Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
David Ahern | 9112 | 91.00% | 16 | 69.57% |
Guillaume Nault | 386 | 3.85% | 2 | 8.70% |
Vadim Fedorenko | 221 | 2.21% | 1 | 4.35% |
Riccardo Paolo Bestetti | 134 | 1.34% | 1 | 4.35% |
Leonard Crestez | 118 | 1.18% | 1 | 4.35% |
Richard Gobert | 41 | 0.41% | 1 | 4.35% |
Colin Ian King | 1 | 0.01% | 1 | 4.35% |
Total | 10013 | 23 |
// SPDX-License-Identifier: GPL-2.0 /* nettest - used for functional tests of networking APIs * * Copyright (c) 2013-2019 David Ahern <dsahern@gmail.com>. All rights reserved. */ #define _GNU_SOURCE #include <features.h> #include <sys/types.h> #include <sys/ioctl.h> #include <sys/socket.h> #include <sys/wait.h> #include <linux/tcp.h> #include <linux/udp.h> #include <arpa/inet.h> #include <net/if.h> #include <netinet/in.h> #include <netinet/ip.h> #include <netdb.h> #include <fcntl.h> #include <libgen.h> #include <limits.h> #include <sched.h> #include <stdarg.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <time.h> #include <errno.h> #include <getopt.h> #include <linux/xfrm.h> #include <linux/ipsec.h> #include <linux/pfkeyv2.h> #ifndef IPV6_UNICAST_IF #define IPV6_UNICAST_IF 76 #endif #ifndef IPV6_MULTICAST_IF #define IPV6_MULTICAST_IF 17 #endif #define DEFAULT_PORT 12345 #define NS_PREFIX "/run/netns/" #ifndef MAX #define MAX(a, b) ((a) > (b) ? (a) : (b)) #endif #ifndef MIN #define MIN(a, b) ((a) < (b) ? (a) : (b)) #endif struct sock_args { /* local address */ const char *local_addr_str; const char *client_local_addr_str; union { struct in_addr in; struct in6_addr in6; } local_addr; /* remote address */ const char *remote_addr_str; union { struct in_addr in; struct in6_addr in6; } remote_addr; int scope_id; /* remote scope; v6 send only */ struct in_addr grp; /* multicast group */ unsigned int has_local_ip:1, has_remote_ip:1, has_grp:1, has_expected_laddr:1, has_expected_raddr:1, bind_test_only:1, client_dontroute:1, server_dontroute:1; unsigned short port; int type; /* DGRAM, STREAM, RAW */ int protocol; int version; /* AF_INET/AF_INET6 */ int use_setsockopt; int use_freebind; int use_cmsg; uint8_t dsfield; const char *dev; const char *server_dev; int ifindex; const char *clientns; const char *serverns; const char *password; const char *client_pw; /* prefix for MD5 password */ const char *md5_prefix_str; union { struct sockaddr_in v4; struct sockaddr_in6 v6; } md5_prefix; unsigned int prefix_len; /* 0: default, -1: force off, +1: force on */ int bind_key_ifindex; /* expected addresses and device index for connection */ const char *expected_dev; const char *expected_server_dev; int expected_ifindex; /* local address */ const char *expected_laddr_str; union { struct in_addr in; struct in6_addr in6; } expected_laddr; /* remote address */ const char *expected_raddr_str; union { struct in_addr in; struct in6_addr in6; } expected_raddr; /* ESP in UDP encap test */ int use_xfrm; /* use send() and connect() instead of sendto */ int datagram_connect; }; static int server_mode; static unsigned int prog_timeout = 5; static unsigned int interactive; static int iter = 1; static char *msg = "Hello world!"; static int msglen; static int quiet; static int try_broadcast = 1; static char *timestamp(char *timebuf, int buflen) { time_t now; now = time(NULL); if (strftime(timebuf, buflen, "%T", localtime(&now)) == 0) { memset(timebuf, 0, buflen); strncpy(timebuf, "00:00:00", buflen-1); } return timebuf; } static void log_msg(const char *format, ...) { char timebuf[64]; va_list args; if (quiet) return; fprintf(stdout, "%s %s:", timestamp(timebuf, sizeof(timebuf)), server_mode ? "server" : "client"); va_start(args, format); vfprintf(stdout, format, args); va_end(args); fflush(stdout); } static void log_error(const char *format, ...) { char timebuf[64]; va_list args; if (quiet) return; fprintf(stderr, "%s %s:", timestamp(timebuf, sizeof(timebuf)), server_mode ? "server" : "client"); va_start(args, format); vfprintf(stderr, format, args); va_end(args); fflush(stderr); } static void log_err_errno(const char *fmt, ...) { char timebuf[64]; va_list args; if (quiet) return; fprintf(stderr, "%s %s: ", timestamp(timebuf, sizeof(timebuf)), server_mode ? "server" : "client"); va_start(args, fmt); vfprintf(stderr, fmt, args); va_end(args); fprintf(stderr, ": %d: %s\n", errno, strerror(errno)); fflush(stderr); } static void log_address(const char *desc, struct sockaddr *sa) { char addrstr[64]; if (quiet) return; if (sa->sa_family == AF_INET) { struct sockaddr_in *s = (struct sockaddr_in *) sa; log_msg("%s %s:%d\n", desc, inet_ntop(AF_INET, &s->sin_addr, addrstr, sizeof(addrstr)), ntohs(s->sin_port)); } else if (sa->sa_family == AF_INET6) { struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa; log_msg("%s [%s]:%d\n", desc, inet_ntop(AF_INET6, &s6->sin6_addr, addrstr, sizeof(addrstr)), ntohs(s6->sin6_port)); } fflush(stdout); } static int switch_ns(const char *ns) { char path[PATH_MAX]; int fd, ret; if (geteuid()) log_error("warning: likely need root to set netns %s!