123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160 |
- // SPDX-License-Identifier: GPL-2.0
- /* nettest - used for functional tests of networking APIs
- *
- * Copyright (c) 2013-2019 David Ahern <[email protected]>. All rights reserved.
- */
- #define _GNU_SOURCE
- #include <features.h>
- #include <sys/types.h>
- #include <sys/ioctl.h>
- #include <sys/socket.h>
- #include <sys/wait.h>
- #include <linux/tcp.h>
- #include <linux/udp.h>
- #include <arpa/inet.h>
- #include <net/if.h>
- #include <netinet/in.h>
- #include <netinet/ip.h>
- #include <netdb.h>
- #include <fcntl.h>
- #include <libgen.h>
- #include <limits.h>
- #include <sched.h>
- #include <stdarg.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <unistd.h>
- #include <time.h>
- #include <errno.h>
- #include <getopt.h>
- #include <linux/xfrm.h>
- #include <linux/ipsec.h>
- #include <linux/pfkeyv2.h>
- #ifndef IPV6_UNICAST_IF
- #define IPV6_UNICAST_IF 76
- #endif
- #ifndef IPV6_MULTICAST_IF
- #define IPV6_MULTICAST_IF 17
- #endif
- #define DEFAULT_PORT 12345
- #define NS_PREFIX "/run/netns/"
- #ifndef MAX
- #define MAX(a, b) ((a) > (b) ? (a) : (b))
- #endif
- #ifndef MIN
- #define MIN(a, b) ((a) < (b) ? (a) : (b))
- #endif
- struct sock_args {
- /* local address */
- const char *local_addr_str;
- const char *client_local_addr_str;
- union {
- struct in_addr in;
- struct in6_addr in6;
- } local_addr;
- /* remote address */
- const char *remote_addr_str;
- union {
- struct in_addr in;
- struct in6_addr in6;
- } remote_addr;
- int scope_id; /* remote scope; v6 send only */
- struct in_addr grp; /* multicast group */
- unsigned int has_local_ip:1,
- has_remote_ip:1,
- has_grp:1,
- has_expected_laddr:1,
- has_expected_raddr:1,
- bind_test_only:1;
- unsigned short port;
- int type; /* DGRAM, STREAM, RAW */
- int protocol;
- int version; /* AF_INET/AF_INET6 */
- int use_setsockopt;
- int use_freebind;
- int use_cmsg;
- const char *dev;
- const char *server_dev;
- int ifindex;
- const char *clientns;
- const char *serverns;
- const char *password;
- const char *client_pw;
- /* prefix for MD5 password */
- const char *md5_prefix_str;
- union {
- struct sockaddr_in v4;
- struct sockaddr_in6 v6;
- } md5_prefix;
- unsigned int prefix_len;
- /* 0: default, -1: force off, +1: force on */
- int bind_key_ifindex;
- /* expected addresses and device index for connection */
- const char *expected_dev;
- const char *expected_server_dev;
- int expected_ifindex;
- /* local address */
- const char *expected_laddr_str;
- union {
- struct in_addr in;
- struct in6_addr in6;
- } expected_laddr;
- /* remote address */
- const char *expected_raddr_str;
- union {
- struct in_addr in;
- struct in6_addr in6;
- } expected_raddr;
- /* ESP in UDP encap test */
- int use_xfrm;
- /* use send() and connect() instead of sendto */
- int datagram_connect;
- };
- static int server_mode;
- static unsigned int prog_timeout = 5;
- static unsigned int interactive;
- static int iter = 1;
- static char *msg = "Hello world!";
- static int msglen;
- static int quiet;
- static int try_broadcast = 1;
- static char *timestamp(char *timebuf, int buflen)
- {
- time_t now;
- now = time(NULL);
- if (strftime(timebuf, buflen, "%T", localtime(&now)) == 0) {
- memset(timebuf, 0, buflen);
- strncpy(timebuf, "00:00:00", buflen-1);
- }
- return timebuf;
- }
- static void log_msg(const char *format, ...)
- {
- char timebuf[64];
- va_list args;
- if (quiet)
- return;
- fprintf(stdout, "%s %s:",
- timestamp(timebuf, sizeof(timebuf)),
- server_mode ? "server" : "client");
- va_start(args, format);
- vfprintf(stdout, format, args);
- va_end(args);
- fflush(stdout);
- }
- static void log_error(const char *format, ...)
- {
- char timebuf[64];
- va_list args;
- if (quiet)
- return;
- fprintf(stderr, "%s %s:",
- timestamp(timebuf, sizeof(timebuf)),
- server_mode ? "server" : "client");
- va_start(args, format);
- vfprintf(stderr, format, args);
- va_end(args);
- fflush(stderr);
- }
- static void log_err_errno(const char *fmt, ...)
- {
- char timebuf[64];
- va_list args;
- if (quiet)
- return;
- fprintf(stderr, "%s %s: ",
- timestamp(timebuf, sizeof(timebuf)),
- server_mode ? "server" : "client");
- va_start(args, fmt);
- vfprintf(stderr, fmt, args);
- va_end(args);
- fprintf(stderr, ": %d: %s\n", errno, strerror(errno));
- fflush(stderr);
- }
- static void log_address(const char *desc, struct sockaddr *sa)
- {
- char addrstr[64];
- if (quiet)
- return;
- if (sa->sa_family == AF_INET) {
- struct sockaddr_in *s = (struct sockaddr_in *) sa;
- log_msg("%s %s:%d\n",
- desc,
- inet_ntop(AF_INET, &s->sin_addr, addrstr,
- sizeof(addrstr)),
- ntohs(s->sin_port));
- } else if (sa->sa_family == AF_INET6) {
- struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
- log_msg("%s [%s]:%d\n",
- desc,
- inet_ntop(AF_INET6, &s6->sin6_addr, addrstr,
- sizeof(addrstr)),
- ntohs(s6->sin6_port));
- }
- fflush(stdout);
- }
- static int switch_ns(const char *ns)
- {
- char path[PATH_MAX];
- int fd, ret;
- if (geteuid())
- log_error("warning: likely need root to set netns %s!\n", ns);
- snprintf(path, sizeof(path), "%s%s", NS_PREFIX, ns);
- fd = open(path, 0);
- if (fd < 0) {
- log_err_errno("Failed to open netns path; can not switch netns");
- return 1;
- }
- ret = setns(fd, CLONE_NEWNET);
- close(fd);
- return ret;
- }
- static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args)
- {
- int keylen = strlen(args->password);
- struct tcp_md5sig md5sig = {};
- int opt = TCP_MD5SIG;
- int rc;
- md5sig.tcpm_keylen = keylen;
- memcpy(md5sig.tcpm_key, args->password, keylen);
- if (args->prefix_len) {
- opt = TCP_MD5SIG_EXT;
