• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *
3  *   Copyright (c) International Business Machines  Corp., 2001
4  *
5  *   This program is free software;  you can redistribute it and/or modify
6  *   it under the terms of the GNU General Public License as published by
7  *   the Free Software Foundation; either version 2 of the License, or
8  *   (at your option) any later version.
9  *
10  *   This program is distributed in the hope that it will be useful,
11  *   but WITHOUT ANY WARRANTY;  without even the implied warranty of
12  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
13  *   the GNU General Public License for more details.
14  *
15  *   You should have received a copy of the GNU General Public License
16  *   along with this program;  if not, write to the Free Software
17  *   Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
18  */
19 
20 /*
21  * Test Name: recvfrom01
22  *
23  * Test Description:
24  *  Verify that recvfrom() returns the proper errno for various failure cases
25  *
26  * Usage:  <for command-line>
27  *  recvfrom01 [-c n] [-e] [-i n] [-I x] [-P x] [-t]
28  *     where,  -c n : Run n copies concurrently.
29  *             -e   : Turn on errno logging.
30  *	       -i n : Execute test n times.
31  *	       -I x : Execute test for x seconds.
32  *	       -P x : Pause for x seconds between iterations.
33  *	       -t   : Turn on syscall timing.
34  *
35  * HISTORY
36  *	07/2001 Ported by Wayne Boyer
37  *
38  * RESTRICTIONS:
39  *  None.
40  *
41  */
42 
43 #include <stdio.h>
44 #include <unistd.h>
45 #include <errno.h>
46 #include <fcntl.h>
47 
48 #include <sys/types.h>
49 #include <sys/socket.h>
50 #include <sys/signal.h>
51 #include <sys/un.h>
52 
53 #include <netinet/in.h>
54 
55 #include "test.h"
56 
57 char *TCID = "recvfrom01";
58 int testno;
59 
60 char buf[1024];
61 int s;				/* socket descriptor */
62 struct sockaddr_in sin1, from;
63 static int sfd;			/* shared between do_child and start_server */
64 socklen_t fromlen;
65 
66 void do_child(void);
67 void setup(void);
68 void setup0(void);
69 void setup1(void);
70 void setup2(void);
71 void cleanup(void);
72 void cleanup0(void);
73 void cleanup1(void);
74 pid_t start_server(struct sockaddr_in *);
75 
76 struct test_case_t {		/* test case structure */
77 	int domain;		/* PF_INET, PF_UNIX, ... */
78 	int type;		/* SOCK_STREAM, SOCK_DGRAM ... */
79 	int proto;		/* protocol number (usually 0 = default) */
80 	void *buf;		/* recv data buffer */
81 	size_t buflen;		/* recv's 3rd argument */
82 	unsigned flags;		/* recv's 4th argument */
83 	struct sockaddr *from;	/* from address */
84 	socklen_t *salen;	/* from address value/result buffer length */
85 	int retval;		/* syscall return value */
86 	int experrno;		/* expected errno */
87 	void (*setup) (void);
88 	void (*cleanup) (void);
89 	char *desc;
90 } tdat[] = {
91 /* 1 */
92 	{
93 	PF_INET, SOCK_STREAM, 0, buf, sizeof(buf), 0,
94 		    (struct sockaddr *)&from, &fromlen,
95 		    -1, EBADF, setup0, cleanup0, "bad file descriptor"},
96 /* 2 */
97 	{
98 	0, 0, 0, buf, sizeof(buf), 0, (struct sockaddr *)&from,
99 		    &fromlen, -1, ENOTSOCK, setup0, cleanup0, "invalid socket"},
100 /* 3 */
101 	{
