1 /*- 2 * Copyright (c) 2014 Spectra Logic Corporation. All rights reserved. 3 * Redistribution and use in source and binary forms, with or without 4 * modification, are permitted provided that the following conditions 5 * are met: 6 * 1. Redistributions of source code must retain the above copyright 7 * notice, this list of conditions and the following disclaimer. 8 * 2. Redistributions in binary form must reproduce the above copyright 9 * notice, this list of conditions and the following disclaimer in the 10 * documentation and/or other materials provided with the distribution. 11 * 12 * THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND 13 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 14 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 15 * ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE 16 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 17 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 18 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 19 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 20 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 21 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 22 * SUCH DAMAGE. 23 */ 24 25 #include <sys/cdefs.h> 26 __FBSDID("$FreeBSD$"); 27 28 #include <errno.h> 29 #include <fcntl.h> 30 #include <pthread.h> 31 #include <signal.h> 32 #include <sys/socket.h> 33 #include <sys/un.h> 34 35 #include <stdio.h> 36 37 #include <atf-c.h> 38 39 /* 40 * Helper functions 41 */ 42 43 #define MIN(x, y) ((x) < (y) ? (x) : (y)) 44 #define MAX(x, y) ((x) > (y) ? (x) : (y)) 45 46 static void 47 do_socketpair(int *sv) 48 { 49 int s; 50 51 s = socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sv); 52 ATF_REQUIRE_EQ(0, s); 53 ATF_REQUIRE(sv[0] >= 0); 54 ATF_REQUIRE(sv[1] >= 0); 55 ATF_REQUIRE(sv[0] != sv[1]); 56 } 57 58 static void 59 do_socketpair_nonblocking(int *sv) 60 { 61 int s; 62 63 s = socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sv); 64 ATF_REQUIRE_EQ(0, s); 65 ATF_REQUIRE(sv[0] >= 0); 66 ATF_REQUIRE(sv[1] >= 0); 67 ATF_REQUIRE(sv[0] != sv[1]); 68 ATF_REQUIRE(-1 != fcntl(sv[0], F_SETFL, O_NONBLOCK)); 69 ATF_REQUIRE(-1 != fcntl(sv[1], F_SETFL, O_NONBLOCK)); 70 } 71 72 /* 73 * Returns a pair of sockets made the hard way: bind, listen, connect & accept 74 * @return const char* The path to the socket 75 */ 76 static const char* 77 mk_pair_of_sockets(int *sv) 78 { 79 struct sockaddr_un sun; 80 /* ATF's isolation mechanisms will guarantee uniqueness of this file */ 81 const char *path = "sock"; 82 int s, err, s2, s1; 83 84 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 85 ATF_REQUIRE(s >= 0); 86 87 bzero(&sun, sizeof(sun)); 88 sun.sun_family = AF_LOCAL; 89 sun.sun_len = sizeof(sun); 90 strlcpy(sun.sun_path, path, sizeof(sun.sun_path)); 91 err = bind(s, (struct sockaddr *)&sun, sizeof(sun)); 92 err = listen(s, -1); 93 ATF_CHECK_EQ(0, err); 94 95 /* Create the other socket */ 96 s2 = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 97 ATF_REQUIRE(s2 >= 0); 98 err = connect(s2, (struct sockaddr*)&sun, sizeof(sun)); 99 if (err != 0) { 100 perror("connect"); 101 atf_tc_fail("connect(2) failed"); 102 } 103 104 /* Accept it */ 105 s1 = accept(s, NULL, NULL); 106 if (s1 == -1) { 107 perror("accept"); 108 atf_tc_fail("accept(2) failed"); 109 } 110 111 sv[0] = s1; 112 sv[1] = s2; 113 114 close(s); 115 116 return (path); 117 } 118 119 static volatile sig_atomic_t got_sigpipe = 0; 120 static void 121 shutdown_send_sigpipe_handler(int __unused x) 122 { 123 got_sigpipe = 1; 124 } 125 126 /* 127 * Parameterized test function bodies 128 */ 129 static void 130 test_eagain(int sndbufsize, int rcvbufsize) 131 { 132 int i; 133 int sv[2]; 134 const size_t totalsize = (sndbufsize + rcvbufsize) * 2; 135 const size_t pktsize = MIN(sndbufsize, rcvbufsize) / 4; 136 const int numpkts = totalsize / pktsize; 137 char sndbuf[pktsize]; 138 ssize_t ssize; 139 140 /* setup the socket pair */ 141 do_socketpair_nonblocking(sv); 142 /* Setup the buffers */ 143 ATF_REQUIRE_EQ(0, setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbufsize, 144 sizeof(sndbufsize))); 145 ATF_REQUIRE_EQ(0, setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rcvbufsize, 146 sizeof(rcvbufsize))); 147 148 bzero(sndbuf, pktsize); 149 /* Send data until we get EAGAIN */ 150 for(i=0; i < numpkts; i++) { 151 ssize = send(sv[0], sndbuf, pktsize, MSG_EOR); 152 if (ssize == -1) { 153 if (errno == EAGAIN) { 154 close(sv[0]); 