1/* SCTP kernel Implementation
2 * (C) Copyright IBM Corp. 2003
3 * Copyright (c) 1999-2001 Motorola, Inc.
4 *
5 * This file is part of the SCTP kernel Implementation
6 *
7 * The SCTP implementation is free software;
8 * you can redistribute it and/or modify it under the terms of
9 * the GNU General Public License as published by
10 * the Free Software Foundation; either version 2, or (at your option)
11 * any later version.
12 *
13 * The SCTP implementation is distributed in the hope that it
14 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
15 *                 ************************
16 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
17 * See the GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with GNU CC; see the file COPYING.  If not, write to
21 * the Free Software Foundation, 59 Temple Place - Suite 330,
22 * Boston, MA 02111-1307, USA.
23 *
24 * Please send any bug reports or fixes you make to the
25 * email address(es):
26 *    lksctp developers <lksctp-developers@lists.sourceforge.net>
27 *
28 * Or submit a bug report through the following website:
29 *    http://www.sf.net/projects/lksctp
30 *
31 * Any bugs reported to us we will try to fix... any fixes shared will
32 * be incorporated into the next SCTP release.
33 *
34 * Written or modified by:
35 *    Sridhar Samudrala		<sri@us.ibm.com>
36 */
37
38/* This is a kernel test to verify the TCP-style socket interfaces. */
39
40#include <stdio.h>
41#include <unistd.h>
42#include <stdlib.h>
43#include <string.h>
44#include <fcntl.h>
45#include <sys/types.h>
46#include <sys/socket.h>
47#include <sys/uio.h>
48#include <sys/poll.h>
49#include <netinet/in.h>
50#include <errno.h>
51#include <netinet/sctp.h>
52#include <sctputil.h>
53#include "tst_kernel.h"
54
55char *TCID = __FILE__;
56int TST_TOTAL = 22;
57int TST_CNT = 0;
58
59#define MAX_CLIENTS 10
60
61int
62main(void)
63{
64	int clt_sk[MAX_CLIENTS], accept_sk[MAX_CLIENTS];
65	int listen_sk, clt2_sk, accept2_sk;
66	sockaddr_storage_t clt_loop[MAX_CLIENTS];
67	sockaddr_storage_t svr_loop, accept_loop, clt2_loop;
68	socklen_t addrlen;
69	int error, i;
70        char *message = "hello, world!\n";
71	char msgbuf[100];
72	int pf_class;
73	struct pollfd poll_fd;
74	fd_set set;
75	struct msghdr outmessage;
76	char outcmsg[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
77	struct iovec out_iov;
78	struct cmsghdr *cmsg;
79	struct sctp_sndrcvinfo *sinfo;
80	struct msghdr inmessage;
81	char incmsg[CMSG_SPACE(sizeof(sctp_cmsg_data_t))];
82	char *big_buffer;
83	struct iovec iov;
84
85	if (tst_check_driver("sctp"))
86		tst_brkm(TCONF, tst_exit, "sctp driver not available");
87
88        /* Rather than fflush() throughout the code, set stdout to
89	 * be unbuffered.
