1 /*
2  *
3  *   Copyright (c) International Business Machines  Corp., 2001
4  *
5  *   This program is free software;  you can redistribute it and/or modify
6  *   it under the terms of the GNU General Public License as published by
7  *   the Free Software Foundation; either version 2 of the License, or
8  *   (at your option) any later version.
9  *
10  *   This program is distributed in the hope that it will be useful,
11  *   but WITHOUT ANY WARRANTY;  without even the implied warranty of
12  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
13  *   the GNU General Public License for more details.
14  *
15  *   You should have received a copy of the GNU General Public License
16  *   along with this program;  if not, write to the Free Software
17  *   Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
18  */
19 
20 /*
21  * Test Name: getsockname01
22  *
23  * Test Description:
24  *  Verify that getsockname() returns the proper errno for various failure cases
25  *
26  * Usage:  <for command-line>
27  *  getsockname01 [-c n] [-e] [-i n] [-I x] [-P x] [-t]
28  *     where,  -c n : Run n copies concurrently.
29  *             -e   : Turn on errno logging.
30  *	       -i n : Execute test n times.
31  *	       -I x : Execute test for x seconds.
32  *	       -P x : Pause for x seconds between iterations.
33  *	       -t   : Turn on syscall timing.
34  *
35  * HISTORY
36  *	07/2001 Ported by Wayne Boyer
37  *
38  * RESTRICTIONS:
39  *  None.
40  */
41 
42 #include <stdio.h>
43 #include <unistd.h>
44 #include <errno.h>
45 #include <fcntl.h>
46 
47 #include <sys/types.h>
48 #include <sys/socket.h>
49 #include <sys/signal.h>
50 #include <sys/ioctl.h>
51 
52 #include <netinet/in.h>
53 
54 #include "test.h"
55 #include "safe_macros.h"
56 
57 char *TCID = "getsockname01";
58 int testno;
59 
60 int s;				/* socket descriptor */
61 struct sockaddr_in sin0, fsin1;
62 socklen_t sinlen;
63 
64 void setup(void), setup0(void), setup1(void),
65 cleanup(void), cleanup0(void), cleanup1(void);
66 
67 struct test_case_t {		/* test case structure */
68 	int domain;		/* PF_INET, PF_UNIX, ... */
69 	int type;		/* SOCK_STREAM, SOCK_DGRAM ... */
70 	int proto;		/* protocol number (usually 0 = default) */
71 	struct sockaddr *sockaddr;	/* socket address buffer */
72 	socklen_t *salen;	/* getsockname's 3rd argument */
73 	int retval;		/* syscall return value */
74 	int experrno;		/* expected errno */
75 	void (*setup) (void);
76 	void (*cleanup) (void);
77 	char *desc;
78 } tdat[] = {
79 	{
80 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
81 		    &sinlen, -1, EBADF, setup0, cleanup0,
82 		    "bad file descriptor"}, {
83 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
84 		    &sinlen, -1, ENOTSOCK, setup0, cleanup0,
85 		    "bad file descriptor"},
86 #ifndef UCLINUX
87 	    /* Skip since uClinux does not implement memory protection */
88 	{
89 	PF_INET, SOCK_STREAM, 0, NULL,
90 		    &sinlen, -1, EFAULT, setup1, cleanup1,
91 		    "invalid socket buffer"}, {
92 		/* invalid salen test for aligned input */
93 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
94 		    NULL, -1, EFAULT, setup1, cleanup1,
95 		    "invalid aligned salen"}, {
96 		/* invalid salen test for unaligned input */
97 	PF_INET, SOCK_STREAM, 0, (struct sockaddr *)&fsin1,
98 		    (socklen_t *) 1, -1, EFAULT, setup1, cleanup1,
99 		    "invalid unaligned salen"},
100 #endif
101 };
102 
103 int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
104 
main(int argc,char * argv[])105 int main(int argc, char *argv[])
106 {
107 	int lc;
108 
109 	tst_parse_opts(argc, argv, NULL, NULL);
110 
111 	setup();
112 
113 	for (lc = 0; TEST_LOOPING(lc); ++lc) {
114 		tst_count = 0;
115 		for (testno = 0; testno < TST_TOTAL; ++testno) {
116 			tdat[testno].setup();
117 
118 			TEST(getsockname(s, tdat[testno].sockaddr,
119 					 tdat[testno].salen));
120 			if (TEST_RETURN != tdat[testno].retval ||
121 			    (TEST_RETURN < 0 &&
122 			     TEST_ERRNO != tdat[testno].experrno)) {
123 				tst_resm(TFAIL, "%s ; returned"
124 					 " %ld (expected %d), errno %d (expected"
125 					 " %d)", tdat[testno].desc,
126 					 TEST_RETURN, tdat[testno].retval,
127 					 TEST_ERRNO, tdat[testno].experrno);
128 			} else {
129 				tst_resm(TPASS, "%s successful",
130 					 tdat[testno].desc);
131 			}
132 			tdat[testno].cleanup();
133 		}
134 	}
135 	cleanup();
136 
137 	tst_exit();
138 }
139 
setup(void)140 void setup(void)
141 {
142 	TEST_PAUSE;
143 
144 	/* initialize local sockaddr */
145 	sin0.sin_family = AF_INET;
146 	sin0.sin_port = 0;
147 	sin0.sin_addr.s_addr = INADDR_ANY;
148 }
149 
cleanup(void)150 void cleanup(void)
151 {
152 }
153 
setup0(void)154 void setup0(void)
155 {
156 	if (tdat[testno].experrno == EBADF)
157 		s = 400;	/* anything not an open file */
158 	else if ((s = open("/dev/null", O_WRONLY)) == -1)
159 		tst_brkm(TBROK, cleanup, "error opening /dev/null - "
160 			 "errno: %s", strerror(errno));
161 
162 }
163 
cleanup0(void)164 void cleanup0(void)
165 {
166 	s = -1;
167 }
168 
setup1(void)169 void setup1(void)
170 {
171 	s = SAFE_SOCKET(cleanup, tdat[testno].domain, tdat[testno].type,
172 			tdat[testno].proto);
173 	SAFE_BIND(cleanup, s, (struct sockaddr *)&sin0, sizeof(sin0));
174 	sinlen = sizeof(fsin1);
175 }
176 
cleanup1(void)177 void cleanup1(void)
178 {
179 	(void)close(s);
180 	s = -1;
181 }
182