• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *
3  *   Copyright (c) International Business Machines  Corp., 2001
4  *   07/2001 Ported by Wayne Boyer
5  *
6  *   This program is free software;  you can redistribute it and/or modify
7  *   it under the terms of the GNU General Public License as published by
8  *   the Free Software Foundation; either version 2 of the License, or
9  *   (at your option) any later version.
10  *
11  *   This program is distributed in the hope that it will be useful,
12  *   but WITHOUT ANY WARRANTY;  without even the implied warranty of
13  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
14  *   the GNU General Public License for more details.
15  *
16  *   You should have received a copy of the GNU General Public License
17  *   along with this program;  if not, write to the Free Software
18  *   Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
19  */
20 
21 /*
22  * Description:
23  *  Verify that accept() returns the proper errno for various failure cases
24  */
25 
26 #include <stdio.h>
27 #include <unistd.h>
28 #include <errno.h>
29 #include <fcntl.h>
30 
31 #include <sys/types.h>
32 #include <sys/socket.h>
33 #include <sys/signal.h>
34 
35 #include <netinet/in.h>
36 
37 #include "test.h"
38 #include "safe_macros.h"
39 
40 char *TCID = "accept01";
41 int testno;
42 
43 int s;				/* socket descriptor */
44 struct sockaddr_in sin0, fsin1;
45 socklen_t sinlen;
46 
47 static void setup(void);
48 static void cleanup(void);
49 static void setup0(void);
50 static void cleanup0(void);
51 static void setup1(void);
52 static void cleanup1(void);
53 static void setup2(void);
54 static void setup3(void);
55 
56 struct test_case_t {		/* test case structure */
57 	int domain;		/* PF_INET, PF_UNIX, ... */
58 	int type;		/* SOCK_STREAM, SOCK_DGRAM ... */
59 	int proto;		/* protocol number (usually 0 = default) */
60 	struct sockaddr *sockaddr;	/* socket address buffer */
61 	socklen_t *salen;	/* accept's 3rd argument */
62 	int retval;		/* syscall return value */
63 	int experrno;		/* expected errno */
64 	void (*setup) (void);
65 	void (*cleanup) (void);
66 	char *desc;
67 } tdat[] = {
68 	{
69 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
70 		    &sinlen, -1, EBADF, setup0, cleanup0,
71 		    "bad file descriptor"}, {
72 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
73 		    &sinlen, -1, ENOTSOCK, setup0, cleanup0,
74 		    "bad file descriptor"}, {
75 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)3,
76 		    &sinlen, -1, EINVAL, setup1, cleanup1,
77 		    "invalid socket buffer"}, {
78 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
79 		    (socklen_t *) 1, -1, EINVAL, setup1, cleanup1,
80 		    "invalid salen"}, {
81 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
82 		    &sinlen, -1, EINVAL, setup2, cleanup1,
83 		    "invalid salen"}, {
84 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
85 		    &sinlen, -1, EINVAL, setup3, cleanup1,
86 		    "no queued connections"}, {
87 	PF_INET, SOCK_DGRAM, 0, (struct sockaddr *)&fsin1,
88 		    &sinlen, -1, EOPNOTSUPP, setup1, cleanup1,
89 		    "UDP accept"},};
90 
91 int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
92 
main(int ac,char * av[])93 int main(int ac, char *av[])
94 {
95 	int lc;
96 
97 	tst_parse_opts(ac, av, NULL, NULL);
98 
99 	setup();
100 
101 	for (lc = 0; TEST_LOOPING(lc); ++lc) {
102 		tst_count = 0;
103 		for (testno = 0; testno < TST_TOTAL; ++testno) {
104 			tdat[testno].setup();
105 
106 			TEST(accept(s, tdat[testno].sockaddr,
107 				    tdat[testno].salen));
108 			if (TEST_RETURN > 0)
109 				TEST_RETURN = 0;
110 			if (TEST_RETURN != tdat[testno].retval ||
111 			    (TEST_RETURN < 0 &&
112 			     TEST_ERRNO != tdat[testno].experrno)) {
113 				tst_resm(TFAIL, "%s ; returned"
114 					 " %ld (expected %d), errno %d (expected"
115 					 " %d)", tdat[testno].desc,
116 					 TEST_RETURN, tdat[testno].retval,
117 					 TEST_ERRNO, tdat[testno].experrno);
118 			} else {
119 				tst_resm(TPASS, "%s successful",
120 					 tdat[testno].desc);
121 			}
122 			tdat[testno].cleanup();
123 		}
124 	}
125 
126 	cleanup();
127 	tst_exit();
128 }
129 
setup(void)130 static void setup(void)
131 {
132 	TEST_PAUSE;
133 
134 	/* initialize local sockaddr */
135 	sin0.sin_family = AF_INET;
136 	sin0.sin_port = 0;
137 	sin0.sin_addr.s_addr = INADDR_ANY;
138 }
139 
cleanup(void)140 static void cleanup(void)
141 {
142 }
143 
setup0(void)144 static void setup0(void)
145 {
146 	if (tdat[testno].experrno == EBADF)
147 		s = 400;	/* anything not an open file */
148 	else if ((s = open("/dev/null", O_WRONLY)) == -1)
149 		tst_brkm(TBROK | TERRNO, cleanup, "error opening /dev/null");
150 }
151 
cleanup0(void)152 static void cleanup0(void)
153 {
154 	s = -1;
155 }
156 
setup1(void)157 static void setup1(void)
158 {
159 	s = SAFE_SOCKET(cleanup, tdat[testno].domain, tdat[testno].type,
160 			tdat[testno].proto);
161 	SAFE_BIND(cleanup, s, (struct sockaddr *)&sin0, sizeof(sin0));
162 	sinlen = sizeof(fsin1);
163 }
164 
cleanup1(void)165 static void cleanup1(void)
166 {
167 	(void)close(s);
168 	s = -1;
169 }
170 
setup2(void)171 static void setup2(void)
172 {
173 	setup1();		/* get a socket in s */
174 	sinlen = 1;		/* invalid s */
175 }
176 
setup3(void)177 static void setup3(void)
178 {
179 	int one = 1;
180 
181 	setup1();
182 	SAFE_IOCTL(cleanup, s, FIONBIO, &one);
183 }
184