1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Copyright (c) International Business Machines Corp., 2001
4 * 07/2001 Ported by Wayne Boyer
5 * Copyright (c) Linux Test Project, 2003-2017
6 * Copyright (C) 2024 SUSE LLC Andrea Manzini <[email protected]>
7 */
8
9 /*\
10 * [Description]
11 * Verify that getsockopt() returns the proper errno for various failure cases:
12 *
13 * - EBADF on a not open file
14 * - ENOTSOCK on a file descriptor not linked to a socket
15 * - EFAULT on invalid address of value or length
16 * - EOPNOTSUPP on invalid option name or protocol
17 * - EINVAL on an invalid optlen
18 */
19
20 #include "tst_test.h"
21
22 static int sock_fake, sock_null, sock_bind;
23 static struct sockaddr_in sin0;
24 static int sinlen;
25 static int optval;
26 static socklen_t optlen;
27 static socklen_t optleninval = -1;
28
29 static struct test_case {
30 int *sockfd;
31 int level;
32 int optname;
33 void *optval;
34 socklen_t *optlen;
35 int experrno;
36 char *desc;
37 } tcases[] = {
38 {.sockfd = &sock_fake, .level = SOL_SOCKET, .optname = SO_OOBINLINE, .optval = &optval,
39 .optlen = &optlen, .experrno = EBADF, .desc = "bad file descriptor"},
40
41 {.sockfd = &sock_null, .level = SOL_SOCKET, .optname = SO_OOBINLINE, .optval = &optval,
42 .optlen = &optlen, .experrno = ENOTSOCK, .desc = "bad file descriptor"},
43
44 {.sockfd = &sock_bind, .level = SOL_SOCKET, .optname = SO_OOBINLINE, .optval = 0,
45 .optlen = &optlen, .experrno = EFAULT, .desc = "invalid option buffer"},
46
47 {.sockfd = &sock_bind, .level = SOL_SOCKET, .optname = SO_OOBINLINE, .optval = &optval,
48 .optlen = 0, .experrno = EFAULT, .desc = "invalid optlen"},
49
50 {.sockfd = &sock_bind, .level = 500, .optname = SO_OOBINLINE, .optval = &optval,
51 .optlen = &optlen, .experrno = EOPNOTSUPP, .desc = "invalid level"},
52
53 {.sockfd = &sock_bind, .level = IPPROTO_UDP, .optname = SO_OOBINLINE, .optval = &optval,
54 .optlen = &optlen, .experrno = EOPNOTSUPP, .desc = "not supported option name (UDP)"},
55
56 {.sockfd = &sock_bind, .level = IPPROTO_IP, .optname = -1, .optval = &optval,
57 .optlen = &optlen, .experrno = ENOPROTOOPT, .desc = "invalid option name (IP)"},
58
59 {.sockfd = &sock_bind, .level = IPPROTO_TCP, .optname = -1, .optval = &optval,
60 .optlen = &optlen, .experrno = ENOPROTOOPT, .desc = "invalid option name (TCP)"},
61
62 {.sockfd = &sock_bind, .level = SOL_SOCKET, .optname = SO_OOBINLINE, .optval = &optval,
63 .optlen = &optleninval, .experrno = EINVAL, .desc = "invalid optlen"},
64 };
65
66
check_getsockopt(unsigned int nr)67 static void check_getsockopt(unsigned int nr)
68 {
69 struct test_case *tc = &tcases[nr];
70
71 TST_EXP_FAIL(getsockopt(*(tc->sockfd), tc->level, tc->optname, tc->optval, tc->optlen),
72 tc->experrno, "%s", tc->desc);
73 }
74
setup(void)75 static void setup(void)
76 {
77 sin0.sin_family = AF_INET;
78 sin0.sin_port = 0;
79 sin0.sin_addr.s_addr = INADDR_ANY;
80 sock_fake = 400;
81 sock_null = SAFE_OPEN("/dev/null", O_WRONLY);
82 sock_bind = SAFE_SOCKET(PF_INET, SOCK_STREAM, 0);
83 SAFE_BIND(sock_bind, (struct sockaddr *)&sin0, sizeof(sin0));
84 sinlen = sizeof(sin0);
85 optlen = sizeof(optval);
86 }
87
88 static struct tst_test test = {
89 .setup = setup,
90 .test = check_getsockopt,
91 .tcnt = ARRAY_SIZE(tcases),
92 };
93