/* * * Copyright (c) International Business Machines Corp., 2001 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ /* * Test Name: recvmsg01 * * Test Description: * Verify that recvmsg() returns the proper errno for various failure cases * * Usage: * recvmsg01 [-c n] [-e] [-i n] [-I x] [-P x] [-t] * where, -c n : Run n copies concurrently. * -e : Turn on errno logging. * -i n : Execute test n times. * -I x : Execute test for x seconds. * -P x : Pause for x seconds between iterations. * -t : Turn on syscall timing. * * HISTORY * 07/2001 Ported by Wayne Boyer * * RESTRICTIONS: * None. * */ #include #include #include #include #include #include #include #include #include #include #include #include #include "test.h" #include "safe_macros.h" char *TCID = "recvmsg01"; int testno; char buf[1024], cbuf[1024]; int s; /* socket descriptor */ int passed_fd = -1; /* rights-passing test descriptor */ struct sockaddr_in sin1, from; struct sockaddr_un sun1; struct msghdr msgdat; struct cmsghdr *control = 0; int controllen = 0; struct iovec iov[1]; static int sfd; /* shared between do_child and start_server */ static int ufd; /* shared between do_child and start_server */ void setup(void); void setup0(void); void setup1(void); void setup2(void); void setup3(void); void setup4(void); void cleanup(void); void cleanup0(void); void cleanup1(void); void cleanup2(void); void do_child(void); void sender(int); pid_t start_server(struct sockaddr_in *, struct sockaddr_un *); struct test_case_t { /* test case structure */ int domain; /* PF_INET, PF_UNIX, ... */ int type; /* SOCK_STREAM, SOCK_DGRAM ... */ int proto; /* protocol number (usually 0 = default) */ struct iovec *iov; int iovcnt; void *buf; /* recv data buffer */ int buflen; /* recv buffer length */ struct msghdr *msg; unsigned flags; struct sockaddr *from; /* from address */ int fromlen; /* from address value/result buffer length */ int retval; /* syscall return value */ int experrno; /* expected errno */ void (*setup) (void); void (*cleanup) (void); char *desc; } tdat[] = { /* 1 */ { PF_INET, SOCK_STREAM, 0, iov, 1, buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), -1, EBADF, setup0, cleanup0, "bad file descriptor"} , /* 2 */ { 0, 0, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), -1, ENOTSOCK, setup0, cleanup0, "invalid socket"} , /* 3 */ { PF_INET, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)-1, sizeof(from), 0, ENOTSOCK, setup1, cleanup1, "invalid socket buffer"} , /* 4 */ { PF_INET, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, -1, (struct sockaddr *)&from, -1, -1, EINVAL, setup1, cleanup1, "invalid socket length"}, /* 5 */ { PF_INET, SOCK_STREAM, 0, iov, 1, (void *)-1, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), -1, EFAULT, setup1, cleanup1, "invalid recv buffer"} , /* 6 */ { PF_INET, SOCK_STREAM, 0, 0, 1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), -1, EFAULT, setup1, cleanup1, "invalid iovec buffer"} , /* 7 */ { PF_INET, SOCK_STREAM, 0, iov, -1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), -1, EMSGSIZE, setup1, cleanup1, "invalid iovec count"} , /* 8 */ { PF_UNIX, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), 0, 0, setup2, cleanup2, "rights reception"} , /* 9 */ { PF_INET, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, MSG_OOB, (struct sockaddr *)&from, sizeof(from), -1, EINVAL, setup1, cleanup1, "invalid MSG_OOB flag set"} , /* 10 */ { PF_INET, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, MSG_ERRQUEUE, (struct sockaddr *)&from, sizeof(from), -1, EAGAIN, setup1, cleanup1, "invalid