xref: /netbsd-src/tests/net/can/h_canutils.c (revision 4e545ef793ffd691532a71002a95c1054044ae1e)
1*4e545ef7Smrg /*	$NetBSD: h_canutils.c,v 1.4 2019/10/13 07:46:16 mrg Exp $	*/
26e4cb2b9Sbouyer 
36e4cb2b9Sbouyer /*-
46e4cb2b9Sbouyer  * Copyright (c) 2017 The NetBSD Foundation, Inc.
56e4cb2b9Sbouyer  * All rights reserved.
66e4cb2b9Sbouyer  *
76e4cb2b9Sbouyer  * This code is derived from software contributed to The NetBSD Foundation
86e4cb2b9Sbouyer  * by Manuel Bouyer
96e4cb2b9Sbouyer  *
106e4cb2b9Sbouyer  * Redistribution and use in source and binary forms, with or without
116e4cb2b9Sbouyer  * modification, are permitted provided that the following conditions
126e4cb2b9Sbouyer  * are met:
136e4cb2b9Sbouyer  * 1. Redistributions of source code must retain the above copyright
146e4cb2b9Sbouyer  *    notice, this list of conditions and the following disclaimer.
156e4cb2b9Sbouyer  * 2. Redistributions in binary form must reproduce the above copyright
166e4cb2b9Sbouyer  *    notice, this list of conditions and the following disclaimer in the
176e4cb2b9Sbouyer  *    documentation and/or other materials provided with the distribution.
186e4cb2b9Sbouyer  *
196e4cb2b9Sbouyer  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
206e4cb2b9Sbouyer  * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
216e4cb2b9Sbouyer  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
226e4cb2b9Sbouyer  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
236e4cb2b9Sbouyer  * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
246e4cb2b9Sbouyer  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
256e4cb2b9Sbouyer  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
266e4cb2b9Sbouyer  * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
276e4cb2b9Sbouyer  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
286e4cb2b9Sbouyer  * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
296e4cb2b9Sbouyer  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
306e4cb2b9Sbouyer  * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
316e4cb2b9Sbouyer  */
326e4cb2b9Sbouyer 
336e4cb2b9Sbouyer #include <sys/cdefs.h>
346e4cb2b9Sbouyer #ifndef lint
35*4e545ef7Smrg __RCSID("$NetBSD: h_canutils.c,v 1.4 2019/10/13 07:46:16 mrg Exp $");
366e4cb2b9Sbouyer #endif /* not lint */
376e4cb2b9Sbouyer 
386e4cb2b9Sbouyer #include <sys/types.h>
396e4cb2b9Sbouyer #include <sys/resource.h>
406e4cb2b9Sbouyer #include <sys/wait.h>
416e4cb2b9Sbouyer #include <sys/sockio.h>
426e4cb2b9Sbouyer #include <sys/param.h>
436e4cb2b9Sbouyer 
446e4cb2b9Sbouyer #include <atf-c.h>
456e4cb2b9Sbouyer #include <assert.h>
466e4cb2b9Sbouyer #include <fcntl.h>
476e4cb2b9Sbouyer #include <stdio.h>
486e4cb2b9Sbouyer #include <stdlib.h>
496e4cb2b9Sbouyer #include <string.h>
506e4cb2b9Sbouyer #include <unistd.h>
516e4cb2b9Sbouyer 
526e4cb2b9Sbouyer #include <net/if.h>
536e4cb2b9Sbouyer #include <netcan/can.h>
546e4cb2b9Sbouyer 
556e4cb2b9Sbouyer #include <rump/rump.h>
566e4cb2b9Sbouyer #include <rump/rump_syscalls.h>
576e4cb2b9Sbouyer 
586e4cb2b9Sbouyer #include "h_macros.h"
596e4cb2b9Sbouyer #include "h_canutils.h"
606e4cb2b9Sbouyer 
616e4cb2b9Sbouyer void