- md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_PREFIX;
- md5sig.tcpm_prefixlen = args->prefix_len;
- addr = &args->md5_prefix;
- }
- memcpy(&md5sig.tcpm_addr, addr, alen);
- if ((args->ifindex && args->bind_key_ifindex >= 0) || args->bind_key_ifindex >= 1) {
- opt = TCP_MD5SIG_EXT;
- md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_IFINDEX;
- md5sig.tcpm_ifindex = args->ifindex;
- log_msg("TCP_MD5SIG_FLAG_IFINDEX set tcpm_ifindex=%d\n", md5sig.tcpm_ifindex);
- } else {
- log_msg("TCP_MD5SIG_FLAG_IFINDEX off\n", md5sig.tcpm_ifindex);
- }
- rc = setsockopt(sd, IPPROTO_TCP, opt, &md5sig, sizeof(md5sig));
- if (rc < 0) {
- /* ENOENT is harmless. Returned when a password is cleared */
- if (errno == ENOENT)
- rc = 0;
- else
- log_err_errno("setsockopt(TCP_MD5SIG)");
- }
- return rc;
- }
- static int tcp_md5_remote(int sd, struct sock_args *args)
- {
- struct sockaddr_in sin = {
- .sin_family = AF_INET,
- };
- struct sockaddr_in6 sin6 = {
- .sin6_family = AF_INET6,
- };
- void *addr;
- int alen;
- switch (args->version) {
- case AF_INET:
- sin.sin_port = htons(args->port);
- sin.sin_addr = args->md5_prefix.v4.sin_addr;
- addr = &sin;
- alen = sizeof(sin);
- break;
- case AF_INET6:
- sin6.sin6_port = htons(args->port);
- sin6.sin6_addr = args->md5_prefix.v6.sin6_addr;
- addr = &sin6;
- alen = sizeof(sin6);
- break;
- default:
- log_error("unknown address family\n");
- exit(1);
- }
- if (tcp_md5sig(sd, addr, alen, args))
- return -1;
- return 0;
- }
- static int get_ifidx(const char *ifname)
- {
- struct ifreq ifdata;
- int sd, rc;
- if (!ifname || *ifname == '\0')
- return -1;
- memset(&ifdata, 0, sizeof(ifdata));
- strcpy(ifdata.ifr_name, ifname);
- sd = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
- if (sd < 0) {
- log_err_errno("socket failed");
- return -1;
- }
- rc = ioctl(sd, SIOCGIFINDEX, (char *)&ifdata);
- close(sd);
- if (rc != 0) {
- log_err_errno("ioctl(SIOCGIFINDEX) failed");
- return -1;
- }
- return ifdata.ifr_ifindex;
- }
- static int bind_to_device(int sd, const char *name)
- {
- int rc;
- rc = setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
- if (rc < 0)
- log_err_errno("setsockopt(SO_BINDTODEVICE)");
- return rc;
- }
- static int get_bind_to_device(int sd, char *name, size_t len)
- {
- int rc;
- socklen_t optlen = len;
- name[0] = '\0';
- rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
- if (rc < 0)
- log_err_errno("setsockopt(SO_BINDTODEVICE)");
- return rc;
- }
- static int check_device(int sd, struct sock_args *args)
- {
- int ifindex = 0;
- char name[32];
- if (get_bind_to_device(sd, name, sizeof(name)))
- *name = '\0';
- else
- ifindex = get_ifidx(name);
- log_msg(" bound to device %s/%d\n",
- *name ? name : "<none>", ifindex);
- if (!args->expected_ifindex)
- return 0;
- if (args->expected_ifindex != ifindex) {
- log_error("Device index mismatch: expected %d have %d\n",
- args->expected_ifindex, ifindex);
- return 1;
- }
- log_msg("Device index matches: expected %d have %d\n",
- args->expected_ifindex, ifindex);
- return 0;
- }
- static int set_pktinfo_v4(int sd)
- {
- int one = 1;
- int rc;
- rc = setsockopt(sd, SOL_IP, IP_PKTINFO, &one, sizeof(one));
- if (rc < 0 && rc != -ENOTSUP)
- log_err_errno("setsockopt(IP_PKTINFO)");
- return rc;
- }
- static int set_recvpktinfo_v6(int sd)
- {
- int one = 1;
- int rc;
- rc = setsockopt(sd, SOL_IPV6, IPV6_RECVPKTINFO, &one, sizeof(one));
- if (rc < 0 && rc != -ENOTSUP)
- log_err_errno("setsockopt(IPV6_RECVPKTINFO)");
- return rc;
- }
- static int set_recverr_v4(int sd)
- {
- int one = 1;
- int rc;
- rc = setsockopt(sd, SOL_IP, IP_RECVERR, &one, sizeof(one));
- if (rc < 0 && rc != -ENOTSUP)
- log_err_errno("setsockopt(IP_RECVERR)");
- return rc;
- }
- static int set_recverr_v6(int sd)
- {
- int one = 1;
- int rc;
- rc = setsockopt(sd, SOL_IPV6, IPV6_RECVERR, &one, sizeof(one));
- if (rc < 0 && rc != -ENOTSUP)
- log_err_errno("setsockopt(IPV6_RECVERR)");
- return rc;
- }
- static int set_unicast_if(int sd, int ifindex, int version)
- {
- int opt = IP_UNICAST_IF;
- int level = SOL_IP;
- int rc;
- ifindex = htonl(ifindex);
- if (version == AF_INET6) {
- opt = IPV6_UNICAST_IF;
- level = SOL_IPV6;
- }
- rc = setsockopt(sd, level, opt, &ifindex, sizeof(ifindex));
- if (rc < 0)
- log_err_errno("setsockopt(IP_UNICAST_IF)");
- return rc;
- }
- static int set_multicast_if(int sd, int ifindex)
- {
- struct ip_mreqn mreq = { .imr_ifindex = ifindex };
- int rc;
- rc = setsockopt(sd, SOL_IP, IP_MULTICAST_IF, &mreq, sizeof(mreq));
- if (rc < 0)
- log_err_errno("setsockopt(IP_MULTICAST_IF)");
- return rc;
- }
- static int set_membership(int sd, uint32_t grp, uint32_t addr, int ifindex)
- {
- uint32_t if_addr = addr;
- struct ip_mreqn mreq;
- int rc;
- if (addr == htonl(INADDR_ANY) && !ifindex) {
- log_error("Either local address or device needs to be given for multicast membership\n");
- return -1;
- }
- mreq.imr_multiaddr.s_addr = grp;
- mreq.imr_address.s_addr = if_addr;
- mreq.imr_ifindex = ifindex;
- rc = setsockopt(sd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq));
- if (rc < 0) {
- log_err_errno("setsockopt(IP_ADD_MEMBERSHIP)");
- return -1;
- }
- return 0;
- }
- static int set_freebind(int sd, int version)
- {
- unsigned int one = 1;
- int rc = 0;
- switch (version) {
- case AF_INET:
- if (setsockopt(sd, SOL_IP, IP_FREEBIND, &one, sizeof(one))) {
- log_err_errno("setsockopt(IP_FREEBIND)");
- rc = -1;
- }
- break;
- case AF_INET6:
- if (setsockopt(sd, SOL_IPV6, IPV6_FREEBIND, &one, sizeof(one))) {
- log_err_errno("setsockopt(IPV6_FREEBIND");
- rc = -1;
- }
- break;
- }
- return rc;
- }