155 close(sv[1]); 156 atf_tc_pass(); 157 } 158 else { 159 perror("send"); 160 atf_tc_fail("send returned < 0 but not EAGAIN"); 161 } 162 } 163 } 164 atf_tc_fail("Never got EAGAIN"); 165 } 166 167 static void 168 test_sendrecv_symmetric_buffers(int bufsize, int blocking) { 169 int s; 170 int sv[2]; 171 const ssize_t pktsize = bufsize / 2; 172 char sndbuf[pktsize]; 173 char recv_buf[pktsize]; 174 ssize_t ssize, rsize; 175 176 /* setup the socket pair */ 177 if (blocking) 178 do_socketpair(sv); 179 else 180 do_socketpair_nonblocking(sv); 181 182 /* Setup the buffers */ 183 s = setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &bufsize, sizeof(bufsize)); 184 ATF_REQUIRE_EQ(0, s); 185 s = setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &bufsize, sizeof(bufsize)); 186 ATF_REQUIRE_EQ(0, s); 187 188 /* Fill the send buffer */ 189 bzero(sndbuf, pktsize); 190 191 /* send and receive the packet */ 192 ssize = send(sv[0], sndbuf, pktsize, MSG_EOR); 193 if (ssize < 0) { 194 perror("send"); 195 atf_tc_fail("send returned < 0"); 196 } 197 ATF_CHECK_EQ_MSG(pktsize, ssize, "expected %zd=send(...) but got %zd", 198 pktsize, ssize); 199 200 rsize = recv(sv[1], recv_buf, pktsize, MSG_WAITALL); 201 if (rsize < 0) { 202 perror("recv"); 203 atf_tc_fail("recv returned < 0"); 204 } 205 ATF_CHECK_EQ_MSG(pktsize, rsize, "expected %zd=send(...) but got %zd", 206 pktsize, rsize); 207 close(sv[0]); 208 close(sv[1]); 209 } 210 211 static void 212 test_pipe_simulator(int sndbufsize, int rcvbufsize) 213 { 214 int num_sent, num_received; 215 int sv[2]; 216 const ssize_t pktsize = MIN(sndbufsize, rcvbufsize) / 4; 217 int numpkts; 218 char sndbuf[pktsize]; 219 char rcvbuf[pktsize]; 220 char comparebuf[pktsize]; 221 ssize_t ssize, rsize; 222 bool currently_sending = true; 223 224 /* setup the socket pair */ 225 do_socketpair_nonblocking(sv); 226 /* Setup the buffers */ 227 ATF_REQUIRE_EQ(0, setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbufsize, 228 sizeof(sndbufsize))); 229 ATF_REQUIRE_EQ(0, setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rcvbufsize, 230 sizeof(rcvbufsize))); 231 232 /* Send a total amount of data comfortably greater than the buffers */ 233 numpkts = MAX(sndbufsize, rcvbufsize) * 8 / pktsize; 234 for (num_sent=0, num_received=0; 235 num_sent < numpkts || num_received < numpkts; ) { 236 if (currently_sending && num_sent < numpkts) { 237 /* The simulated sending process */ 238 /* fill the buffer */ 239 memset(sndbuf, num_sent, pktsize); 240 ssize = send(sv[0], sndbuf, pktsize, MSG_EOR); 241 if (ssize < 0) { 242 /* 243 * XXX: This is bug-compatible with the kernel. 244 * The kernel returns EMSGSIZE when it should 245 * return EAGAIN 246 */ 247 if (errno == EAGAIN || errno == EMSGSIZE) 248 currently_sending = false; 249 else { 250 perror("send"); 251 atf_tc_fail("send failed"); 252 } 253 } else { 254 ATF_CHECK_EQ_MSG(pktsize, ssize, 255 "expected %zd=send(...) but got %zd", 256 pktsize, ssize); 257 num_sent++; 258 } 259 } else { 260 /* The simulated receiving process */ 261 rsize = recv(sv[1], rcvbuf, pktsize, MSG_WAITALL); 262 if (rsize < 0) { 263 if (errno == EAGAIN) { 264 currently_sending = true; 265 ATF_REQUIRE_MSG(num_sent < numpkts, 266 "Packets were lost!"); 267 } 268 else { 269 perror("recv"); 270 atf_tc_fail("recv failed"); 271 } 272 } else { 273 ATF_CHECK_EQ_MSG(pktsize, rsize, 274 "expected %zd=recv(...) but got %zd", 275 pktsize, rsize); 276 memset(comparebuf, num_received, pktsize); 277 ATF_CHECK_EQ_MSG(0, memcmp(comparebuf, rcvbuf, 278 pktsize), 279 "Received data miscompare"); 280 num_received++; 281 } 282 } 283 } 284 close(sv[0]); 285 close(sv[1]); 286 } 287 288 typedef struct { 289 ssize_t pktsize; 290 int numpkts; 291 int so; 292 } test_pipe_thread_data_t; 293 294 static void* 295 test_pipe_writer(void* args) 296 { 297 test_pipe_thread_data_t* td = args; 298 char sndbuf[td->pktsize]; 299 ssize_t ssize; 300 int i; 301 302 for(i=0; i < td->numpkts; i++) { 303 memset(sndbuf, i, td->pktsize); 304 ssize = send(td->so, sndbuf, td->pktsize, MSG_EOR); 305 if (ssize < 0) { 306 perror("send"); 307 atf_tc_fail("send returned < 0"); 308 } 309 ATF_CHECK_EQ_MSG(td->pktsize, ssize, 310 "expected %zd=send(...) but got %zd", 311 td->pktsize, ssize); 312 } 313 return (0); 314 } 315 316 static void* 317 test_pipe_reader(void* args) 318 { 319 test_pipe_thread_data_t* td = args; 320 char rcvbuf[td->pktsize]; 321 char comparebuf[td->pktsize]; 322 ssize_t