[LTP] [PATCH] syscalls/setsockopt10: handle explicit disallow of disconnect
Avinesh Kumar
akumar@suse.de
Thu Apr 17 13:19:29 CEST 2025
Hi,
Tested-by: Avinesh Kumar <akumar@suse.de>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_setnqWwDi as tmpdir (tmpfs filesystem)
tst_test.c:1903: TINFO: LTP version: 20250130
tst_test.c:1907: TINFO: Tested kernel: 6.15.0-rc2-1.g2e8a181-default #1 SMP PREEMPT_DYNAMIC Sun Apr 13 20:38:27 UTC 2025 (2e8a181) x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_FAULT_INJECTION kernel option detected which might slow the execution
tst_test.c:1720: TINFO: Overall timeout per run is 0h 02m 00s
setsockopt10.c:98: TINFO: child: Listen for tcp1 connection
setsockopt10.c:135: TINFO: parent: Connect for tcp0 connection
setsockopt10.c:147: TINFO: parent: Disconnect by setting unspec address
setsockopt10.c:151: TPASS: parent: tls disallows disconnect: EOPNOTSUPP (95)
setsockopt10.c:112: TINFO: child: connect for tcp2 connection
setsockopt10.c:116: TINFO: child: could not connect to tcp1: ECONNREFUSED (111)
Summary:
passed 1
failed 0
broken 0
skipped 0
warnings 0
On Thursday, April 17, 2025 11:05:29 AM CEST Jan Stancek via ltp wrote:
> Since commit 5071a1e606b3 ("net: tls: explicitly disallow disconnect") in
> 6.15 kernel, disconnect is now explicitly disallowed.
>
> Signed-off-by: Jan Stancek <jstancek@redhat.com>
> ---
> testcases/kernel/syscalls/setsockopt/setsockopt10.c | 11 ++++++++++-
> 1 file changed, 10 insertions(+), 1 deletion(-)
>
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt10.c b/testcases/kernel/syscalls/setsockopt/setsockopt10.c
> index e52c6cd9338f..f955f4e83a44 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt10.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt10.c
> @@ -145,7 +145,16 @@ static void run(void)
> TST_CHECKPOINT_WAKE(1);
>
> tst_res(TINFO, "parent: Disconnect by setting unspec address");
> - SAFE_CONNECT(tcp1_sk, &unspec_addr, sizeof(unspec_addr));
> + TEST(connect(tcp1_sk, &unspec_addr, sizeof(unspec_addr)));
> + if (TST_RET == -1) {
> + if (TST_ERR == EOPNOTSUPP)
> + tst_res(TPASS | TTERRNO, "parent: tls disallows disconnect");
> + else
> + tst_res(TFAIL | TTERRNO, "parent: unexpected errno from connect");
> + TST_CHECKPOINT_WAKE(2);
> + tst_reap_children();
> + return;
> + }
> SAFE_BIND(tcp1_sk, (struct sockaddr *)&tcp1_addr, sizeof(tcp1_addr));
>
> TEST(listen(tcp1_sk, 1));
>
Regards,
Avinesh
More information about the ltp
mailing list