- static int set_broadcast(int sd)
- {
- unsigned int one = 1;
- int rc = 0;
- if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST, &one, sizeof(one)) != 0) {
- log_err_errno("setsockopt(SO_BROADCAST)");
- rc = -1;
- }
- return rc;
- }
- static int set_reuseport(int sd)
- {
- unsigned int one = 1;
- int rc = 0;
- if (setsockopt(sd, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one)) != 0) {
- log_err_errno("setsockopt(SO_REUSEPORT)");
- rc = -1;
- }
- return rc;
- }
- static int set_reuseaddr(int sd)
- {
- unsigned int one = 1;
- int rc = 0;
- if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) != 0) {
- log_err_errno("setsockopt(SO_REUSEADDR)");
- rc = -1;
- }
- return rc;
- }
- static int str_to_uint(const char *str, int min, int max, unsigned int *value)
- {
- int number;
- char *end;
- errno = 0;
- number = (unsigned int) strtoul(str, &end, 0);
- /* entire string should be consumed by conversion
- * and value should be between min and max
- */
- if (((*end == '\0') || (*end == '\n')) && (end != str) &&
- (errno != ERANGE) && (min <= number) && (number <= max)) {
- *value = number;
- return 0;
- }
- return -1;
- }
- static int resolve_devices(struct sock_args *args)
- {
- if (args->dev) {
- args->ifindex = get_ifidx(args->dev);
- if (args->ifindex < 0) {
- log_error("Invalid device name\n");
- return 1;
- }
- }
- if (args->expected_dev) {
- unsigned int tmp;
- if (str_to_uint(args->expected_dev, 0, INT_MAX, &tmp) == 0) {
- args->expected_ifindex = (int)tmp;
- } else {
- args->expected_ifindex = get_ifidx(args->expected_dev);
- if (args->expected_ifindex < 0) {
- fprintf(stderr, "Invalid expected device\n");
- return 1;
- }
- }
- }
- return 0;
- }
- static int expected_addr_match(struct sockaddr *sa, void *expected,
- const char *desc)
- {
- char addrstr[64];
- int rc = 0;
- if (sa->sa_family == AF_INET) {
- struct sockaddr_in *s = (struct sockaddr_in *) sa;
- struct in_addr *exp_in = (struct in_addr *) expected;
- if (s->sin_addr.s_addr != exp_in->s_addr) {
- log_error("%s address does not match expected %s\n",
- desc,
- inet_ntop(AF_INET, exp_in,
- addrstr, sizeof(addrstr)));
- rc = 1;
- }
- } else if (sa->sa_family == AF_INET6) {
- struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
- struct in6_addr *exp_in = (struct in6_addr *) expected;
- if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) {
- log_error("%s address does not match expected %s\n",
- desc,
- inet_ntop(AF_INET6, exp_in,
- addrstr, sizeof(addrstr)));
- rc = 1;
- }
- } else {
- log_error("%s address does not match expected - unknown family\n",
- desc);
- rc = 1;
- }
- if (!rc)
- log_msg("%s address matches expected\n", desc);
- return rc;
- }
- static int show_sockstat(int sd, struct sock_args *args)
- {
- struct sockaddr_in6 local_addr, remote_addr;
- socklen_t alen = sizeof(local_addr);
- struct sockaddr *sa;
- const char *desc;
- int rc = 0;
- desc = server_mode ? "server local:" : "client local:";
- sa = (struct sockaddr *) &local_addr;
- if (getsockname(sd, sa, &alen) == 0) {
- log_address(desc, sa);
- if (args->has_expected_laddr) {
- rc = expected_addr_match(sa, &args->expected_laddr,
- "local");
- }
- } else {
- log_err_errno("getsockname failed");
- }
- sa = (struct sockaddr *) &remote_addr;
- desc = server_mode ? "server peer:" : "client peer:";
- if (getpeername(sd, sa, &alen) == 0) {
- log_address(desc, sa);
- if (args->has_expected_raddr) {
- rc |= expected_addr_match(sa, &args->expected_raddr,
- "remote");
- }
- } else {
- log_err_errno("getpeername failed");
- }
- return rc;
- }
- enum addr_type {
- ADDR_TYPE_LOCAL,
- ADDR_TYPE_REMOTE,
- ADDR_TYPE_MCAST,
- ADDR_TYPE_EXPECTED_LOCAL,
- ADDR_TYPE_EXPECTED_REMOTE,
- ADDR_TYPE_MD5_PREFIX,
- };
- static int convert_addr(struct sock_args *args, const char *_str,
- enum addr_type atype)
- {
- int pfx_len_max = args->version == AF_INET6 ? 128 : 32;
- int family = args->version;
- char *str, *dev, *sep;
- struct in6_addr *in6;
- struct in_addr *in;
- const char *desc;
- void *addr;
- int rc = 0;
- str = strdup(_str);
- if (!str)
- return -ENOMEM;
- switch (atype) {
- case ADDR_TYPE_LOCAL:
- desc = "local";
- addr = &args->local_addr;
- break;
- case ADDR_TYPE_REMOTE:
- desc = "remote";
- addr = &args->remote_addr;
- break;
- case ADDR_TYPE_MCAST:
- desc = "mcast grp";
- addr = &args->grp;
- break;
- case ADDR_TYPE_EXPECTED_LOCAL:
- desc = "expected local";
- addr = &args->expected_laddr;
- break;
- case ADDR_TYPE_EXPECTED_REMOTE:
- desc = "expected remote";
- addr = &args->expected_raddr;
- break;
- case ADDR_TYPE_MD5_PREFIX:
- desc = "md5 prefix";
- if (family == AF_INET) {
- args->md5_prefix.v4.sin_family = AF_INET;
- addr = &args->md5_prefix.v4.sin_addr;
- } else if (family == AF_INET6) {
- args->md5_prefix.v6.sin6_family = AF_INET6;
- addr = &args->md5_prefix.v6.sin6_addr;
- } else
- return 1;
- sep = strchr(str, '/');
- if (sep) {
- *sep = '\0';
- sep++;
- if (str_to_uint(sep, 1, pfx_len_max,
- &args->prefix_len) != 0) {
- fprintf(stderr, "Invalid port\n");
- return 1;
- }
- } else {
- args->prefix_len = 0;
- }
- break;
- default:
- log_error("unknown address type\n");
- exit(1);
- }
- switch (family) {
- case AF_INET:
- in = (struct in_addr *) addr;
- if (str) {
- if (inet_pton(AF_INET, str, in) == 0) {
- log_error("Invalid %s IP address\n", desc);
- rc = -1;
- goto out;
- }
- } else {
- in->s_addr = htonl(INADDR_ANY);
- }
- break;
- case AF_INET6:
- dev = strchr(str, '%');
- if (dev) {
- *dev = '\0';
- dev++;
- }
- in6 = (struct in6_addr *) addr;
- if (str) {
- if (inet_pton(AF_INET6, str, in6) == 0) {
- log_error("Invalid %s IPv6 address\n", desc);