rsize; 323 int i, d; 324 325 for(i=0; i < td->numpkts; i++) { 326 memset(comparebuf, i, td->pktsize); 327 rsize = recv(td->so, rcvbuf, td->pktsize, MSG_WAITALL); 328 if (rsize < 0) { 329 perror("recv"); 330 atf_tc_fail("recv returned < 0"); 331 } 332 ATF_CHECK_EQ_MSG(td->pktsize, rsize, 333 "expected %zd=send(...) but got %zd", 334 td->pktsize, rsize); 335 d = memcmp(comparebuf, rcvbuf, td->pktsize); 336 ATF_CHECK_EQ_MSG(0, d, 337 "Received data miscompare on packet %d", i); 338 } 339 return (0); 340 } 341 342 343 static void 344 test_pipe(int sndbufsize, int rcvbufsize) 345 { 346 test_pipe_thread_data_t writer_data, reader_data; 347 pthread_t writer, reader; 348 int sv[2]; 349 const size_t pktsize = MIN(sndbufsize, rcvbufsize) / 4; 350 int numpkts; 351 352 /* setup the socket pair */ 353 do_socketpair(sv); 354 /* Setup the buffers */ 355 ATF_REQUIRE_EQ(0, setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbufsize, 356 sizeof(sndbufsize))); 357 ATF_REQUIRE_EQ(0, setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rcvbufsize, 358 sizeof(rcvbufsize))); 359 360 /* Send a total amount of data comfortably greater than the buffers */ 361 numpkts = MAX(sndbufsize, rcvbufsize) * 8 / pktsize; 362 363 /* Start the child threads */ 364 writer_data.pktsize = pktsize; 365 writer_data.numpkts = numpkts; 366 writer_data.so = sv[0]; 367 reader_data.pktsize = pktsize; 368 reader_data.numpkts = numpkts; 369 reader_data.so = sv[1]; 370 ATF_REQUIRE_EQ(0, pthread_create(&writer, NULL, test_pipe_writer, 371 (void*)&writer_data)); 372 /* 373 * Give the writer time to start writing, and hopefully block, before 374 * starting the reader. This increases the likelihood of the test case 375 * failing due to PR kern/185812 376 */ 377 usleep(1000); 378 ATF_REQUIRE_EQ(0, pthread_create(&reader, NULL, test_pipe_reader, 379 (void*)&reader_data)); 380 381 /* Join the children */ 382 ATF_REQUIRE_EQ(0, pthread_join(writer, NULL)); 383 ATF_REQUIRE_EQ(0, pthread_join(reader, NULL)); 384 close(sv[0]); 385 close(sv[1]); 386 } 387 388 389 /* 390 * Test Cases 391 */ 392 393 /* Create a SEQPACKET socket */ 394 ATF_TC_WITHOUT_HEAD(create_socket); 395 ATF_TC_BODY(create_socket, tc) 396 { 397 int s; 398 399 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 400 ATF_REQUIRE(s >= 0); 401 close(s); 402 } 403 404 /* Create SEQPACKET sockets using socketpair(2) */ 405 ATF_TC_WITHOUT_HEAD(create_socketpair); 406 ATF_TC_BODY(create_socketpair, tc) 407 { 408 int sv[2]; 409 int s; 410 411 s = socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sv); 412 ATF_CHECK_EQ(0, s); 413 ATF_CHECK(sv[0] >= 0); 414 ATF_CHECK(sv[1] >= 0); 415 ATF_CHECK(sv[0] != sv[1]); 416 close(sv[0]); 417 close(sv[1]); 418 } 419 420 /* Call listen(2) without first calling bind(2). It should fail */ 421 ATF_TC_WITHOUT_HEAD(listen_unbound); 422 ATF_TC_BODY(listen_unbound, tc) 423 { 424 int s, r; 425 426 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 427 ATF_REQUIRE(s > 0); 428 r = listen(s, -1); 429 /* expect listen to fail since we haven't called bind(2) */ 430 ATF_CHECK(r != 0); 431 close(s); 432 } 433 434 /* Bind the socket to a file */ 435 ATF_TC_WITHOUT_HEAD(bind); 436 ATF_TC_BODY(bind, tc) 437 { 438 struct sockaddr_un sun; 439 /* ATF's isolation mechanisms will guarantee uniqueness of this file */ 440 const char *path = "sock"; 441 int s, r; 442 443 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 444 ATF_REQUIRE(s >= 0); 445 446 bzero(&sun, sizeof(sun)); 447 sun.sun_family = AF_LOCAL; 448 sun.sun_len = sizeof(sun); 449 strlcpy(sun.sun_path, path, sizeof(sun.sun_path)); 450 r = bind(s, (struct sockaddr *)&sun, sizeof(sun)); 451 ATF_CHECK_EQ(0, r); 452 close(s); 453 } 454 455 /* listen(2) a socket that is already bound(2) should succeed */ 456 ATF_TC_WITHOUT_HEAD(listen_bound); 457 ATF_TC_BODY(listen_bound, tc) 458 { 459 struct sockaddr_un sun; 460 /* ATF's isolation mechanisms will guarantee uniqueness of this file */ 461 const char *path = "sock"; 462 int s, r, l; 463 464 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 465 ATF_REQUIRE(s >= 0); 466 467 bzero(&sun, sizeof(sun)); 468 sun.sun_family = AF_LOCAL; 469 sun.sun_len = sizeof(sun); 470 strlcpy(sun.sun_path, path, sizeof(sun.sun_path)); 471 r = bind(s, (struct sockaddr *)&sun, sizeof(sun)); 472 l = listen(s, -1); 473 ATF_CHECK_EQ(0, r); 474 ATF_CHECK_EQ(0, l); 475 close(s); 476 } 477 478 /* connect(2) can make a connection */ 479 ATF_TC_WITHOUT_HEAD(connect); 