cancfg_rump_createif(const char * ifname)626e4cb2b9Sbouyer cancfg_rump_createif(const char *ifname)
636e4cb2b9Sbouyer {
646e4cb2b9Sbouyer 	int s, rv;
656e4cb2b9Sbouyer 	struct ifreq ifr;
666e4cb2b9Sbouyer 
676e4cb2b9Sbouyer 	s = -1;
686e4cb2b9Sbouyer 	if ((s = rump_sys_socket(AF_CAN, SOCK_RAW, CAN_RAW)) < 0) {
696e4cb2b9Sbouyer 		atf_tc_fail_errno("if config socket");
706e4cb2b9Sbouyer 	}
716e4cb2b9Sbouyer 
726e4cb2b9Sbouyer 	memset(&ifr, 0, sizeof(ifr));
73*4e545ef7Smrg 	strncpy(ifr.ifr_name, ifname, IFNAMSIZ-1);
74*4e545ef7Smrg 	ifr.ifr_name[IFNAMSIZ - 1] = '\0';
756e4cb2b9Sbouyer 
766e4cb2b9Sbouyer 	if ((rv = rump_sys_ioctl(s, SIOCIFCREATE, &ifr)) < 0) {
776e4cb2b9Sbouyer 		atf_tc_fail_errno("if config create");
786e4cb2b9Sbouyer 	}
796e4cb2b9Sbouyer 
806e4cb2b9Sbouyer 	memset(&ifr, 0, sizeof(ifr));
81*4e545ef7Smrg 	strncpy(ifr.ifr_name, ifname, IFNAMSIZ-1);
82*4e545ef7Smrg 	ifr.ifr_name[IFNAMSIZ - 1] = '\0';
836e4cb2b9Sbouyer 
846e4cb2b9Sbouyer 	if ((rv = rump_sys_ioctl(s, SIOCGIFFLAGS, &ifr)) < 0) {
856e4cb2b9Sbouyer 		atf_tc_fail_errno("if config get flags");
866e4cb2b9Sbouyer 	}
876e4cb2b9Sbouyer 
886e4cb2b9Sbouyer 	ifr.ifr_flags |= IFF_UP;
896e4cb2b9Sbouyer 	if ((rv = rump_sys_ioctl(s, SIOCSIFFLAGS, &ifr)) < 0) {
906e4cb2b9Sbouyer 		atf_tc_fail_errno("if config set flags");
916e4cb2b9Sbouyer 	}
926e4cb2b9Sbouyer }
936e4cb2b9Sbouyer 
946e4cb2b9Sbouyer int
can_recvfrom(int s,struct can_frame * cf,int * len,struct sockaddr_can * sa)956e4cb2b9Sbouyer can_recvfrom(int s, struct can_frame *cf, int *len, struct sockaddr_can *sa)
966e4cb2b9Sbouyer {
976e4cb2b9Sbouyer 	socklen_t salen;
986e4cb2b9Sbouyer 	fd_set rfds;
996e4cb2b9Sbouyer 	struct timeval tmout;
1006e4cb2b9Sbouyer 	int rv;
1016e4cb2b9Sbouyer 
1026e4cb2b9Sbouyer 	memset(cf,  0, sizeof(struct can_frame));
1036e4cb2b9Sbouyer 	FD_ZERO(&rfds);
1046e4cb2b9Sbouyer 	FD_SET(s, &rfds);
1056e4cb2b9Sbouyer 	/* wait 1 second for the message (in some tests we expect no message) */
1066e4cb2b9Sbouyer 	tmout.tv_sec = 1;
1076e4cb2b9Sbouyer 	tmout.tv_usec = 0;
1086e4cb2b9Sbouyer 	rv = rump_sys_select(s + 1, &rfds, NULL, NULL, &tmout);
1096e4cb2b9Sbouyer 	switch(rv) {
1106e4cb2b9Sbouyer 	case -1:
1116e4cb2b9Sbouyer 		atf_tc_fail_errno("select");
1126e4cb2b9Sbouyer 		/* NOTREACHED */
1136e4cb2b9Sbouyer 	case 0:
1146e4cb2b9Sbouyer 		/* timeout */
1156e4cb2b9Sbouyer 		errno = EWOULDBLOCK;
1166e4cb2b9Sbouyer 		return -1;
1176e4cb2b9Sbouyer 	default: break;
1186e4cb2b9Sbouyer 	}
1196e4cb2b9Sbouyer 	ATF_CHECK_MSG(FD_ISSET(s, &rfds), "select returns but s not in set");
1206e4cb2b9Sbouyer 	salen = sizeof(struct sockaddr_can);
1216e4cb2b9Sbouyer 	if (( *len = rump_sys_recvfrom(s, cf, sizeof(struct can_frame),
1226e4cb2b9Sbouyer 	    0, (struct sockaddr *)sa, &salen)) < 0) {
1236e4cb2b9Sbouyer 		atf_tc_fail_errno("recvfrom");
1246e4cb2b9Sbouyer 	}
1256e4cb2b9Sbouyer 	ATF_CHECK_MSG(rv > 0, "short read on socket");
1266e4cb2b9Sbouyer 	ATF_CHECK_MSG(sa->can_family == AF_CAN,
1276e4cb2b9Sbouyer 	    "recvfrom provided wrong %d family", sa->can_family);
1286e4cb2b9Sbouyer         ATF_CHECK_MSG(salen == sizeof(struct sockaddr_can),