\n", ns); snprintf(path, sizeof(path), "%s%s", NS_PREFIX, ns); fd = open(path, 0); if (fd < 0) { log_err_errno("Failed to open netns path; can not switch netns"); return 1; } ret = setns(fd, CLONE_NEWNET); close(fd); return ret; } static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args) { int keylen = strlen(args->password); struct tcp_md5sig md5sig = {}; int opt = TCP_MD5SIG; int rc; md5sig.tcpm_keylen = keylen; memcpy(md5sig.tcpm_key, args->password, keylen); if (args->prefix_len) { opt = TCP_MD5SIG_EXT; md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_PREFIX; md5sig.tcpm_prefixlen = args->prefix_len; addr = &args->md5_prefix; } memcpy(&md5sig.tcpm_addr, addr, alen); if ((args->ifindex && args->bind_key_ifindex >= 0) || args->bind_key_ifindex >= 1) { opt = TCP_MD5SIG_EXT; md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_IFINDEX; md5sig.tcpm_ifindex = args->ifindex; log_msg("TCP_MD5SIG_FLAG_IFINDEX set tcpm_ifindex=%d\n", md5sig.tcpm_ifindex); } else { log_msg("TCP_MD5SIG_FLAG_IFINDEX off\n", md5sig.tcpm_ifindex); } rc = setsockopt(sd, IPPROTO_TCP, opt, &md5sig, sizeof(md5sig)); if (rc < 0) { /* ENOENT is harmless. Returned when a password is cleared */ if (errno == ENOENT) rc = 0; else log_err_errno("setsockopt(TCP_MD5SIG)"); } return rc; } static int tcp_md5_remote(int sd, struct sock_args *args) { struct sockaddr_in sin = { .sin_family = AF_INET, }; struct sockaddr_in6 sin6 = { .sin6_family = AF_INET6, }; void *addr; int alen; switch (args->version) { case AF_INET: sin.sin_port = htons(args->port); sin.sin_addr = args->md5_prefix.v4.sin_addr; addr = &sin; alen = sizeof(sin); break; case AF_INET6: sin6.sin6_port = htons(args->port); sin6.sin6_addr = args->md5_prefix.v6.sin6_addr; addr = &sin6; alen = sizeof(sin6); break; default: log_error("unknown address family\n"); exit(1); } if (tcp_md5sig(sd, addr, alen, args)) return -1; return 0; } static int get_ifidx(const char *ifname) { struct ifreq ifdata; int sd, rc; if (!ifname || *ifname == '\0') return -1; memset(&ifdata, 0, sizeof(ifdata)); strcpy(ifdata.ifr_name, ifname); sd = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP); if (sd < 0) { log_err_errno("socket failed"); return -1; } rc = ioctl(sd, SIOCGIFINDEX, (char *)&ifdata); close(sd); if (rc != 0) { log_err_errno("ioctl(SIOCGIFINDEX) failed"); return -1; } return ifdata.ifr_ifindex; } static int bind_to_device(int sd, const char *name) { int rc; rc = setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1); if (rc < 0) log_err_errno("setsockopt(SO_BINDTODEVICE)"); return rc; } static int get_bind_to_device(int sd, char *name, size_t len) { int rc; socklen_t optlen = len; name[0] = '\0'; rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen); if (rc < 0) log_err_errno("setsockopt(SO_BINDTODEVICE)"); return rc; } static int check_device(int sd, struct sock_args *args) { int ifindex = 0; char name[32]; if (get_bind_to_device(sd, name, sizeof(name))) *name = '\0'; else ifindex = get_ifidx(name); log_msg(" bound to device %s/%d\n", *name ? name : "<none>", ifindex); if (!args->expected_ifindex) return 0; if (args->expected_ifindex != ifindex) { log_error("Device index mismatch: expected %d have %d\n", args->expected_ifindex, ifindex); return 1; } log_msg("Device index matches: expected %d have %d\n", args->expected_ifindex, ifindex); return 0; } static int set_pktinfo_v4(int sd) { int one = 1; int rc; rc = setsockopt(sd, SOL_IP, IP_PKTINFO, &one, sizeof(one)); if (rc < 0 && rc != -ENOTSUP) log_err_errno("setsockopt(IP_PKTINFO)"); return rc; } static int set_recvpktinfo_v6(int sd) { int one = 1; int rc; rc = setsockopt(sd, SOL_IPV6, IPV6_RECVPKTINFO, &one, sizeof(one)); if (rc < 0 && rc != -ENOTSUP) log_err_errno("setsockopt(IPV6_RECVPKTINFO)"); return rc; } static int set_recverr_v4(int sd) { int one = 1; int rc; rc = setsockopt(sd, SOL_IP, IP_RECVERR, &one, sizeof(one)); if (rc < 0 && rc != -ENOTSUP) log_err_errno("setsockopt(IP_RECVERR)"); return rc; } static int set_recverr_v6(int sd) { int one = 1; int rc; rc = setsockopt(sd, SOL_IPV6, IPV6_RECVERR, &one, sizeof(one)); if (rc < 0 && rc != -ENOTSUP) log_err_errno("setsockopt(IPV6_RECVERR)"); return rc; } static int set_unicast_if(int sd, int ifindex, int version) { int opt = IP_UNICAST_IF; int level = SOL_IP; int rc; ifindex = htonl(ifindex); if (version == AF_INET6) { opt = IPV6_UNICAST_IF; level = SOL_IPV6; } rc = setsockopt(sd, level, opt, &ifindex, sizeof(ifindex)); if (rc < 0) log_err_errno("setsockopt(IP_UNICAST_IF)"); return rc; } static int set_multicast_if(int sd, int ifindex) { struct ip_mreqn mreq = { .imr_ifindex = ifindex }; int rc; rc = setsockopt(sd, SOL_IP, IP_MULTICAST_IF, &mreq, sizeof(mreq)); if (rc < 0) log_err_errno("setsockopt(IP_MULTICAST_IF)"); return rc; } static int set_membership(int sd, uint32_t grp, uint32_t addr, int ifindex) { uint32_t if_addr = addr; struct ip_mreqn mreq; int rc; if (addr == htonl(INADDR_ANY) && !ifindex) { log_error("Either local address or device needs to be given for multicast membership\n"); return -1; } mreq.imr_multiaddr.s_addr = grp; mreq.imr_address.s_addr = if_addr; mreq.imr_ifindex = ifindex; rc = setsockopt(sd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq)); if (rc < 0) { log_err_errno("setsockopt(IP_ADD_MEMBERSHIP)"); return -1; } return 0; } static int set_freebind(int sd, int version) { unsigned int one = 1; int rc = 0; switch (version) { case AF_INET: if (setsockopt(sd, SOL_IP, IP_FREEBIND, &one, sizeof(one))) { log_err_errno("setsockopt(IP_FREEBIND)"); rc = -1; } break; case AF_INET6: if (setsockopt(sd, SOL_IPV6, IPV6_FREEBIND, &one, sizeof(one))) { log_err_errno("setsockopt(IPV6_FREEBIND"); rc = -1; } break; } return rc; } static int set_broadcast(int sd) { unsigned int one = 1; int rc = 0; if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST, &one, sizeof(one)) != 0) { log_err_errno("setsockopt(SO_BROADCAST)"); rc = -1; } return rc; } static int set_reuseport(int sd) { unsigned int one = 1; int rc = 0; if (setsockopt(sd, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one)) != 0) { log_err_errno("setsockopt(SO_REUSEPORT)"); rc = -1; } return rc; } static int set_reuseaddr(int sd) { unsigned int one = 1; int rc = 0; if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) != 0) { log_err_errno("setsockopt(SO_REUSEADDR)"); rc = -1; } return rc; } static int set_dsfield(int sd, int version, int dsfield) { if (!dsfield) return 0; switch (version) { case AF_INET: if (setsockopt(sd, SOL_IP, IP_TOS, &dsfield, sizeof(dsfield)) < 0) { log_err_errno("setsockopt(IP_TOS)"); return -1; } break; case AF_INET6: if (setsockopt(sd, SOL_IPV6, IPV6_TCLASS, &dsfield, sizeof(dsfield)) < 0) { log_err_errno("setsockopt(IPV6_TCLASS)"); return -1; } break; default: log_error("Invalid address family\n"); return -1; } return 0; } static int set_dontroute(int sd) { unsigned int one = 1; if (setsockopt(sd, SOL_SOCKET, SO_DONTROUTE, &one, sizeof(one)) < 0) { log_err_errno("setsockopt(SO_DONTROUTE)"); return -1; } return 0; } static int str_to_uint(const char *str, int min, int max, unsigned int *value) { int number; char *end; errno = 0; number = (unsigned int) strtoul(str, &end, 0); /* entire string should be consumed by conversion * and value should be between min and max */ if (((*end == '\0') || (*end == '\n')) && (end != str) && (errno != ERANGE) && (min <= number) && (number <= max)) { *value = number; return 0; } return -1; } static int resolve_devices(struct sock_args *args) { if (args->dev) { args->ifindex = get_ifidx(args->dev); if (args->ifindex < 0) { log_error("Invalid device name\n"); return 1; } } if (args->expected_dev) { unsigned int tmp; if (str_to_uint(args->expected_dev, 0, INT_MAX, &tmp) == 0) { args->expected_ifindex = (int)tmp; } else { args->expected_ifindex = get_ifidx(args->expected_dev); if (args->expected_ifindex < 0) { fprintf(stderr, "Invalid expected device\n"); return 1; } } } return 0; } static int expected_addr_match(struct sockaddr *sa, void *expected, const char *desc) { char addrstr[64]; int rc = 0; if (sa->sa_family == AF_INET) { struct sockaddr_in *s = (struct sockaddr_in *) sa; struct in_addr *exp_in = (struct in_addr *) expected; if (s->sin_addr.s_addr != exp_in->s_addr) { log_error("%s address does not match expected %s\n", desc, inet_ntop(AF_INET, exp_in, addrstr, sizeof(addrstr))); rc = 1; } } else if (sa->sa_family == AF_INET6) { struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa; struct in6_addr *exp_in = (struct in6_addr *) expected; if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) { log_error("%s address does not match expected %s\n", desc, inet_ntop(AF_INET6, exp_in, addrstr, sizeof(addrstr))); rc = 1; } } else { log_error("%s address does not match expected - unknown family\n", desc); rc = 1; } if (!rc) log_msg("%s address matches expected\n", desc); return rc; } static int show_sockstat(int sd, struct sock_args *args) { struct sockaddr_in6 local_addr, remote_addr; socklen_t alen = sizeof(local_addr); struct sockaddr *sa; const char *desc; int rc = 0; desc = server_mode ? "server local:" : "client local:"; sa = (struct sockaddr *) &local_addr; if (getsockname(sd, sa, &alen) == 0) { log_address(desc, sa); if (args->has_expected_laddr) { rc = expected_addr_match(sa, &args->expected_laddr, "local"); } } else { log_err_errno("getsockname failed"); } sa = (struct sockaddr *) &remote_addr; desc = server_mode ? "server peer:" : "client peer:"; if (getpeername(sd, sa, &alen) == 0) { log_address(desc, sa); if (args->has_expected_raddr) { rc |= expected_addr_match(sa, &args->expected_raddr, "remote"); } } else { log_err_errno("getpeername failed"); } return rc; } enum addr_type { ADDR_TYPE_LOCAL, ADDR_TYPE_REMOTE, ADDR_TYPE_MCAST, ADDR_TYPE_EXPECTED_LOCAL, ADDR_TYPE_EXPECTED_REMOTE, ADDR_TYPE_MD5_PREFIX, }; static int convert_addr(struct sock_args *args, const char *_str, enum addr_type atype) { int pfx_len_max = args->version == AF_INET6 ? 128 : 32; int family = args->version; char *str, *dev, *sep; struct in6_addr *in6; struct in_addr *in; const char *desc; void *addr; int rc = 0; str = strdup(_str); if (!str) return -ENOMEM; switch (atype) { case ADDR_TYPE_LOCAL: desc = "local"; addr = &args->local_addr; break; case ADDR_TYPE_REMOTE: desc = "remote"; addr = &args->remote_addr; break; case ADDR_TYPE_MCAST: desc = "mcast grp"; addr = &args->grp; break; case ADDR_TYPE_EXPECTED_LOCAL: desc = "expected local"; addr = &args->expected_laddr; break; case ADDR_TYPE_EXPECTED_REMOTE: desc = "expected remote"; addr = &args->expected_raddr; break; case ADDR_TYPE_MD5_PREFIX: desc = "md5 prefix"; if (family == AF_INET) { args->md5_prefix.v4.sin_family = AF_INET; addr = &args->md5_prefix.v4.sin_addr; } else if (family == AF_INET6) { args->md5_prefix.v6.sin6_family = AF_INET6; addr = &args->md5_prefix.v6.sin6_addr; } else return 1; sep = strchr(str, '/'); if (sep) { *sep = '\0'; sep++; if (str_to_uint(sep, 1, pfx_len_max, &args->prefix_len) != 0) { fprintf(stderr, "Invalid port\n"); return 1; } } else { args->prefix_len = 0; } break; default: log_error("unknown address type\n"); exit(1); } switch (family) { case AF_INET: in = (struct in_addr *) addr; if (str) { if (inet_pton(AF_INET, str, in) == 0) { log_error("Invalid %s IP address\n", desc); rc = -1; goto out; } } else { in->s_addr = htonl(INADDR_ANY); } break; case AF_INET6: dev = strchr(str, '%'); if (dev) { *dev = '\0'; dev++; } in6 = (struct in6_addr *) addr; if (str) { if (inet_pton(AF_INET6, str, in6) == 0) { log_error("Invalid %s IPv6 address\n", desc); rc = -1; goto out; } } else { *in6 = in6addr_any; } if (dev) { args->scope_id = get_ifidx(dev); if (args->scope_id < 0) { log_error("Invalid scope on %s IPv6 address\n", desc); rc = -1; goto out; } } break; default: log_error("Invalid address family\n"); } out: free(str); return rc; } static int validate_addresses(struct sock_args *args) { if (args->local_addr_str && convert_addr(args, args->local_addr_str, ADDR_TYPE_LOCAL) < 0) return 1; if (args->remote_addr_str && convert_addr(args, args->remote_addr_str, ADDR_TYPE_REMOTE) < 0) return 1; if (args->md5_prefix_str && convert_addr(args, args->md5_prefix_str, ADDR_TYPE_MD5_PREFIX) < 0) return 1; if (args->expected_laddr_str && convert_addr(args, args->expected_laddr_str, ADDR_TYPE_EXPECTED_LOCAL)) return 1; if (args->expected_raddr_str && convert_addr(args, args->expected_raddr_str, ADDR_TYPE_EXPECTED_REMOTE)) return 1; return 0; } static int get_index_from_cmsg(struct msghdr *m) { struct cmsghdr *cm; int ifindex = 0; char buf[64]; for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(m); m->msg_controllen != 0 && cm; cm = (struct cmsghdr *)CMSG_NXTHDR(m, cm)) { if (cm->cmsg_level == SOL_IP && cm->cmsg_type == IP_PKTINFO) { struct in_pktinfo *pi; pi = (struct in_pktinfo *)(CMSG_DATA(cm)); inet_ntop(AF_INET, &pi->ipi_addr, buf, sizeof(buf)); ifindex = pi->ipi_ifindex; } else if (cm->cmsg_level == SOL_IPV6 && cm->cmsg_type == IPV6_PKTINFO) { struct in6_pktinfo *pi6; pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm)); inet_ntop(AF_INET6, &pi6->ipi6_addr, buf, sizeof(buf)); ifindex = pi6->ipi6_ifindex; } } if (ifindex) { log_msg(" pktinfo: ifindex %d dest addr %s\n", ifindex, buf); } return ifindex; } static int send_msg_no_cmsg(int sd, void *addr, socklen_t alen) { int err; again: err = sendto(sd, msg, msglen, 0, addr, alen); if (err < 0) { if (errno == EACCES && try_broadcast) { try_broadcast = 0; if (!set_broadcast(sd)) goto again; errno = EACCES; } log_err_errno("sendto failed"); return 1; } return 0; } static int send_msg_cmsg(int sd, void *addr, socklen_t alen, int ifindex, int version) { unsigned char cmsgbuf[64]; struct iovec iov[2]; struct cmsghdr *cm; struct msghdr m; int err; iov[0].iov_base = msg; iov[0].iov_len = msglen; m.msg_iov = iov; m.msg_iovlen = 1; m.msg_name = (caddr_t)addr; m.msg_namelen = alen; memset(cmsgbuf, 0, sizeof(cmsgbuf)); cm = (struct cmsghdr *)cmsgbuf; m.msg_control = (caddr_t)cm; if (version == AF_INET) { struct in_pktinfo *pi; cm->cmsg_level = SOL_IP; cm->cmsg_type = IP_PKTINFO; cm->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo)); pi = (struct in_pktinfo *)(CMSG_DATA(cm)); pi->ipi_ifindex = ifindex; m.msg_controllen = cm->cmsg_len; } else if (version == AF_INET6) { struct in6_pktinfo *pi6; cm->cmsg_level = SOL_IPV6; cm->cmsg_type = IPV6_PKTINFO; cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo)); pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm)); pi6->ipi6_ifindex = ifindex; m.msg_controllen = cm->cmsg_len; } again: err = sendmsg(sd, &m, 0); if (err < 0) { if (errno == EACCES && try_broadcast) { try_broadcast = 0; if (!set_broadcast(sd)) goto again; errno = EACCES; } log_err_errno("sendmsg failed"); return 1; } return 0; } static int send_msg(int sd, void *addr, socklen_t alen, struct sock_args *args) { if (args->type == SOCK_STREAM) { if (write(sd, msg, msglen) < 0) { log_err_errno("write failed sending msg to peer"); return 1; } } else if (args->datagram_connect) { if (send(sd, msg, msglen, 0) < 0) { log_err_errno("send failed sending msg to peer"); return 1; } } else if (args->ifindex && args->use_cmsg) { if (send_msg_cmsg(sd, addr, alen, args->ifindex, args->version)) return 1; } else { if (send_msg_no_cmsg(sd, addr, alen)) return 1; } log_msg("Sent message:\n"); log_msg(" %.24s%s\n", msg, msglen > 24 ? " ..." : ""); return 0; } static int socket_read_dgram(int sd, struct sock_args *args) { unsigned char addr[sizeof(struct sockaddr_in6)]; struct sockaddr *sa = (struct sockaddr *) addr; socklen_t alen = sizeof(addr); struct iovec iov[2]; struct msghdr m = { .msg_name = (caddr_t)addr, .msg_namelen = alen, .msg_iov = iov, .msg_iovlen = 1, }; unsigned char cmsgbuf[256]; struct cmsghdr *cm = (struct cmsghdr *)cmsgbuf; char buf[16*1024]; int ifindex; int len; iov[0].iov_base = (caddr_t)buf; iov[0].iov_len = sizeof(buf); memset(cmsgbuf, 0, sizeof(cmsgbuf)); m.msg_control = (caddr_t)cm; m.msg_controllen = sizeof(cmsgbuf); len = recvmsg(sd, &m, 0); if (len == 0) { log_msg("peer closed connection.