Linux Audio

Check our new training course

Loading...
Note: File does not exist in v3.1.
   1// SPDX-License-Identifier: GPL-2.0
   2/* nettest - used for functional tests of networking APIs
   3 *
   4 * Copyright (c) 2013-2019 David Ahern <dsahern@gmail.com>. All rights reserved.
   5 */
   6
   7#define _GNU_SOURCE
   8#include <features.h>
   9#include <sys/types.h>
  10#include <sys/ioctl.h>
  11#include <sys/socket.h>
  12#include <linux/tcp.h>
  13#include <arpa/inet.h>
  14#include <net/if.h>
  15#include <netinet/in.h>
  16#include <netdb.h>
  17#include <fcntl.h>
  18#include <libgen.h>
  19#include <limits.h>
  20#include <stdarg.h>
  21#include <stdio.h>
  22#include <stdlib.h>
  23#include <string.h>
  24#include <unistd.h>
  25#include <time.h>
  26#include <errno.h>
  27
  28#ifndef IPV6_UNICAST_IF
  29#define IPV6_UNICAST_IF         76
  30#endif
  31#ifndef IPV6_MULTICAST_IF
  32#define IPV6_MULTICAST_IF       17
  33#endif
  34
  35#define DEFAULT_PORT 12345
  36
  37#ifndef MAX
  38#define MAX(a, b)  ((a) > (b) ? (a) : (b))
  39#endif
  40#ifndef MIN
  41#define MIN(a, b)  ((a) < (b) ? (a) : (b))
  42#endif
  43
  44struct sock_args {
  45	/* local address */
  46	union {
  47		struct in_addr  in;
  48		struct in6_addr in6;
  49	} local_addr;
  50
  51	/* remote address */
  52	union {
  53		struct in_addr  in;
  54		struct in6_addr in6;
  55	} remote_addr;
  56	int scope_id;  /* remote scope; v6 send only */
  57
  58	struct in_addr grp;     /* multicast group */
  59
  60	unsigned int has_local_ip:1,
  61		     has_remote_ip:1,
  62		     has_grp:1,
  63		     has_expected_laddr:1,
  64		     has_expected_raddr:1,
  65		     bind_test_only:1;
  66
  67	unsigned short port;
  68
  69	int type;      /* DGRAM, STREAM, RAW */
  70	int protocol;
  71	int version;   /* AF_INET/AF_INET6 */
  72
  73	int use_setsockopt;
  74	int use_cmsg;
  75	const char *dev;
  76	int ifindex;
  77
  78	const char *password;
  79	/* prefix for MD5 password */
  80	union {
  81		struct sockaddr_in v4;
  82		struct sockaddr_in6 v6;
  83	} md5_prefix;
  84	unsigned int prefix_len;
  85
  86	/* expected addresses and device index for connection */
  87	int expected_ifindex;
  88
  89	/* local address */
  90	union {
  91		struct in_addr  in;
  92		struct in6_addr in6;
  93	} expected_laddr;
  94
  95	/* remote address */
  96	union {
  97		struct in_addr  in;
  98		struct in6_addr in6;
  99	} expected_raddr;
 100};
 101
 102static int server_mode;
 103static unsigned int prog_timeout = 5;
 104static unsigned int interactive;
 105static int iter = 1;
 106static char *msg = "Hello world!";
 107static int msglen;
 108static int quiet;
 109static int try_broadcast = 1;
 110
 111static char *timestamp(char *timebuf, int buflen)
 112{
 113	time_t now;
 114
 115	now = time(NULL);
 116	if (strftime(timebuf, buflen, "%T", localtime(&now)) == 0) {
 117		memset(timebuf, 0, buflen);
 118		strncpy(timebuf, "00:00:00", buflen-1);
 119	}
 120
 121	return timebuf;
 122}
 123
 124static void log_msg(const char *format, ...)