90	 */
91	setvbuf(stdout, NULL, _IONBF, 0);
92
93	/* Initialize the server and client addresses. */
94#if TEST_V6
95	pf_class = PF_INET6;
96        svr_loop.v6.sin6_family = AF_INET6;
97        svr_loop.v6.sin6_addr = in6addr_loopback;
98        svr_loop.v6.sin6_port = htons(SCTP_TESTPORT_1);
99	for (i = 0; i < MAX_CLIENTS; i++) {
100        	clt_loop[i].v6.sin6_family = AF_INET6;
101        	clt_loop[i].v6.sin6_addr = in6addr_loopback;
102        	clt_loop[i].v6.sin6_port = htons(SCTP_TESTPORT_2 + i);
103	}
104        clt2_loop.v6.sin6_family = AF_INET6;
105        clt2_loop.v6.sin6_addr = in6addr_loopback;
106        clt2_loop.v6.sin6_port = htons(SCTP_TESTPORT_2 + i);
107#else
108	pf_class = PF_INET;
109	svr_loop.v4.sin_family = AF_INET;
110	svr_loop.v4.sin_addr.s_addr = SCTP_IP_LOOPBACK;
111	svr_loop.v4.sin_port = htons(SCTP_TESTPORT_1);
112	for (i = 0; i < MAX_CLIENTS; i++) {
113		clt_loop[i].v4.sin_family = AF_INET;
114		clt_loop[i].v4.sin_addr.s_addr = SCTP_IP_LOOPBACK;
115		clt_loop[i].v4.sin_port = htons(SCTP_TESTPORT_2 + i);
116	}
117	clt2_loop.v4.sin_family = AF_INET;
118	clt2_loop.v4.sin_addr.s_addr = SCTP_IP_LOOPBACK;
119	clt2_loop.v4.sin_port = htons(SCTP_TESTPORT_2 + i);
120#endif
121
122	/* Create and bind the listening server socket.  */
123        listen_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
124	test_bind(listen_sk, &svr_loop.sa, sizeof(svr_loop));
125
126	/* Mark listen_sk as being able to accept new associations.  */
127	test_listen(listen_sk, MAX_CLIENTS-1);
128
129	/* Create and bind the client sockets.  */
130	for (i = 0; i < MAX_CLIENTS; i++) {
131		clt_sk[i] = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
132		test_bind(clt_sk[i], &clt_loop[i].sa, sizeof(clt_loop[i]));
133	}
134	clt2_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
135	test_bind(clt2_sk, &clt2_loop.sa, sizeof(clt2_loop));
136
137	addrlen = sizeof(accept_loop);
138	/* Try to do accept on a non-listening socket. It should fail. */
139	error = accept(clt_sk[0], &accept_loop.sa, &addrlen);
140	if ((-1 != error) && (EINVAL != errno))
141		tst_brkm(TBROK, tst_exit, "accept on non-listening socket "
142			 "error:%d, errno:%d", error, errno);
143
144	tst_resm(TPASS, "accept on non-listening socket");
145
146	/* Try to do a connect from a listening socket. It should fail. */
147	error = connect(listen_sk, (struct sockaddr *)&clt_loop[0],
148			sizeof(clt_loop[0]));
149	if ((-1 != error) && (EISCONN != errno))
150		tst_brkm(TBROK, tst_exit, "connect to non-listening socket "
151			 "error:%d, errno:%d", error, errno);
152
153	tst_resm(TPASS, "connect to non-listening socket");
154
155	/* Do a blocking connect from clt_sk's to listen_sk */
156	for (i = 0; i < MAX_CLIENTS; i++)
157		test_connect(clt_sk[i], &svr_loop.sa, sizeof(svr_loop));
158
159	tst_resm(TPASS, "connect to listening socket");
160
161	/* Verify that no more connect's can be done after the acceptq
162	 * backlog has reached the max value.
163	 */
164	error = connect(clt2_sk, &svr_loop.sa, sizeof(svr_loop));
165	if ((-1 != error) && (ECONNREFUSED != errno))
166		tst_brkm(TBROK, tst_exit, "connect after max backlog "
167			 "error:%d, errno:%d", error, errno);
168
169	tst_resm(TPASS, "connect after max backlog");
170
171	/* Extract the associations on the listening socket as new sockets. */
172	for (i = 0; i < MAX_CLIENTS; i++) {
173		poll_fd.fd = listen_sk;
174		poll_fd.events = POLLIN;
175		poll_fd.revents = 0;
176		error = poll(&poll_fd, 1, -1);
177		if ((1 != error) && (1 != poll_fd.revents))
178			tst_brkm(TBROK, tst_exit, "Unexpected return value "
179				 "with poll, error:%d errno:%d, revents:%d",
180				 error, errno, poll_fd.revents);
181
182		addrlen = sizeof(accept_loop);
183		accept_sk[i] = test_accept(listen_sk, &accept_loop.sa,
184					   &addrlen);
185	}
186
187	tst_resm(TPASS, "accept from listening socket");
188
189	/* Try to do a connect on an established socket. It should fail. */
190	error = connect(accept_sk[0], &clt_loop[0].sa, sizeof(clt_loop[0]));
191	if ((-1 != error) || (EISCONN != errno))
192		tst_brkm(TBROK, tst_exit, "connect on an established socket "
193			 "error:%d errno:%d", error, errno);
194
195	tst_resm(TPASS, "connect on an established socket");
196
197	/* Try to do accept on an established socket. It should fail. */
198	error = accept(accept_sk[0], &accept_loop.sa, &addrlen);
199	if ((-1 != error) && (EINVAL != errno))
200		tst_brkm(TBROK, tst_exit, "accept on an established socket "
201			 "error:%d errno:%d", error, errno);
202
203	error = accept(clt_sk[0], &accept_loop.sa, &addrlen);
204	if ((-1 != error) && (EINVAL != errno))
205		tst_brkm(TBROK, tst_exit, "accept on an established socket "
206			 "failure: error:%d errno:%d", error, errno);
207
208	tst_resm(TPASS, "accept on an established socket");
209
210	/* Send and receive a message from the client sockets to the accepted
211	 * sockets.
