• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright(c) 2016 Fujitsu Ltd.
3  * Author: Xiao Yang <yangx.jy@cn.fujitsu.com>
4  *
5  * This program is free software; you can redistribute it and/or modify it
6  * under the terms of version 2 of the GNU General Public License as
7  * published by the Free Software Foundation.
8  *
9  * This program is distributed in the hope that it would be useful, but
10  * WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
12  *
13  * You should have received a copy of the GNU General Public License
14  * alone with this program.
15  */
16 
17 /*
18  * Test Name: recvmsg03
19  *
20  * This test needs that rds socket is supported by system.
21  * If the size of address for receiving data is set larger than
22  * actaul size, recvmsg() will set msg_namelen incorrectly.
23  *
24  * Description:
25  * This is a regression test and has been fixed by kernel commit:
26  * 06b6a1cf6e776426766298d055bb3991957d90a7 (rds: set correct msg_namelen)
27  */
28 
29 #include <errno.h>
30 #include <string.h>
31 #include <sys/types.h>
32 #include <sys/socket.h>
33 
34 #include "tst_test.h"
35 
36 #ifndef AF_RDS
37 # define AF_RDS 21
38 #endif
39 
setup(void)40 static void setup(void)
41 {
42 	int res;
43 
44 	res = socket(AF_RDS, SOCK_SEQPACKET, 0);
45 	if (res == -1) {
46 		if (errno == EAFNOSUPPORT)
47 			tst_brk(TCONF, "rds was not supported");
48 		else
49 			tst_brk(TBROK | TERRNO, "socket() failed with rds");
50 	}
51 
52 	SAFE_CLOSE(res);
53 }
54 
client(void)55 static void client(void)
56 {
57 	int sock_fd1;
58 	char send_buf[128] = "hello world";
59 	struct sockaddr_in server_addr;
60 	struct sockaddr_in to_addr;
61 	struct msghdr msg;
62 	struct iovec iov;
63 
64 	sock_fd1 = SAFE_SOCKET(AF_RDS, SOCK_SEQPACKET, 0);
65 
66 	memset(&server_addr, 0, sizeof(server_addr));
67 	server_addr.sin_family = AF_INET;
68 	server_addr.sin_addr.s_addr = inet_addr("127.0.0.1");
69 	server_addr.sin_port = htons(4001);
70 
71 	SAFE_BIND(sock_fd1, (struct sockaddr *) &server_addr, sizeof(server_addr));
72 
73 	memset(&to_addr, 0, sizeof(to_addr));
74 
75 	to_addr.sin_family = AF_INET;
76 	to_addr.sin_addr.s_addr = inet_addr("127.0.0.1");
77 	to_addr.sin_port = htons(4000);
78 	msg.msg_name = &to_addr;
79 	msg.msg_namelen = sizeof(to_addr);
80 	msg.msg_iov = &iov;
81 	msg.msg_iovlen = 1;
82 	msg.msg_iov->iov_base = send_buf;
83 	msg.msg_iov->iov_len = strlen(send_buf) + 1;
84 	msg.msg_control = 0;
85 	msg.msg_controllen = 0;
86 	msg.msg_flags = 0;
87 
88 	if (sendmsg(sock_fd1, &msg, 0) == -1) {
89 		tst_brk(TBROK | TERRNO,
90 			"sendmsg() failed to send data to server");
91 	}
92 
93 	SAFE_CLOSE(sock_fd1);
94 }
95 
server(void)96 static void server(void)
97 {
98 	int sock_fd2;
99 	static char recv_buf[128];
100 	struct sockaddr_in server_addr;
101 	struct sockaddr_in from_addr;
102 	struct msghdr msg;
103 	struct iovec iov;
104 
105 	sock_fd2 = SAFE_SOCKET(AF_RDS, SOCK_SEQPACKET, 0);
106 
107 	memset(&server_addr, 0, sizeof(server_addr));
108 	server_addr.sin_family = AF_INET;
109 	server_addr.sin_addr.s_addr = inet_addr("127.0.0.1");
110 	server_addr.sin_port = htons(4000);
111 
112 	SAFE_BIND(sock_fd2, (struct sockaddr *) &server_addr, sizeof(server_addr));
113 
114 	msg.msg_name = &from_addr;
115 	msg.msg_namelen = sizeof(from_addr) + 16;
116 	msg.msg_iov = &iov;
117 	msg.msg_iovlen = 1;
118 	msg.msg_iov->iov_base = recv_buf;
119 	msg.msg_iov->iov_len = 128;
120 	msg.msg_control = 0;
121 	msg.msg_controllen = 0;
122 	msg.msg_flags = 0;
123 
124 	TST_CHECKPOINT_WAKE(0);
125 
126 	TEST(recvmsg(sock_fd2, &msg, 0));
127 	if (TEST_RETURN == -1) {
128 		tst_brk(TBROK | TTERRNO,
129 		"recvmsg() failed to recvice data from client");
130 	}
131 
132 	if (msg.msg_namelen != sizeof(from_addr)) {
133 		tst_res(TFAIL, "msg_namelen was set to %u incorrectly, "
134 			"expected %lu", msg.msg_namelen, sizeof(from_addr));
135 	} else {
136 		tst_res(TPASS, "msg_namelen was set to %u correctly",
137 			msg.msg_namelen);
138 	}
139 
140 	SAFE_CLOSE(sock_fd2);
141 }
142 
verify_recvmsg(void)143 static void verify_recvmsg(void)
144 {
145 	pid_t pid;
146 
147 	pid = SAFE_FORK();
148 	if (pid == 0) {
149 		TST_CHECKPOINT_WAIT(0);
150 		client();
151 	} else {
152 		server();
153 		tst_reap_children();
154 	}
155 }
156 
157 static struct tst_test test = {
158 	.tid = "recvmsg03",
159 	.forks_child = 1,
160 	.needs_checkpoints = 1,
161 	.setup = setup,
162 	.test_all = verify_recvmsg
163 };
164