- rc = -1;
- goto out;
- }
- } else {
- *in6 = in6addr_any;
- }
- if (dev) {
- args->scope_id = get_ifidx(dev);
- if (args->scope_id < 0) {
- log_error("Invalid scope on %s IPv6 address\n",
- desc);
- rc = -1;
- goto out;
- }
- }
- break;
- default:
- log_error("Invalid address family\n");
- }
- out:
- free(str);
- return rc;
- }
- static int validate_addresses(struct sock_args *args)
- {
- if (args->local_addr_str &&
- convert_addr(args, args->local_addr_str, ADDR_TYPE_LOCAL) < 0)
- return 1;
- if (args->remote_addr_str &&
- convert_addr(args, args->remote_addr_str, ADDR_TYPE_REMOTE) < 0)
- return 1;
- if (args->md5_prefix_str &&
- convert_addr(args, args->md5_prefix_str,
- ADDR_TYPE_MD5_PREFIX) < 0)
- return 1;
- if (args->expected_laddr_str &&
- convert_addr(args, args->expected_laddr_str,
- ADDR_TYPE_EXPECTED_LOCAL))
- return 1;
- if (args->expected_raddr_str &&
- convert_addr(args, args->expected_raddr_str,
- ADDR_TYPE_EXPECTED_REMOTE))
- return 1;
- return 0;
- }
- static int get_index_from_cmsg(struct msghdr *m)
- {
- struct cmsghdr *cm;
- int ifindex = 0;
- char buf[64];
- for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(m);
- m->msg_controllen != 0 && cm;
- cm = (struct cmsghdr *)CMSG_NXTHDR(m, cm)) {
- if (cm->cmsg_level == SOL_IP &&
- cm->cmsg_type == IP_PKTINFO) {
- struct in_pktinfo *pi;
- pi = (struct in_pktinfo *)(CMSG_DATA(cm));
- inet_ntop(AF_INET, &pi->ipi_addr, buf, sizeof(buf));
- ifindex = pi->ipi_ifindex;
- } else if (cm->cmsg_level == SOL_IPV6 &&
- cm->cmsg_type == IPV6_PKTINFO) {
- struct in6_pktinfo *pi6;
- pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
- inet_ntop(AF_INET6, &pi6->ipi6_addr, buf, sizeof(buf));
- ifindex = pi6->ipi6_ifindex;
- }
- }
- if (ifindex) {
- log_msg(" pktinfo: ifindex %d dest addr %s\n",
- ifindex, buf);
- }
- return ifindex;
- }
- static int send_msg_no_cmsg(int sd, void *addr, socklen_t alen)
- {
- int err;
- again:
- err = sendto(sd, msg, msglen, 0, addr, alen);
- if (err < 0) {
- if (errno == EACCES && try_broadcast) {
- try_broadcast = 0;
- if (!set_broadcast(sd))
- goto again;
- errno = EACCES;
- }
- log_err_errno("sendto failed");
- return 1;
- }
- return 0;
- }
- static int send_msg_cmsg(int sd, void *addr, socklen_t alen,
- int ifindex, int version)
- {
- unsigned char cmsgbuf[64];
- struct iovec iov[2];
- struct cmsghdr *cm;
- struct msghdr m;
- int err;
- iov[0].iov_base = msg;
- iov[0].iov_len = msglen;
- m.msg_iov = iov;
- m.msg_iovlen = 1;
- m.msg_name = (caddr_t)addr;
- m.msg_namelen = alen;
- memset(cmsgbuf, 0, sizeof(cmsgbuf));
- cm = (struct cmsghdr *)cmsgbuf;
- m.msg_control = (caddr_t)cm;
- if (version == AF_INET) {
- struct in_pktinfo *pi;
- cm->cmsg_level = SOL_IP;
- cm->cmsg_type = IP_PKTINFO;
- cm->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
- pi = (struct in_pktinfo *)(CMSG_DATA(cm));
- pi->ipi_ifindex = ifindex;
- m.msg_controllen = cm->cmsg_len;
- } else if (version == AF_INET6) {
- struct in6_pktinfo *pi6;
- cm->cmsg_level = SOL_IPV6;
- cm->cmsg_type = IPV6_PKTINFO;
- cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
- pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
- pi6->ipi6_ifindex = ifindex;
- m.msg_controllen = cm->cmsg_len;
- }
- again:
- err = sendmsg(sd, &m, 0);
- if (err < 0) {
- if (errno == EACCES && try_broadcast) {
- try_broadcast = 0;
- if (!set_broadcast(sd))
- goto again;
- errno = EACCES;
- }
- log_err_errno("sendmsg failed");
- return 1;
- }
- return 0;
- }
- static int send_msg(int sd, void *addr, socklen_t alen, struct sock_args *args)
- {
- if (args->type == SOCK_STREAM) {
- if (write(sd, msg, msglen) < 0) {
- log_err_errno("write failed sending msg to peer");
- return 1;
- }
- } else if (args->datagram_connect) {
- if (send(sd, msg, msglen, 0) < 0) {
- log_err_errno("send failed sending msg to peer");
- return 1;
- }
- } else if (args->ifindex && args->use_cmsg) {
- if (send_msg_cmsg(sd, addr, alen, args->ifindex, args->version))
- return 1;
- } else {
- if (send_msg_no_cmsg(sd, addr, alen))
- return 1;
- }
- log_msg("Sent message:\n");
- log_msg(" %.24s%s\n", msg, msglen > 24 ? " ..." : "");
- return 0;
- }
- static int socket_read_dgram(int sd, struct sock_args *args)
- {
- unsigned char addr[sizeof(struct sockaddr_in6)];
- struct sockaddr *sa = (struct sockaddr *) addr;
- socklen_t alen = sizeof(addr);
- struct iovec iov[2];
- struct msghdr m = {
- .msg_name = (caddr_t)addr,
- .msg_namelen = alen,
- .msg_iov = iov,
- .msg_iovlen = 1,
- };
- unsigned char cmsgbuf[256];
- struct cmsghdr *cm = (struct cmsghdr *)cmsgbuf;
- char buf[16*1024];
- int ifindex;
- int len;
- iov[0].iov_base = (caddr_t)buf;
- iov[0].iov_len = sizeof(buf);
- memset(cmsgbuf, 0, sizeof(cmsgbuf));
- m.msg_control = (caddr_t)cm;
- m.msg_controllen = sizeof(cmsgbuf);
- len = recvmsg(sd, &m, 0);
- if (len == 0) {
- log_msg("peer closed connection.\n");
- return 0;
- } else if (len < 0) {
- log_msg("failed to read message: %d: %s\n",
- errno, strerror(errno));
- return -1;
- }
- buf[len] = '\0';
- log_address("Message from:", sa);
- log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
- ifindex = get_index_from_cmsg(&m);
- if (args->expected_ifindex) {
- if (args->expected_ifindex != ifindex) {
- log_error("Device index mismatch: expected %d have %d\n",
- args->expected_ifindex, ifindex);
- return -1;
- }
- log_msg("Device index matches: expected %d have %d\n",
- args->expected_ifindex, ifindex);
- }
- if (!interactive && server_mode) {
- if (sa->sa_family == AF_INET6) {
- struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
- struct in6_addr *in6 = &s6->sin6_addr;
