• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* SCTP kernel Implementation
2  * (C) Copyright IBM Corp. 2002, 2003
3  * Copyright (c) 1999-2001 Motorola, Inc.
4  *
5  * The SCTP implementation is free software;
6  * you can redistribute it and/or modify it under the terms of
7  * the GNU General Public License as published by
8  * the Free Software Foundation; either version 2, or (at your option)
9  * any later version.
10  *
11  * The SCTP implementation is distributed in the hope that it
12  * will be useful, but WITHOUT ANY WARRANTY; without even the implied
13  *                 ************************
14  * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
15  * See the GNU General Public License for more details.
16  *
17  * You should have received a copy of the GNU General Public License
18  * along with GNU CC; see the file COPYING.  If not, write to
19  * the Free Software Foundation, 59 Temple Place - Suite 330,
20  * Boston, MA 02111-1307, USA.
21  *
22  * Please send any bug reports or fixes you make to the
23  * email address(es):
24  *    lksctp developers <lksctp-developers@lists.sourceforge.net>
25  *
26  * Or submit a bug report through the following website:
27  *    http://www.sf.net/projects/lksctp
28  *
29  * Any bugs reported given to us we will try to fix... any fixes shared will
30  * be incorporated into the next SCTP release.
31  *
32  * Written or modified by:
33  *    Sridhar Samudrala		<sri@us.ibm.com>
34  */
35 
36 /* This is a kernel test to verify the one-to-many style sctp_connectx()
37  * in blocking and non-blocking modes.
38  */
39 
40 #include <stdio.h>
41 #include <unistd.h>
42 #include <stdlib.h>
43 #include <string.h>
44 #include <fcntl.h>
45 #include <sys/types.h>
46 #include <sys/socket.h>
47 #include <sys/uio.h>
48 #include <netinet/in.h>
49 #include <errno.h>
50 #include <netinet/sctp.h>
51 #include <sctputil.h>
52 #include "tst_kernel.h"
53 
54 char *TCID = __FILE__;
55 int TST_TOTAL = 9;
56 int TST_CNT = 0;
57 
58 #define NUMADDR 6
59 #define SCTP_IP_LOOPBACK_I(I)  htonl(0x7f000001 + I)
60 
61 #define NIPQUAD(addr) \
62 	((unsigned char *)&addr)[0], \
63 	((unsigned char *)&addr)[1], \
64 	((unsigned char *)&addr)[2], \
65 	((unsigned char *)&addr)[3]
66 
67 int
main(void)68 main(void)
69 {
70 	int svr_sk, clt_sk1, clt_sk2, peeloff_sk;
71 	sctp_assoc_t associd, svr_associd1, svr_associd2, clt_associd1, clt_associd2;
72 	struct iovec iov;
73 	struct msghdr inmessage;
74 	int error, i;
75 	struct sctp_assoc_change *sac;
76 	char *big_buffer;
77 	int flags;
78 	struct sockaddr_in svr_loop[NUMADDR];
79 	struct sockaddr_in svr_try[NUMADDR];
80 	struct sockaddr_in clt_loop1[NUMADDR];
81 	struct sockaddr_in clt_loop2[NUMADDR];
82 	struct sockaddr_in clt_loop3[NUMADDR];
83 	sockaddr_storage_t svr_test[NUMADDR], clt_test1[NUMADDR], clt_test2[NUMADDR];
84 
85 	if (tst_check_driver("sctp"))
86 		tst_brkm(TCONF, tst_exit, "sctp driver not available");
87 
88 	/* Rather than fflush() throughout the code, set stdout to
89 	 * be unbuffered.
