv[],int numargs,const char * env_value)424418919fSjohnjiang process_dup(const char *const argv[], int numargs, const char *env_value)
434418919fSjohnjiang {
444418919fSjohnjiang 	int num;
454418919fSjohnjiang 	char *argv_cpy[numargs + 1];
464418919fSjohnjiang 	int i, status;
474418919fSjohnjiang 	char path[32];
48*2d9fd380Sjfb8856606 #ifdef RTE_LIB_PDUMP
49*2d9fd380Sjfb8856606 #ifdef RTE_NET_RING
504418919fSjohnjiang 	pthread_t thread;
514418919fSjohnjiang #endif
524418919fSjohnjiang #endif
534418919fSjohnjiang 
544418919fSjohnjiang 	pid_t pid = fork();
554418919fSjohnjiang 	if (pid < 0)
564418919fSjohnjiang 		return -1;
574418919fSjohnjiang 	else if (pid == 0) {
584418919fSjohnjiang 		/* make a copy of the arguments to be passed to exec */
594418919fSjohnjiang 		for (i = 0; i < numargs; i++)
604418919fSjohnjiang 			argv_cpy[i] = strdup(argv[i]);
614418919fSjohnjiang 		argv_cpy[i] = NULL;
624418919fSjohnjiang 		num = numargs;
634418919fSjohnjiang 
644418919fSjohnjiang #ifdef RTE_EXEC_ENV_LINUX
654418919fSjohnjiang 		{
664418919fSjohnjiang 			const char *procdir = "/proc/" self "/fd/";
674418919fSjohnjiang 			struct dirent *dirent;
684418919fSjohnjiang 			char *endptr;
694418919fSjohnjiang 			int fd, fdir;
704418919fSjohnjiang 			DIR *dir;
714418919fSjohnjiang 
724418919fSjohnjiang 			/* close all open file descriptors, check /proc/self/fd
734418919fSjohnjiang 			 * to only call close on open fds. Exclude fds 0, 1 and
744418919fSjohnjiang 			 * 2
754418919fSjohnjiang 			 */
764418919fSjohnjiang 			dir = opendir(procdir);
774418919fSjohnjiang 			if (dir == NULL) {
784418919fSjohnjiang 				rte_panic("Error opening %s: %s\n", procdir,
794418919fSjohnjiang 						strerror(errno));
804418919fSjohnjiang 			}
814418919fSjohnjiang 
824418919fSjohnjiang 			fdir = dirfd(dir);
834418919fSjohnjiang 			if (fdir < 0) {
844418919fSjohnjiang 				status = errno;
854418919fSjohnjiang 				closedir(dir);
864418919fSjohnjiang 				rte_panic("Error %d obtaining fd for dir %s: %s\n",
874418919fSjohnjiang 						fdir, procdir,
884418919fSjohnjiang 						strerror(status));
894418919fSjohnjiang 			}
904418919fSjohnjiang 
914418919fSjohnjiang 			while ((dirent = readdir(dir)) != NULL) {
924418919fSjohnjiang 				errno = 0;
934418919fSjohnjiang 				fd = strtol(dirent->d_name, &endptr, 10);
944418919fSjohnjiang 				if (errno != 0 || endptr[0] != '\0') {
954418919fSjohnjiang 					printf("Error converting name fd %d %s:\n",
964418919fSjohnjiang 						fd, dirent->d_name);
974418919fSjohnjiang 					continue;
984418919fSjohnjiang 				}
994418919fSjohnjiang 
1004418919fSjohnjiang 				if (fd == fdir || fd <= 2)
1014418919fSjohnjiang 					continue;
1024418919fSjohnjiang 
1034418919fSjohnjiang 				close(fd);
1044418919fSjohnjiang 			}
1054418919fSjohnjiang 			closedir(dir);
1064418919fSjohnjiang 		}
1074418919fSjohnjiang #endif
1084418919fSjohnjiang 		printf("Running binary with argv[]:");