MSG_ERRQUEUE flag set"} , /* 11 */ { PF_UNIX, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), 0, EINVAL, setup3, cleanup2, "invalid cmsg length"} , /* 12 */ { PF_UNIX, SOCK_STREAM, 0, iov, 1, (void *)buf, sizeof(buf), &msgdat, 0, (struct sockaddr *)&from, sizeof(from), 0, 0, setup4, cleanup2, "large cmesg length"} ,}; int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]); #ifdef UCLINUX static char *argv0; #endif int main(int argc, char *argv[]) { int lc; tst_parse_opts(argc, argv, NULL, NULL); #ifdef UCLINUX argv0 = argv[0]; maybe_run_child(&do_child, "dd", &sfd, &ufd); #endif setup(); for (lc = 0; TEST_LOOPING(lc); ++lc) { tst_count = 0; for (testno = 0; testno < TST_TOTAL; ++testno) { if ((tst_kvercmp(3, 17, 0) < 0) && (tdat[testno].flags & MSG_ERRQUEUE) && (tdat[testno].type & SOCK_STREAM)) { tst_resm(TCONF, "skip MSG_ERRQUEUE test, " "it's supported from 3.17"); continue; } tdat[testno].setup(); /* setup common to all tests */ iov[0].iov_base = tdat[testno].buf; iov[0].iov_len = tdat[testno].buflen; msgdat.msg_name = tdat[testno].from; msgdat.msg_namelen = tdat[testno].fromlen; msgdat.msg_iov = tdat[testno].iov; msgdat.msg_iovlen = tdat[testno].iovcnt; msgdat.msg_control = control; msgdat.msg_controllen = controllen; msgdat.msg_flags = 0; TEST(recvmsg(s, tdat[testno].msg, tdat[testno].flags)); if (TEST_RETURN >= 0) TEST_RETURN = 0; /* all nonzero equal here */ if (TEST_RETURN != tdat[testno].retval || (TEST_RETURN < 0 && TEST_ERRNO != tdat[testno].experrno)) { tst_resm(TFAIL, "%s ; returned" " %ld (expected %d), errno %d (expected" " %d)", tdat[testno].desc, TEST_RETURN, tdat[testno].retval, TEST_ERRNO, tdat[testno].experrno); } else { tst_resm(TPASS, "%s successful", tdat[testno].desc); } tdat[testno].cleanup(); } } cleanup(); tst_exit(); } pid_t pid; char tmpsunpath[1024]; void setup(void) { int tfd; TEST_PAUSE; tst_tmpdir(); (void)strcpy(tmpsunpath, "udsockXXXXXX"); tfd = mkstemp(tmpsunpath); close(tfd); unlink(tmpsunpath); sun1.sun_family = AF_UNIX; (void)strcpy(sun1.sun_path, tmpsunpath); signal(SIGPIPE, SIG_IGN); pid = start_server(&sin1, &sun1); } void cleanup(void) { if (pid > 0) (void)kill(pid, SIGKILL); /* kill server */ if (tmpsunpath[0] != '\0') (void)unlink(tmpsunpath); tst_rmdir(); } void setup0(void) { if (tdat[testno].experrno == EBADF) s = 400; /* anything not an open file */ else if ((s = open("/dev/null", O_WRONLY)) == -1) tst_brkm(TBROK | TERRNO, cleanup, "open(/dev/null) failed"); } void cleanup0(void) { s = -1; } void setup1(void) { fd_set rdfds; struct timeval timeout; int n; s = SAFE_SOCKET(cleanup, tdat[testno].domain, tdat[testno].type, tdat[testno].proto); if (tdat[testno].type == SOCK_STREAM) { if (tdat[testno].domain == PF_INET) { SAFE_CONNECT(cleanup, s, (struct sockaddr *)&sin1, sizeof(sin1)); /* Wait for something to be readable, else we won't detect EFAULT on recv */ FD_ZERO(&rdfds); FD_SET(s, &rdfds); timeout.tv_sec = 2; timeout.tv_usec = 0; n = select(s + 1, &rdfds, 0, 0, &timeout); if (n != 1 || !FD_ISSET(s, &rdfds)) tst_brkm(TBROK, cleanup, "client setup1 failed - no message ready in 2 sec"); } else if (tdat[testno].domain == PF_UNIX) { SAFE_CONNECT(cleanup, s, (struct sockaddr *)&sun1, sizeof(sun1)); } } } void setup2(void) { setup1(); if (write(s, "R", 1) < 0) tst_brkm(TBROK | TERRNO, cleanup, "test setup failed: write:"); control = (struct cmsghdr *)cbuf; controllen = control->cmsg_len = sizeof(cbuf); } void setup3(void) { setup2(); controllen = sizeof(struct cmsghdr) - 1; } void setup4(void) { setup2(); controllen = 128 * 1024; } void