xref: /aosp_15_r20/external/ltp/testcases/kernel/syscalls/connect/connect01.c (revision 49cdfc7efb34551c7342be41a7384b9c40d7cab7)
1 /*
2  *
3  *   Copyright (c) International Business Machines  Corp., 2001
4  *
5  *   This program is free software;  you can redistribute it and/or modify
6  *   it under the terms of the GNU General Public License as published by
7  *   the Free Software Foundation; either version 2 of the License, or
8  *   (at your option) any later version.
9  *
10  *   This program is distributed in the hope that it will be useful,
11  *   but WITHOUT ANY WARRANTY;  without even the implied warranty of
12  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
13  *   the GNU General Public License for more details.
14  *
15  *   You should have received a copy of the GNU General Public License
16  *   along with this program;  if not, write to the Free Software
17  *   Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
18  */
19 
20 /*
21  * Test Name: connect01
22  *
23  * Test Description:
24  *  Verify that connect() returns the proper errno for various failure cases
25  *
26  * Usage:  <for command-line>
27  *  connect01 [-c n] [-e] [-i n] [-I x] [-P x] [-t]
28  *     where,  -c n : Run n copies concurrently.
29  *             -e   : Turn on errno logging.
30  *	       -i n : Execute test n times.
31  *	       -I x : Execute test for x seconds.
32  *	       -P x : Pause for x seconds between iterations.
33  *	       -t   : Turn on syscall timing.
34  *
35  * HISTORY
36  *	07/2001 Ported by Wayne Boyer
37  *
38  * RESTRICTIONS:
39  *  None.
40  *
41  */
42 
43 #include <stdio.h>
44 #include <unistd.h>
45 #include <errno.h>
46 #include <fcntl.h>
47 
48 #include <sys/types.h>
49 #include <sys/socket.h>
50 #include <sys/signal.h>
51 #include <sys/un.h>
52 
53 #include <netinet/in.h>
54 
55 #include "test.h"
56 #include "safe_macros.h"
57 
58 char *TCID = "connect01";
59 int testno;
60 
61 int s, s2;			/* socket descriptor */
62 struct sockaddr_in sin1, sin2, sin3, sin4;
63 static int sfd;			/* shared between start_server and do_child */
64 
65 void setup(void), setup0(void), setup1(void), setup2(void),
66 cleanup(void), cleanup0(void), cleanup1(void), do_child(void);
67 
68 static pid_t start_server(struct sockaddr_in *);
69 
70 struct test_case_t {		/* test case structure */
71 	int domain;		/* PF_INET, PF_UNIX, ... */
72 	int type;		/* SOCK_STREAM, SOCK_DGRAM ... */
73 	int proto;		/* protocol number (usually 0 = default) */
74 	struct sockaddr *sockaddr;	/* socket address buffer */
75 	int salen;		/* connect's 3rd argument */
76 	int retval;		/* syscall return value */
77 	int experrno;		/* expected errno */
78 	void (*setup) (void);
79 	void (*cleanup) (void);
80 	char *desc;
81 } tdat[] = {
82 	{
83 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&sin1,
84 		    sizeof(struct sockaddr_in), -1, EBADF, setup0,
85 		    cleanup0, "bad file descriptor"},
86 	{
87 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)-1,
88 		    sizeof(struct sockaddr_in), -1, EFAULT, setup1,
89 		    cleanup1, "invalid socket buffer"},
90 	{
91 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&sin1,
92 		    3, -1, EINVAL, setup1, cleanup1, "invalid salen"}, {
93 	0, 0, 0, (struct sockaddr *)&sin1,
94 		    sizeof(sin1), -1, ENOTSOCK, setup0, cleanup0,
95 		    "invalid socket"}
96 	, {
97 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&sin1,
98 		    sizeof(sin1), -1, EISCONN, setup2, cleanup1,
99 		    "already connected"}
100 	, {
101 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&sin2,
102 		    sizeof(sin2), -1, ECONNREFUSED, setup1, cleanup1,
103 		    "connection refused"}
104 	, {
105 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&sin4,
106 		    sizeof(sin4), -1, EAFNOSUPPORT, setup1, cleanup1,
107 		    "invalid address family"}
108 ,};
109 
110 int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
111 
112 /**
113  * bionic's connect() implementation calls netdClientInitConnect() before
114  * sending the request to the kernel.  We need to bypass this, or the test will
115  * segfault during the addr = (struct sockaddr *)-1 testcase. We had cases where
116  * tests started to segfault on glibc upgrade or in special conditions where
117  * libc had to convert structure layouts between 32bit/64bit userspace/kernel =>
118  * safer to call the raw syscall regardless of the libc implementation.