129a5e8ad6bSkre             "recvfrom provided wrong size %d (!= %zu)", salen, sizeof(sa));
1306e4cb2b9Sbouyer 	return 0;
1316e4cb2b9Sbouyer }
1326e4cb2b9Sbouyer 
1336e4cb2b9Sbouyer int
can_read(int s,struct can_frame * cf,int * len)1346e4cb2b9Sbouyer can_read(int s, struct can_frame *cf, int *len)
1356e4cb2b9Sbouyer {
1366e4cb2b9Sbouyer 	fd_set rfds;
1376e4cb2b9Sbouyer 	struct timeval tmout;
1386e4cb2b9Sbouyer 	int rv;
1396e4cb2b9Sbouyer 
1406e4cb2b9Sbouyer 	memset(cf,  0, sizeof(struct can_frame));
1416e4cb2b9Sbouyer 	FD_ZERO(&rfds);
1426e4cb2b9Sbouyer 	FD_SET(s, &rfds);
1436e4cb2b9Sbouyer 	/* wait 1 second for the message (in some tests we expect no message) */
1446e4cb2b9Sbouyer 	tmout.tv_sec = 1;
1456e4cb2b9Sbouyer 	tmout.tv_usec = 0;
1466e4cb2b9Sbouyer 	rv = rump_sys_select(s + 1, &rfds, NULL, NULL, &tmout);
1476e4cb2b9Sbouyer 	switch(rv) {
1486e4cb2b9Sbouyer 	case -1:
1496e4cb2b9Sbouyer 		atf_tc_fail_errno("select");
1506e4cb2b9Sbouyer 		/* NOTREACHED */
1516e4cb2b9Sbouyer 	case 0:
1526e4cb2b9Sbouyer 		/* timeout */
1536e4cb2b9Sbouyer 		errno = EWOULDBLOCK;
1546e4cb2b9Sbouyer 		return -1;
1556e4cb2b9Sbouyer 	default: break;
1566e4cb2b9Sbouyer 	}
1576e4cb2b9Sbouyer 	ATF_CHECK_MSG(FD_ISSET(s, &rfds), "select returns but s not in set");
1586e4cb2b9Sbouyer 	if (( *len = rump_sys_read(s, cf, sizeof(struct can_frame))) < 0) {
1596e4cb2b9Sbouyer 		atf_tc_fail_errno("read");
1606e4cb2b9Sbouyer 	}
1616e4cb2b9Sbouyer 	ATF_CHECK_MSG(rv > 0, "short read on socket");
1626e4cb2b9Sbouyer 	return 0;
1636e4cb2b9Sbouyer }
1646e4cb2b9Sbouyer 
1656e4cb2b9Sbouyer int
can_bind(int s,const char * ifname)1666e4cb2b9Sbouyer can_bind(int s, const char *ifname)
1676e4cb2b9Sbouyer {
1686e4cb2b9Sbouyer 	struct ifreq ifr;
1696e4cb2b9Sbouyer 	struct sockaddr_can sa;
1706e4cb2b9Sbouyer 
1716e4cb2b9Sbouyer 	strcpy(ifr.ifr_name, ifname );
1726e4cb2b9Sbouyer 	if (rump_sys_ioctl(s, SIOCGIFINDEX, &ifr) < 0) {
1736e4cb2b9Sbouyer 		atf_tc_fail_errno("SIOCGIFINDEX");
1746e4cb2b9Sbouyer 	}
1756e4cb2b9Sbouyer 	ATF_CHECK_MSG(ifr.ifr_ifindex > 0, "%s index is %d (not > 0)",
1766e4cb2b9Sbouyer 	    ifname, ifr.ifr_ifindex);
1776e4cb2b9Sbouyer 
1786e4cb2b9Sbouyer 	sa.can_family = AF_CAN;
1796e4cb2b9Sbouyer 	sa.can_ifindex = ifr.ifr_ifindex;
1806e4cb2b9Sbouyer 
1816e4cb2b9Sbouyer 	if (rump_sys_bind(s, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
1826e4cb2b9Sbouyer 		atf_tc_fail_errno("bind");
1836e4cb2b9Sbouyer 	}
1846e4cb2b9Sbouyer 	return ifr.ifr_ifindex;
1856e4cb2b9Sbouyer }
1866e4cb2b9Sbouyer 
1876e4cb2b9Sbouyer int
can_socket_with_own(void)1886e4cb2b9Sbouyer can_socket_with_own(void)
1896e4cb2b9Sbouyer {
1906e4cb2b9Sbouyer 	int s;
1916e4cb2b9Sbouyer 	int v;
1926e4cb2b9Sbouyer 
1936e4cb2b9Sbouyer 	if ((s = rump_sys_socket(AF_CAN, SOCK_RAW, CAN_RAW)) < 0) {
1946e4cb2b9Sbouyer 		atf_tc_fail_errno("CAN socket");
1956e4cb2b9Sbouyer 	}
1966e4cb2b9Sbouyer 	v = 1;
1976e4cb2b9Sbouyer 	if (rump_sys_setsockopt(s, SOL_CAN_RAW, CAN_RAW_RECV_OWN_MSGS,
1986e4cb2b9Sbouyer 	    &v, sizeof(v)) < 0) {
1996e4cb2b9Sbouyer 		atf_tc_fail_errno("setsockopt(CAN_RAW_RECV_OWN_MSGS)");
2006e4cb2b9Sbouyer 	}
2016e4cb2b9Sbouyer 	return s;
2026e4cb2b9Sbouyer }
203