blob: 24772417caec505c69ca631aeae070b19c3cfb1e [file] [log] [blame]
Simon Xu6f224942013-12-06 11:51:16 +08001/* SCTP kernel Implementation
mridgea72abc52006-01-05 20:54:48 +00002 * (C) Copyright IBM Corp. 2002, 2003
3 * Copyright (c) 1999-2001 Motorola, Inc.
4 *
Simon Xu6f224942013-12-06 11:51:16 +08005 * The SCTP implementation is free software;
mridgea72abc52006-01-05 20:54:48 +00006 * you can redistribute it and/or modify it under the terms of
7 * the GNU General Public License as published by
8 * the Free Software Foundation; either version 2, or (at your option)
9 * any later version.
10 *
Simon Xu6f224942013-12-06 11:51:16 +080011 * The SCTP implementation is distributed in the hope that it
mridgea72abc52006-01-05 20:54:48 +000012 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
13 * ************************
14 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
15 * See the GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with GNU CC; see the file COPYING. If not, write to
19 * the Free Software Foundation, 59 Temple Place - Suite 330,
20 * Boston, MA 02111-1307, USA.
21 *
22 * Please send any bug reports or fixes you make to the
23 * email address(es):
24 * lksctp developers <lksctp-developers@lists.sourceforge.net>
25 *
26 * Or submit a bug report through the following website:
27 * http://www.sf.net/projects/lksctp
28 *
29 * Any bugs reported given to us we will try to fix... any fixes shared will
30 * be incorporated into the next SCTP release.
31 *
32 * Written or modified by:
33 * Sridhar Samudrala <sri@us.ibm.com>
34 */
35
36/* This is a kernel test to verify the one-to-many style sctp_connectx()
37 * in blocking and non-blocking modes.
38 */
39
40#include <stdio.h>
41#include <unistd.h>
42#include <stdlib.h>
43#include <string.h>
44#include <fcntl.h>
45#include <sys/types.h>
46#include <sys/socket.h>
47#include <sys/uio.h>
48#include <netinet/in.h>
49#include <errno.h>
50#include <netinet/sctp.h>
51#include <sctputil.h>
52
53char *TCID = __FILE__;
54int TST_TOTAL = 9;
55int TST_CNT = 0;
56
57#define NUMADDR 6
58#define SCTP_IP_LOOPBACK_I(I) htonl(0x7f000001 + I)
59
60#define NIPQUAD(addr) \
61 ((unsigned char *)&addr)[0], \
62 ((unsigned char *)&addr)[1], \
63 ((unsigned char *)&addr)[2], \
64 ((unsigned char *)&addr)[3]
65
Simon Xu6f224942013-12-06 11:51:16 +080066int
67main(int argc, char *argv[])
mridgea72abc52006-01-05 20:54:48 +000068{
69 int svr_sk, clt_sk1, clt_sk2, peeloff_sk;
Simon Xu6f224942013-12-06 11:51:16 +080070 sctp_assoc_t associd, svr_associd1, svr_associd2, clt_associd1, clt_associd2;
mridgea72abc52006-01-05 20:54:48 +000071 struct iovec iov;
72 struct msghdr inmessage;
73 int error, i;
74 struct sctp_assoc_change *sac;
75 char *big_buffer;
76 int flags;
77 struct sockaddr_in svr_loop[NUMADDR];
78 struct sockaddr_in svr_try[NUMADDR];
79 struct sockaddr_in clt_loop1[NUMADDR];
80 struct sockaddr_in clt_loop2[NUMADDR];
81 struct sockaddr_in clt_loop3[NUMADDR];
Simon Xu6f224942013-12-06 11:51:16 +080082 sockaddr_storage_t svr_test[NUMADDR], clt_test1[NUMADDR], clt_test2[NUMADDR];
mridgea72abc52006-01-05 20:54:48 +000083
Simon Xu6f224942013-12-06 11:51:16 +080084 /* Rather than fflush() throughout the code, set stdout to
85 * be unbuffered.