212	 */
213	for (i = 0; i < MAX_CLIENTS; i++) {
214		test_send(clt_sk[i], message, strlen(message), 0);
215		test_recv(accept_sk[i], msgbuf, 100, 0);
216	}
217
218	tst_resm(TPASS, "client sockets -> accepted sockets");
219
220	/* Send and receive a message from the accepted sockets to the client
221	 * sockets.
222	 */
223	for (i = 0; i < MAX_CLIENTS; i++) {
224		test_send(accept_sk[i], message, strlen(message), 0);
225		test_recv(clt_sk[i], msgbuf, 100, 0);
226	}
227
228	tst_resm(TPASS, "accepted sockets -> client sockets");
229
230	/* Sending a message on a listening socket should fail. */
231	error = send(listen_sk, message, strlen(message), MSG_NOSIGNAL);
232	if ((-1 != error) || (EPIPE != errno))
233		tst_brkm(TBROK, tst_exit, "send on a listening socket "
234			 "error:%d, errno:%d", error, errno);
235
236	tst_resm(TPASS, "send on a listening socket");
237
238	/* Trying to receive a message on a listening socket should fail. */
239	error = recv(listen_sk, msgbuf, 100, 0);
240	if ((-1 != error) || (ENOTCONN != errno))
241		tst_brkm(TBROK, tst_exit, "recv on a listening socket "
242			 "error:%d, errno:%d", error, errno);
243
244	tst_resm(TPASS, "recv on a listening socket");
245
246	/* TESTCASES for shutdown() */
247	errno = 0;
248	test_send(accept_sk[0], message, strlen(message), 0);
249
250	/* Enable ASSOC_CHANGE and SNDRCVINFO notifications. */
251	test_enable_assoc_change(clt_sk[0]);
252
253	/* Do a SHUT_WR on clt_sk[0] to disable any new sends. */
254	test_shutdown(clt_sk[0], SHUT_WR);
255
256	/* Reading on a socket that has received SHUTDOWN should return 0
257	 * indicating EOF.
258	 */
259	error = recv(accept_sk[0], msgbuf, 100, 0);
260	if ((0 != error) || (0 != errno))
261		tst_brkm(TBROK, tst_exit, "recv on a SHUTDOWN received socket "
262			 "error:%d errno:%d", error, errno);
263
264	tst_resm(TPASS, "recv on a SHUTDOWN received socket");
265
266	/* Read the pending message on clt_sk[0] that was received before
267	 * SHUTDOWN call.