90 	 */
91 	setvbuf(stdout, NULL, _IONBF, 0);
92 
93 	for (i = 0; i < NUMADDR; i++) {
94 		/* Initialize the server and client addresses. */
95 		svr_loop[i].sin_family = AF_INET;
96 		svr_loop[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i);
97 		svr_loop[i].sin_port = htons(SCTP_TESTPORT_1);
98 		svr_test[i].v4.sin_family = AF_INET;
99 		svr_test[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i);
100 		svr_test[i].v4.sin_port = htons(SCTP_TESTPORT_1);
101 		svr_try[i].sin_family = AF_INET;
102 		if (i < (NUMADDR-1)) {
103 			svr_try[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i);
104 		} else {
105 			/* Make last address invalid. */
106 			svr_try[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x400);
107 		}
108 		svr_try[i].sin_port = htons(SCTP_TESTPORT_1);
109 		clt_loop1[i].sin_family = AF_INET;
110 		clt_loop1[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x100);
111 		clt_loop1[i].sin_port = htons(SCTP_TESTPORT_2);
112 		clt_test1[i].v4.sin_family = AF_INET;
113 		clt_test1[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x100);
114 		clt_test1[i].v4.sin_port = htons(SCTP_TESTPORT_2);
115 		clt_loop2[i].sin_family = AF_INET;
116 		clt_loop2[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x200);
117 		clt_loop2[i].sin_port = htons(SCTP_TESTPORT_2+1);
118 		clt_test2[i].v4.sin_family = AF_INET;
119 		clt_test2[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x200);
120 		clt_test2[i].v4.sin_port = htons(SCTP_TESTPORT_2+1);
121 		clt_loop3[i].sin_family = AF_INET;
122 		clt_loop3[i].sin_addr.s_addr = SCTP_IP_LOOPBACK_I(i + 0x300);
123 		clt_loop3[i].sin_port = htons(SCTP_TESTPORT_2+2);
124 	}
125 
126 	/* Create and bind the server socket.  */
127 	svr_sk = test_socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
128 	test_bind(svr_sk, (struct sockaddr *)&svr_loop[0], sizeof(svr_loop[0]));
129 	test_bindx_add(svr_sk, (struct sockaddr *)&svr_loop[1], NUMADDR-1);
130 
131 	/* Mark server socket as being able to accept new associations.  */
132 	test_listen(svr_sk, 1);
133 
134 	/* Create and bind the client sockets.  */
135 	clt_sk1 = test_socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
136 	test_bind(clt_sk1, (struct sockaddr *)&clt_loop1[0], sizeof(clt_loop1));
137 	test_bindx_add(clt_sk1, (struct sockaddr *)&clt_loop1[1], NUMADDR-1);
138 	clt_sk2 = test_socket(AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP);
139 	test_bind(clt_sk2, (struct sockaddr *)&clt_loop2[0], sizeof(clt_loop2));
140 	test_bindx_add(clt_sk2, (struct sockaddr *)&clt_loop2[1], NUMADDR-1);
141 
142 	/* Enable ASSOC_CHANGE and SNDRCVINFO notifications. */
143 	test_enable_assoc_change(svr_sk);
144 	test_enable_assoc_change(clt_sk1);
145 	test_enable_assoc_change(clt_sk2);
146 
147 	/* Set clt_sk1 as non-blocking. */
148 	flags = fcntl(clt_sk1, F_GETFL, 0);
149 	if (flags < 0)
150 		tst_brkm(TBROK, tst_exit, "fcntl F_GETFL: %s", strerror(errno));
151 	if (fcntl(clt_sk1, F_SETFL, flags | O_NONBLOCK) < 0)
152 		tst_brkm(TBROK, tst_exit, "fcntl F_SETFL: %s", strerror(errno));
153 
154 	/* Do a non-blocking connectx from clt_sk1 to svr_sk */
155 	error = sctp_connectx(clt_sk1, (struct sockaddr *)svr_try, NUMADDR,
156 			      &associd);
157 	/* Non-blocking connectx should return immediately with EINPROGRESS. */
158 	if ((error != -1) || (EINPROGRESS != errno))
159 		tst_brkm(TBROK, tst_exit, "non-blocking connectx error: %d "
160 			 "errno:%d", error, errno);
161 
162 	tst_resm(TPASS, "non-blocking connectx");
163 
164 	/* Doing a connectx on a socket to create an association that is
165 	 * is already established should return EISCONN.
