• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 
3 /*
4  * Copyright (C) 2008, Linux Foundation,
5  * Copyright (c) 2020 Petr Vorel <petr.vorel@gmail.com>
6  * written by Michael Kerrisk <mtk.manpages@gmail.com>
7  * Initial Porting to LTP by Subrata <subrata@linux.vnet.ibm.com>
8  */
9 
10 #define _GNU_SOURCE
11 #include <unistd.h>
12 #include <sys/syscall.h>
13 #include <sys/socket.h>
14 #include <netinet/in.h>
15 #include <stdlib.h>
16 #include <stdio.h>
17 #include <string.h>
18 #include <errno.h>
19 #include <linux/net.h>
20 
21 #include "tst_test.h"
22 #include "lapi/fcntl.h"
23 #include "lapi/syscalls.h"
24 
25 #define PORT_NUM 33333
26 
27 static const char *variant_desc[] = {
28 	"libc accept4()",
29 	"__NR_accept4 syscall",
30 	"__NR_socketcall SYS_ACCEPT4 syscall"};
31 
32 static struct sockaddr_in *conn_addr, *accept_addr;
33 static int listening_fd;
34 
socketcall_accept4(int fd,struct sockaddr * sockaddr,socklen_t * addrlen,int flags)35 static int socketcall_accept4(int fd, struct sockaddr *sockaddr, socklen_t
36 			      *addrlen, int flags)
37 {
38 	long args[6];
39 
40 	args[0] = fd;
41 	args[1] = (long)sockaddr;
42 	args[2] = (long)addrlen;
43 	args[3] = flags;
44 
45 	return tst_syscall(__NR_socketcall, SYS_ACCEPT4, args);
46 }
47 
create_listening_socket(void)48 static int create_listening_socket(void)
49 {
50 	struct sockaddr_in svaddr;
51 	int lfd;
52 	int optval;
53 
54 	memset(&svaddr, 0, sizeof(struct sockaddr_in));
55 	svaddr.sin_family = AF_INET;
56 	svaddr.sin_addr.s_addr = htonl(INADDR_ANY);
57 	svaddr.sin_port = htons(PORT_NUM);
58 
59 	lfd = SAFE_SOCKET(AF_INET, SOCK_STREAM, 0);
60 
61 	optval = 1;
62 	SAFE_SETSOCKOPT(lfd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval));
63 	SAFE_BIND(lfd, (struct sockaddr *)&svaddr, sizeof(struct sockaddr_in));
64 	SAFE_LISTEN(lfd, 5);
65 
66 	return lfd;
67 }
68 
setup(void)69 static void setup(void)
70 {
71 	tst_res(TINFO, "Testing variant: %s", variant_desc[tst_variant]);
72 
73 	memset(conn_addr, 0, sizeof(*conn_addr));
74 	conn_addr->sin_family = AF_INET;
75 	conn_addr->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
76 	conn_addr->sin_port = htons(PORT_NUM);
77 
78 	listening_fd = create_listening_socket();
79 }
80 
cleanup(void)81 static void cleanup(void)
82 {
83 	SAFE_CLOSE(listening_fd);
84 }
85 
86 static struct test_case {
87 	int cloexec;
88 	int nonblock;
89 } tcases[] = {
90 	{ 0, 0 },
91 	{ SOCK_CLOEXEC, 0 },
92 	{ 0, SOCK_NONBLOCK },
93 	{ SOCK_CLOEXEC, SOCK_NONBLOCK },
94 };
95 
verify_accept4(unsigned int nr)96 static void verify_accept4(unsigned int nr)
97 {
98 	struct test_case *tcase = &tcases[nr];
99 	int flags = tcase->cloexec | tcase->nonblock;
100 	int connfd, acceptfd;
101 	int fdf, flf, fdf_pass, flf_pass, fd_cloexec, fd_nonblock;
102 	socklen_t addrlen;
103 
104 	connfd = SAFE_SOCKET(AF_INET, SOCK_STREAM, 0);
105 	SAFE_CONNECT(connfd, (struct sockaddr *)conn_addr, sizeof(*conn_addr));
106 	addrlen = sizeof(*accept_addr);
107 
108 	switch (tst_variant) {
109 	case 0:
110 		TEST(accept4(listening_fd, (struct sockaddr *)accept_addr,
111 			     &addrlen, flags));
112 	break;
113 	case 1:
114 		TEST(tst_syscall(__NR_accept4, listening_fd,
115 				 (struct sockaddr *)accept_addr,
116 				 &addrlen, flags));
117 	break;
118 	case 2:
119 		TEST(socketcall_accept4(listening_fd, (struct sockaddr *)accept_addr,
120 				&addrlen, flags));
121 	break;
122 	}
123 
124 	if (TST_RET == -1)
125 		tst_brk(TBROK | TTERRNO, "accept4 failed");
126 
127 	acceptfd = TST_RET;
128 
129 	/* Test to see if O_CLOEXEC is as expected */
130 	fdf = SAFE_FCNTL(acceptfd, F_GETFD);
131 	fd_cloexec = !!(fdf & FD_CLOEXEC);
132 	fdf_pass = fd_cloexec == !!tcase->cloexec;
133 	if (!fdf_pass) {
134 		tst_res(TFAIL, "Close-on-exec flag mismatch, %d vs %d",
135 			fd_cloexec, !!tcase->cloexec);
136 	}
137 
138 	/* Test to see if O_NONBLOCK is as expected */
139 	flf = SAFE_FCNTL(acceptfd, F_GETFL);
140 	fd_nonblock = !!(flf & O_NONBLOCK);
141 	flf_pass = fd_nonblock == !!tcase->nonblock;
142 	if (!flf_pass) {
143 		tst_res(TFAIL, "nonblock flag mismatch, %d vs %d",
144 		        fd_nonblock, !!tcase->nonblock);
145 	}
146 
147 	SAFE_CLOSE(acceptfd);
148 	SAFE_CLOSE(connfd);
149 
150 	if (fdf_pass && flf_pass) {
151 		tst_res(TPASS, "Close-on-exec %d, nonblock %d",
152 				fd_cloexec, fd_nonblock);
153 	}
154 }
155 
156 static struct tst_test test = {
157 	.tcnt = ARRAY_SIZE(tcases),
158 	.setup = setup,
159 	.cleanup = cleanup,
160 	.test_variants = ARRAY_SIZE(variant_desc),
161 	.test = verify_accept4,
162 	.bufs = (struct tst_buffers []) {
163 		{&conn_addr, .size = sizeof(*conn_addr)},
164 		{&accept_addr, .size = sizeof(*accept_addr)},
165 		{},
166 	}
167 };
168