- if (IN6_IS_ADDR_V4MAPPED(in6)) {
- const uint32_t *pa = (uint32_t *) &in6->s6_addr;
- struct in_addr in4;
- struct sockaddr_in *sin;
- sin = (struct sockaddr_in *) addr;
- pa += 3;
- in4.s_addr = *pa;
- sin->sin_addr = in4;
- sin->sin_family = AF_INET;
- if (send_msg_cmsg(sd, addr, alen,
- ifindex, AF_INET) < 0)
- goto out_err;
- }
- }
- again:
- iov[0].iov_len = len;
- if (args->version == AF_INET6) {
- struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
- if (args->dev) {
- /* avoid PKTINFO conflicts with bindtodev */
- if (sendto(sd, buf, len, 0,
- (void *) addr, alen) < 0)
- goto out_err;
- } else {
- /* kernel is allowing scope_id to be set to VRF
- * index for LLA. for sends to global address
- * reset scope id
- */
- s6->sin6_scope_id = ifindex;
- if (sendmsg(sd, &m, 0) < 0)
- goto out_err;
- }
- } else {
- int err;
- err = sendmsg(sd, &m, 0);
- if (err < 0) {
- if (errno == EACCES && try_broadcast) {
- try_broadcast = 0;
- if (!set_broadcast(sd))
- goto again;
- errno = EACCES;
- }
- goto out_err;
- }
- }
- log_msg("Sent message:\n");
- log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
- }
- return 1;
- out_err:
- log_err_errno("failed to send msg to peer");
- return -1;
- }
- static int socket_read_stream(int sd)
- {
- char buf[1024];
- int len;
- len = read(sd, buf, sizeof(buf)-1);
- if (len == 0) {
- log_msg("client closed connection.\n");
- return 0;
- } else if (len < 0) {
- log_msg("failed to read message\n");
- return -1;
- }
- buf[len] = '\0';
- log_msg("Incoming message:\n");
- log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
- if (!interactive && server_mode) {
- if (write(sd, buf, len) < 0) {
- log_err_errno("failed to send buf");
- return -1;
- }
- log_msg("Sent message:\n");
- log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
- }
- return 1;
- }
- static int socket_read(int sd, struct sock_args *args)
- {
- if (args->type == SOCK_STREAM)
- return socket_read_stream(sd);
- return socket_read_dgram(sd, args);
- }
- static int stdin_to_socket(int sd, int type, void *addr, socklen_t alen)
- {
- char buf[1024];
- int len;
- if (fgets(buf, sizeof(buf), stdin) == NULL)
- return 0;
- len = strlen(buf);
- if (type == SOCK_STREAM) {
- if (write(sd, buf, len) < 0) {
- log_err_errno("failed to send buf");
- return -1;
- }
- } else {
- int err;
- again:
- err = sendto(sd, buf, len, 0, addr, alen);
- if (err < 0) {
- if (errno == EACCES && try_broadcast) {
- try_broadcast = 0;
- if (!set_broadcast(sd))
- goto again;
- errno = EACCES;
- }
- log_err_errno("failed to send msg to peer");
- return -1;
- }
- }
- log_msg("Sent message:\n");
- log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
- return 1;
- }
- static void set_recv_attr(int sd, int version)
- {
- if (version == AF_INET6) {
- set_recvpktinfo_v6(sd);
- set_recverr_v6(sd);
- } else {
- set_pktinfo_v4(sd);
- set_recverr_v4(sd);
- }
- }
- static int msg_loop(int client, int sd, void *addr, socklen_t alen,
- struct sock_args *args)
- {
- struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
- fd_set rfds;
- int nfds;
- int rc;
- if (args->type != SOCK_STREAM)
- set_recv_attr(sd, args->version);
- if (msg) {
- msglen = strlen(msg);
- /* client sends first message */
- if (client) {
- if (send_msg(sd, addr, alen, args))
- return 1;
- }
- if (!interactive) {
- ptval = &timeout;
- if (!prog_timeout)
- timeout.tv_sec = 5;
- }
- }
- nfds = interactive ? MAX(fileno(stdin), sd) + 1 : sd + 1;
- while (1) {
- FD_ZERO(&rfds);
- FD_SET(sd, &rfds);
- if (interactive)
- FD_SET(fileno(stdin), &rfds);
- rc = select(nfds, &rfds, NULL, NULL, ptval);
- if (rc < 0) {
- if (errno == EINTR)
- continue;
- rc = 1;
- log_err_errno("select failed");
- break;
- } else if (rc == 0) {
- log_error("Timed out waiting for response\n");
- rc = 2;
- break;
- }
- if (FD_ISSET(sd, &rfds)) {
- rc = socket_read(sd, args);
- if (rc < 0) {
- rc = 1;
- break;
- }
- if (rc == 0)
- break;
- }
- rc = 0;
- if (FD_ISSET(fileno(stdin), &rfds)) {
- if (stdin_to_socket(sd, args->type, addr, alen) <= 0)
- break;
- }
- if (interactive)
- continue;
- if (iter != -1) {
- --iter;
- if (iter == 0)
- break;
- }
- log_msg("Going into quiet mode\n");
- quiet = 1;
- if (client) {
- if (send_msg(sd, addr, alen, args)) {
- rc = 1;
- break;
- }
- }
- }
- return rc;
- }
- static int msock_init(struct sock_args *args, int server)
- {
- uint32_t if_addr = htonl(INADDR_ANY);
- struct sockaddr_in laddr = {
- .sin_family = AF_INET,
- .sin_port = htons(args->port),
- };
- int one = 1;
- int sd;
- if (!server && args->has_local_ip)
- if_addr = args->local_addr.in.s_addr;
- sd = socket(PF_INET, SOCK_DGRAM, 0);
- if (sd < 0) {
- log_err_errno("socket");
- return -1;
- }
- if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR,
- (char *)&one, sizeof(one)) < 0) {
- log_err_errno("Setting SO_REUSEADDR error");
- goto out_err;
- }
- if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST,
- (char *)&one, sizeof(one)) < 0)
- log_err_errno("Setting SO_BROADCAST error");
- if (args->dev && bind_to_device(sd, args->dev) != 0)
- goto out_err;
- else if (args->use_setsockopt &&
- set_multicast_if(sd, args->ifindex))
- goto out_err;
- laddr.sin_addr.s_addr = if_addr;
- if (bind(sd, (struct sockaddr *) &laddr, sizeof(laddr)) < 0) {
- log_err_errno("bind failed");
- goto out_err;
- }
- if (server &&
- set_membership(sd, args->grp.s_addr,
- args->local_addr.in.s_addr, args->ifindex))
- goto out_err;
- return sd;
- out_err:
- close(sd);
- return -1;
- }
- static int msock_server(struct sock_args *args)
- {
- return msock_init(args, 1);
- }
- static int msock_client(struct sock_args *args)