119  */
120 #include "lapi/syscalls.h"
121 
sys_connect(int sockfd,const struct sockaddr * addr,socklen_t addrlen)122 static int sys_connect(int sockfd, const struct sockaddr *addr,
123 		socklen_t addrlen)
124 {
125 	return tst_syscall(__NR_connect, sockfd, addr, addrlen);
126 }
127 
128 #define connect(sockfd, addr, addrlen) sys_connect(sockfd, addr, addrlen)
129 
main(int argc,char * argv[])130 int main(int argc, char *argv[])
131 {
132 	int lc;
133 
134 	tst_parse_opts(argc, argv, NULL, NULL);
135 
136 	setup();
137 
138 	for (lc = 0; TEST_LOOPING(lc); ++lc) {
139 		tst_count = 0;
140 		for (testno = 0; testno < TST_TOTAL; ++testno) {
141 			tdat[testno].setup();
142 
143 			TEST(connect
144 			     (s, tdat[testno].sockaddr, tdat[testno].salen));
145 
146 			if (TEST_RETURN != tdat[testno].retval ||
147 			    (TEST_RETURN < 0 &&
148 			     TEST_ERRNO != tdat[testno].experrno)) {
149 				tst_resm(TFAIL, "%s ; returned"
150 					 " %ld (expected %d), errno %d (expected"
151 					 " %d)", tdat[testno].desc,
152 					 TEST_RETURN, tdat[testno].retval,
153 					 TEST_ERRNO, tdat[testno].experrno);
154 			} else {
155 				tst_resm(TPASS, "%s successful",
156 					 tdat[testno].desc);
157 			}
158 			tdat[testno].cleanup();
159 		}
160 	}
161 	cleanup();
162 
163 	tst_exit();
164 }
165 
166 pid_t pid;
167 
setup(void)168 void setup(void)
169 {
170 	TEST_PAUSE;		/* if -p option specified */
171 
172 	pid = start_server(&sin1);
173 
174 	sin2.sin_family = AF_INET;
175 	/* this port must be unused! */
176 	sin2.sin_port = TST_GET_UNUSED_PORT(NULL, AF_INET, SOCK_STREAM);
177 	sin2.sin_addr.s_addr = INADDR_ANY;
178 
179 	sin3.sin_family = AF_INET;
180 	sin3.sin_port = 0;
181 	/* assumes no route to this network! */
182 	sin3.sin_addr.s_addr = htonl(0x0AFFFEFD);
183 
184 	sin4.sin_family = 47;	/* bogus address family */
185 	sin4.sin_port = 0;
186 	sin4.sin_addr.s_addr = htonl(0x0AFFFEFD);
187 
188 }
189 
cleanup(void)190 void cleanup(void)
191 {
192 	(void)kill(pid, SIGKILL);
193 
194 }
195 
setup0(void)196 void setup0(void)
197 {
198 	if (tdat[testno].experrno == EBADF)
199 		s = 400;	/* anything not an open file */
200 	else if ((s = open("/dev/null", O_WRONLY)) == -1)
201 		tst_brkm(TBROK | TERRNO, cleanup, "open(/dev/null) failed");
202 
203 }
204 
cleanup0(void)205 void cleanup0(void)
206 {
207 	close(s);
208 	s = -1;
209 }
210 
setup1(void)211 void setup1(void)
212 {
213 	s = SAFE_SOCKET(cleanup, tdat[testno].domain, tdat[testno].type,
214 		        tdat[testno].proto);
215 }
216 
cleanup1(void)217 void cleanup1(void)
218 {
219 	(void)close(s);
220 	s = -1;
221 }
222 
setup2(void)223 void setup2(void)
224 {
225 	setup1();		/* get a socket in s */
226 	SAFE_CONNECT(cleanup, s, (const struct sockaddr *)&sin1, sizeof(sin1));
227 }
228 
start_server(struct sockaddr_in * sin0)229 pid_t start_server(struct sockaddr_in *sin0)
230 {
231 	pid_t pid;
232 	socklen_t slen = sizeof(*sin0);
233 
234 	sin0->sin_family = AF_INET;
235 	sin0->sin_port = 0; /* pick random free port */
236 	sin0->sin_addr.s_addr = INADDR_ANY;
237 
238 	sfd = socket(PF_INET, SOCK_STREAM, 0);
239 	if (sfd < 0) {
240 		tst_brkm(TBROK | TERRNO, cleanup, "server socket failed");
241 		return -1;
242 	}
243 	if (bind(sfd, (struct sockaddr *)sin0, sizeof(*sin0)) < 0) {
244 		tst_brkm(TBROK | TERRNO, cleanup, "server bind failed");
245 		return -1;
246 	}
247 	if (listen(sfd, 10) < 0) {
248 		tst_brkm(TBROK | TERRNO, cleanup, "server listen failed");
249 		return -1;
250 	}
251 	SAFE_GETSOCKNAME(cleanup, sfd, (struct sockaddr *)sin0, &slen);
252 
253 	switch ((pid = tst_fork())) {
254 	case 0:		/* child */
255 		do_child();
256 		break;
257 	case -1:
258 		tst_brkm(TBROK | TERRNO, cleanup, "server fork failed");
259 		/* fall through */
260 	default:		/* parent */
261 		(void)close(sfd);
262 		return pid;
263 	}
264 
265 	return -1;
266 }
267 
do_child(void)268 void do_child(void)
269 {
270 	struct sockaddr_in fsin;
271 	fd_set afds, rfds;
272 	int nfds, cc, fd;
273 	char c;
274 
275 	FD_ZERO(&afds);
276 	FD_SET(sfd, &afds);
277 
278 	nfds = sfd + 1;
279 
280 	/* accept connections until killed */
281 	while (1) {
282 		socklen_t fromlen;
283 
284 		memcpy(&rfds, &afds, sizeof(rfds));
285 
286 		if (select(nfds, &rfds, NULL, NULL,
287 			   NULL) < 0)
288 			if (errno != EINTR)
289 				exit(1);
290 		if (FD_ISSET(sfd, &rfds)) {
291 			int newfd;
292 
293 			fromlen = sizeof(fsin);
294 			newfd = accept(sfd, (struct sockaddr *)&fsin, &fromlen);
295 			if (newfd >= 0) {
296 				FD_SET(newfd, &afds);
297 				nfds = MAX(nfds, newfd + 1);
298 			}
299 		}
300 		for (fd = 0; fd < nfds; ++fd)
301 			if (fd != sfd && FD_ISSET(fd, &rfds)) {
302 				if ((cc = read(fd, &c, 1)) == 0) {
303 					(void)close(fd);
304 					FD_CLR(fd, &afds);
305 				}
306 			}
307 	}
308 }
309