#include <sys/socket.h>
#include <netinet/in.h>
#include <errno.h>
#include <fcntl.h>
#include <stdlib.h>
#include <atf-c.h>
static int
listensock(struct sockaddr_in *sin)
{
int l;
ATF_REQUIRE((l = socket(PF_INET, SOCK_STREAM, 0)) > 0);
ATF_REQUIRE(fcntl(l, F_SETFL, O_NONBLOCK) != -1);
ATF_REQUIRE(setsockopt(l, SOL_SOCKET, SO_REUSEADDR, &(socklen_t){1},
sizeof(int)) == 0);
*sin = (struct sockaddr_in){
.sin_len = sizeof(sin),
.sin_family = AF_INET,
.sin_addr.s_addr = htonl(INADDR_LOOPBACK),
};
ATF_REQUIRE(bind(l, (struct sockaddr *)sin, sizeof(*sin)) == 0);
ATF_REQUIRE(getsockname(l, (struct sockaddr *)sin,
&(socklen_t){ sizeof(*sin) }) == 0);
ATF_REQUIRE(listen(l, -1) == 0);
return (l);
}
static int
clientsock(struct sockaddr_in *sin)
{
int s;
ATF_REQUIRE((s = socket(PF_INET, SOCK_STREAM, 0)) > 0);
ATF_REQUIRE(connect(s, (struct sockaddr *)sin, sizeof(*sin)) == 0);
return (s);
}
static void
accfon(int l, struct accept_filter_arg *af)
{
if (setsockopt(l, SOL_SOCKET, SO_ACCEPTFILTER, af, sizeof(*af)) != 0) {
atf_tc_fail("setsockopt(SO_ACCEPTFILTER): %s", strerror(errno));
}
}
static ssize_t
usend(int s, const void *msg, size_t len)
{
ssize_t rv;
rv = send(s, msg, len, 0);
usleep(100000);
return (rv);
}
ATF_TC(data);
ATF_TC_HEAD(data, tc)
{
atf_tc_set_md_var(tc, "require.kmods", "accf_data");
}
ATF_TC_BODY(data, tc)
{
struct accept_filter_arg afa = {
.af_name = "dataready"
};
struct sockaddr_in sin;
int l, s, a;
l = listensock(&sin);
accfon(l, &afa);
s = clientsock(&sin);
ATF_REQUIRE(accept(l, NULL, 0) == -1);
ATF_REQUIRE(errno == EAGAIN);
ATF_REQUIRE(usend(s, "foo", sizeof("foo")) == sizeof("foo"));
ATF_REQUIRE((a = accept(l, NULL, 0)) > 0);
}
ATF_TC(http);
ATF_TC_HEAD(http, tc)
{
atf_tc_set_md_var(tc, "require.kmods", "accf_http");
}
ATF_TC_BODY(http, tc)
{
struct accept_filter_arg afa = {
.af_name = "httpready"
};
struct sockaddr_in sin;
int l, s, a;
l = listensock(&sin);
accfon(l, &afa);
s = clientsock(&sin);
ATF_REQUIRE(accept(l, NULL, 0) == -1);
ATF_REQUIRE(errno == EAGAIN);
ATF_REQUIRE(usend(s, "foo", sizeof("foo")) == sizeof("foo"));
ATF_REQUIRE((a = accept(l, NULL, 0)) > 0);
close(s);
close(a);
#define CHUNK1 "GET / "
#define CHUNK2 "HTTP/1.0\r\n\n"
#define LEN(c) (sizeof(c) - 1)
s = clientsock(&sin);
ATF_REQUIRE(usend(s, CHUNK1, LEN(CHUNK1)) == LEN(CHUNK1));
ATF_REQUIRE(accept(l, NULL, 0) == -1);
ATF_REQUIRE(errno == EAGAIN);
ATF_REQUIRE(usend(s, CHUNK2, LEN(CHUNK2)) == LEN(CHUNK2));
ATF_REQUIRE((a = accept(l, NULL, 0)) > 0);
}
ATF_TC(tls);
ATF_TC_HEAD(tls, tc)
{
atf_tc_set_md_var(tc, "require.kmods", "accf_tls");
}
ATF_TC_BODY(tls, tc)
{
struct accept_filter_arg afa = {
.af_name = "tlsready"
};
struct sockaddr_in sin;
int l, s, a;
l = listensock(&sin);
accfon(l, &afa);
s = clientsock(&sin);
ATF_REQUIRE(accept(l, NULL, 0) == -1);
ATF_REQUIRE(errno == EAGAIN);
ATF_REQUIRE(usend(s, "foo", sizeof("foo")) == sizeof("foo"));
ATF_REQUIRE(errno == EAGAIN);
ATF_REQUIRE(usend(s, "bar", sizeof("bar")) == sizeof("bar"));
ATF_REQUIRE((a = accept(l, NULL, 0)) > 0);
close(s);
close(a);
s = clientsock(&sin);
struct {
uint8_t type;
uint16_t version;
uint16_t length;
} __attribute__((__packed__)) header = {
.type = 0x16,
.length = htons((uint16_t)(arc4random() % 16384)),
};
_Static_assert(sizeof(header) == 5, "");
ATF_REQUIRE(usend(s, &header, sizeof(header)) == sizeof(header));
ssize_t sent = 0;
do {
size_t len;
char *buf;
ATF_REQUIRE(accept(l, NULL, 0) == -1);
ATF_REQUIRE(errno == EAGAIN);
len = arc4random() % 1024;
buf = alloca(len);
ATF_REQUIRE(usend(s, buf, len) == (ssize_t)len);
sent += len;
} while (sent < ntohs(header.length));
ATF_REQUIRE((a = accept(l, NULL, 0)) > 0);
}
ATF_TC(change);
ATF_TC_HEAD(change, tc)
{
atf_tc_set_md_var(tc, "require.kmods", "accf_data accf_http");
}
ATF_TC_BODY(change, tc)
{
struct accept_filter_arg dfa = {
.af_name = "dataready"
};
struct accept_filter_arg hfa = {
.af_name = "httpready"
};
struct sockaddr_in sin;
int n, l;
l = listensock(&sin);
accfon(l, &dfa);
ATF_REQUIRE(setsockopt(l, SOL_SOCKET, SO_ACCEPTFILTER, &hfa,
sizeof(hfa)) != 0 && errno == EBUSY);
ATF_REQUIRE(setsockopt(l, SOL_SOCKET, SO_ACCEPTFILTER, NULL, 0) == 0);
ATF_REQUIRE(setsockopt(l, SOL_SOCKET, SO_ACCEPTFILTER, &hfa,
sizeof(hfa)) == 0);
ATF_REQUIRE((n = socket(PF_INET, SOCK_STREAM, 0)) > 0);
ATF_REQUIRE(setsockopt(n, SOL_SOCKET, SO_ACCEPTFILTER, &dfa,
sizeof(dfa)) != 0 && errno == EINVAL);
}
ATF_TP_ADD_TCS(tp)
{
ATF_TP_ADD_TC(tp, data);
ATF_TP_ADD_TC(tp, http);
ATF_TP_ADD_TC(tp, tls);
ATF_TP_ADD_TC(tp, change);
return (atf_no_error());
}