480 ATF_TC_BODY(connect, tc) 481 { 482 struct sockaddr_un sun; 483 /* ATF's isolation mechanisms will guarantee uniqueness of this file */ 484 const char *path = "sock"; 485 int s, r, err, l, s2; 486 487 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 488 ATF_REQUIRE(s >= 0); 489 490 bzero(&sun, sizeof(sun)); 491 sun.sun_family = AF_LOCAL; 492 sun.sun_len = sizeof(sun); 493 strlcpy(sun.sun_path, path, sizeof(sun.sun_path)); 494 r = bind(s, (struct sockaddr *)&sun, sizeof(sun)); 495 l = listen(s, -1); 496 ATF_CHECK_EQ(0, r); 497 ATF_CHECK_EQ(0, l); 498 499 /* Create the other socket */ 500 s2 = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 501 ATF_REQUIRE(s2 >= 0); 502 err = connect(s2, (struct sockaddr*)&sun, sizeof(sun)); 503 if (err != 0) { 504 perror("connect"); 505 atf_tc_fail("connect(2) failed"); 506 } 507 close(s); 508 close(s2); 509 } 510 511 /* accept(2) can receive a connection */ 512 ATF_TC_WITHOUT_HEAD(accept); 513 ATF_TC_BODY(accept, tc) 514 { 515 int sv[2]; 516 517 mk_pair_of_sockets(sv); 518 close(sv[0]); 519 close(sv[1]); 520 } 521 522 523 /* Set O_NONBLOCK on the socket */ 524 ATF_TC_WITHOUT_HEAD(fcntl_nonblock); 525 ATF_TC_BODY(fcntl_nonblock, tc) 526 { 527 int s; 528 529 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 530 ATF_REQUIRE(s >= 0); 531 if (fcntl(s, F_SETFL, O_NONBLOCK) == -1) { 532 perror("fcntl"); 533 atf_tc_fail("fcntl failed"); 534 } 535 close(s); 536 } 537 538 /* Resize the send and receive buffers */ 539 ATF_TC_WITHOUT_HEAD(resize_buffers); 540 ATF_TC_BODY(resize_buffers, tc) 541 { 542 int s; 543 int sndbuf = 12345; 544 int rcvbuf = 23456; 545 int xs, xr; 546 socklen_t sl = sizeof(xs); 547 548 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 549 ATF_REQUIRE(s >= 0); 550 551 printf(" Socket Buffer Sizes\n"); 552 printf(" | SNDBUF | RCVBUF |\n"); 553 ATF_CHECK_EQ(0, getsockopt(s, SOL_SOCKET, SO_SNDBUF, &xs, &sl)); 554 ATF_CHECK_EQ(0, getsockopt(s, SOL_SOCKET, SO_RCVBUF, &xr, &sl)); 555 printf("Default | %7d | %7d |\n", xs, xr); 556 557 if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, &sndbuf, sizeof(sndbuf)) != 0){ 558 perror("setsockopt"); 559 atf_tc_fail("setsockopt(SO_SNDBUF) failed"); 560 } 561 ATF_CHECK_EQ(0, getsockopt(s, SOL_SOCKET, SO_SNDBUF, &xs, &sl)); 562 ATF_CHECK_EQ(0, getsockopt(s, SOL_SOCKET, SO_RCVBUF, &xr, &sl)); 563 printf("After changing SNDBUF | %7d | %7d |\n", xs, xr); 564 565 if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, &rcvbuf, sizeof(rcvbuf)) != 0){ 566 perror("setsockopt"); 567 atf_tc_fail("setsockopt(SO_RCVBUF) failed"); 568 } 569 ATF_CHECK_EQ(0, getsockopt(s, SOL_SOCKET, SO_SNDBUF, &xs, &sl)); 570 ATF_CHECK_EQ(0, getsockopt(s, SOL_SOCKET, SO_RCVBUF, &xr, &sl)); 571 printf("After changing RCVBUF | %7d | %7d |\n", xs, xr); 572 close(s); 573 } 574 575 /* 576 * Resize the send and receive buffers of a connected socketpair 577 * Print some useful debugging info too 578 */ 579 ATF_TC_WITHOUT_HEAD(resize_connected_buffers); 580 ATF_TC_BODY(resize_connected_buffers, tc) 581 { 582 int sv[2]; 583 int sndbuf = 12345; 584 int rcvbuf = 23456; 585 int err; 586 int ls, lr, rs, rr; 587 socklen_t sl = sizeof(ls); 588 589 /* setup the socket pair */ 590 do_socketpair(sv); 591 592 printf(" Socket Buffer Sizes\n"); 593 printf(" | Left Socket | Right Socket |\n"); 594 printf(" | SNDBUF | RCVBUF | SNDBUF | RCVBUF |\n"); 595 ATF_CHECK_EQ(0, getsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &ls, &sl)); 596 ATF_CHECK_EQ(0, getsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &lr, &sl)); 597 ATF_CHECK_EQ(0, getsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &rs, &sl)); 598 ATF_CHECK_EQ(0, getsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rr, &sl)); 599 printf("Default | %7d | %7d | %7d | %7d |\n", 600 ls, lr, rs, rr); 601 602 /* Update one side's send buffer */ 603 err = setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbuf, sizeof(sndbuf)); 604 if (err != 0){ 605 perror("setsockopt"); 606 atf_tc_fail("setsockopt(SO_SNDBUF) failed"); 607 } 608 609 ATF_CHECK_EQ(0, getsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &ls, &sl)); 610 ATF_CHECK_EQ(0, getsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &lr, &sl)); 611 ATF_CHECK_EQ(0, getsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &rs, &sl)); 612 ATF_CHECK_EQ(0, getsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rr, &sl)); 613 printf("After changing Left's SNDBUF | %7d | %7d | %7d | %7d |\n", 614 ls, lr, rs, rr); 615 616 /* Update the same side's receive buffer */ 617 err = setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &rcvbuf, sizeof(rcvbuf)); 618 if (err != 0){ 619 perror("setsockopt"); 620 atf_tc_fail("setsockopt(SO_RCVBUF) failed"); 621 } 622 623 ATF_CHECK_EQ(0, getsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &ls, &sl)); 624 ATF_CHECK_EQ(0, getsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &lr, &sl)); 625 ATF_CHECK_EQ(0, getsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &rs, &sl)); 626 ATF_CHECK_EQ(0, getsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rr, &sl)); 627 printf("After changing Left's RCVBUF | %7d | %7d | %7d | %7d |\n", 628 ls, lr, rs, rr); 629 close(sv[0]); 630 close(sv[1]); 631 } 632 633 634 /* send(2) and recv(2) a single short record */ 635 ATF_TC_WITHOUT_HEAD(send_recv); 636 ATF_TC_BODY(send_recv, tc) 637 { 638 int sv[2]; 639 const int bufsize = 64; 640 const char *data = "data"; 641 char recv_buf[bufsize]; 642 ssize_t datalen; 643 ssize_t ssize, rsize; 644 645 /* setup the socket pair */ 646 do_socketpair(sv); 647 648 /* send and receive a small packet */ 649 datalen = strlen(data) + 1; /* +1 for the null */ 650 ssize = send(sv[0], data, datalen, MSG_EOR); 651 if (ssize < 0) { 652 perror("send"); 653 atf_tc_fail("send returned < 0"); 654 } 655 ATF_CHECK_EQ_MSG(datalen, ssize, "expected %zd=send(...) but got %zd", 656 datalen, ssize); 657 658 rsize = recv(sv[1], recv_buf, bufsize, MSG_WAITALL); 659 ATF_CHECK_EQ(datalen, rsize); 660 close(sv[0]); 661 close(sv[1]); 662 } 663 664 /* sendto(2) and recvfrom(2) a single short record 665 * According to The Open Group Base Specifications Issue 6 IEEE Std 1003.1, 2004 666 * Edition, sendto(2) is exactly the same as send(2) on a connection-mode socket 667 * 668 * According to the same spec, not all protocols are required to provide the 669 * source addres in recvfrom(2). 670 */ 671 ATF_TC_WITHOUT_HEAD(sendto_recvfrom); 672 ATF_TC_BODY(sendto_recvfrom, tc) 673 { 674 #ifdef TEST_SEQ_PACKET_SOURCE_ADDRESS 675 const char* path; 676 #endif 677 struct sockaddr_storage from; 678 int sv[2]; 679 const int bufsize = 64; 680 const char *data = "data"; 681 char recv_buf[bufsize]; 682 ssize_t datalen; 683 ssize_t ssize, rsize; 684 socklen_t fromlen; 685 686 /* setup the socket pair */ 687 #ifdef TEST_SEQ_PACKET_SOURCE_ADDRESS 688 path = 689 #endif 690 mk_pair_of_sockets(sv); 691 692 /* send and receive a small packet */ 693 datalen = strlen(data) + 1; /* +1 for the null */ 694 ssize = sendto(sv[0], data, datalen, MSG_EOR, NULL, 0); 695 if (ssize < 0) { 696 perror("send"); 697 atf_tc_fail("send returned < 0"); 698 } 699 ATF_CHECK_EQ_MSG(datalen, ssize, "expected %zd=send(...) but got %zd", 700 datalen, ssize); 701 702 fromlen = sizeof(from); 703 rsize = recvfrom(sv[1], recv_buf, bufsize, MSG_WAITALL, 704 (struct sockaddr*)&from, &fromlen); 705 if (ssize < 0) { 706 perror("recvfrom"); 707 atf_tc_fail("recvfrom returned < 0"); 708 } 709 ATF_CHECK_EQ(datalen, rsize); 710 711 #ifdef TEST_SEQ_PACKET_SOURCE_ADDRESS 712 /* 713 * FreeBSD does not currently provide the source address for SEQ_PACKET 714 * AF_UNIX sockets, and POSIX does not require it, so these two checks 715 * are disabled. If FreeBSD gains that feature in the future, then 716 * these checks may be reenabled 717 */ 718 ATF_CHECK_EQ(PF_LOCAL, from.ss_family); 719 ATF_CHECK_STREQ(path, ((struct sockaddr_un*)&from)->sun_path); 720 #endif 721 close(sv[0]); 722 close(sv[1]); 723 } 724 725 /* 726 * send(2) and recv(2) a single short record with sockets created the 727 * traditional way, involving bind, listen, connect, and accept 728 */ 729 ATF_TC_WITHOUT_HEAD(send_recv_with_connect); 730 ATF_TC_BODY(send_recv_with_connect, tc) 731 { 732 int sv[2]; 733 const int bufsize = 64; 734 const char *data = "data"; 735 char recv_buf[bufsize]; 736 ssize_t datalen; 737 ssize_t ssize, rsize; 738 739 mk_pair_of_sockets(sv); 740 741 /* send and receive a small packet */ 742 datalen = strlen(data) + 1; /* +1 for the null */ 743 ssize = send(sv[0], data, datalen, MSG_EOR); 744 if (ssize < 0) { 745 perror("send"); 746 atf_tc_fail("send returned < 0"); 747 } 748 ATF_CHECK_EQ_MSG(datalen, ssize, "expected %zd=send(...) but got %zd", 749 datalen, ssize); 750 751 rsize = recv(sv[1], recv_buf, bufsize, MSG_WAITALL); 752 ATF_CHECK_EQ(datalen, rsize); 753 close(sv[0]); 754 close(sv[1]); 755 } 756 757 /* send(2) should fail