268	 */
269	test_recv(clt_sk[0], msgbuf, 100, 0);
270
271	/* Initialize inmessage for all receives. */
272	big_buffer = test_malloc(REALLY_BIG);
273	memset(&inmessage, 0, sizeof(inmessage));
274	iov.iov_base = big_buffer;
275	iov.iov_len = REALLY_BIG;
276	inmessage.msg_iov = &iov;
277	inmessage.msg_iovlen = 1;
278	inmessage.msg_control = incmsg;
279	inmessage.msg_controllen = sizeof(incmsg);
280
281	/* Receive the SHUTDOWN_COMP notification as they are enabled. */
282	error = test_recvmsg(clt_sk[0], &inmessage, MSG_WAITALL);
283	test_check_msg_notification(&inmessage, error,
284				    sizeof(struct sctp_assoc_change),
285				    SCTP_ASSOC_CHANGE, SCTP_SHUTDOWN_COMP);
286
287	tst_resm(TPASS, "recv SHUTDOWN_COMP notification on a SHUT_WR socket");
288
289	/* No more messages and the association is SHUTDOWN, should fail. */
290	error = recv(clt_sk[0], msgbuf, 100, 0);
291	if ((-1 != error) || (ENOTCONN != errno))
292		tst_brkm(TBROK, tst_exit, "recv on a SHUTDOWN sent socket "
293			 "error:%d, errno:%d", error, errno);
294
295	tst_resm(TPASS, "recv on a SHUTDOWN sent socket");
296
297	errno = 0;
298
299	/* Do a SHUT_RD on clt_sk[1] to disable any new receives. */
300	test_shutdown(clt_sk[1], SHUT_RD);
301
302	error = recv(clt_sk[1], msgbuf, 100, 0);
303	if ((0 != error) || (0 != errno))
304		tst_brkm(TBROK, tst_exit, "recv on a SHUT_RD socket "
305			 "error:%d, errno:%d", error, errno);
306
307	/* Sending a message on SHUT_RD socket. */
308	test_send(clt_sk[1], message, strlen(message), 0);
309
310	/* Receive the message sent on SHUT_RD socket. */
311	test_recv(accept_sk[1], msgbuf, 100, 0);
312
313	/* Send a message to the SHUT_RD socket. */
314	test_send(accept_sk[1], message, strlen(message), 0);
315
316	/* We should not receive the message as the socket is SHUT_RD */
317	error = recv(clt_sk[1], msgbuf, 100, 0);
318	if ((0 != error) || (0 != errno))
319		tst_brkm(TBROK, tst_exit, "recv on a SHUT_RD socket "
320			 "error:%d, errno:%d", error, errno);
321
322	tst_resm(TPASS, "recv on a SHUT_RD socket");
323
324	/* Do a SHUT_RDWR on clt_sk[2] to disable any new sends/receives. */
325	test_shutdown(clt_sk[2], SHUT_RDWR);
326
327	error = recv(accept_sk[2], msgbuf, 100, 0);
328	if ((0 != error) || (0 != errno))
329		tst_brkm(TBROK, tst_exit, "recv on a SHUT_RDWR socket "
330			 "error:%d, errno:%d", error, errno);
331
332	error = recv(clt_sk[2], msgbuf, 100, 0);
333	if ((0 != error) || (0 != errno))
334		tst_brkm(TBROK, tst_exit, "recv on a SHUT_RDWR socket "
335			 "error:%d, errno:%d", error, errno);
336
337	tst_resm(TPASS, "recv on a SHUT_RDWR socket");
338
339	error = 0;
340
341	for (i = 0; i < MAX_CLIENTS; i++)
342		close(clt_sk[i]);
343	for (i = 0; i < MAX_CLIENTS; i++)
344		close(accept_sk[i]);
345
346	/* Test case to verify accept of a CLOSED association. */
347	/* Do a connect, send and a close to ESTABLISH and CLOSE an
348	 * association on the listening socket.
349	 */
350	test_connect(clt2_sk, &svr_loop.sa, sizeof(svr_loop));
351
352	test_send(clt2_sk, message, strlen(message), 0);
353
354	close(clt2_sk);
355
356	FD_ZERO(&set);
357	FD_SET(listen_sk, &set);
358
359	error = select(listen_sk + 1, &set, NULL, NULL, NULL);
360	if (1 != error)
361		tst_brkm(TBROK, tst_exit, "select error:%d, "
362			 "errno: %d", error, errno);
363
364	/* Now accept the CLOSED association waiting on the listening
365	 * socket.
366	 */
367	accept2_sk = test_accept(listen_sk, &accept_loop.sa, &addrlen);
368
369	/* Receive the message sent before doing a close. */
370	test_recv(accept2_sk, msgbuf, 100, 0);
371
372	/* Receive EOF indication as there are no more messages and the
373	 * socket is SHUTDOWN.