1094418919fSjohnjiang 		for (i = 0; i < num; i++)
1104418919fSjohnjiang 			printf("'%s' ", argv_cpy[i]);
1114418919fSjohnjiang 		printf("\n");
1124418919fSjohnjiang 
1134418919fSjohnjiang 		/* set the environment variable */
1144418919fSjohnjiang 		if (setenv(RECURSIVE_ENV_VAR, env_value, 1) != 0)
1154418919fSjohnjiang 			rte_panic("Cannot export environment variable\n");
1164418919fSjohnjiang 
1174418919fSjohnjiang 		strlcpy(path, "/proc/" self "/" exe, sizeof(path));
1184418919fSjohnjiang 		if (execv(path, argv_cpy) < 0) {
1194418919fSjohnjiang 			if (errno == ENOENT) {
1204418919fSjohnjiang 				printf("Could not find '%s', is procfs mounted?\n",
1214418919fSjohnjiang 						path);
1224418919fSjohnjiang 			}
1234418919fSjohnjiang 			rte_panic("Cannot exec: %s\n", strerror(errno));
1244418919fSjohnjiang 		}
1254418919fSjohnjiang 	}
1264418919fSjohnjiang 	/* parent process does a wait */
127*2d9fd380Sjfb8856606 #ifdef RTE_LIB_PDUMP
128*2d9fd380Sjfb8856606 #ifdef RTE_NET_RING
1294418919fSjohnjiang 	if ((strcmp(env_value, "run_pdump_server_tests") == 0))
1304418919fSjohnjiang 		pthread_create(&thread, NULL, &send_pkts, NULL);
1314418919fSjohnjiang #endif
1324418919fSjohnjiang #endif
1334418919fSjohnjiang 
1344418919fSjohnjiang 	while (wait(&status) != pid)
1354418919fSjohnjiang 		;
136*2d9fd380Sjfb8856606 #ifdef RTE_LIB_PDUMP
137*2d9fd380Sjfb8856606 #ifdef RTE_NET_RING
1384418919fSjohnjiang 	if ((strcmp(env_value, "run_pdump_server_tests") == 0)) {
1394418919fSjohnjiang 		flag_for_send_pkts = 0;
1404418919fSjohnjiang 		pthread_join(thread, NULL);
1414418919fSjohnjiang 	}
1424418919fSjohnjiang #endif
1434418919fSjohnjiang #endif
1444418919fSjohnjiang 	return status;
1454418919fSjohnjiang }
1464418919fSjohnjiang 
1474418919fSjohnjiang /* FreeBSD doesn't support file prefixes, so force compile failures for any
1484418919fSjohnjiang  * tests attempting to use this function on FreeBSD.
1494418919fSjohnjiang  */
1504418919fSjohnjiang #ifdef RTE_EXEC_ENV_LINUX
1514418919fSjohnjiang static char *
get_current_prefix(char * prefix,int size)1524418919fSjohnjiang get_current_prefix(char *prefix, int size)
1534418919fSjohnjiang {
1544418919fSjohnjiang 	char path[PATH_MAX] = {0};
1554418919fSjohnjiang 	char buf[PATH_MAX] = {0};
1564418919fSjohnjiang 
1574418919fSjohnjiang 	/* get file for config (fd is always 3) */
1584418919fSjohnjiang 	snprintf(path, sizeof(path), "/proc/self/fd/%d", 3);
1594418919fSjohnjiang 
1604418919fSjohnjiang 	/* return NULL on error */
1614418919fSjohnjiang 	if (readlink(path, buf, sizeof(buf)) == -1)
1624418919fSjohnjiang 		return NULL;
1634418919fSjohnjiang 
1644418919fSjohnjiang 	/* get the prefix */
1654418919fSjohnjiang 	snprintf(prefix, size, "%s", basename(dirname(buf)));
1664418919fSjohnjiang 
1674418919fSjohnjiang 	return prefix;
1684418919fSjohnjiang }
1694418919fSjohnjiang #endif
1704418919fSjohnjiang 
1714418919fSjohnjiang #endif /* _PROCESS_H_ */
172