- {
- return msock_init(args, 0);
- }
- static int bind_socket(int sd, struct sock_args *args)
- {
- struct sockaddr_in serv_addr = {
- .sin_family = AF_INET,
- };
- struct sockaddr_in6 serv6_addr = {
- .sin6_family = AF_INET6,
- };
- void *addr;
- socklen_t alen;
- if (!args->has_local_ip && args->type == SOCK_RAW)
- return 0;
- switch (args->version) {
- case AF_INET:
- serv_addr.sin_port = htons(args->port);
- serv_addr.sin_addr = args->local_addr.in;
- addr = &serv_addr;
- alen = sizeof(serv_addr);
- break;
- case AF_INET6:
- serv6_addr.sin6_port = htons(args->port);
- serv6_addr.sin6_addr = args->local_addr.in6;
- addr = &serv6_addr;
- alen = sizeof(serv6_addr);
- break;
- default:
- log_error("Invalid address family\n");
- return -1;
- }
- if (bind(sd, addr, alen) < 0) {
- log_err_errno("error binding socket");
- return -1;
- }
- return 0;
- }
- static int config_xfrm_policy(int sd, struct sock_args *args)
- {
- struct xfrm_userpolicy_info policy = {};
- int type = UDP_ENCAP_ESPINUDP;
- int xfrm_af = IP_XFRM_POLICY;
- int level = SOL_IP;
- if (args->type != SOCK_DGRAM) {
- log_error("Invalid socket type. Only DGRAM could be used for XFRM\n");
- return 1;
- }
- policy.action = XFRM_POLICY_ALLOW;
- policy.sel.family = args->version;
- if (args->version == AF_INET6) {
- xfrm_af = IPV6_XFRM_POLICY;
- level = SOL_IPV6;
- }
- policy.dir = XFRM_POLICY_OUT;
- if (setsockopt(sd, level, xfrm_af, &policy, sizeof(policy)) < 0)
- return 1;
- policy.dir = XFRM_POLICY_IN;
- if (setsockopt(sd, level, xfrm_af, &policy, sizeof(policy)) < 0)
- return 1;
- if (setsockopt(sd, IPPROTO_UDP, UDP_ENCAP, &type, sizeof(type)) < 0) {
- log_err_errno("Failed to set xfrm encap");
- return 1;
- }
- return 0;
- }
- static int lsock_init(struct sock_args *args)
- {
- long flags;
- int sd;
- sd = socket(args->version, args->type, args->protocol);
- if (sd < 0) {
- log_err_errno("Error opening socket");
- return -1;
- }
- if (set_reuseaddr(sd) != 0)
- goto err;
- if (set_reuseport(sd) != 0)
- goto err;
- if (args->dev && bind_to_device(sd, args->dev) != 0)
- goto err;
- else if (args->use_setsockopt &&
- set_unicast_if(sd, args->ifindex, args->version))
- goto err;
- if (args->use_freebind && set_freebind(sd, args->version))
- goto err;
- if (bind_socket(sd, args))
- goto err;
- if (args->bind_test_only)
- goto out;
- if (args->type == SOCK_STREAM && listen(sd, 1) < 0) {
- log_err_errno("listen failed");
- goto err;
- }
- flags = fcntl(sd, F_GETFL);
- if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
- log_err_errno("Failed to set non-blocking option");
- goto err;
- }
- if (fcntl(sd, F_SETFD, FD_CLOEXEC) < 0)
- log_err_errno("Failed to set close-on-exec flag");
- if (args->use_xfrm && config_xfrm_policy(sd, args)) {
- log_err_errno("Failed to set xfrm policy");
- goto err;
- }
- out:
- return sd;
- err:
- close(sd);
- return -1;
- }
- static void ipc_write(int fd, int message)
- {
- /* Not in both_mode, so there's no process to signal */
- if (fd < 0)
- return;
- if (write(fd, &message, sizeof(message)) < 0)
- log_err_errno("Failed to send client status");
- }
- static int do_server(struct sock_args *args, int ipc_fd)
- {
- /* ipc_fd = -1 if no parent process to signal */
- struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
- unsigned char addr[sizeof(struct sockaddr_in6)] = {};
- socklen_t alen = sizeof(addr);
- int lsd, csd = -1;
- fd_set rfds;
- int rc;
- if (args->serverns) {
- if (switch_ns(args->serverns)) {
- log_error("Could not set server netns to %s\n",
- args->serverns);
- goto err_exit;
- }
- log_msg("Switched server netns\n");
- }
- args->dev = args->server_dev;
- args->expected_dev = args->expected_server_dev;
- if (resolve_devices(args) || validate_addresses(args))
- goto err_exit;
- if (prog_timeout)
- ptval = &timeout;
- if (args->has_grp)
- lsd = msock_server(args);
- else
- lsd = lsock_init(args);
- if (lsd < 0)
- goto err_exit;
- if (args->bind_test_only) {
- close(lsd);
- ipc_write(ipc_fd, 1);
- return 0;
- }
- if (args->type != SOCK_STREAM) {
- ipc_write(ipc_fd, 1);
- rc = msg_loop(0, lsd, (void *) addr, alen, args);
- close(lsd);
- return rc;
- }
- if (args->password && tcp_md5_remote(lsd, args)) {
- close(lsd);
- goto err_exit;
- }
- ipc_write(ipc_fd, 1);
- while (1) {
- log_msg("waiting for client connection.\n");
- FD_ZERO(&rfds);
- FD_SET(lsd, &rfds);
- rc = select(lsd+1, &rfds, NULL, NULL, ptval);
- if (rc == 0) {
- rc = 2;
- break;
- }
- if (rc < 0) {
- if (errno == EINTR)
- continue;
- log_err_errno("select failed");
- break;
- }
- if (FD_ISSET(lsd, &rfds)) {
- csd = accept(lsd, (void *) addr, &alen);
- if (csd < 0) {
- log_err_errno("accept failed");
- break;
- }
- rc = show_sockstat(csd, args);
- if (rc)
- break;
- rc = check_device(csd, args);
- if (rc)
- break;
- }
- rc = msg_loop(0, csd, (void *) addr, alen, args);
- close(csd);
- if (!interactive)
- break;
- }
- close(lsd);
- return rc;
- err_exit:
- ipc_write(ipc_fd, 0);
- return 1;
- }
- static int wait_for_connect(int sd)
- {
- struct timeval _tv = { .tv_sec = prog_timeout }, *tv = NULL;
- fd_set wfd;
- int val = 0, sz = sizeof(val);
- int rc;
- FD_ZERO(&wfd);
- FD_SET(sd, &wfd);
- if (prog_timeout)
- tv = &_tv;
- rc = select(FD_SETSIZE, NULL, &wfd, NULL, tv);
- if (rc == 0) {
- log_error("connect timed out\n");
- return -2;
- } else if (rc < 0) {
- log_err_errno("select failed");
- return -3;
- }
- if (getsockopt(sd, SOL_SOCKET, SO_ERROR, &val, (socklen_t *)&sz) < 0) {
- log_err_errno("getsockopt(SO_ERROR) failed");
- return -4;
- }
- if (val != 0) {
- log_error("connect failed: %d: %s\n", val, strerror(val));