166 	 */
167 	error = sctp_connectx(clt_sk1, (struct sockaddr *)svr_try, NUMADDR,
168 			      NULL);
169 	if ((error != -1) || (EISCONN != errno))
170 		tst_brkm(TBROK, tst_exit, "connectx on a socket to create an "
171 			 "assoc that is already established error:%d errno:%d",
172 			 error, errno);
173 
174 	tst_resm(TPASS, "connectx on a socket to create an assoc that is "
175 		 "already established");
176 
177 	/* Initialize inmessage for all receives. */
178 	memset(&inmessage, 0, sizeof(inmessage));
179 	big_buffer = test_malloc(REALLY_BIG);
180 	iov.iov_base = big_buffer;
181 	iov.iov_len = REALLY_BIG;
182 	inmessage.msg_iov = &iov;
183 	inmessage.msg_iovlen = 1;
184 	inmessage.msg_control = NULL;
185 
186 	/* Get COMM_UP on clt_sk1 */
187 	error = test_recvmsg(clt_sk1, &inmessage, MSG_WAITALL);
188 	test_check_msg_notification(&inmessage, error,
189 				    sizeof(struct sctp_assoc_change),
190 				    SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
191 	sac = (struct sctp_assoc_change *)iov.iov_base;
192 	clt_associd1 = sac->sac_assoc_id;
193 
194 	if (associd) {
195 		if (associd != clt_associd1)
196 			tst_brkm(TBROK, tst_exit, "Association id mismatch: "
197 			 "connectx returned %d, notification returned:%d",
198 			 associd, clt_associd1);
199 		tst_resm(TPASS, "Association id match between sctp_connectx()"
200 				" and notification.");
201 	}
202 
203 	/* Get COMM_UP on svr_sk */
204 	error = test_recvmsg(svr_sk, &inmessage, MSG_WAITALL);
205 	test_check_msg_notification(&inmessage, error,
206 				    sizeof(struct sctp_assoc_change),
207 				    SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
208 	sac = (struct sctp_assoc_change *)iov.iov_base;
209 	svr_associd1 = sac->sac_assoc_id;
210 
211 	/* Do a blocking connectx from clt_sk2 to svr_sk.
212 	 * Blocking connectx should block until the association is established
213 	 * and return success.
214 	 */
215 	test_connectx(clt_sk2, (struct sockaddr *)svr_try, NUMADDR);
216 
217 	/* Get COMM_UP on clt_sk2 */
218 	error = test_recvmsg(clt_sk2, &inmessage, MSG_WAITALL);
219 	test_check_msg_notification(&inmessage, error,
220 				    sizeof(struct sctp_assoc_change),
221 				    SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
222 	sac = (struct sctp_assoc_change *)iov.iov_base;
223 	clt_associd2 = sac->sac_assoc_id;
224 
225 	/* Get COMM_UP on svr_sk */
226 	error = test_recvmsg(svr_sk, &inmessage, MSG_WAITALL);
227 	test_check_msg_notification(&inmessage, error,
228 				    sizeof(struct sctp_assoc_change),
229 				    SCTP_ASSOC_CHANGE, SCTP_COMM_UP);
230 	sac = (struct sctp_assoc_change *)iov.iov_base;
231 	svr_associd2 = sac->sac_assoc_id;
232 
233 	tst_resm(TPASS, "blocking connectx");
234 
235 	peeloff_sk = test_sctp_peeloff(svr_sk, svr_associd1);
236 
237 	/* Doing a connectx on a peeled off socket should fail. */
238 	error = sctp_connectx(peeloff_sk, (struct sockaddr *)clt_loop3, NUMADDR,
239 			      NULL);
240 	if ((error != -1) || (EISCONN != errno))
241 		tst_brkm(TBROK, tst_exit, "connectx on a peeled off socket "
242 			 "error:%d, errno:%d", error, errno);
243 
244 	tst_resm(TPASS, "connectx on a peeled off socket");
245 
246 	/* Trying to create an association on a socket that matches an
247 	 * existing peeled-off association should fail.
248 	 */
249 	error = sctp_connectx(svr_sk, (struct sockaddr *)clt_loop1, NUMADDR,
250 			      NULL);
251 	if ((error != -1) || (EADDRNOTAVAIL != errno))
252 		tst_brkm(TBROK, tst_exit, "connectx to create an assoc that "
253 			 "matches a peeled off assoc error:%d errno:%d",
254 			 error, errno);
255 
256 	tst_resm(TPASS, "connectx to create an assoc that matches a peeled off "
257 		 "assoc");
258 
259 	test_peer_addr(peeloff_sk, svr_associd1, clt_test1, NUMADDR);
260 	tst_resm(TPASS, "server association 1 peers ok");
261 	test_peer_addr(svr_sk, svr_associd2, clt_test2, NUMADDR);
262 	tst_resm(TPASS, "server association 2 peers ok");
263 	test_peer_addr(clt_sk1, clt_associd1, svr_test, NUMADDR);
264 	tst_resm(TPASS, "client association 1 peers ok");
265 	test_peer_addr(clt_sk2, clt_associd2, svr_test, NUMADDR);
266 	tst_resm(TPASS, "client association 2 peers ok");
267 	close(svr_sk);
268 	close(clt_sk1);
269 	close(clt_sk2);
270 	close(peeloff_sk);
271 
272 	/* Indicate successful completion.  */
273 	return 0;
274 }
275