on a shutdown socket */ 758 ATF_TC_WITHOUT_HEAD(shutdown_send); 759 ATF_TC_BODY(shutdown_send, tc) 760 { 761 struct sockaddr_un sun; 762 /* ATF's isolation mechanisms will guarantee uniqueness of this file */ 763 const char *path = "sock"; 764 const char *data = "data"; 765 ssize_t datalen, ssize; 766 int s, err, s2; 767 768 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 769 ATF_REQUIRE(s >= 0); 770 771 bzero(&sun, sizeof(sun)); 772 sun.sun_family = AF_LOCAL; 773 sun.sun_len = sizeof(sun); 774 strlcpy(sun.sun_path, path, sizeof(sun.sun_path)); 775 err = bind(s, (struct sockaddr *)&sun, sizeof(sun)); 776 err = listen(s, -1); 777 ATF_CHECK_EQ(0, err); 778 779 /* Create the other socket */ 780 s2 = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 781 ATF_REQUIRE(s2 >= 0); 782 err = connect(s2, (struct sockaddr*)&sun, sizeof(sun)); 783 if (err != 0) { 784 perror("connect"); 785 atf_tc_fail("connect(2) failed"); 786 } 787 788 ATF_CHECK_EQ(0, shutdown(s2, SHUT_RDWR)); 789 datalen = strlen(data) + 1; /* +1 for the null */ 790 /* USE MSG_NOSIGNAL so we don't get SIGPIPE */ 791 ssize = send(s2, data, datalen, MSG_EOR | MSG_NOSIGNAL); 792 ATF_CHECK_EQ(EPIPE, errno); 793 ATF_CHECK_EQ(-1, ssize); 794 close(s); 795 close(s2); 796 } 797 798 /* send(2) should cause SIGPIPE on a shutdown socket */ 799 ATF_TC_WITHOUT_HEAD(shutdown_send_sigpipe); 800 ATF_TC_BODY(shutdown_send_sigpipe, tc) 801 { 802 struct sockaddr_un sun; 803 /* ATF's isolation mechanisms will guarantee uniqueness of this file */ 804 const char *path = "sock"; 805 const char *data = "data"; 806 ssize_t datalen; 807 int s, err, s2; 808 809 s = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 810 ATF_REQUIRE(s >= 0); 811 812 bzero(&sun, sizeof(sun)); 813 sun.sun_family = AF_LOCAL; 814 sun.sun_len = sizeof(sun); 815 strlcpy(sun.sun_path, path, sizeof(sun.sun_path)); 816 err = bind(s, (struct sockaddr *)&sun, sizeof(sun)); 817 err = listen(s, -1); 818 ATF_CHECK_EQ(0, err); 819 820 /* Create the other socket */ 821 s2 = socket(PF_LOCAL, SOCK_SEQPACKET, 0); 822 ATF_REQUIRE(s2 >= 0); 823 err = connect(s2, (struct sockaddr*)&sun, sizeof(sun)); 824 if (err != 0) { 825 perror("connect"); 826 atf_tc_fail("connect(2) failed"); 827 } 828 829 ATF_CHECK_EQ(0, shutdown(s2, SHUT_RDWR)); 830 ATF_REQUIRE(SIG_ERR != signal(SIGPIPE, shutdown_send_sigpipe_handler)); 831 datalen = strlen(data) + 1; /* +1 for the null */ 832 (void)send(s2, data, sizeof(*data), MSG_EOR); 833 ATF_CHECK_EQ(1, got_sigpipe); 834 close(s); 835 close(s2); 836 } 837 838 /* nonblocking send(2) and recv(2) a single short record */ 839 ATF_TC_WITHOUT_HEAD(send_recv_nonblocking); 840 ATF_TC_BODY(send_recv_nonblocking, tc) 841 { 842 int sv[2]; 843 const int bufsize = 64; 844 const char *data = "data"; 845 char recv_buf[bufsize]; 846 ssize_t datalen; 847 ssize_t ssize, rsize; 848 849 /* setup the socket pair */ 850 do_socketpair_nonblocking(sv); 851 852 /* Verify that there is nothing to receive */ 853 rsize = recv(sv[1], recv_buf, bufsize, MSG_WAITALL); 854 ATF_CHECK_EQ(EAGAIN, errno); 855 ATF_CHECK_EQ(-1, rsize); 856 857 /* send and receive a small packet */ 858 datalen = strlen(data) + 1; /* +1 for the null */ 859 ssize = send(sv[0], data, datalen, MSG_EOR); 860 if (ssize < 0) { 861 perror("send"); 862 atf_tc_fail("send returned < 0"); 863 } 864 ATF_CHECK_EQ_MSG(datalen, ssize, "expected %zd=send(...) but got %zd", 865 datalen, ssize); 866 867 rsize = recv(sv[1], recv_buf, bufsize, MSG_WAITALL); 868 ATF_CHECK_EQ(datalen, rsize); 869 close(sv[0]); 870 close(sv[1]); 871 } 872 873 /* 874 * We should get EMSGSIZE if we try to send a message larger than the socket 875 * buffer, with blocking sockets 876 */ 877 ATF_TC_WITHOUT_HEAD(emsgsize); 878 ATF_TC_BODY(emsgsize, tc) 879 { 880 int sv[2]; 881 const int sndbufsize = 8192; 882 const int rcvbufsize = 8192; 883 const size_t pktsize = (sndbufsize + rcvbufsize) * 2; 884 char sndbuf[pktsize]; 885 ssize_t ssize; 886 887 /* setup the socket pair */ 888 do_socketpair(sv); 889 /* Setup the buffers */ 890 ATF_REQUIRE_EQ(0, setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbufsize, 891 sizeof(sndbufsize))); 892 ATF_REQUIRE_EQ(0, setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rcvbufsize, 893 sizeof(rcvbufsize))); 894 895 ssize = send(sv[0], sndbuf, pktsize, MSG_EOR); 896 ATF_CHECK_EQ(EMSGSIZE, errno); 897 ATF_CHECK_EQ(-1, ssize); 898 close(sv[0]); 899 close(sv[1]); 900 } 901 902 /* 903 * We should get