- return -1;
- }
- return 0;
- }
- static int connectsock(void *addr, socklen_t alen, struct sock_args *args)
- {
- int sd, rc = -1;
- long flags;
- sd = socket(args->version, args->type, args->protocol);
- if (sd < 0) {
- log_err_errno("Failed to create socket");
- return -1;
- }
- flags = fcntl(sd, F_GETFL);
- if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
- log_err_errno("Failed to set non-blocking option");
- goto err;
- }
- if (set_reuseport(sd) != 0)
- goto err;
- if (args->dev && bind_to_device(sd, args->dev) != 0)
- goto err;
- else if (args->use_setsockopt &&
- set_unicast_if(sd, args->ifindex, args->version))
- goto err;
- if (args->has_local_ip && bind_socket(sd, args))
- goto err;
- if (args->type != SOCK_STREAM && !args->datagram_connect)
- goto out;
- if (args->password && tcp_md5sig(sd, addr, alen, args))
- goto err;
- if (args->bind_test_only)
- goto out;
- if (connect(sd, addr, alen) < 0) {
- if (errno != EINPROGRESS) {
- log_err_errno("Failed to connect to remote host");
- rc = -1;
- goto err;
- }
- rc = wait_for_connect(sd);
- if (rc < 0)
- goto err;
- }
- out:
- return sd;
- err:
- close(sd);
- return rc;
- }
- static int do_client(struct sock_args *args)
- {
- struct sockaddr_in sin = {
- .sin_family = AF_INET,
- };
- struct sockaddr_in6 sin6 = {
- .sin6_family = AF_INET6,
- };
- void *addr;
- int alen;
- int rc = 0;
- int sd;
- if (!args->has_remote_ip && !args->has_grp) {
- fprintf(stderr, "remote IP or multicast group not given\n");
- return 1;
- }
- if (args->clientns) {
- if (switch_ns(args->clientns)) {
- log_error("Could not set client netns to %s\n",
- args->clientns);
- return 1;
- }
- log_msg("Switched client netns\n");
- }
- args->local_addr_str = args->client_local_addr_str;
- if (resolve_devices(args) || validate_addresses(args))
- return 1;
- if ((args->use_setsockopt || args->use_cmsg) && !args->ifindex) {
- fprintf(stderr, "Device binding not specified\n");
- return 1;
- }
- if (args->use_setsockopt || args->use_cmsg)
- args->dev = NULL;
- switch (args->version) {
- case AF_INET:
- sin.sin_port = htons(args->port);
- if (args->has_grp)
- sin.sin_addr = args->grp;
- else
- sin.sin_addr = args->remote_addr.in;
- addr = &sin;
- alen = sizeof(sin);
- break;
- case AF_INET6:
- sin6.sin6_port = htons(args->port);
- sin6.sin6_addr = args->remote_addr.in6;
- sin6.sin6_scope_id = args->scope_id;
- addr = &sin6;
- alen = sizeof(sin6);
- break;
- }
- args->password = args->client_pw;
- if (args->has_grp)
- sd = msock_client(args);
- else
- sd = connectsock(addr, alen, args);
- if (sd < 0)
- return -sd;
- if (args->bind_test_only)
- goto out;
- if (args->type == SOCK_STREAM) {
- rc = show_sockstat(sd, args);
- if (rc != 0)
- goto out;
- }
- rc = msg_loop(1, sd, addr, alen, args);
- out:
- close(sd);
- return rc;
- }
- static char *random_msg(int len)
- {
- int i, n = 0, olen = len + 1;
- char *m;
- if (len <= 0)
- return NULL;
- m = malloc(olen);
- if (!m)
- return NULL;
- while (len > 26) {
- i = snprintf(m + n, olen - n, "%.26s",
- "abcdefghijklmnopqrstuvwxyz");
- n += i;
- len -= i;
- }
- i = snprintf(m + n, olen - n, "%.*s", len,
- "abcdefghijklmnopqrstuvwxyz");
- return m;
- }
- static int ipc_child(int fd, struct sock_args *args)
- {
- char *outbuf, *errbuf;
- int rc = 1;
- outbuf = malloc(4096);
- errbuf = malloc(4096);
- if (!outbuf || !errbuf) {
- fprintf(stderr, "server: Failed to allocate buffers for stdout and stderr\n");
- goto out;
- }
- setbuffer(stdout, outbuf, 4096);
- setbuffer(stderr, errbuf, 4096);
- server_mode = 1; /* to tell log_msg in case we are in both_mode */
- /* when running in both mode, address validation applies
- * solely to client side
- */
- args->has_expected_laddr = 0;
- args->has_expected_raddr = 0;
- rc = do_server(args, fd);
- out:
- free(outbuf);
- free(errbuf);
- return rc;
- }
- static int ipc_parent(int cpid, int fd, struct sock_args *args)
- {
- int client_status;
- int status;
- int buf;
- /* do the client-side function here in the parent process,
- * waiting to be told when to continue
- */
- if (read(fd, &buf, sizeof(buf)) <= 0) {
- log_err_errno("Failed to read IPC status from status");
- return 1;
- }
- if (!buf) {
- log_error("Server failed; can not continue\n");
- return 1;
- }
- log_msg("Server is ready\n");
- client_status = do_client(args);
- log_msg("parent is done!\n");
- if (kill(cpid, 0) == 0)
- kill(cpid, SIGKILL);
- wait(&status);
- return client_status;
- }
- #define GETOPT_STR "sr:l:c:p:t:g:P:DRn:M:X:m:d:I:BN:O:SUCi6xL:0:1:2:3:Fbqf"
- #define OPT_FORCE_BIND_KEY_IFINDEX 1001
- #define OPT_NO_BIND_KEY_IFINDEX 1002
- static struct option long_opts[] = {
- {"force-bind-key-ifindex", 0, 0, OPT_FORCE_BIND_KEY_IFINDEX},
- {"no-bind-key-ifindex", 0, 0, OPT_NO_BIND_KEY_IFINDEX},
- {0, 0, 0, 0}
- };
- static void print_usage(char *prog)
- {
- printf(
- "usage: %s OPTS\n"
- "Required:\n"
- " -r addr remote address to connect to (client mode only)\n"
- " -p port port to connect to (client mode)/listen on (server mode)\n"
- " (default: %d)\n"
- " -s server mode (default: client mode)\n"
- " -t timeout seconds (default: none)\n"
- "\n"
- "Optional:\n"
- " -B do both client and server via fork and IPC\n"
- " -N ns set client to network namespace ns (requires root)\n"
- " -O ns set server to network namespace ns (requires root)\n"
- " -F Restart server loop\n"
- " -6 IPv6 (default is IPv4)\n"
- " -P proto protocol for socket: icmp, ospf (default: none)\n"
- " -D|R datagram (D) / raw (R) socket (default stream)\n"
- " -l addr local address to bind to in server mode\n"
- " -c addr local address to bind to in client mode\n"
