xref: /linux/tools/testing/selftests/net/packetdrill/tcp_syscall_bad_arg_syscall-invalid-buf-ptr.pkt (revision 0ad9617c78acbc71373fb341a6f75d4012b01d69)
1// SPDX-License-Identifier: GPL-2.0
2// Test kernel behavior with NULL as buffer pointer
3
4`./defaults.sh`
5
6    0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
7   +0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
8   +0 fcntl(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0
9   +0 bind(3, ..., ...) = 0
10   +0 listen(3, 1) = 0
11
12   +0 < S 0:0(0) win 32792 <mss 1000,sackOK,nop,nop,nop,wscale 10>
13   +0 > S. 0:0(0) ack 1 <mss 1460,nop,nop,sackOK,nop,wscale 8>
14  +.2 < . 1:1(0) ack 1 win 514
15
16   +0 accept(3, ..., ...) = 4
17
18   +0 write(4, NULL, 1000) = -1 EFAULT (Bad address)
19   +0 send(4, NULL, 1000, 0) = -1 EFAULT (Bad address)
20   +0 sendto(4, NULL, 1000, 0, ..., ...) = -1 EFAULT (Bad address)
21
22   +0 < . 1:1001(1000) ack 1 win 200
23   +0 read(4, NULL, 1000) = -1 EFAULT (Bad address)
24   +0 recv(4, NULL, 1000, 0) = -1 EFAULT (Bad address)
25   +0 recvfrom(4, NULL, 1000, 0, ..., ...) = -1 EFAULT (Bad address)
26