 125{
 126	char timebuf[64];
 127	va_list args;
 128
 129	if (quiet)
 130		return;
 131
 132	fprintf(stdout, "%s %s:",
 133		timestamp(timebuf, sizeof(timebuf)),
 134		server_mode ? "server" : "client");
 135	va_start(args, format);
 136	vfprintf(stdout, format, args);
 137	va_end(args);
 138
 139	fflush(stdout);
 140}
 141
 142static void log_error(const char *format, ...)
 143{
 144	char timebuf[64];
 145	va_list args;
 146
 147	if (quiet)
 148		return;
 149
 150	fprintf(stderr, "%s %s:",
 151		timestamp(timebuf, sizeof(timebuf)),
 152		server_mode ? "server" : "client");
 153	va_start(args, format);
 154	vfprintf(stderr, format, args);
 155	va_end(args);
 156
 157	fflush(stderr);
 158}
 159
 160static void log_err_errno(const char *fmt, ...)
 161{
 162	char timebuf[64];
 163	va_list args;
 164
 165	if (quiet)
 166		return;
 167
 168	fprintf(stderr, "%s %s: ",
 169		timestamp(timebuf, sizeof(timebuf)),
 170		server_mode ? "server" : "client");
 171	va_start(args, fmt);
 172	vfprintf(stderr, fmt, args);
 173	va_end(args);
 174
 175	fprintf(stderr, ": %d: %s\n", errno, strerror(errno));
 176	fflush(stderr);
 177}
 178
 179static void log_address(const char *desc, struct sockaddr *sa)
 180{
 181	char addrstr[64];
 182
 183	if (quiet)
 184		return;
 185
 186	if (sa->sa_family == AF_INET) {
 187		struct sockaddr_in *s = (struct sockaddr_in *) sa;
 188
 189		log_msg("%s %s:%d",
 190			desc,
 191			inet_ntop(AF_INET, &s->sin_addr, addrstr,
 192				  sizeof(addrstr)),
 193			ntohs(s->sin_port));
 194
 195	} else if (sa->sa_family == AF_INET6) {
 196		struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
 197
 198		log_msg("%s [%s]:%d",
 199			desc,
 200			inet_ntop(AF_INET6, &s6->sin6_addr, addrstr,
 201				  sizeof(addrstr)),
 202			ntohs(s6->sin6_port));
 203	}
 204
 205	printf("\n");
 206
 207	fflush(stdout);
 208}
 209
 210static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args)
 211{
 212	int keylen = strlen(args->password);
 213	struct tcp_md5sig md5sig = {};
 214	int opt = TCP_MD5SIG;
 215	int rc;
 216
 217	md5sig.tcpm_keylen = keylen;
 218	memcpy(md5sig.tcpm_key, args->password, keylen);
 219
 220	if (args->prefix_len) {
 221		opt = TCP_MD5SIG_EXT;
 222		md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_PREFIX;
 223
 224		md5sig.tcpm_prefixlen = args->prefix_len;
 225		addr = &args->md5_prefix;
 226	}
 227	memcpy(&md5sig.tcpm_addr, addr, alen);
 228
 229	if (args->ifindex) {
 230		opt = TCP_MD5SIG_EXT;
 231		md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_IFINDEX;
 232
 233		md5sig.tcpm_ifindex = args->ifindex;
 234	}
 235
 236	rc = setsockopt(sd, IPPROTO_TCP, opt, &md5sig, sizeof(md5sig));
 237	if (rc < 0) {
 238		/* ENOENT is harmless. Returned when a password is cleared */
 239		if (errno == ENOENT)
 240			rc = 0;
 241		else
 242			log_err_errno("setsockopt(TCP_MD5SIG)");
 243	}
 244
 245	return rc;
 246}
 247
 248static int tcp_md5_remote(int sd, struct sock_args *args)
 249{
 250	struct sockaddr_in sin = {
