[LTP] [PATCH v2] syscalls/setsockopt05: associate receiver with destination address

Martin Doucha mdoucha@suse.cz
Thu Aug 27 17:55:56 CEST 2020


Hi,
I assume that cycling through different source ports prevented the issue?

Reviewed-by: Martin Doucha <mdoucha@suse.cz>

On 27. 08. 20 14:14, Jan Stancek wrote:
> to avoid sporadic ECONNREFUSED errors (caused by delayed ICMP):
>   safe_net.c:202: BROK: setsockopt05.c:70: send(6, 0x3ffcaf7d828, 4000, 32768) failed: ECONNREFUSED (111)
> 
> per man(7) udp:
>   ECONNREFUSED
>     No receiver was associated with the destination address.
>     This might be caused by a previous packet sent over the socket.
> 
> per https://tools.ietf.org/html/rfc1122#page-78
>   The application is also responsible to avoid confusion from a delayed ICMP
>   error message resulting from an earlier use of the same port(s).
> 
> Signed-off-by: Jan Stancek <jstancek@redhat.com>
> ---
>  .../kernel/syscalls/setsockopt/setsockopt05.c | 23 ++++++++++++++-----
>  1 file changed, 17 insertions(+), 6 deletions(-)
> 
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt05.c b/testcases/kernel/syscalls/setsockopt/setsockopt05.c
> index e78ef236e337..0b7ff39d2663 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt05.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt05.c
> @@ -31,13 +31,14 @@
>  #define BUFSIZE 4000
>  
>  static struct sockaddr_in addr;
> +static int dst_sock = -1;
>  
>  static void setup(void)
>  {
>  	int real_uid = getuid();
>  	int real_gid = getgid();
> -	int sock;
>  	struct ifreq ifr;
> +	socklen_t addrlen = sizeof(addr);
>  
>  	SAFE_UNSHARE(CLONE_NEWUSER);
>  	SAFE_UNSHARE(CLONE_NEWNET);
> @@ -45,14 +46,23 @@ static void setup(void)
>  	SAFE_FILE_PRINTF("/proc/self/uid_map", "0 %d 1", real_uid);
>  	SAFE_FILE_PRINTF("/proc/self/gid_map", "0 %d 1", real_gid);
>  
> -	tst_init_sockaddr_inet_bin(&addr, INADDR_LOOPBACK, 12345);
> -	sock = SAFE_SOCKET(AF_INET, SOCK_DGRAM, 0);
> +	tst_init_sockaddr_inet_bin(&addr, INADDR_LOOPBACK, 0);
> +	dst_sock = SAFE_SOCKET(AF_INET, SOCK_DGRAM, 0);
> +
>  	strcpy(ifr.ifr_name, "lo");
>  	ifr.ifr_mtu = 1500;
> -	SAFE_IOCTL(sock, SIOCSIFMTU, &ifr);
> +	SAFE_IOCTL(dst_sock, SIOCSIFMTU, &ifr);
>  	ifr.ifr_flags = IFF_UP;
> -	SAFE_IOCTL(sock, SIOCSIFFLAGS, &ifr);
> -	SAFE_CLOSE(sock);
> +	SAFE_IOCTL(dst_sock, SIOCSIFFLAGS, &ifr);
> +
> +	SAFE_BIND(dst_sock, (struct sockaddr *)&addr, addrlen);
> +	SAFE_GETSOCKNAME(dst_sock, (struct sockaddr*)&addr, &addrlen);
> +}
> +
> +static void cleanup(void)
> +{
> +	if (dst_sock != -1)
> +		SAFE_CLOSE(dst_sock);
>  }
>  
>  static void run(void)
> @@ -82,6 +92,7 @@ static void run(void)
>  static struct tst_test test = {
>  	.test_all = run,
>  	.setup = setup,
> +	.cleanup = cleanup,
>  	.taint_check = TST_TAINT_W | TST_TAINT_D,
>  	.needs_kconfigs = (const char *[]) {
>  		"CONFIG_USER_NS=y",
> 


-- 
Martin Doucha   mdoucha@suse.cz
QA Engineer for Software Maintenance
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic


More information about the ltp mailing list