// SPDX-License-Identifier: GPL-2.0-or-later /* * Copyright(c) 2016 Fujitsu Ltd. * Author: Xiao Yang */ /* * Test Name: recvmsg03 * * This test needs that rds socket is supported by system. * If the size of address for receiving data is set larger than * actaul size, recvmsg() will set msg_namelen incorrectly. * * Description: * This is a regression test and has been fixed by kernel commit: * 06b6a1cf6e776426766298d055bb3991957d90a7 (rds: set correct msg_namelen) */ #include #include #include #include #include "tst_safe_net.h" #include "tst_test.h" #ifndef AF_RDS # define AF_RDS 21 #endif static void setup(void) { int res; res = socket(AF_RDS, SOCK_SEQPACKET, 0); if (res == -1) { if (errno == EAFNOSUPPORT) tst_brk(TCONF, "rds was not supported"); else tst_brk(TBROK | TERRNO, "socket() failed with rds"); } SAFE_CLOSE(res); } static void client(void) { int sock_fd1; char send_buf[128] = "hello world"; struct sockaddr_in server_addr; struct sockaddr_in to_addr; struct msghdr msg; struct iovec iov; sock_fd1 = SAFE_SOCKET(AF_RDS, SOCK_SEQPACKET, 0); memset(&server_addr, 0, sizeof(server_addr)); server_addr.sin_family = AF_INET; server_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); server_addr.sin_port = htons(4001); SAFE_BIND(sock_fd1, (struct sockaddr *) &server_addr, sizeof(server_addr)); memset(&to_addr, 0, sizeof(to_addr)); to_addr.sin_family = AF_INET; to_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); to_addr.sin_port = htons(4000); msg.msg_name = &to_addr; msg.msg_namelen = sizeof(to_addr); msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_iov->iov_base = send_buf; msg.msg_iov->iov_len = strlen(send_buf) + 1; msg.msg_control = 0; msg.msg_controllen = 0; msg.msg_flags = 0; if (sendmsg(sock_fd1, &msg, 0) == -1) { tst_brk(TBROK | TERRNO, "sendmsg() failed to send data to server"); } TST_CHECKPOINT_WAIT(1); SAFE_CLOSE(sock_fd1); } static void server(void) { int sock_fd2; static char recv_buf[128]; struct sockaddr_in server_addr; struct sockaddr_in from_addr; struct msghdr msg; struct iovec iov; sock_fd2 = SAFE_SOCKET(AF_RDS, SOCK_SEQPACKET, 0); memset(&server_addr, 0, sizeof(server_addr)); server_addr.sin_family = AF_INET; server_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); server_addr.sin_port = htons(4000); SAFE_BIND(sock_fd2, (struct sockaddr *) &server_addr, sizeof(server_addr)); msg.msg_name = &from_addr; msg.msg_namelen = sizeof(from_addr) + 16; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_iov->iov_base = recv_buf; msg.msg_iov->iov_len = 128; msg.msg_control = 0; msg.msg_controllen = 0; msg.msg_flags = 0; TST_CHECKPOINT_WAKE(0); SAFE_RECVMSG(0, sock_fd2, &msg, 0); if (msg.msg_namelen != sizeof(from_addr)) { tst_res(TFAIL, "msg_namelen was set to %u incorrectly, " "expected %lu", msg.msg_namelen, sizeof(from_addr)); } else { tst_res(TPASS, "msg_namelen was set to %u correctly", msg.msg_namelen); } TST_CHECKPOINT_WAKE(1); SAFE_CLOSE(sock_fd2); } static void verify_recvmsg(void) { pid_t pid; pid = SAFE_FORK(); if (pid == 0) { TST_CHECKPOINT_WAIT(0); client(); } else { server(); tst_reap_children(); } } static struct tst_test test = { .forks_child = 1, .needs_checkpoints = 1, .setup = setup, .test_all = verify_recvmsg, .tags = (const struct tst_tag[]) { {"linux-git", "06b6a1cf6e77"}, {} } };