 251		.sin_family = AF_INET,
 252	};
 253	struct sockaddr_in6 sin6 = {
 254		.sin6_family = AF_INET6,
 255	};
 256	void *addr;
 257	int alen;
 258
 259	switch (args->version) {
 260	case AF_INET:
 261		sin.sin_port = htons(args->port);
 262		sin.sin_addr = args->remote_addr.in;
 263		addr = &sin;
 264		alen = sizeof(sin);
 265		break;
 266	case AF_INET6:
 267		sin6.sin6_port = htons(args->port);
 268		sin6.sin6_addr = args->remote_addr.in6;
 269		addr = &sin6;
 270		alen = sizeof(sin6);
 271		break;
 272	default:
 273		log_error("unknown address family\n");
 274		exit(1);
 275	}
 276
 277	if (tcp_md5sig(sd, addr, alen, args))
 278		return -1;
 279
 280	return 0;
 281}
 282
 283static int get_ifidx(const char *ifname)
 284{
 285	struct ifreq ifdata;
 286	int sd, rc;
 287
 288	if (!ifname || *ifname == '\0')
 289		return -1;
 290
 291	memset(&ifdata, 0, sizeof(ifdata));
 292
 293	strcpy(ifdata.ifr_name, ifname);
 294
 295	sd = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
 296	if (sd < 0) {
 297		log_err_errno("socket failed");
 298		return -1;
 299	}
 300
 301	rc = ioctl(sd, SIOCGIFINDEX, (char *)&ifdata);
 302	close(sd);
 303	if (rc != 0) {
 304		log_err_errno("ioctl(SIOCGIFINDEX) failed");
 305		return -1;
 306	}
 307
 308	return ifdata.ifr_ifindex;
 309}
 310
 311static int bind_to_device(int sd, const char *name)
 312{
 313	int rc;
 314
 315	rc = setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
 316	if (rc < 0)
 317		log_err_errno("setsockopt(SO_BINDTODEVICE)");
 318
 319	return rc;
 320}
 321
 322static int get_bind_to_device(int sd, char *name, size_t len)
 323{
 324	int rc;
 325	socklen_t optlen = len;
 326
 327	name[0] = '\0';
 328	rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
 329	if (rc < 0)
 330		log_err_errno("setsockopt(SO_BINDTODEVICE)");
 331
 332	return rc;
 333}
 334
 335static int check_device(int sd, struct sock_args *args)
 336{
 337	int ifindex = 0;
 338	char name[32];
 339
 340	if (get_bind_to_device(sd, name, sizeof(name)))
 341		*name = '\0';
 342	else
 343		ifindex = get_ifidx(name);
 344
 345	log_msg("    bound to device %s/%d\n",
 346		*name ? name : "<none>", ifindex);
 347
 348	if (!args->expected_ifindex)
 349		return 0;
 350
 351	if (args->expected_ifindex != ifindex) {
 352		log_error("Device index mismatch: expected %d have %d\n",
 353			  args->expected_ifindex, ifindex);
 354		return 1;
 355	}
 356
 357	log_msg("Device index matches: expected %d have %d\n",
 358		args->expected_ifindex, ifindex);
 359
 360	return 0;
 361}
 362
 363static int set_pktinfo_v4(int sd)
 364{
 365	int one = 1;
 366	int rc;
 367
 368	rc = setsockopt(sd, SOL_IP, IP_PKTINFO, &one, sizeof(one));
 369	if (rc < 0 && rc != -ENOTSUP)
 370		log_err_errno("setsockopt(IP_PKTINFO)");
 371
 372	return rc;
 373}
 374
 375static int set_recvpktinfo_v6(int sd)
 376{
 377	int one = 1;
 378	int rc;
 379
 380	rc = setsockopt(sd, SOL_IPV6, IPV6_RECVPKTINFO, &one, sizeof(one));
 381	if (rc < 0 && rc != -ENOTSUP)