102 	PF_INET, SOCK_STREAM, 0, (void *)buf, sizeof(buf), 0,
103 		    (struct sockaddr *)-1, &fromlen,
104 		    0, ENOTSOCK, setup1, cleanup1, "invalid socket buffer"},
105 /* 4 */
106 	{
107 	PF_INET, SOCK_STREAM, 0, (void *)buf, sizeof(buf), 0,
108 		    (struct sockaddr *)&from, &fromlen,
109 		    -1, EINVAL, setup2, cleanup1, "invalid socket addr length"},
110 /* 5 */
111 	{
112 	PF_INET, SOCK_STREAM, 0, (void *)-1, sizeof(buf), 0,
113 		    (struct sockaddr *)&from, &fromlen,
114 		    -1, EFAULT, setup1, cleanup1, "invalid recv buffer"},
115 /* 6 */
116 	{
117 	PF_INET, SOCK_STREAM, 0, (void *)buf, sizeof(buf), MSG_OOB,
118 		    (struct sockaddr *)&from, &fromlen,
119 		    -1, EINVAL, setup1, cleanup1, "invalid MSG_OOB flag set"},
120 /* 7 */
121 	{
122 	PF_INET, SOCK_STREAM, 0, (void *)buf, sizeof(buf), MSG_ERRQUEUE,
123 		    (struct sockaddr *)&from, &fromlen,
124 		    -1, EAGAIN, setup1, cleanup1, "invalid MSG_ERRQUEUE flag set"},};
125 
126 int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
127 
128 #ifdef UCLINUX
129 static char *argv0;
130 #endif
131 
main(int argc,char * argv[])132 int main(int argc, char *argv[])
133 {
134 	int lc;
135 
136 	tst_parse_opts(argc, argv, NULL, NULL);
137 
138 #ifdef UCLINUX
139 	argv0 = argv[0];
140 	maybe_run_child(&do_child, "d", &sfd);
141 #endif
142 
143 	setup();
144 
145 	for (lc = 0; TEST_LOOPING(lc); ++lc) {
146 		tst_count = 0;
147 		for (testno = 0; testno < TST_TOTAL; ++testno) {
148 			if ((tst_kvercmp(3, 17, 0) < 0)
149 			    && (tdat[testno].flags & MSG_ERRQUEUE)
150 			    && (tdat[testno].type & SOCK_STREAM)) {
151 				tst_resm(TCONF, "skip MSG_ERRQUEUE test, "
152 						"it's supported from 3.17");
153 				continue;
154 			}
155 
156 			tdat[testno].setup();
157 			TEST(recvfrom(s, tdat[testno].buf, tdat[testno].buflen,
158 				      tdat[testno].flags, tdat[testno].from,
159 				      tdat[testno].salen));
160 			if (TEST_RETURN >= 0)
161 				TEST_RETURN = 0;	/* all nonzero equal here */
162 			if (TEST_RETURN != tdat[testno].retval ||
163 			    (TEST_RETURN < 0 &&
164 			     TEST_ERRNO != tdat[testno].experrno)) {
165 				tst_resm(TFAIL, "%s ; returned"
166 					 " %ld (expected %d), errno %d (expected"
167 					 " %d)", tdat[testno].desc,
168 					 TEST_RETURN, tdat[testno].retval,
169 					 TEST_ERRNO, tdat[testno].experrno);
170 			} else {
171 				tst_resm(TPASS, "%s successful",
172 					 tdat[testno].desc);
173 			}
174 			tdat[testno].cleanup();
175 		}
176 	}
177 	cleanup();
178 
179 	tst_exit();
180 }
181 
182 pid_t pid;
183 
setup(void)184 void setup(void)
185 {
186 	TEST_PAUSE;
187 
188 	pid = start_server(&sin1);
189 }
190 
cleanup(void)191 void cleanup(void)
192 {
193 	(void)kill(pid, SIGKILL);
194 
195 }
196 
setup0(void)197 void setup0(void)
198 {
199 	if (tdat[testno].experrno == EBADF)
200 		s = 400;	/* anything not an open file */
201 	else if ((s = open("/dev/null", O_WRONLY)) == -1)
202 		tst_brkm(TBROK | TERRNO, cleanup, "open(/dev/null) failed");
203 	fromlen = sizeof(from);
204 }
205 
cleanup0(void)206 void cleanup0(void)
207 {
208 	s = -1;
209 }
210 
setup1(void)211 void setup1(void)
212 {
213 	fd_set rdfds;
214 	struct timeval timeout;
215 	int n;
216 
