xref: /aosp_15_r20/external/ltp/testcases/kernel/syscalls/getpeername/getpeername01.c (revision 49cdfc7efb34551c7342be41a7384b9c40d7cab7)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Copyright (c) International Business Machines  Corp., 2001
4  * 07/2001 Ported by Wayne Boyer
5  * Copyright (C) 2024 SUSE LLC Andrea Manzini <[email protected]>
6  */
7 
8 /*\
9  * [Description]
10  *
11  * Verify that getpeername() returns the proper errno for various failure cases:
12  *
13  * - EBADF on invalid address.
14  * - ENOTSOCK on socket opened on /dev/null.
15  * - ENOTCONN on socket not connected.
16  * - EINVAL on negative addrlen.
17  * - EFAULT on invalid addr/addrlen pointers.
18  */
19 
20 #include "tst_test.h"
21 
22 static struct sockaddr_in server_addr;
23 static struct sockaddr_in fsin1;
24 static socklen_t sinlen;
25 static socklen_t invalid_sinlen = -1;
26 static int sv[2];
27 static int sockfd = -1;
28 
setup_fd_file(void)29 static void setup_fd_file(void)
30 {
31 	sockfd = SAFE_OPEN("/dev/null", O_WRONLY, 0666);
32 }
33 
setup_fd_stream(void)34 static void setup_fd_stream(void)
35 {
36 	sockfd = SAFE_SOCKET(PF_INET, SOCK_STREAM, 0);
37 	SAFE_BIND(sockfd, (struct sockaddr *)&server_addr, sizeof(server_addr));
38 }
39 
cleanup_fd(void)40 static void cleanup_fd(void)
41 {
42 	if (sockfd)
43 		SAFE_CLOSE(sockfd);
44 }
45 
setup_pair(void)46 static void setup_pair(void)
47 {
48 	SAFE_SOCKETPAIR(PF_UNIX, SOCK_STREAM, 0, sv);
49 	sockfd = sv[0];
50 }
51 
cleanup_pair(void)52 static void cleanup_pair(void)
53 {
54 	if (sv[0])
55 		SAFE_CLOSE(sv[0]);
56 
57 	if (sv[1])
58 		SAFE_CLOSE(sv[1]);
59 }
60 
61 static struct test_case {
62 	struct sockaddr *sockaddr;
63 	socklen_t *addrlen;
64 	int experrno;
65 	void (*setup)(void);
66 	void (*cleanup)(void);
67 } test_cases[] = {
68 	{.addrlen = &sinlen, .experrno = EBADF},
69 	{.addrlen = &sinlen, .experrno = ENOTSOCK, .setup = setup_fd_file,
70 		.cleanup = cleanup_fd },
71 	{.addrlen = &sinlen, .experrno = ENOTCONN, .setup = setup_fd_stream,
72 		.cleanup = cleanup_fd },
73 	{.addrlen = &invalid_sinlen, .experrno = EINVAL, .setup = setup_pair,
74 		.cleanup = cleanup_pair},
75 	{.sockaddr = (struct sockaddr *) -1, .addrlen = &sinlen, .experrno = EFAULT,
76 		.setup = setup_pair, .cleanup = cleanup_pair},
77 	{.experrno = EFAULT, .setup = setup_pair, .cleanup = cleanup_pair},
78 	{.addrlen = (socklen_t *) 1, .experrno = EFAULT, .setup = setup_pair,
79 		.cleanup = cleanup_pair },
80 };
81 
verify_getpeername(unsigned int nr)82 static void verify_getpeername(unsigned int nr)
83 {
84 	struct test_case *tc = &test_cases[nr];
85 
86 	if (tc->setup != NULL)
87 		tc->setup();
88 
89 	if (!tc->sockaddr)
90 		tc->sockaddr = (struct sockaddr *)&fsin1;
91 
92 	TST_EXP_FAIL(getpeername(sockfd, tc->sockaddr, tc->addrlen), tc->experrno);
93 
94 	if (tc->cleanup != NULL)
95 		tc->cleanup();
96 }
97 
setup(void)98 static void setup(void)
99 {
100 	server_addr.sin_family = AF_INET;
101 	server_addr.sin_port = 0;
102 	server_addr.sin_addr.s_addr = INADDR_ANY;
103 	sinlen = sizeof(fsin1);
104 }
105 
106 static struct tst_test test = {
107 	.setup = setup,
108 	.test = verify_getpeername,
109 	.tcnt = ARRAY_SIZE(test_cases),
110 };
111