mirror of
https://github.com/opnsense/src.git
synced 2026-03-06 07:10:41 -05:00
The SUS doesn't mention this error code as a possible one [1]. The FreeBSD manual page specifies a possible ECONNRESET for close(2): [ECONNRESET] The underlying object was a stream socket that was shut down by the peer before all pending data was delivered. In the past it had been EINVAL (see21367f630d), and this EINVAL was added as a safety measure in623dce13c6. After conversion to ECONNRESET it had been documented in the manual page in78e3a7fdd5, but I bet wasn't ever tested to actually be ever returned, cause the tcp-testsuite[2] didn't exist back then. So documentation is incorrect since 2006, if my bet wins. Anyway, in the modern FreeBSD the condition described above doesn't end up with ECONNRESET error code from close(2). The error condition is reported via SO_ERROR socket option, though. This can be checked using the tcp-testsuite, temporarily disabling the getsockopt(SO_ERROR) lines using sed command [3]. Most of these getsockopt(2)s are followed by '+0.00 close(3) = 0', which will confirm that close(2) doesn't return ECONNRESET even on a socket that has the error stored, neither it is returned in the case described in the manual page. The latter case is covered by multiple tests residing in tcp- testsuite/state-event-engine/rcv-rst-*. However, the deleted block of code could be entered in a race condition between close(2) and processing of incoming packet, when connection had already been half-closed with shutdown(SHUT_WR) and sits in TCPS_LAST_ACK. This was reported in the bug 146845. With the block deleted, we will continue into tcp_disconnect() which has proper handling of INP_DROPPED. The race explanation follows. The connection is in TCPS_LAST_ACK. The network input thread acquires the tcpcb lock first, sets INP_DROPPED, acquires the socket lock in soisdisconnected() and clears SS_ISCONNECTED. Meanwhile, the syscall thread goes through sodisconnect() which checks for SS_ISCONNECTED locklessly(!). The check passes and the thread blocks on the tcpcb lock in tcp_usr_disconnect(). Once input thread releases the lock, the syscall thread observes INP_DROPPED and returns ECONNRESET. - Thread 1: tcp_do_segment()->tcp_close()->in_pcbdrop(),soisdisconnected() - Thread 2: sys_close()...->soclose()->sodisconnect()->tcp_usr_disconnect() Note that the lockless operation in sodisconnect() isn't correct, but enforcing the socket lock there will not fix the problem. [1] https://pubs.opengroup.org/onlinepubs/9799919799/ [2] https://github.com/freebsd-net/tcp-testsuite [3] sed -i "" -Ee '/\+0\.00 getsockopt\(3, SOL_SOCKET, SO_ERROR, \[ECONNRESET\]/d' $(grep -lr ECONNRESET tcp-testsuite) PR: 146845 Reviewed by: tuexen, rrs, imp Differential Revision: https://reviews.freebsd.org/D48148 (cherry picked from commit 053a988497342a6fd0a717cc097d09c23f83e103)
140 lines
4.2 KiB
Groff
140 lines
4.2 KiB
Groff
.\" Copyright (c) 1980, 1991, 1993, 1994
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
.\"
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
.\" modification, are permitted provided that the following conditions
|
|
.\" are met:
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
.\" 3. Neither the name of the University nor the names of its contributors
|
|
.\" may be used to endorse or promote products derived from this software
|
|
.\" without specific prior written permission.
|
|
.\"
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
.\" SUCH DAMAGE.
|
|
.\"
|
|
.\" @(#)close.2 8.2 (Berkeley) 4/19/94
|
|
.\"
|
|
.Dd December 18, 2024
|
|
.Dt CLOSE 2
|
|
.Os
|
|
.Sh NAME
|
|
.Nm close
|
|
.Nd delete a descriptor
|
|
.Sh LIBRARY
|
|
.Lb libc
|
|
.Sh SYNOPSIS
|
|
.In unistd.h
|
|
.Ft int
|
|
.Fn close "int fd"
|
|
.Sh DESCRIPTION
|
|
The
|
|
.Fn close
|
|
system call deletes a descriptor from the per-process object
|
|
reference table.
|
|
If this is the last reference to the underlying object, the
|
|
object will be deactivated.
|
|
For example, on the last close of a file
|
|
the current
|
|
.Em seek
|
|
pointer associated with the file is lost;
|
|
on the last close of a
|
|
.Xr socket 2
|
|
associated naming information and queued data are discarded;
|
|
on the last close of a file holding an advisory lock
|
|
the lock is released (see further
|
|
.Xr flock 2 ) .
|
|
However, the semantics of System V and
|
|
.St -p1003.1-88
|
|
dictate that all
|
|
.Xr fcntl 2
|
|
advisory record locks associated with a file for a given process
|
|
are removed when
|
|
.Em any
|
|
file descriptor for that file is closed by that process.
|
|
.Pp
|
|
When a process exits,
|
|
all associated file descriptors are freed, but since there is
|
|
a limit on active descriptors per processes, the
|
|
.Fn close
|
|
system call
|
|
is useful when a large quantity of file descriptors are being handled.
|
|
.Pp
|
|
When a process forks (see
|
|
.Xr fork 2 ) ,
|
|
all descriptors for the new child process reference the same
|
|
objects as they did in the parent before the fork.
|
|
If a new process is then to be run using
|
|
.Xr execve 2 ,
|
|
the process would normally inherit these descriptors.
|
|
Most
|
|
of the descriptors can be rearranged with
|
|
.Xr dup2 2
|
|
or deleted with
|
|
.Fn close
|
|
before the
|
|
.Xr execve 2
|
|
is attempted, but if some of these descriptors will still
|
|
be needed if the execve fails, it is necessary to arrange for them
|
|
to be closed if the execve succeeds.
|
|
For this reason, the call
|
|
.Dq Li fcntl(d, F_SETFD, FD_CLOEXEC)
|
|
is provided,
|
|
which arranges that a descriptor will be closed after a successful
|
|
execve; the call
|
|
.Dq Li fcntl(d, F_SETFD, 0)
|
|
restores the default,
|
|
which is to not close the descriptor.
|
|
.Sh RETURN VALUES
|
|
.Rv -std close
|
|
.Sh ERRORS
|
|
The
|
|
.Fn close
|
|
system call will fail if:
|
|
.Bl -tag -width Er
|
|
.It Bq Er EBADF
|
|
The
|
|
.Fa fd
|
|
argument
|
|
is not an active descriptor.
|
|
.It Bq Er EINTR
|
|
An interrupt was received.
|
|
.It Bq Er ENOSPC
|
|
The underlying object did not fit, cached data was lost.
|
|
.El
|
|
.Pp
|
|
In case of any error except
|
|
.Er EBADF ,
|
|
the supplied file descriptor is deallocated and therefore is no longer valid.
|
|
.Sh SEE ALSO
|
|
.Xr accept 2 ,
|
|
.Xr closefrom 2 ,
|
|
.Xr execve 2 ,
|
|
.Xr fcntl 2 ,
|
|
.Xr flock 2 ,
|
|
.Xr open 2 ,
|
|
.Xr pipe 2 ,
|
|
.Xr socket 2 ,
|
|
.Xr socketpair 2
|
|
.Sh STANDARDS
|
|
The
|
|
.Fn close
|
|
system call is expected to conform to
|
|
.St -p1003.1-90 .
|
|
.Sh HISTORY
|
|
The
|
|
.Fn close
|
|
function appeared in
|
|
.At v1 .
|