git: 8d3d9ca8bd3d - main - tests/netinet: add UDP socket I/O tests

From: Gleb Smirnoff <glebius_at_FreeBSD.org>
Date: Sat, 23 Mar 2024 05:45:39 UTC
The branch main has been updated by glebius:

URL: https://cgit.FreeBSD.org/src/commit/?id=8d3d9ca8bd3db284f6ae671f1e816ba2822f0988

commit 8d3d9ca8bd3db284f6ae671f1e816ba2822f0988
Author:     Gleb Smirnoff <glebius@FreeBSD.org>
AuthorDate: 2024-03-23 05:44:16 +0000
Commit:     Gleb Smirnoff <glebius@FreeBSD.org>
CommitDate: 2024-03-23 05:44:16 +0000

    tests/netinet: add UDP socket I/O tests
    
    Start a file that would collect tests for I/O functionality of a UDP
    socket, targeted on how a socket interacts with userland rather than with
    wire side of the protocol.
    
    First version tests that MSG_TRUNC and MSG_PEEK are working correctly.
---
 tests/sys/netinet/Makefile |   3 +-
 tests/sys/netinet/udp_io.c | 139 +++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 141 insertions(+), 1 deletion(-)

diff --git a/tests/sys/netinet/Makefile b/tests/sys/netinet/Makefile
index b86457c2d723..fb3281028aff 100644
--- a/tests/sys/netinet/Makefile
+++ b/tests/sys/netinet/Makefile
@@ -12,7 +12,8 @@ ATF_TESTS_C=	ip_reass_test \
 		socket_afinet \
 		tcp_connect_port_test \
 		tcp_implied_connect \
-		tcp_md5_getsockopt
+		tcp_md5_getsockopt \
+		udp_io
 
 ATF_TESTS_SH=	arp \
 		carp \
diff --git a/tests/sys/netinet/udp_io.c b/tests/sys/netinet/udp_io.c
new file mode 100644
index 000000000000..6e0c4d9fe6d0
--- /dev/null
+++ b/tests/sys/netinet/udp_io.c
@@ -0,0 +1,139 @@
+/*-
+ * SPDX-License-Identifier: BSD-2-Clause
+ *
+ * Copyright (c) 2024 Gleb Smirnoff <glebius@FreeBSD.org>
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#include <sys/socket.h>
+#include <netinet/in.h>
+#include <errno.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+#include <atf-c.h>
+
+/*
+ * Create a pair of UDP sockets.  The first one is bound to a local
+ * address and the second one is connected to it.
+ */
+static void
+udp_socketpair(int *s)
+{
+	struct sockaddr_in sin = {
+		.sin_family = AF_INET,
+		.sin_len = sizeof(sin),
+	};
+	socklen_t slen = sizeof(sin);
+	int b, c;
+
+	ATF_REQUIRE((b = socket(PF_INET, SOCK_DGRAM, 0)) > 0);
+	ATF_REQUIRE((c = socket(PF_INET, SOCK_DGRAM, 0)) > 0);
+	ATF_REQUIRE(bind(b, (struct sockaddr *)&sin, sizeof(sin)) == 0);
+	ATF_REQUIRE(getsockname(b, (struct sockaddr *)&sin, &slen) == 0);
+	ATF_REQUIRE(connect(c, (struct sockaddr *)&sin, sizeof(sin)) == 0);
+
+	s[0] = b;
+	s[1] = c;
+}
+
+/*
+ * Check MSG_TRUNC.
+ */
+ATF_TC_WITHOUT_HEAD(trunc);
+ATF_TC_BODY(trunc, tc)
+{
+	char sbuf[] = "Hello, peer!", rbuf[sizeof(sbuf)];
+	struct iovec iov = {
+		.iov_base = sbuf,
+		.iov_len = sizeof(sbuf),
+	};
+	struct msghdr msg = {
+		.msg_iov = &iov,
+		.msg_iovlen = 1,
+	};
+	int s[2];
+	u_int n;
+
+	udp_socketpair(s);
+
+	ATF_REQUIRE(sendmsg(s[1], &msg, 0) == sizeof(sbuf));
+	n = (arc4random() % (sizeof(sbuf) - 1)) + 1;
+	iov.iov_base = rbuf;
+	iov.iov_len = n;
+	ATF_REQUIRE(recvmsg(s[0], &msg, 0) == n);
+	ATF_REQUIRE(msg.msg_flags == MSG_TRUNC);
+	ATF_REQUIRE(strncmp(sbuf, rbuf, n) == 0);
+	iov.iov_len = sizeof(rbuf);
+	ATF_REQUIRE(recvmsg(s[0], &msg, MSG_DONTWAIT) == -1);
+	ATF_REQUIRE(errno == EAGAIN);
+
+	close(s[0]);
+	close(s[1]);
+}
+
+/*
+ * Check MSG_PEEK.
+ */
+ATF_TC_WITHOUT_HEAD(peek);
+ATF_TC_BODY(peek, tc)
+{
+	char sbuf[] = "Hello, peer!", rbuf[sizeof(sbuf)];
+	struct iovec iov = {
+		.iov_base = sbuf,
+		.iov_len = sizeof(sbuf),
+	};
+	struct msghdr msg = {
+		.msg_iov = &iov,
+		.msg_iovlen = 1,
+	};
+	int s[2];
+	u_int n;
+
+	udp_socketpair(s);
+
+	ATF_REQUIRE(sendmsg(s[1], &msg, 0) == sizeof(sbuf));
+	iov.iov_base = rbuf;
+	for (int i = 0; i < 10; i++) {
+		n = (arc4random() % sizeof(sbuf)) + 1;
+		iov.iov_len = n;
+		ATF_REQUIRE(recvmsg(s[0], &msg, MSG_PEEK) == n);
+		if (n < sizeof(sbuf))
+			ATF_REQUIRE(msg.msg_flags == (MSG_PEEK | MSG_TRUNC));
+		else
+			ATF_REQUIRE(msg.msg_flags == MSG_PEEK);
+		ATF_REQUIRE(strncmp(sbuf, rbuf, n) == 0);
+	}
+
+	close(s[0]);
+	close(s[1]);
+}
+
+ATF_TP_ADD_TCS(tp)
+{
+	ATF_TP_ADD_TC(tp, trunc);
+	ATF_TP_ADD_TC(tp, peek);
+
+	return (atf_no_error());
+}