\n"); return 0; } else if (len < 0) { log_msg("failed to read message: %d: %s\n", errno, strerror(errno)); return -1; } buf[len] = '\0'; log_address("Message from:", sa); log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : ""); ifindex = get_index_from_cmsg(&m); if (args->expected_ifindex) { if (args->expected_ifindex != ifindex) { log_error("Device index mismatch: expected %d have %d\n", args->expected_ifindex, ifindex); return -1; } log_msg("Device index matches: expected %d have %d\n", args->expected_ifindex, ifindex); } if (!interactive && server_mode) { if (sa->sa_family == AF_INET6) { struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa; struct in6_addr *in6 = &s6->sin6_addr; if (IN6_IS_ADDR_V4MAPPED(in6)) { const uint32_t *pa = (uint32_t *) &in6->s6_addr; struct in_addr in4; struct sockaddr_in *sin; sin = (struct sockaddr_in *) addr; pa += 3; in4.s_addr = *pa; sin->sin_addr = in4; sin->sin_family = AF_INET; if (send_msg_cmsg(sd, addr, alen, ifindex, AF_INET) < 0) goto out_err; } } again: iov[0].iov_len = len; if (args->version == AF_INET6) { struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa; if (args->dev) { /* avoid PKTINFO conflicts with bindtodev */ if (sendto(sd, buf, len, 0, (void *) addr, alen) < 0) goto out_err; } else { /* kernel is allowing scope_id to be set to VRF * index for LLA. for sends to global address * reset scope id */ s6->sin6_scope_id = ifindex; if (sendmsg(sd, &m, 0) < 0) goto out_err; } } else { int err; err = sendmsg(sd, &m, 0); if (err < 0) { if (errno == EACCES && try_broadcast) { try_broadcast = 0; if (!set_broadcast(sd)) goto again; errno = EACCES; } goto out_err; } } log_msg("Sent message:\n"); log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : ""); } return 1; out_err: log_err_errno("failed to send msg to peer"); return -1; } static int socket_read_stream(int sd) { char buf[1024]; int len; len = read(sd, buf, sizeof(buf)-1); if (len == 0) { log_msg("client closed connection.\n"); return 0; } else if (len < 0) { log_msg("failed to read message\n"); return -1; } buf[len] = '\0'; log_msg("Incoming message:\n"); log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : ""); if (!interactive && server_mode) { if (write(sd, buf, len) < 0) { log_err_errno("failed to send buf"); return -1; } log_msg("Sent message:\n"); log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : ""); } return 1; } static int socket_read(int sd, struct sock_args *args) { if (args->type == SOCK_STREAM) return socket_read_stream(sd); return socket_read_dgram(sd, args); } static int stdin_to_socket(int sd, int type, void *addr, socklen_t alen) { char buf[1024]; int len; if (fgets(buf, sizeof(buf), stdin) == NULL) return 0; len = strlen(buf); if (type == SOCK_STREAM) { if (write(sd, buf, len) < 0) { log_err_errno("failed to send buf"); return -1; } } else { int err; again: err = sendto(sd, buf, len, 0, addr, alen); if (err < 0) { if (errno == EACCES && try_broadcast) { try_broadcast = 0; if (!set_broadcast(sd)) goto again; errno = EACCES; } log_err_errno("failed to send msg to peer"); return -1; } } log_msg("Sent message:\n"); log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : ""); return 1; } static void set_recv_attr(int sd, int version) { if (version == AF_INET6) { set_recvpktinfo_v6(sd); set_recverr_v6(sd); } else { set_pktinfo_v4(sd); set_recverr_v4(sd); } } static int msg_loop(int client, int sd, void *addr, socklen_t alen, struct sock_args *args) { struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL; fd_set rfds; int nfds; int rc; if (args->type != SOCK_STREAM) set_recv_attr(sd, args->version); if (msg) { msglen = strlen(msg); /* client sends first message */ if (client) { if (send_msg(sd, addr, alen, args)) return 1; } if (!interactive) { ptval = &timeout; if (!prog_timeout) timeout.tv_sec = 5; } } nfds = interactive ? MAX(fileno(stdin), sd) + 1 : sd + 1; while (1) { FD_ZERO(&rfds); FD_SET(sd, &rfds); if (interactive) FD_SET(fileno(stdin), &rfds); rc = select(nfds, &rfds, NULL, NULL, ptval); if (rc < 0) { if (errno == EINTR) continue; rc = 1; log_err_errno("select failed"); break; } else if (rc == 0) { log_error("Timed out waiting for response\n"); rc = 2; break; } if (FD_ISSET(sd, &rfds)) { rc = socket_read(sd, args); if (rc < 0) { rc = 1; break; } if (rc == 0) break; } rc = 0; if (FD_ISSET(fileno(stdin), &rfds)) { if (stdin_to_socket(sd, args->type, addr, alen) <= 0) break; } if (interactive) continue; if (iter != -1) { --iter; if (iter == 0) break; } log_msg("Going into quiet mode\n"); quiet = 1; if (client) { if (send_msg(sd, addr, alen, args)) { rc = 1; break; } } } return rc; } static int msock_init(struct sock_args *args, int server) { uint32_t if_addr = htonl(INADDR_ANY); struct sockaddr_in laddr = { .sin_family = AF_INET, .sin_port = htons(args->port), }; int one = 1; int sd; if (!server && args->has_local_ip) if_addr = args->local_addr.in.s_addr; sd = socket(PF_INET, SOCK_DGRAM, 0); if (sd < 0) { log_err_errno("socket"); return -1; } if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, (char *)&one, sizeof(one)) < 0) { log_err_errno("Setting SO_REUSEADDR error"); goto out_err; } if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST, (char *)&one, sizeof(one)) < 0) log_err_errno("Setting SO_BROADCAST error"); if (set_dsfield(sd, AF_INET, args->dsfield) != 0) goto out_err; if (server) { if (args->server_dontroute && set_dontroute(sd) != 0) goto out_err; } else { if (args->client_dontroute && set_dontroute(sd) != 0) goto out_err; } if (args->dev && bind_to_device(sd, args->dev) != 0) goto out_err; else if (args->use_setsockopt && set_multicast_if(sd, args->ifindex)) goto out_err; laddr.sin_addr.s_addr = if_addr; if (bind(sd, (struct sockaddr *) &laddr, sizeof(laddr)) < 0) { log_err_errno("bind failed"); goto out_err; } if (server && set_membership(sd, args->grp.s_addr, args->local_addr.in.s_addr, args->ifindex)) goto out_err; return sd; out_err: close(sd); return -1; } static int msock_server(struct sock_args *args) { return msock_init(args, 1); } static int msock_client(struct sock_args *args) { return msock_init(args, 0); } static int bind_socket(int sd, struct sock_args *args) { struct sockaddr_in serv_addr = { .sin_family = AF_INET, }; struct sockaddr_in6 serv6_addr = { .sin6_family = AF_INET6, }; void *addr; socklen_t alen; if (!args->has_local_ip && args->type == SOCK_RAW) return 0; switch (args->version) { case AF_INET: serv_addr.sin_port = htons(args->port); serv_addr.sin_addr = args->local_addr.in; addr = &serv_addr; alen = sizeof(serv_addr); break; case AF_INET6: serv6_addr.sin6_port = htons(args->port); serv6_addr.sin6_addr = args->local_addr.in6; addr = &serv6_addr; alen = sizeof(serv6_addr); break; default: log_error("Invalid address family\n"); return -1; } if (bind(sd, addr, alen) < 0) { log_err_errno("error binding socket"); return -1; } return 0; } static int config_xfrm_policy(int sd, struct sock_args *args) { struct xfrm_userpolicy_info policy = {}; int type = UDP_ENCAP_ESPINUDP; int xfrm_af = IP_XFRM_POLICY; int level = SOL_IP; if (args->type != SOCK_DGRAM) { log_error("Invalid socket type. Only DGRAM could be used for XFRM\n"); return 1; } policy.action = XFRM_POLICY_ALLOW; policy.sel.family = args->version; if (args->version == AF_INET6) { xfrm_af = IPV6_XFRM_POLICY; level = SOL_IPV6; } policy.dir = XFRM_POLICY_OUT; if (setsockopt(sd, level, xfrm_af, &policy, sizeof(policy)) < 0) return 1; policy.dir = XFRM_POLICY_IN; if (setsockopt(sd, level, xfrm_af, &policy, sizeof(policy)) < 0) return 1; if (setsockopt(sd, IPPROTO_UDP, UDP_ENCAP, &type, sizeof(type)) < 0) { log_err_errno("Failed to set xfrm encap"); return 1; } return 0; } static int lsock_init(struct sock_args *args) { long flags; int sd; sd = socket(args->version, args->type, args->protocol); if (sd < 0) { log_err_errno("Error opening socket"); return -1; } if (set_reuseaddr(sd) != 0) goto err; if (set_reuseport(sd) != 0) goto err; if (set_dsfield(sd, args->version, args->dsfield) != 0) goto err; if (args->server_dontroute && set_dontroute(sd) != 0) goto err; if (args->dev && bind_to_device(sd, args->dev) != 0) goto err; else if (args->use_setsockopt && set_unicast_if(sd, args->ifindex, args->version)) goto err; if (args->use_freebind && set_freebind(sd, args->version)) goto err; if (bind_socket(sd, args)) goto err; if (args->bind_test_only) goto out; if (args->type == SOCK_STREAM && listen(sd, 1) < 0) { log_err_errno("listen failed"); goto err; } flags = fcntl(sd, F_GETFL); if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) { log_err_errno("Failed to set non-blocking option"); goto err; } if (fcntl(sd, F_SETFD, FD_CLOEXEC) < 0) log_err_errno("Failed to set close-on-exec flag"); if (args->use_xfrm && config_xfrm_policy(sd, args)) { log_err_errno("Failed to set xfrm policy"); goto err; } out: return sd; err: close(sd); return -1; } static void ipc_write(int fd, int message) { /* Not in both_mode, so there's no process to signal */ if (fd < 0) return; if (write(fd, &message, sizeof(message)) < 0) log_err_errno("Failed to send client status"); } static int do_server(struct sock_args *args, int ipc_fd) { /* ipc_fd = -1 if no parent process to signal */ struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL; unsigned char addr[sizeof(struct sockaddr_in6)] = {}; socklen_t alen = sizeof(addr); int lsd, csd = -1; fd_set rfds; int rc; if (args->serverns) { if (switch_ns(args->serverns)) { log_error("Could not set server netns to %s\n", args->serverns); goto err_exit; } log_msg("Switched server netns\n"); } args->dev = args->server_dev; args->expected_dev = args->expected_server_dev; if (resolve_devices(args) || validate_addresses(args)) goto err_exit; if (prog_timeout) ptval = &timeout; if (args->has_grp) lsd = msock_server(args); else lsd = lsock_init(args); if (lsd < 0) goto err_exit; if (args->bind_test_only) { close(lsd); ipc_write(ipc_fd, 1); return 0; } if (args->type != SOCK_STREAM) { ipc_write(ipc_fd, 1); rc = msg_loop(0, lsd, (void *) addr, alen, args); close(lsd); return rc; } if (args->password && tcp_md5_remote(lsd, args)) { close(lsd); goto err_exit; } ipc_write(ipc_fd, 1); while (1) { log_msg("waiting for client connection.\n"); FD_ZERO(&rfds); FD_SET(lsd, &rfds); rc = select(lsd+1, &rfds, NULL, NULL, ptval); if (rc == 0) { rc = 2; break; } if (rc < 0) { if (errno == EINTR) continue; log_err_errno("select failed"); break; } if (FD_ISSET(lsd, &rfds)) { csd = accept(lsd, (void *) addr, &alen); if (csd < 0) { log_err_errno("accept failed"); break; } rc = show_sockstat(csd, args); if (rc) break; rc = check_device(csd, args); if (rc) break; } rc = msg_loop(0, csd, (void *) addr, alen, args); close(csd); if (!interactive) break; } close(lsd); return rc; err_exit: ipc_write(ipc_fd, 0); return 1; } static int wait_for_connect(int sd) { struct timeval _tv = { .tv_sec = prog_timeout }, *tv = NULL; fd_set wfd; int val = 0, sz = sizeof(val); int rc; FD_ZERO(&wfd); FD_SET(sd, &wfd); if (prog_timeout) tv = &_tv; rc = select(FD_SETSIZE, NULL, &wfd, NULL, tv); if (rc == 0) { log_error("connect timed out\n"); return -2; } else if (rc < 0) { log_err_errno("select failed"); return -3; } if (getsockopt(sd, SOL_SOCKET, SO_ERROR, &val, (socklen_t *)&sz) < 0) { log_err_errno("getsockopt(SO_ERROR) failed"); return -4; } if (val != 0) { log_error("connect failed: %d: %s\n", val, strerror(val)); return -1; } return 0; } static int connectsock(void *addr, socklen_t alen, struct sock_args *args) { int sd, rc = -1; long flags; sd = socket(args->version, args->type, args->protocol); if (sd < 0) { log_err_errno("Failed to create socket"); return -1; } flags = fcntl(sd, F_GETFL); if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) { log_err_errno("Failed