1 /* $NetBSD: t_socketpair.c,v 1.2 2017/01/13 20:04:52 christos Exp $ */ 2 3 /*- 4 * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Christos Zoulas. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the NetBSD 21 * Foundation, Inc. and its contributors. 22 * 4. Neither the name of The NetBSD Foundation nor the names of its 23 * contributors may be used to endorse or promote products derived 24 * from this software without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 36 * POSSIBILITY OF SUCH DAMAGE. 37 */ 38 #include <sys/cdefs.h> 39 __RCSID("$NetBSD: t_socketpair.c,v 1.2 2017/01/13 20:04:52 christos Exp $"); 40 41 #include <atf-c.h> 42 #include <fcntl.h> 43 #include <unistd.h> 44 #include <stdlib.h> 45 #include <sys/socket.h> 46 #include <sys/un.h> 47 #include <errno.h> 48 49 static void 50 connected(int fd) 51 { 52 struct sockaddr_un addr; 53 socklen_t len = (socklen_t)sizeof(addr); 54 ATF_REQUIRE(getpeername(fd, (struct sockaddr*)(void *)&addr, 55 &len) == 0); 56 } 57 58 static void 59 run(int domain, int type, int flags) 60 { 61 int fd[2], i; 62 63 while ((i = open("/", O_RDONLY)) < 3) 64 ATF_REQUIRE(i != -1); 65 66 #ifdef __NetBSD__ 67 /* This check is harmful since it closes atf's output file */ 68 ATF_REQUIRE(closefrom(3) != -1); 69 #endif 70 71 ATF_REQUIRE(socketpair(domain, type | flags, 0, fd) == 0); 72 73 #if __NetBSD__ 74 /* This check is harmful since it requires closing atf's output file */ 75 ATF_REQUIRE(fd[0] == 3); 76 ATF_REQUIRE(fd[1] == 4); 77 #endif 78 79 connected(fd[0]); 80 connected(fd[1]); 81 82 if (flags & SOCK_CLOEXEC) { 83 ATF_REQUIRE((fcntl(fd[0], F_GETFD) & FD_CLOEXEC) != 0); 84 ATF_REQUIRE((fcntl(fd[1], F_GETFD) & FD_CLOEXEC) != 0); 85 } else { 86 ATF_REQUIRE((fcntl(fd[0], F_GETFD) & FD_CLOEXEC) == 0); 87 ATF_REQUIRE((fcntl(fd[1], F_GETFD) & FD_CLOEXEC) == 0); 88 } 89 90 if (flags & SOCK_NONBLOCK) { 91 ATF_REQUIRE((fcntl(fd[0], F_GETFL) & O_NONBLOCK) != 0); 92 ATF_REQUIRE((fcntl(fd[1], F_GETFL) & O_NONBLOCK) != 0); 93 } else { 94 ATF_REQUIRE((fcntl(fd[0], F_GETFL) & O_NONBLOCK) == 0); 95 ATF_REQUIRE((fcntl(fd[1], F_GETFL) & O_NONBLOCK) == 0); 96 } 97 98 ATF_REQUIRE(close(fd[0]) != -1); 99 ATF_REQUIRE(close(fd[1]) != -1); 100 } 101 102 ATF_TC(inet); 103 ATF_TC_HEAD(inet, tc) 104 { 105 atf_tc_set_md_var(tc, "descr", 106 "socketpair(2) does not work in the PF_INET domain"); 107 } 108 109 ATF_TC_BODY(inet, tc) 110 { 111 int fd[2]; 112 113 ATF_REQUIRE_EQ(socketpair(PF_INET, SOCK_DGRAM, 0, fd), -1); 114 ATF_REQUIRE_EQ(EOPNOTSUPP, errno); 115 ATF_REQUIRE_EQ(socketpair(PF_INET, SOCK_STREAM, 0, fd), -1); 116 ATF_REQUIRE_EQ(EOPNOTSUPP, errno); 117 } 118 119 ATF_TC(null_sv); 120 ATF_TC_HEAD(null_sv, tc) 121 { 122 atf_tc_set_md_var(tc, "descr", 123 "socketpair(2) should fail without return storage"); 124 } 125 126 ATF_TC_BODY(null_sv, tc) 127 { 128 int fd; 129 130 #ifdef __NetBSD__ 131 /* This check is harmful since it closes atf's output file */ 132 closefrom(3); 133 #else 134 int lowfd = open("/", O_RDONLY); 135 ATF_REQUIRE(lowfd > 0); 136 ATF_REQUIRE_EQ(0, close(lowfd)); 137 #endif 138 ATF_REQUIRE_EQ(socketpair(AF_UNIX, SOCK_DGRAM, 0, NULL), -1); 139 ATF_REQUIRE_EQ(EFAULT, errno); 140 fd = open("/", O_RDONLY); 141 #ifdef __NetBSD__ 142 ATF_REQUIRE_EQ_MSG(fd, 3, 143 "socketpair(..., NULL) allocated descriptors"); 144 #else 145 ATF_REQUIRE_EQ_MSG(fd, lowfd, 146 "socketpair(..., NULL) allocated descriptors: fd=%d, lowfd=%d", 147 fd, lowfd); 148 #endif 149 } 150 151 ATF_TC(socketpair_basic); 152 ATF_TC_HEAD(socketpair_basic, tc) 153 { 154 atf_tc_set_md_var(tc, "descr", "A basic test of socketpair(2)"); 155 } 156 157 ATF_TC_BODY(socketpair_basic, tc) 158 { 159 run(AF_UNIX, SOCK_DGRAM, 0); 160 } 161 162 ATF_TC(socketpair_nonblock); 163 ATF_TC_HEAD(socketpair_nonblock, tc) 164 { 165 atf_tc_set_md_var(tc, "descr", "A non-blocking test of socketpair(2)"); 166 } 167 168 ATF_TC_BODY(socketpair_nonblock, tc) 169 { 170 run(AF_UNIX, SOCK_DGRAM, SOCK_NONBLOCK); 171 } 172 173 ATF_TC(socketpair_cloexec); 174 ATF_TC_HEAD(socketpair_cloexec, tc) 175 { 176 atf_tc_set_md_var(tc, "descr", "A close-on-exec of socketpair(2)"); 177 } 178 179 ATF_TC_BODY(socketpair_cloexec, tc) 180 { 181 run(AF_UNIX, SOCK_DGRAM, SOCK_CLOEXEC); 182 } 183 184 ATF_TC(socketpair_stream); 185 ATF_TC_HEAD(socketpair_stream, tc) 186 { 187 atf_tc_set_md_var(tc, "descr", "A stream-oriented socketpair(2)"); 188 } 189 190 ATF_TC_BODY(socketpair_stream, tc) 191 { 192 run(AF_UNIX, SOCK_STREAM, 0); 193 } 194 195 ATF_TP_ADD_TCS(tp) 196 { 197 198 ATF_TP_ADD_TC(tp, inet); 199 ATF_TP_ADD_TC(tp, null_sv); 200 ATF_TP_ADD_TC(tp, socketpair_basic); 201 ATF_TP_ADD_TC(tp, socketpair_nonblock); 202 ATF_TP_ADD_TC(tp, socketpair_cloexec); 203 ATF_TP_ADD_TC(tp, socketpair_stream); 204 205 return atf_no_error(); 206 } 207