1 // SPDX-License-Identifier: GPL-2.0-or-later
2
3 /*\
4 * Test recvmmsg() errors:
5 *
6 * - EBADF Bad socket file descriptor
7 * - EFAULT Bad message vector address
8 * - EINVAL Bad seconds value for the timeout argument
9 * - EINVAL Bad nanoseconds value for the timeout argument
10 * - EFAULT Bad timeout address
11 */
12
13 #define _GNU_SOURCE
14 #include "../sendmmsg/sendmmsg.h"
15
16 static int send_sockfd;
17 static int receive_sockfd;
18
19 #define VLEN 1
20
21 static struct mmsghdr *msg;
22 static struct iovec *iov;
23
24 static void *bad_addr;
25 static int bad_fd = -1;
26
27 static struct tst_ts ts;
28
29 struct test_case {
30 const char *desc;
31 int *fd;
32 long tv_sec;
33 long tv_nsec;
34 int exp_errno;
35 struct mmsghdr **msg_vec;
36 int bad_ts_addr;
37 };
38
39 static struct test_case tcase[] = {
40 {
41 .desc = "bad socket file descriptor",
42 .fd = &bad_fd,
43 .exp_errno = EBADF,
44 .msg_vec = &msg,
45 },
46 {
47 .desc = "bad message vector address",
48 .fd = &receive_sockfd,
49 .exp_errno = EFAULT,
50 .msg_vec = (void*)&bad_addr,
51 },
52 {
53 .desc = "negative seconds in timeout",
54 .fd = &receive_sockfd,
55 .tv_sec = -1,
56 .tv_nsec = 0,
57 .exp_errno = EINVAL,
58 .msg_vec = &msg,
59 },
60 {
61 .desc = "overflow in nanoseconds in timeout",
62 .fd = &receive_sockfd,
63 .tv_sec = 1,
64 .tv_nsec = 1000000001,
65 .exp_errno = EINVAL,
66 .msg_vec = &msg,
67 },
68 {
69 .desc = "bad timeout address",
70 .fd = &receive_sockfd,
71 .exp_errno = EFAULT,
72 .msg_vec = &msg,
73 .bad_ts_addr = 1,
74 }
75 };
76
do_test(unsigned int i)77 static void do_test(unsigned int i)
78 {
79 struct time64_variants *tv = &variants[tst_variant];
80 struct test_case *tc = &tcase[i];
81 void *timeout;
82
83 ts.type = tv->ts_type;
84 tst_ts_set_sec(&ts, tc->tv_sec);
85 tst_ts_set_nsec(&ts, tc->tv_nsec);
86
87 if (tc->bad_ts_addr)
88 timeout = bad_addr;
89 else
90 timeout = tst_ts_get(&ts);
91
92 TST_EXP_FAIL2(tv->recvmmsg(*tc->fd, *tc->msg_vec, VLEN, 0, timeout),
93 tc->exp_errno, "recvmmsg() %s", tc->desc);
94 }
95
setup(void)96 static void setup(void)
97 {
98 struct sockaddr_in addr;
99 unsigned int port = TST_GET_UNUSED_PORT(AF_INET, SOCK_DGRAM);
100 struct time64_variants *tv = &variants[tst_variant];
101
102 tst_res(TINFO, "Testing variant: %s", variants[tst_variant].desc);
103
104 send_sockfd = SAFE_SOCKET(AF_INET, SOCK_DGRAM, 0);
105 receive_sockfd = SAFE_SOCKET(AF_INET, SOCK_DGRAM, 0);
106
107 addr.sin_family = AF_INET;
108 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
109 addr.sin_port = port;
110
111 SAFE_BIND(receive_sockfd, (struct sockaddr *)&addr, sizeof(addr));
112 SAFE_CONNECT(send_sockfd, (struct sockaddr *)&addr, sizeof(addr));
113
114 msg[0].msg_hdr.msg_iov = iov;
115 msg[0].msg_hdr.msg_iovlen = 1;
116
117 TEST(tv->sendmmsg(send_sockfd, msg, 1, 0));
118
119 if (TST_RET != 1) {
120 tst_res(TFAIL | TTERRNO, "sendmmsg() failed");
121 return;
122 }
123
124 bad_addr = tst_get_bad_addr(NULL);
125 }
126
cleanup(void)127 static void cleanup(void)
128 {
129 if (send_sockfd > 0)
130 SAFE_CLOSE(send_sockfd);
131
132 if (receive_sockfd > 0)
133 SAFE_CLOSE(receive_sockfd);
134 }
135
136 static struct tst_test test = {
137 .test = do_test,
138 .tcnt = ARRAY_SIZE(tcase),
139 .setup = setup,
140 .cleanup = cleanup,
141 .test_variants = ARRAY_SIZE(variants),
142 .bufs = (struct tst_buffers []) {
143 {&iov, .iov_sizes = (int[]){1, -1}},
144 {&msg, .size = VLEN * sizeof(*msg)},
145 {},
146 }
147 };
148