217 	s = socket(tdat[testno].domain, tdat[testno].type, tdat[testno].proto);
218 	if (s < 0)
219 		tst_brkm(TBROK | TERRNO, cleanup, "socket() failed");
220 	if (tdat[testno].type == SOCK_STREAM &&
221 	    connect(s, (struct sockaddr *)&sin1, sizeof(sin1)) < 0) {
222 		tst_brkm(TBROK | TERRNO, cleanup, "connect failed");
223 	}
224 	/* Wait for something to be readable, else we won't detect EFAULT on recv */
225 	FD_ZERO(&rdfds);
226 	FD_SET(s, &rdfds);
227 	timeout.tv_sec = 2;
228 	timeout.tv_usec = 0;
229 	n = select(s + 1, &rdfds, 0, 0, &timeout);
230 	if (n != 1 || !FD_ISSET(s, &rdfds))
231 		tst_brkm(TBROK, cleanup,
232 			 "client setup1 failed - no message ready in 2 sec");
233 	fromlen = sizeof(from);
234 }
235 
setup2(void)236 void setup2(void)
237 {
238 	setup1();
239 	fromlen = -1;
240 }
241 
cleanup1(void)242 void cleanup1(void)
243 {
244 	(void)close(s);
245 	s = -1;
246 }
247 
start_server(struct sockaddr_in * sin0)248 pid_t start_server(struct sockaddr_in *sin0)
249 {
250 	pid_t pid;
251 	socklen_t slen = sizeof(*sin0);
252 
253 	sin0->sin_family = AF_INET;
254 	sin0->sin_port = 0; /* pick random free port */
255 	sin0->sin_addr.s_addr = INADDR_ANY;
256 
257 	sfd = socket(PF_INET, SOCK_STREAM, 0);
258 	if (sfd < 0) {
259 		tst_brkm(TBROK | TERRNO, cleanup, "server socket failed");
260 		return -1;
261 	}
262 	if (bind(sfd, (struct sockaddr *)sin0, sizeof(*sin0)) < 0) {
263 		tst_brkm(TBROK | TERRNO, cleanup, "server bind failed");
264 		return -1;
265 	}
266 	if (listen(sfd, 10) < 0) {
267 		tst_brkm(TBROK | TERRNO, cleanup, "server listen failed");
268 		return -1;
269 	}
270 	if (getsockname(sfd, (struct sockaddr *)sin0, &slen) == -1)
271 		tst_brkm(TBROK | TERRNO, cleanup, "getsockname failed");
272 
273 	switch ((pid = FORK_OR_VFORK())) {
274 	case 0:		/* child */
275 #ifdef UCLINUX
276 		if (self_exec(argv0, "d", sfd) < 0) {
277 			tst_brkm(TBROK, cleanup, "server self_exec failed");
278 		}
279 #else
280 		do_child();
281 #endif
282 		break;
283 	case -1:
284 		tst_brkm(TBROK | TERRNO, cleanup, "server fork failed");
285 		/* fall through */
286 	default:		/* parent */
287 		(void)close(sfd);
288 		return pid;
289 	}
290 
291 	exit(1);
292 }
293 
do_child(void)294 void do_child(void)
295 {
296 	struct sockaddr_in fsin;
297 	fd_set afds, rfds;
298 	int nfds, cc, fd;
299 
300 	FD_ZERO(&afds);
301 	FD_SET(sfd, &afds);
302 
303 	nfds = sfd + 1;
304 
305 	/* accept connections until killed */
306 	while (1) {
307 		socklen_t fromlen;
308 
309 		memcpy(&rfds, &afds, sizeof(rfds));
310 
311 		if (select(nfds, &rfds, NULL, NULL,
312 			   NULL) < 0)
313 			if (errno != EINTR)
314 				exit(1);
315 		if (FD_ISSET(sfd, &rfds)) {
316 			int newfd;
317 
318 			fromlen = sizeof(fsin);
319 			newfd = accept(sfd, (struct sockaddr *)&fsin, &fromlen);
320 			if (newfd >= 0) {
321 				FD_SET(newfd, &afds);
322 				nfds = MAX(nfds, newfd + 1);
323 				/* send something back */
324 				(void)write(newfd, "hoser\n", 6);
325 			}
326 		}
327 		for (fd = 0; fd < nfds; ++fd)
328 			if (fd != sfd && FD_ISSET(fd, &rfds)) {
329 				cc = read(fd, buf, sizeof(buf));
330 				if (cc == 0 || (cc < 0 && errno != EINTR)) {
331 					(void)close(fd);
332 					FD_CLR(fd, &afds);
333 				}
334 			}
335 	}
336 }
337