EMSGSIZE if we try to send a message larger than the socket 904 * buffer, with nonblocking sockets 905 */ 906 ATF_TC_WITHOUT_HEAD(emsgsize_nonblocking); 907 ATF_TC_BODY(emsgsize_nonblocking, tc) 908 { 909 int sv[2]; 910 const int sndbufsize = 8192; 911 const int rcvbufsize = 8192; 912 const size_t pktsize = (sndbufsize + rcvbufsize) * 2; 913 char sndbuf[pktsize]; 914 ssize_t ssize; 915 916 /* setup the socket pair */ 917 do_socketpair_nonblocking(sv); 918 /* Setup the buffers */ 919 ATF_REQUIRE_EQ(0, setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbufsize, 920 sizeof(sndbufsize))); 921 ATF_REQUIRE_EQ(0, setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rcvbufsize, 922 sizeof(rcvbufsize))); 923 924 ssize = send(sv[0], sndbuf, pktsize, MSG_EOR); 925 ATF_CHECK_EQ(EMSGSIZE, errno); 926 ATF_CHECK_EQ(-1, ssize); 927 close(sv[0]); 928 close(sv[1]); 929 } 930 931 932 /* 933 * We should get EAGAIN if we try to send a message larger than the socket 934 * buffer, with nonblocking sockets. Test with several different sockbuf sizes 935 */ 936 ATF_TC_WITHOUT_HEAD(eagain_8k_8k); 937 ATF_TC_BODY(eagain_8k_8k, tc) 938 { 939 test_eagain(8192, 8192); 940 } 941 ATF_TC_WITHOUT_HEAD(eagain_8k_128k); 942 ATF_TC_BODY(eagain_8k_128k, tc) 943 { 944 test_eagain(8192, 131072); 945 } 946 ATF_TC_WITHOUT_HEAD(eagain_128k_8k); 947 ATF_TC_BODY(eagain_128k_8k, tc) 948 { 949 test_eagain(131072, 8192); 950 } 951 ATF_TC_WITHOUT_HEAD(eagain_128k_128k); 952 ATF_TC_BODY(eagain_128k_128k, tc) 953 { 954 test_eagain(131072, 131072); 955 } 956 957 958 /* 959 * nonblocking send(2) and recv(2) of several records, which should collectively 960 * fill up the send buffer but not the receive buffer 961 */ 962 ATF_TC_WITHOUT_HEAD(rcvbuf_oversized); 963 ATF_TC_BODY(rcvbuf_oversized, tc) 964 { 965 int i; 966 int sv[2]; 967 const ssize_t pktsize = 1024; 968 const int sndbufsize = 8192; 969 const int rcvbufsize = 131072; 970 const size_t geometric_mean_bufsize = 32768; 971 const int numpkts = geometric_mean_bufsize / pktsize; 972 char sndbuf[pktsize]; 973 char recv_buf[pktsize]; 974 ssize_t ssize, rsize; 975 976 /* setup the socket pair */ 977 do_socketpair_nonblocking(sv); 978 ATF_REQUIRE_EQ(0, setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &sndbufsize, 979 sizeof(sndbufsize))); 980 ATF_REQUIRE_EQ(0, setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &rcvbufsize, 981 sizeof(rcvbufsize))); 982 983 /* 984 * Send and receive packets that are collectively greater than the send 985 * buffer, but less than the receive buffer 986 */ 987 for (i=0; i < numpkts; i++) { 988 /* Fill the buffer */ 989 memset(sndbuf, i, pktsize); 990 991 /* send the packet */ 992 ssize = send(sv[0], sndbuf, pktsize, MSG_EOR); 993 if (ssize < 0) { 994 perror("send"); 995 atf_tc_fail("send returned < 0"); 996 } 997 ATF_CHECK_EQ_MSG(pktsize, ssize, 998 "expected %zd=send(...) but got %zd", pktsize, ssize); 999 1000 /* Receive it */ 1001 1002 rsize = recv(sv[1], recv_buf, pktsize, MSG_WAITALL); 1003 if (rsize < 0) { 1004 perror("recv"); 1005 atf_tc_fail("recv returned < 0"); 1006 } 1007 ATF_CHECK_EQ_MSG(pktsize, rsize, 1008 "expected %zd=send(...) but got %zd", pktsize, rsize); 1009 1010 /* Verify the contents */ 1011 ATF_CHECK_EQ_MSG(0, memcmp(sndbuf, recv_buf, pktsize), 1012 "Received data miscompare"); 1013 } 1014 1015 /* Trying to receive again should return EAGAIN */ 1016 rsize = recv(sv[1], recv_buf, pktsize, MSG_WAITALL); 1017 ATF_CHECK_EQ(EAGAIN, errno); 1018 ATF_CHECK_EQ(-1, rsize); 1019 close(sv[0]); 1020 close(sv[1]); 1021 } 1022 1023 /* 1024 * Simulate the behavior of a blocking pipe. The sender will send until his 1025 * buffer fills up, then we'll simulate a scheduler switch that will allow the 1026 * receiver to read until his buffer empties. Repeat the process until the 1027 * transfer is complete. 