- " -x configure XFRM policy on socket\n"
- "\n"
- " -d dev bind socket to given device name\n"
- " -I dev bind socket to given device name - server mode\n"
- " -S use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n"
- " to set device binding\n"
- " -U Use connect() and send() for datagram sockets\n"
- " -f bind socket with the IP[V6]_FREEBIND option\n"
- " -C use cmsg and IP_PKTINFO to specify device binding\n"
- "\n"
- " -L len send random message of given length\n"
- " -n num number of times to send message\n"
- "\n"
- " -M password use MD5 sum protection\n"
- " -X password MD5 password for client mode\n"
- " -m prefix/len prefix and length to use for MD5 key\n"
- " --no-bind-key-ifindex: Force TCP_MD5SIG_FLAG_IFINDEX off\n"
- " --force-bind-key-ifindex: Force TCP_MD5SIG_FLAG_IFINDEX on\n"
- " (default: only if -I is passed)\n"
- "\n"
- " -g grp multicast group (e.g., 239.1.1.1)\n"
- " -i interactive mode (default is echo and terminate)\n"
- "\n"
- " -0 addr Expected local address\n"
- " -1 addr Expected remote address\n"
- " -2 dev Expected device name (or index) to receive packet\n"
- " -3 dev Expected device name (or index) to receive packets - server mode\n"
- "\n"
- " -b Bind test only.\n"
- " -q Be quiet. Run test without printing anything.\n"
- , prog, DEFAULT_PORT);
- }
- int main(int argc, char *argv[])
- {
- struct sock_args args = {
- .version = AF_INET,
- .type = SOCK_STREAM,
- .port = DEFAULT_PORT,
- };
- struct protoent *pe;
- int both_mode = 0;
- unsigned int tmp;
- int forever = 0;
- int fd[2];
- int cpid;
- /* process inputs */
- extern char *optarg;
- int rc = 0;
- /*
- * process input args
- */
- while ((rc = getopt_long(argc, argv, GETOPT_STR, long_opts, NULL)) != -1) {
- switch (rc) {
- case 'B':
- both_mode = 1;
- break;
- case 's':
- server_mode = 1;
- break;
- case 'F':
- forever = 1;
- break;
- case 'l':
- args.has_local_ip = 1;
- args.local_addr_str = optarg;
- break;
- case 'r':
- args.has_remote_ip = 1;
- args.remote_addr_str = optarg;
- break;
- case 'c':
- args.has_local_ip = 1;
- args.client_local_addr_str = optarg;
- break;
- case 'p':
- if (str_to_uint(optarg, 1, 65535, &tmp) != 0) {
- fprintf(stderr, "Invalid port\n");
- return 1;
- }
- args.port = (unsigned short) tmp;
- break;
- case 't':
- if (str_to_uint(optarg, 0, INT_MAX,
- &prog_timeout) != 0) {
- fprintf(stderr, "Invalid timeout\n");
- return 1;
- }
- break;
- case 'D':
- args.type = SOCK_DGRAM;
- break;
- case 'R':
- args.type = SOCK_RAW;
- args.port = 0;
- if (!args.protocol)
- args.protocol = IPPROTO_RAW;
- break;
- case 'P':
- pe = getprotobyname(optarg);
- if (pe) {
- args.protocol = pe->p_proto;
- } else {
- if (str_to_uint(optarg, 0, 0xffff, &tmp) != 0) {
- fprintf(stderr, "Invalid protocol\n");
- return 1;
- }
- args.protocol = tmp;
- }
- break;
- case 'n':
- iter = atoi(optarg);
- break;
- case 'N':
- args.clientns = optarg;
- break;
- case 'O':
- args.serverns = optarg;
- break;
- case 'L':
- msg = random_msg(atoi(optarg));
- break;
- case 'M':
- args.password = optarg;
- break;
- case OPT_FORCE_BIND_KEY_IFINDEX:
- args.bind_key_ifindex = 1;
- break;
- case OPT_NO_BIND_KEY_IFINDEX:
- args.bind_key_ifindex = -1;
- break;
- case 'X':
- args.client_pw = optarg;
- break;
- case 'm':
- args.md5_prefix_str = optarg;
- break;
- case 'S':
- args.use_setsockopt = 1;
- break;
- case 'f':
- args.use_freebind = 1;
- break;
- case 'C':
- args.use_cmsg = 1;
- break;
- case 'd':
- args.dev = optarg;
- break;
- case 'I':
- args.server_dev = optarg;
- break;
- case 'i':
- interactive = 1;
- break;
- case 'g':
- args.has_grp = 1;
- if (convert_addr(&args, optarg, ADDR_TYPE_MCAST) < 0)
- return 1;
- args.type = SOCK_DGRAM;
- break;
- case '6':
- args.version = AF_INET6;
- break;
- case 'b':
- args.bind_test_only = 1;
- break;
- case '0':
- args.has_expected_laddr = 1;
- args.expected_laddr_str = optarg;
- break;
- case '1':
- args.has_expected_raddr = 1;
- args.expected_raddr_str = optarg;
- break;
- case '2':
- args.expected_dev = optarg;
- break;
- case '3':
- args.expected_server_dev = optarg;
- break;
- case 'q':
- quiet = 1;
- break;
- case 'x':
- args.use_xfrm = 1;
- break;
- case 'U':
- args.datagram_connect = 1;
- break;
- default:
- print_usage(argv[0]);
- return 1;
- }
- }
- if (args.password &&
- ((!args.has_remote_ip && !args.md5_prefix_str) ||
- args.type != SOCK_STREAM)) {
- log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n");
- return 1;
- }
- if (args.md5_prefix_str && !args.password) {
- log_error("Prefix range for MD5 protection specified without a password\n");
- return 1;
- }
- if (iter == 0) {
- fprintf(stderr, "Invalid number of messages to send\n");
- return 1;
- }
- if (args.type == SOCK_STREAM && !args.protocol)
- args.protocol = IPPROTO_TCP;
- if (args.type == SOCK_DGRAM && !args.protocol)
- args.protocol = IPPROTO_UDP;
- if ((args.type == SOCK_STREAM || args.type == SOCK_DGRAM) &&
- args.port == 0) {
- fprintf(stderr, "Invalid port number\n");
- return 1;
- }
- if ((both_mode || !server_mode) && !args.has_grp &&
- !args.has_remote_ip && !args.has_local_ip) {
- fprintf(stderr,
- "Local (server mode) or remote IP (client IP) required\n");
- return 1;
- }
- if (interactive) {
- prog_timeout = 0;
- msg = NULL;
- }
- if (both_mode) {
- if (pipe(fd) < 0) {
- perror("pipe");
- exit(1);
- }
- cpid = fork();
- if (cpid < 0) {
- perror("fork");
- exit(1);
- }
- if (cpid)
- return ipc_parent(cpid, fd[0], &args);
- return ipc_child(fd[1], &args);
- }
- if (server_mode) {
- do {
- rc = do_server(&args, -1);
- } while (forever);
- return rc;
- }
- return do_client(&args);
- }
|