cleanup1(void) { (void)close(s); close(ufd); close(sfd); s = -1; } void cleanup2(void) { close(ufd); close(sfd); (void)close(s); s = -1; if (passed_fd >= 0) (void)close(passed_fd); passed_fd = -1; control = 0; controllen = 0; } pid_t start_server(struct sockaddr_in *ssin, struct sockaddr_un *ssun) { pid_t pid; socklen_t slen = sizeof(*ssin); ssin->sin_family = AF_INET; ssin->sin_port = 0; /* pick random free port */ ssin->sin_addr.s_addr = INADDR_ANY; /* set up inet socket */ sfd = socket(PF_INET, SOCK_STREAM, 0); if (sfd < 0) { tst_brkm(TBROK | TERRNO, cleanup, "server socket failed"); return -1; } if (bind(sfd, (struct sockaddr *)ssin, sizeof(*ssin)) < 0) { tst_brkm(TBROK | TERRNO, cleanup, "server bind failed"); return -1; } if (listen(sfd, 10) < 0) { tst_brkm(TBROK | TERRNO, cleanup, "server listen failed"); return -1; } SAFE_GETSOCKNAME(cleanup, sfd, (struct sockaddr *)ssin, &slen); /* set up UNIX-domain socket */ ufd = socket(PF_UNIX, SOCK_STREAM, 0); if (ufd < 0) { tst_brkm(TBROK | TERRNO, cleanup, "server UD socket failed"); return -1; } if (bind(ufd, (struct sockaddr *)ssun, sizeof(*ssun))) { tst_brkm(TBROK | TERRNO, cleanup, "server UD bind failed"); return -1; } if (listen(ufd, 10) < 0) { tst_brkm(TBROK | TERRNO, cleanup, "server UD listen failed"); return -1; } switch ((pid = FORK_OR_VFORK())) { case 0: /* child */ #ifdef UCLINUX if (self_exec(argv0, "dd", sfd, ufd) < 0) tst_brkm(TBROK | TERRNO, cleanup, "server self_exec failed"); #else do_child(); #endif break; case -1: tst_brkm(TBROK | TERRNO, cleanup, "server fork failed"); /* fall through */ default: /* parent */ (void)close(sfd); (void)close(ufd); return pid; } exit(1); } void do_child(void) { struct sockaddr_in fsin; struct sockaddr_un fsun; fd_set afds, rfds; int nfds, cc, fd; FD_ZERO(&afds); FD_SET(sfd, &afds); FD_SET(ufd, &afds); nfds = MAX(sfd + 1, ufd + 1); /* accept connections until killed */ while (1) { socklen_t fromlen; memcpy(&rfds, &afds, sizeof(rfds)); if (select(nfds, &rfds, NULL, NULL, NULL) < 0) { if (errno != EINTR) { perror("server select"); exit(1); } continue; } if (FD_ISSET(sfd, &rfds)) { int newfd; fromlen = sizeof(fsin); newfd = accept(sfd, (struct sockaddr *)&fsin, &fromlen); if (newfd >= 0) { FD_SET(newfd, &afds); nfds = MAX(nfds, newfd + 1); /* send something back */ (void)write(newfd, "hoser\n", 6); } } if (FD_ISSET(ufd, &rfds)) { int newfd; fromlen = sizeof(fsun); newfd = accept(ufd, (struct sockaddr *)&fsun, &fromlen); if (newfd >= 0) { FD_SET(newfd, &afds); nfds = MAX(nfds, newfd + 1); } } for (fd = 0; fd < nfds; ++fd) if (fd != sfd && fd != ufd && FD_ISSET(fd, &rfds)) { char rbuf[1024]; cc = read(fd, rbuf, sizeof(rbuf)); if (cc && rbuf[0] == 'R') sender(fd); if (cc == 0 || (cc < 0 && errno != EINTR)) { (void)close(fd); FD_CLR(fd, &afds); } } } } #define TM "from recvmsg01 server" /* special for rights-passing test */ void sender(int fd) { struct msghdr mh; struct cmsghdr *control; char tmpfn[1024], snd_cbuf[1024]; int tfd; (void)strcpy(tmpfn, "smtXXXXXX"); tfd = mkstemp(tmpfn); if (tfd < 0) return; memset(&mh, 0x00, sizeof(mh)); /* set up cmsghdr */ control = (struct cmsghdr *)snd_cbuf; memset(control, 0x00, sizeof(struct cmsghdr)); control->cmsg_len = sizeof(struct cmsghdr) + 4; control->cmsg_level = SOL_SOCKET; control->cmsg_type = SCM_RIGHTS; *(int *)CMSG_DATA(control) = tfd; /* set up msghdr */ iov[0].iov_base = TM; iov[0].iov_len = sizeof(TM); mh.msg_iov = iov; mh.msg_iovlen = 1; mh.msg_flags = 0; mh.msg_control = control; mh.msg_controllen = control->cmsg_len; /* do it */ (void)sendmsg(fd, &mh, 0); (void)close(tfd); (void)unlink(tmpfn); }