1028 * Repeat the test with multiple send and receive buffer sizes 1029 */ 1030 ATF_TC_WITHOUT_HEAD(pipe_simulator_8k_8k); 1031 ATF_TC_BODY(pipe_simulator_8k_8k, tc) 1032 { 1033 test_pipe_simulator(8192, 8192); 1034 } 1035 1036 ATF_TC_WITHOUT_HEAD(pipe_simulator_8k_128k); 1037 ATF_TC_BODY(pipe_simulator_8k_128k, tc) 1038 { 1039 test_pipe_simulator(8192, 131072); 1040 } 1041 1042 ATF_TC_WITHOUT_HEAD(pipe_simulator_128k_8k); 1043 ATF_TC_BODY(pipe_simulator_128k_8k, tc) 1044 { 1045 test_pipe_simulator(131072, 8192); 1046 } 1047 1048 ATF_TC_WITHOUT_HEAD(pipe_simulator_128k_128k); 1049 ATF_TC_BODY(pipe_simulator_128k_128k, tc) 1050 { 1051 test_pipe_simulator(131072, 131072); 1052 } 1053 1054 /* 1055 * Test blocking I/O by passing data between two threads. The total amount of 1056 * data will be >> buffer size to force blocking. Repeat the test with multiple 1057 * send and receive buffer sizes 1058 */ 1059 ATF_TC_WITHOUT_HEAD(pipe_8k_8k); 1060 ATF_TC_BODY(pipe_8k_8k, tc) 1061 { 1062 test_pipe(8192, 8192); 1063 } 1064 1065 ATF_TC_WITHOUT_HEAD(pipe_8k_128k); 1066 ATF_TC_BODY(pipe_8k_128k, tc) 1067 { 1068 test_pipe(8192, 131072); 1069 } 1070 1071 ATF_TC_WITHOUT_HEAD(pipe_128k_8k); 1072 ATF_TC_BODY(pipe_128k_8k, tc) 1073 { 1074 test_pipe(131072, 8192); 1075 } 1076 1077 ATF_TC_WITHOUT_HEAD(pipe_128k_128k); 1078 ATF_TC_BODY(pipe_128k_128k, tc) 1079 { 1080 test_pipe(131072, 131072); 1081 } 1082 1083 1084 /* 1085 * Test single-packet I/O with and without blocking, with symmetric buffers of 1086 * various sizes 1087 */ 1088 ATF_TC_WITHOUT_HEAD(sendrecv_8k); 1089 ATF_TC_BODY(sendrecv_8k, tc) 1090 { 1091 test_sendrecv_symmetric_buffers(8 * 1024, true); 1092 } 1093 ATF_TC_WITHOUT_HEAD(sendrecv_16k); 1094 ATF_TC_BODY(sendrecv_16k, tc) 1095 { 1096 test_sendrecv_symmetric_buffers(16 * 1024, true); 1097 } 1098 ATF_TC_WITHOUT_HEAD(sendrecv_32k); 1099 ATF_TC_BODY(sendrecv_32k, tc) 1100 { 1101 test_sendrecv_symmetric_buffers(32 * 1024, true); 1102 } 1103 ATF_TC_WITHOUT_HEAD(sendrecv_64k); 1104 ATF_TC_BODY(sendrecv_64k, tc) 1105 { 1106 test_sendrecv_symmetric_buffers(64 * 1024, true); 1107 } 1108 ATF_TC_WITHOUT_HEAD(sendrecv_128k); 1109 ATF_TC_BODY(sendrecv_128k, tc) 1110 { 1111 test_sendrecv_symmetric_buffers(128 * 1024, true); 1112 } 1113 ATF_TC_WITHOUT_HEAD(sendrecv_8k_nonblocking); 1114 ATF_TC_BODY(sendrecv_8k_nonblocking, tc) 1115 { 1116 test_sendrecv_symmetric_buffers(8 * 1024, false); 1117 } 1118 ATF_TC_WITHOUT_HEAD(sendrecv_16k_nonblocking); 1119 ATF_TC_BODY(sendrecv_16k_nonblocking, tc) 1120 { 1121 test_sendrecv_symmetric_buffers(16 * 1024, false); 1122 } 1123 ATF_TC_WITHOUT_HEAD(sendrecv_32k_nonblocking); 1124 ATF_TC_BODY(sendrecv_32k_nonblocking, tc) 1125 { 1126 test_sendrecv_symmetric_buffers(32 * 1024, false); 1127 } 1128 ATF_TC_WITHOUT_HEAD(sendrecv_64k_nonblocking); 1129 ATF_TC_BODY(sendrecv_64k_nonblocking, tc) 1130 { 1131 test_sendrecv_symmetric_buffers(64 * 1024, false); 1132 } 1133 ATF_TC_WITHOUT_HEAD(sendrecv_128k_nonblocking); 1134 ATF_TC_BODY(sendrecv_128k_nonblocking, tc) 1135 { 1136 test_sendrecv_symmetric_buffers(128 * 1024, false); 1137 } 1138 1139 1140 /* 1141 * Main. 1142 */ 1143 1144 ATF_TP_ADD_TCS(tp) 1145 { 1146 /* Basic creation and connection tests */ 1147 ATF_TP_ADD_TC(tp, create_socket); 1148 ATF_TP_ADD_TC(tp, create_socketpair); 1149 ATF_TP_ADD_TC(tp, listen_unbound); 1150 ATF_TP_ADD_TC(tp, bind); 1151 ATF_TP_ADD_TC(tp, listen_bound); 1152 ATF_TP_ADD_TC(tp, connect); 1153 ATF_TP_ADD_TC(tp, accept); 1154 ATF_TP_ADD_TC(tp, fcntl_nonblock); 1155 ATF_TP_ADD_TC(tp, resize_buffers); 1156 ATF_TP_ADD_TC(tp, resize_connected_buffers); 1157 1158 /* Unthreaded I/O tests */ 1159 ATF_TP_ADD_TC(tp, send_recv); 1160 ATF_TP_ADD_TC(tp, send_recv_nonblocking); 1161 ATF_TP_ADD_TC(tp, send_recv_with_connect); 1162 ATF_TP_ADD_TC(tp, sendto_recvfrom); 1163 ATF_TP_ADD_TC(tp, shutdown_send); 1164 ATF_TP_ADD_TC(tp, shutdown_send_sigpipe); 1165 ATF_TP_ADD_TC(tp, emsgsize); 1166 ATF_TP_ADD_TC(tp, emsgsize_nonblocking); 1167 ATF_TP_ADD_TC(tp, eagain_8k_8k); 1168 ATF_TP_ADD_TC(tp, eagain_8k_128k); 1169 ATF_TP_ADD_TC(tp, eagain_128k_8k); 1170 ATF_TP_ADD_TC(tp, eagain_128k_128k); 1171 ATF_TP_ADD_TC(tp, sendrecv_8k); 1172 ATF_TP_ADD_TC(tp, sendrecv_16k); 1173 ATF_TP_ADD_TC(tp, sendrecv_32k); 1174 ATF_TP_ADD_TC(tp, sendrecv_64k); 1175 ATF_TP_ADD_TC(tp, sendrecv_128k); 1176 ATF_TP_ADD_TC(tp, sendrecv_8k_nonblocking); 1177 ATF_TP_ADD_TC(tp, sendrecv_16k_nonblocking); 1178 ATF_TP_ADD_TC(tp, sendrecv_32k_nonblocking); 1179 ATF_TP_ADD_TC(tp, sendrecv_64k_nonblocking); 1180 ATF_TP_ADD_TC(tp, sendrecv_128k_nonblocking); 1181 ATF_TP_ADD_TC(tp, rcvbuf_oversized); 1182 ATF_TP_ADD_TC(tp, pipe_simulator_8k_8k); 1183 ATF_TP_ADD_TC(tp, pipe_simulator_8k_128k); 1184 ATF_TP_ADD_TC(tp, pipe_simulator_128k_8k); 1185 ATF_TP_ADD_TC(tp, pipe_simulator_128k_128k); 1186 1187 /* Threaded I/O tests with blocking sockets */ 1188 ATF_TP_ADD_TC(tp, pipe_8k_8k); 1189 ATF_TP_ADD_TC(tp, pipe_8k_128k); 1190 ATF_TP_ADD_TC(tp, pipe_128k_8k); 1191 ATF_TP_ADD_TC(tp, pipe_128k_128k); 1192 1193 return atf_no_error(); 1194 } 1195