to set non-blocking option"); goto err; } if (set_reuseport(sd) != 0) goto err; if (set_dsfield(sd, args->version, args->dsfield) != 0) goto err; if (args->client_dontroute && set_dontroute(sd) != 0) goto err; if (args->dev && bind_to_device(sd, args->dev) != 0) goto err; else if (args->use_setsockopt && set_unicast_if(sd, args->ifindex, args->version)) goto err; if (args->has_local_ip && bind_socket(sd, args)) goto err; if (args->type != SOCK_STREAM && !args->datagram_connect) goto out; if (args->password && tcp_md5sig(sd, addr, alen, args)) goto err; if (args->bind_test_only) goto out; if (connect(sd, addr, alen) < 0) { if (errno != EINPROGRESS) { log_err_errno("Failed to connect to remote host"); rc = -1; goto err; } rc = wait_for_connect(sd); if (rc < 0) goto err; } out: return sd; err: close(sd); return rc; } static int do_client(struct sock_args *args) { struct sockaddr_in sin = { .sin_family = AF_INET, }; struct sockaddr_in6 sin6 = { .sin6_family = AF_INET6, }; void *addr; int alen; int rc = 0; int sd; if (!args->has_remote_ip && !args->has_grp) { fprintf(stderr, "remote IP or multicast group not given\n"); return 1; } if (args->clientns) { if (switch_ns(args->clientns)) { log_error("Could not set client netns to %s\n", args->clientns); return 1; } log_msg("Switched client netns\n"); } args->local_addr_str = args->client_local_addr_str; if (resolve_devices(args) || validate_addresses(args)) return 1; if ((args->use_setsockopt || args->use_cmsg) && !args->ifindex) { fprintf(stderr, "Device binding not specified\n"); return 1; } if (args->use_setsockopt || args->use_cmsg) args->dev = NULL; switch (args->version) { case AF_INET: sin.sin_port = htons(args->port); if (args->has_grp) sin.sin_addr = args->grp; else sin.sin_addr = args->remote_addr.in; addr = &sin; alen = sizeof(sin); break; case AF_INET6: sin6.sin6_port = htons(args->port); sin6.sin6_addr = args->remote_addr.in6; sin6.sin6_scope_id = args->scope_id; addr = &sin6; alen = sizeof(sin6); break; } args->password = args->client_pw; if (args->has_grp) sd = msock_client(args); else sd = connectsock(addr, alen, args); if (sd < 0) return -sd; if (args->bind_test_only) goto out; if (args->type == SOCK_STREAM) { rc = show_sockstat(sd, args); if (rc != 0) goto out; } rc = msg_loop(1, sd, addr, alen, args); out: close(sd); return rc; } static char *random_msg(int len) { int i, n = 0, olen = len + 1; char *m; if (len <= 0) return NULL; m = malloc(olen); if (!m) return NULL; while (len > 26) { i = snprintf(m + n, olen - n, "%.26s", "abcdefghijklmnopqrstuvwxyz"); n += i; len -= i; } snprintf(m + n, olen - n, "%.*s", len, "abcdefghijklmnopqrstuvwxyz"); return m; } static int ipc_child(int fd, struct sock_args *args) { char *outbuf, *errbuf; int rc = 1; outbuf = malloc(4096); errbuf = malloc(4096); if (!outbuf || !errbuf) { fprintf(stderr, "server: Failed to allocate buffers for stdout and stderr\n"); goto out; } setbuffer(stdout, outbuf, 4096); setbuffer(stderr, errbuf, 4096); server_mode = 1; /* to tell log_msg in case we are in both_mode */ /* when running in both mode, address validation applies * solely to client side */ args->has_expected_laddr = 0; args->has_expected_raddr = 0; rc = do_server(args, fd); out: free(outbuf); free(errbuf); return rc; } static int ipc_parent(int cpid, int fd, struct sock_args *args) { int client_status; int status; int buf; /* do the client-side function here in the parent process, * waiting to be told when to continue */ if (read(fd, &buf, sizeof(buf)) <= 0) { log_err_errno("Failed to read IPC status from status"); return 1; } if (!buf) { log_error("Server failed; can not continue\n"); return 1; } log_msg("Server is ready\n"); client_status = do_client(args); log_msg("parent is done!\n"); if (kill(cpid, 0) == 0) kill(cpid, SIGKILL); wait(&status); return client_status; } #define GETOPT_STR "sr:l:c:Q:p:t:g:P:DRn:M:X:m:d:I:BN:O:SUCi6xL:0:1:2:3:Fbqf" #define OPT_FORCE_BIND_KEY_IFINDEX 1001 #define OPT_NO_BIND_KEY_IFINDEX 1002 #define OPT_CLIENT_DONTROUTE 1003 #define OPT_SERVER_DONTROUTE 1004 static struct option long_opts[] = { {"force-bind-key-ifindex", 0, 0, OPT_FORCE_BIND_KEY_IFINDEX}, {"no-bind-key-ifindex", 0, 0, OPT_NO_BIND_KEY_IFINDEX}, {"client-dontroute", 0, 0, OPT_CLIENT_DONTROUTE}, {"server-dontroute", 0, 0, OPT_SERVER_DONTROUTE}, {0, 0, 0, 0} }; static void print_usage(char *prog) { printf( "usage: %s OPTS\n" "Required:\n" " -r addr remote address to connect to (client mode only)\n" " -p port port to connect to (client mode)/listen on (server mode)\n" " (default: %d)\n" " -s server mode (default: client mode)\n" " -t timeout seconds (default: none)\n" "\n" "Optional:\n" " -B do both client and server via fork and IPC\n" " -N ns set client to network namespace ns (requires root)\n" " -O ns set server to network namespace ns (requires root)\n" " -F Restart server loop\n" " -6 IPv6 (default is IPv4)\n" " -P proto protocol for socket: icmp, ospf (default: none)\n" " -D|R datagram (D) / raw (R) socket (default stream)\n" " -l addr local address to bind to in server mode\n" " -c addr local address to bind to in client mode\n" " -Q dsfield DS Field value of the socket (the IP_TOS or\n" " IPV6_TCLASS socket option)\n" " -x configure XFRM policy on socket\n" "\n" " -d dev bind socket to given device name\n" " -I dev bind socket to given device name - server mode\n" " -S use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n" " to set device binding\n" " -U Use