1 // SPDX-License-Identifier: GPL-2.0-or-later
2
3 /*
4 * Copyright (c) International Business Machines Corp., 2001
5 * 07/2001 Ported by Wayne Boyer
6 *
7 * Description:
8 * Verify that accept() returns the proper errno for various failure cases
9 */
10
11 #include <stdio.h>
12 #include <unistd.h>
13 #include <errno.h>
14 #include <fcntl.h>
15
16 #include <sys/types.h>
17 #include <sys/socket.h>
18 #include <sys/signal.h>
19
20 #include <netinet/in.h>
21
22 #include "tst_test.h"
23
24 struct sockaddr_in sin0, sin1, fsin1;
25
26 int invalid_socketfd = 400; /* anything that is not an open file */
27 int devnull_fd;
28 int socket_fd;
29 int udp_fd;
30
31 static struct test_case {
32 int domain; /* PF_INET, PF_UNIX, ... */
33 int type; /* SOCK_STREAM, SOCK_DGRAM ... */
34 int proto; /* protocol number (usually 0 = default) */
35 int *fd; /* File descriptor for the test case */
36 struct sockaddr *sockaddr; /* socket address buffer */
37 socklen_t salen; /* accept's 3rd argument */
38 int experrno; /* expected errno */
39 char *desc;
40 } tcases[] = {
41 {
42 PF_INET, SOCK_STREAM, 0, &invalid_socketfd,
43 (struct sockaddr *)&fsin1, sizeof(fsin1), EBADF,
44 "bad file descriptor"
45 },
46 {
47 PF_INET, SOCK_STREAM, 0, &devnull_fd, (struct sockaddr *)&fsin1,
48 sizeof(fsin1), ENOTSOCK, "fd is not socket"
49 },
50 {
51 PF_INET, SOCK_STREAM, 0, &socket_fd, (struct sockaddr *)3,
52 sizeof(fsin1), EINVAL, "invalid socket buffer"
53 },
54 {
55 PF_INET, SOCK_STREAM, 0, &socket_fd, (struct sockaddr *)&fsin1,
56 1, EINVAL, "invalid salen"
57 },
58 {
59 PF_INET, SOCK_STREAM, 0, &socket_fd, (struct sockaddr *)&fsin1,
60 sizeof(fsin1), EINVAL, "no queued connections"
61 },
62 {
63 PF_INET, SOCK_STREAM, 0, &udp_fd, (struct sockaddr *)&fsin1,
64 sizeof(fsin1), EOPNOTSUPP, "UDP accept"
65 },
66 };
67
test_setup(void)68 static void test_setup(void)
69 {
70 sin0.sin_family = AF_INET;
71 sin0.sin_port = 0;
72 sin0.sin_addr.s_addr = INADDR_ANY;
73
74 devnull_fd = SAFE_OPEN("/dev/null", O_WRONLY);
75
76 socket_fd = SAFE_SOCKET(PF_INET, SOCK_STREAM, 0);
77 SAFE_BIND(socket_fd, (struct sockaddr *)&sin0, sizeof(sin0));
78
79 sin1.sin_family = AF_INET;
80 sin1.sin_port = 0;
81 sin1.sin_addr.s_addr = INADDR_ANY;
82
83 udp_fd = SAFE_SOCKET(PF_INET, SOCK_DGRAM, 0);
84 SAFE_BIND(udp_fd, (struct sockaddr *)&sin1, sizeof(sin1));
85 }
86
test_cleanup(void)87 static void test_cleanup(void)
88 {
89 SAFE_CLOSE(devnull_fd);
90 SAFE_CLOSE(socket_fd);
91 SAFE_CLOSE(udp_fd);
92 }
93
verify_accept(unsigned int nr)94 void verify_accept(unsigned int nr)
95 {
96 struct test_case *tcase = &tcases[nr];
97
98 TEST(accept(*tcase->fd, tcase->sockaddr, &tcase->salen));
99
100 if (TST_RET != -1) {
101 tst_res(TFAIL, "%s: returned %li, expected -1",
102 tcase->desc, TST_RET);
103 return;
104 }
105
106 if (TST_ERR != tcase->experrno) {
107 tst_res(TFAIL | TTERRNO, "%s: expected errno %s, got ",
108 tcase->desc, tst_strerrno(tcase->experrno));
109 return;
110 }
111
112 tst_res(TPASS | TTERRNO, "%s successful", tcase->desc);
113 }
114
115 static struct tst_test test = {
116 .tcnt = ARRAY_SIZE(tcases),
117 .setup = test_setup,
118 .cleanup = test_cleanup,
119 .test = verify_accept,
120 };
121