86 */
87 setvbuf(stdout, NULL, _IONBF, 0);
mridgea72abc52006-01-05 20:54:48 +000088
89 for (i = 0; i < NUMADDR; i++) {
Simon Xu6f224942013-12-06 11:51:16 +080090 /* Initialize the server and client addresses. */
mridgea72abc52006-01-05 20:54:48 +000091 svr_loop[i].sin_family = AF_INET;
92 svr_loop[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i);
93 svr_loop[i].sin_port = htons(SCTP_TESTPORT_1);
94 svr_test[i].v4.sin_family = AF_INET;
95 svr_test[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i);
96 svr_test[i].v4.sin_port = htons(SCTP_TESTPORT_1);
97 svr_try[i].sin_family = AF_INET;
Simon Xu6f224942013-12-06 11:51:16 +080098 if (i < (NUMADDR-1)) {
mridgea72abc52006-01-05 20:54:48 +000099 svr_try[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i);
100 } else {
101 /* Make last address invalid. */
Simon Xu6f224942013-12-06 11:51:16 +0800102 svr_try[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x400);
mridgea72abc52006-01-05 20:54:48 +0000103 }
104 svr_try[i].sin_port = htons(SCTP_TESTPORT_1);
105 clt_loop1[i].sin_family = AF_INET;
106 clt_loop1[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x100);
107 clt_loop1[i].sin_port = htons(SCTP_TESTPORT_2);
108 clt_test1[i].v4.sin_family = AF_INET;
109 clt_test1[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x100);
110 clt_test1[i].v4.sin_port = htons(SCTP_TESTPORT_2);
111 clt_loop2[i].sin_family = AF_INET;
112 clt_loop2[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x200);
Simon Xu6f224942013-12-06 11:51:16 +0800113 clt_loop2[i].sin_port = htons(SCTP_TESTPORT_2+1);
mridgea72abc52006-01-05 20:54:48 +0000114 clt_test2[i].v4.sin_family = AF_INET;
115 clt_test2[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x200);
Simon Xu6f224942013-12-06 11:51:16 +0800116 clt_test2[i].v4.sin_port = htons(SCTP_TESTPORT_2+1);
mridgea72abc52006-01-05 20:54:48 +0000117 clt_loop3[i].sin_family = AF_INET;
118 clt_loop3[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x300);
Simon Xu6f224942013-12-06 11:51:16 +0800119 clt_loop3[i].sin_port = htons(SCTP_TESTPORT_2+2);
mridgea72abc52006-01-05 20:54:48 +0000120 }
121
122 /* Create and bind the server socket. */
123 svr_sk = test_socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
124 test_bind(svr_sk, (struct sockaddr *)&svr_loop[0], sizeof(svr_loop[0]));
Simon Xu6f224942013-12-06 11:51:16 +0800125 test_bindx_add(svr_sk, (struct sockaddr *)&svr_loop[1], NUMADDR-1);
mridgea72abc52006-01-05 20:54:48 +0000126
127 /* Mark server socket as being able to accept new associations. */
128 test_listen(svr_sk, 1);
129
130 /* Create and bind the client sockets. */
131 clt_sk1 = test_socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
132 test_bind(clt_sk1, (struct sockaddr *)&clt_loop1[0], sizeof(clt_loop1));
Simon Xu6f224942013-12-06 11:51:16 +0800133 test_bindx_add(clt_sk1, (struct sockaddr *)&clt_loop1[1], NUMADDR-1);
mridgea72abc52006-01-05 20:54:48 +0000134 clt_sk2 = test_socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
135 test_bind(clt_sk2, (struct sockaddr *)&clt_loop2[0], sizeof(clt_loop2));
Simon Xu6f224942013-12-06 11:51:16 +0800136 test_bindx_add(clt_sk2, (struct sockaddr *)&clt_loop2[1], NUMADDR-1);
mridgea72abc52006-01-05 20:54:48 +0000137
138 /* Enable ASSOC_CHANGE and SNDRCVINFO notifications. */
139 test_enable_assoc_change(svr_sk);
140 test_enable_assoc_change(clt_sk1);
141 test_enable_assoc_change(clt_sk2);
142