374	 */
375	error = recv(accept2_sk, msgbuf, 100, 0);
376	if ((0 != error) || (0 != errno))
377		tst_brkm(TBROK, tst_exit, "Unexpected error return on "
378			 "recv(error:%d, errno:%d)", error, errno);
379
380	tst_resm(TPASS, "accept of a CLOSED association");
381
382	/* Trying to send a message over the CLOSED association should
383	 * generate EPIPE.
384	 */
385	error = send(accept2_sk, message, strlen(message), MSG_NOSIGNAL);
386	if ((-1 != error) || (EPIPE != errno))
387		tst_brkm(TBROK, tst_exit, "send to a CLOSED association "
388			 "error:%d, errno:%d", error, errno);
389
390	tst_resm(TPASS, "send to a CLOSED association");
391
392	error = 0;
393	close(accept2_sk);
394
395	/* Verify that auto-connect can be done on a TCP-style socket using
396	 * sendto/sendmsg.
397	 */
398	clt2_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
399	test_bind(clt2_sk, &clt2_loop.sa, sizeof(clt2_loop));
400
401	/* Do a sendto() without a connect() */
402	test_sendto(clt2_sk, message, strlen(message), 0, &svr_loop.sa,
403		    sizeof(svr_loop));
404
405	accept2_sk = test_accept(listen_sk, &accept_loop.sa, &addrlen);
406
407	test_recv(accept2_sk, msgbuf, 100, 0);
408
409	tst_resm(TPASS, "auto-connect using sendto");
410
411	outmessage.msg_name = &svr_loop;
412	outmessage.msg_namelen = sizeof(svr_loop);
413	outmessage.msg_iov = NULL;
414	outmessage.msg_iovlen = 0;
415	outmessage.msg_control = outcmsg;
416	outmessage.msg_controllen = sizeof(outcmsg);
417	outmessage.msg_flags = 0;
418
419	cmsg = CMSG_FIRSTHDR(&outmessage);
420	cmsg->cmsg_level = IPPROTO_SCTP;
421	cmsg->cmsg_type = SCTP_SNDRCV;
422	cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo));
423	outmessage.msg_controllen = cmsg->cmsg_len;
424	sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
425	memset(sinfo, 0x00, sizeof(struct sctp_sndrcvinfo));
426
427	/* Verify that SCTP_EOF cannot be used to shutdown an association
428	 * on a TCP-style socket.
429	 */
430	sinfo->sinfo_flags |= SCTP_EOF;
431	error = sendmsg(clt2_sk, &outmessage, 0);
432	if ((-1 != error) || (EINVAL != errno))
433		tst_brkm(TBROK, tst_exit, "sendmsg with SCTP_EOF flag "
434			 "error:%d, errno:%d", error, errno);
435
436	tst_resm(TPASS, "sendmsg with SCTP_EOF flag");
437
438	/* Verify that SCTP_ABORT cannot be used to abort an association
439	 * on a TCP-style socket.
440	 */
441	sinfo->sinfo_flags |= SCTP_ABORT;
442	error = sendmsg(clt2_sk, &outmessage, 0);
443	if ((-1 != error) || (EINVAL != errno))
444		tst_brkm(TBROK, tst_exit, "sendmsg with SCTP_ABORT flag "
445			 "error:%d, errno:%d", error, errno);
446
447	tst_resm(TPASS, "sendmsg with SCTP_ABORT flag");
448
449	/* Verify that a normal message can be sent using sendmsg. */
450	outmessage.msg_iov = &out_iov;
451	outmessage.msg_iovlen = 1;
452	out_iov.iov_base = message;
453	out_iov.iov_len = strlen(message) + 1;
454	sinfo->sinfo_flags = 0;
455	test_sendmsg(clt2_sk, &outmessage, 0, strlen(message)+1);
456
457	test_recv(accept2_sk, msgbuf, 100, 0);
458
459	tst_resm(TPASS, "sendmsg with no flags");
460
461	close(clt2_sk);
462	close(accept2_sk);
463	close(listen_sk);
464
465        /* Indicate successful completion.  */
466	return 0;
467}
468