connect() and send() for datagram sockets\n" " -f bind socket with the IP[V6]_FREEBIND option\n" " -C use cmsg and IP_PKTINFO to specify device binding\n" "\n" " -L len send random message of given length\n" " -n num number of times to send message\n" "\n" " -M password use MD5 sum protection\n" " -X password MD5 password for client mode\n" " -m prefix/len prefix and length to use for MD5 key\n" " --no-bind-key-ifindex: Force TCP_MD5SIG_FLAG_IFINDEX off\n" " --force-bind-key-ifindex: Force TCP_MD5SIG_FLAG_IFINDEX on\n" " (default: only if -I is passed)\n" " --client-dontroute: don't use gateways for client socket: send\n" " packets only if destination is on link (see\n" " SO_DONTROUTE in socket(7))\n" " --server-dontroute: don't use gateways for server socket: send\n" " packets only if destination is on link (see\n" " SO_DONTROUTE in socket(7))\n" "\n" " -g grp multicast group (e.g., 239.1.1.1)\n" " -i interactive mode (default is echo and terminate)\n" "\n" " -0 addr Expected local address\n" " -1 addr Expected remote address\n" " -2 dev Expected device name (or index) to receive packet\n" " -3 dev Expected device name (or index) to receive packets - server mode\n" "\n" " -b Bind test only.\n" " -q Be quiet. Run test without printing anything.\n" , prog, DEFAULT_PORT); } int main(int argc, char *argv[]) { struct sock_args args = { .version = AF_INET, .type = SOCK_STREAM, .port = DEFAULT_PORT, }; struct protoent *pe; int both_mode = 0; unsigned int tmp; int forever = 0; int fd[2]; int cpid; /* process inputs */ extern char *optarg; int rc = 0; /* * process input args */ while ((rc = getopt_long(argc, argv, GETOPT_STR, long_opts, NULL)) != -1) { switch (rc) { case 'B': both_mode = 1; break; case 's': server_mode = 1; break; case 'F': forever = 1; break; case 'l': args.has_local_ip = 1; args.local_addr_str = optarg; break; case 'r': args.has_remote_ip = 1; args.remote_addr_str = optarg; break; case 'c': args.has_local_ip = 1; args.client_local_addr_str = optarg; break; case 'Q': if (str_to_uint(optarg, 0, 255, &tmp) != 0) { fprintf(stderr, "Invalid DS Field\n"); return 1; } args.dsfield = tmp; break; case 'p': if (str_to_uint(optarg, 1, 65535, &tmp) != 0) { fprintf(stderr, "Invalid port\n"); return 1; } args.port = (unsigned short) tmp; break; case 't': if (str_to_uint(optarg, 0, INT_MAX, &prog_timeout) != 0) { fprintf(stderr, "Invalid timeout\n"); return 1; } break; case 'D': args.type = SOCK_DGRAM; break; case 'R': args.type = SOCK_RAW; args.port = 0; if (!args.protocol) args.protocol = IPPROTO_RAW; break; case 'P': pe = getprotobyname(optarg); if (pe) { args.protocol = pe->p_proto; } else { if (str_to_uint(optarg, 0, 0xffff, &tmp) != 0) { fprintf(stderr, "Invalid protocol\n"); return 1; } args.protocol = tmp; } break; case 'n': iter = atoi(optarg); break; case 'N': args.clientns = optarg; break; case 'O': args.serverns = optarg; break; case 'L': msg = random_msg(atoi(optarg)); break; case 'M': args.password = optarg; break; case OPT_FORCE_BIND_KEY_IFINDEX: args.bind_key_ifindex = 1; break; case OPT_NO_BIND_KEY_IFINDEX: args.bind_key_ifindex = -1; break; case OPT_CLIENT_DONTROUTE: args.client_dontroute = 1; break; case OPT_SERVER_DONTROUTE: args.server_dontroute = 1; break; case 'X': args.client_pw = optarg; break; case 'm': args.md5_prefix_str = optarg; break; case 'S': args.use_setsockopt = 1; break; case 'f': args.use_freebind = 1; break; case 'C': args.use_cmsg = 1; break; case 'd': args.dev = optarg; break; case 'I': args.server_dev = optarg; break; case 'i': interactive = 1; break; case 'g': args.has_grp = 1; if (convert_addr(&args, optarg, ADDR_TYPE_MCAST) < 0) return 1; args.type = SOCK_DGRAM; break; case '6': args.version = AF_INET6; break; case 'b': args.bind_test_only = 1; break; case '0': args.has_expected_laddr = 1; args.expected_laddr_str = optarg; break; case '1': args.has_expected_raddr = 1; args.expected_raddr_str = optarg; break; case '2': args.expected_dev = optarg; break; case '3': args.expected_server_dev = optarg; break; case 'q': quiet = 1; break; case 'x': args.use_xfrm = 1; break; case 'U': args.datagram_connect = 1; break; default: print_usage(argv[0]); return 1; } } if (args.password && ((!args.has_remote_ip && !args.md5_prefix_str) || args.type != SOCK_STREAM)) { log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n"); return 1; } if (args.md5_prefix_str && !args.password) { log_error("Prefix range for MD5 protection specified without a password\n"); return 1; } if (iter == 0) { fprintf(stderr, "Invalid number of messages to send\n"); return 1; } if (args.type == SOCK_STREAM && !args.protocol) args.protocol = IPPROTO_TCP; if (args.type == SOCK_DGRAM && !args.protocol) args.protocol = IPPROTO_UDP; if ((args.type == SOCK_STREAM || args.type == SOCK_DGRAM) && args.port == 0) { fprintf(stderr, "Invalid port number\n"); return 1; } if ((both_mode || !server_mode) && !args.has_grp && !args.has_remote_ip && !args.has_local_ip) { fprintf(stderr, "Local (server mode) or remote IP (client IP) required\n"); return 1; } if (interactive) { prog_timeout = 0; msg = NULL; } if (both_mode) { if (pipe(fd) < 0) { perror("pipe"); exit(1); } cpid = fork(); if (cpid < 0) { perror("fork"); exit(1); } if (cpid) return ipc_parent(cpid, fd[0], &args); return ipc_child(fd[1], &args); } if (server_mode) { do { rc = do_server(&args, -1); } while (forever); return rc; } return do_client(&args); }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1