143 /* Set clt_sk1 as non-blocking. */
144 flags = fcntl(clt_sk1, F_GETFL, 0);
145 if (flags < 0)
Simon Xu6f224942013-12-06 11:51:16 +0800146 tst_brkm(TBROK, tst_exit, "fcntl F_GETFL: %s", strerror(errno));
mridgea72abc52006-01-05 20:54:48 +0000147 if (fcntl(clt_sk1, F_SETFL, flags | O_NONBLOCK) < 0)
Simon Xu6f224942013-12-06 11:51:16 +0800148 tst_brkm(TBROK, tst_exit, "fcntl F_SETFL: %s", strerror(errno));
mridgea72abc52006-01-05 20:54:48 +0000149
Simon Xu6f224942013-12-06 11:51:16 +0800150 /* Do a non-blocking connectx from clt_sk1 to svr_sk */
151 error = sctp_connectx(clt_sk1, (struct sockaddr *)svr_try, NUMADDR,
152 &associd);
mridgea72abc52006-01-05 20:54:48 +0000153 /* Non-blocking connectx should return immediately with EINPROGRESS. */
154 if ((error != -1) || (EINPROGRESS != errno))
Simon Xu6f224942013-12-06 11:51:16 +0800155 tst_brkm(TBROK, tst_exit, "non-blocking connectx error: %d"
mridgea72abc52006-01-05 20:54:48 +0000156 "errno:%d", error, errno);
157
158 tst_resm(TPASS, "non-blocking connectx");
159
160 /* Doing a connectx on a socket to create an association that is
161 * is already established should return EISCONN.
162 */
Simon Xu6f224942013-12-06 11:51:16 +0800163 error = sctp_connectx(clt_sk1, (struct sockaddr *)svr_try, NUMADDR,
164 NULL);
mridgea72abc52006-01-05 20:54:48 +0000165 if ((error != -1) || (EISCONN != errno))
Simon Xu6f224942013-12-06 11:51:16 +0800166 tst_brkm(TBROK, tst_exit, "connectx on a socket to create an "
mridgea72abc52006-01-05 20:54:48 +0000167 "assoc that is already established error:%d errno:%d",
168 error, errno);
169
170 tst_resm(TPASS, "connectx on a socket to create an assoc that is "
171 "already established");
172
173 /* Initialize inmessage for all receives. */
174 memset(&inmessage, 0, sizeof(inmessage));
175 big_buffer = test_malloc(REALLY_BIG);
176 iov.iov_base = big_buffer;
177 iov.iov_len = REALLY_BIG;
178 inmessage.msg_iov = &iov;
179 inmessage.msg_iovlen = 1;
180 inmessage.msg_control = NULL;
181
182 /* Get COMM_UP on clt_sk1 */
183 error = test_recvmsg(clt_sk1, &inmessage, MSG_WAITALL);
184 test_check_msg_notification(&inmessage, error,
185 sizeof(struct sctp_assoc_change),
Simon Xu6f224942013-12-06 11:51:16 +0800186 SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
mridgea72abc52006-01-05 20:54:48 +0000187 sac = (struct sctp_assoc_change *)iov.iov_base;
188 clt_associd1 = sac->sac_assoc_id;
189
Simon Xu6f224942013-12-06 11:51:16 +0800190 if (associd) {
191 if (associd != clt_associd1)
192 tst_brkm(TBROK, tst_exit, "Association id mismatch: "
193 "connectx returned %d, notification returned:%d",
194 associd, clt_associd1);
195 tst_resm(TPASS, "Association id match between sctp_connectx()"
196 " and notification.");
197 }
198
mridgea72abc52006-01-05 20:54:48 +0000199 /* Get COMM_UP on svr_sk */
200 error = test_recvmsg(svr_sk, &inmessage, MSG_WAITALL);
201 test_check_msg_notification(&inmessage, error,
202 sizeof(struct sctp_assoc_change),
Simon Xu6f224942013-12-06 11:51:16 +0800203 SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
mridgea72abc52006-01-05 20:54:48 +0000204 sac = (struct sctp_assoc_change *)iov.iov_base;
205 svr_associd1 = sac->sac_assoc_id;
206
Simon Xu6f224942013-12-06 11:51:16 +0800207 /* Do a blocking connectx from clt_sk2 to svr_sk.
mridgea72abc52006-01-05 20:54:48 +0000208 * Blocking connectx should block until the association is established
209 * and return success.
210 */
211 test_connectx(clt_sk2, (struct sockaddr *)svr_try, NUMADDR);
212
213 /* Get COMM_UP on clt_sk2 */
214 error = test_recvmsg(clt_sk2, &inmessage, MSG_WAITALL);
215 test_check_msg_notification(&inmessage, error,
216 sizeof(struct sctp_assoc_change),
Simon Xu6f224942013-12-06 11:51:16 +0800217 SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
mridgea72abc52006-01-05 20:54:48 +0000218 sac = (struct sctp_assoc_change *)iov.iov_base;
219 clt_associd2 = sac->sac_assoc_id;
220
221 /* Get COMM_UP on svr_sk */
222 error = test_recvmsg(svr_sk, &inmessage, MSG_WAITALL);
223 test_check_msg_notification(&inmessage, error,
224 sizeof(struct sctp_assoc_change),
Simon Xu6f224942013-12-06 11:51:16 +0800225 SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
mridgea72abc52006-01-05 20:54:48 +0000226 sac = (struct sctp_assoc_change *)iov.iov_base;
227 svr_associd2 = sac->sac_assoc_id;
228
229 tst_resm(TPASS, "blocking connectx");
230
Simon Xu6f224942013-12-06 11:51:16 +0800231 peeloff_sk = test_sctp_peeloff(svr_sk, svr_associd1);
mridgea72abc52006-01-05 20:54:48 +0000232
233 /* Doing a connectx on a peeled off socket should fail. */
Simon Xu6f224942013-12-06 11:51:16 +0800234 error = sctp_connectx(peeloff_sk, (struct sockaddr *)clt_loop3, NUMADDR,
235 NULL);
mridgea72abc52006-01-05 20:54:48 +0000236 if ((error != -1) || (EISCONN != errno))
Simon Xu6f224942013-12-06 11:51:16 +0800237 tst_brkm(TBROK, tst_exit, "connectx on a peeled off socket "
mridgea72abc52006-01-05 20:54:48 +0000238 "error:%d, errno:%d", error, errno);
239
240 tst_resm(TPASS, "connectx on a peeled off socket");
241
Simon Xu6f224942013-12-06 11:51:16 +0800242 /* Trying to create an association on a socket that matches an
mridgea72abc52006-01-05 20:54:48 +0000243 * existing peeled-off association should fail.
244 */
Simon Xu6f224942013-12-06 11:51:16 +0800245 error = sctp_connectx(svr_sk, (struct sockaddr *)clt_loop1, NUMADDR,
246 NULL);
mridgea72abc52006-01-05 20:54:48 +0000247 if ((error != -1) || (EADDRNOTAVAIL != errno))
Simon Xu6f224942013-12-06 11:51:16 +0800248 tst_brkm(TBROK, tst_exit, "connectx to create an assoc that "
mridgea72abc52006-01-05 20:54:48 +0000249 "matches a peeled off assoc error:%d errno:%d",
250 error, errno);
251
252 tst_resm(TPASS, "connectx to create an assoc that matches a peeled off "
253 "assoc");
254
255 test_peer_addr(peeloff_sk, svr_associd1, clt_test1, NUMADDR);
256 tst_resm(TPASS, "server association 1 peers ok");
257 test_peer_addr(svr_sk, svr_associd2, clt_test2, NUMADDR);
258 tst_resm(TPASS, "server association 2 peers ok");
259 test_peer_addr(clt_sk1, clt_associd1, svr_test, NUMADDR);
260 tst_resm(TPASS, "client association 1 peers ok");
261 test_peer_addr(clt_sk2, clt_associd2, svr_test, NUMADDR);
262 tst_resm(TPASS, "client association 2 peers ok");
263 close(svr_sk);
264 close(clt_sk1);
265 close(clt_sk2);
266 close(peeloff_sk);
267
268 /* Indicate successful completion. */
Simon Xu6f224942013-12-06 11:51:16 +0800269 return 0;
Chris Dearmanec6edca2012-10-17 19:54:01 -0700270}