 382		log_err_errno("setsockopt(IPV6_RECVPKTINFO)");
 383
 384	return rc;
 385}
 386
 387static int set_recverr_v4(int sd)
 388{
 389	int one = 1;
 390	int rc;
 391
 392	rc = setsockopt(sd, SOL_IP, IP_RECVERR, &one, sizeof(one));
 393	if (rc < 0 && rc != -ENOTSUP)
 394		log_err_errno("setsockopt(IP_RECVERR)");
 395
 396	return rc;
 397}
 398
 399static int set_recverr_v6(int sd)
 400{
 401	int one = 1;
 402	int rc;
 403
 404	rc = setsockopt(sd, SOL_IPV6, IPV6_RECVERR, &one, sizeof(one));
 405	if (rc < 0 && rc != -ENOTSUP)
 406		log_err_errno("setsockopt(IPV6_RECVERR)");
 407
 408	return rc;
 409}
 410
 411static int set_unicast_if(int sd, int ifindex, int version)
 412{
 413	int opt = IP_UNICAST_IF;
 414	int level = SOL_IP;
 415	int rc;
 416
 417	ifindex = htonl(ifindex);
 418
 419	if (version == AF_INET6) {
 420		opt = IPV6_UNICAST_IF;
 421		level = SOL_IPV6;
 422	}
 423	rc = setsockopt(sd, level, opt, &ifindex, sizeof(ifindex));
 424	if (rc < 0)
 425		log_err_errno("setsockopt(IP_UNICAST_IF)");
 426
 427	return rc;
 428}
 429
 430static int set_multicast_if(int sd, int ifindex)
 431{
 432	struct ip_mreqn mreq = { .imr_ifindex = ifindex };
 433	int rc;
 434
 435	rc = setsockopt(sd, SOL_IP, IP_MULTICAST_IF, &mreq, sizeof(mreq));
 436	if (rc < 0)
 437		log_err_errno("setsockopt(IP_MULTICAST_IF)");
 438
 439	return rc;
 440}
 441
 442static int set_membership(int sd, uint32_t grp, uint32_t addr, int ifindex)
 443{
 444	uint32_t if_addr = addr;
 445	struct ip_mreqn mreq;
 446	int rc;
 447
 448	if (addr == htonl(INADDR_ANY) && !ifindex) {
 449		log_error("Either local address or device needs to be given for multicast membership\n");
 450		return -1;
 451	}
 452
 453	mreq.imr_multiaddr.s_addr = grp;
 454	mreq.imr_address.s_addr = if_addr;
 455	mreq.imr_ifindex = ifindex;
 456
 457	rc = setsockopt(sd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq));
 458	if (rc < 0) {
 459		log_err_errno("setsockopt(IP_ADD_MEMBERSHIP)");
 460		return -1;
 461	}
 462
 463	return 0;
 464}
 465
 466static int set_broadcast(int sd)
 467{
 468	unsigned int one = 1;
 469	int rc = 0;
 470
 471	if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST, &one, sizeof(one)) != 0) {
 472		log_err_errno("setsockopt(SO_BROADCAST)");
 473		rc = -1;
 474	}
 475
 476	return rc;
 477}
 478
 479static int set_reuseport(int sd)
 480{
 481	unsigned int one = 1;
 482	int rc = 0;
 483
 484	if (setsockopt(sd, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one)) != 0) {
 485		log_err_errno("setsockopt(SO_REUSEPORT)");
 486		rc = -1;
 487	}
 488
 489	return rc;
 490}
 491
 492static int set_reuseaddr(int sd)
 493{
 494	unsigned int one = 1;
 495	int rc = 0;
 496
 497	if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) != 0) {
 498		log_err_errno("setsockopt(SO_REUSEADDR)");
 499		rc = -1;
 500	}
 501
 502	return rc;
 503}
 504
 505static int str_to_uint(const char *str, int min, int max, unsigned int *value)
 506{
 507	int number;
 508	char *end;
 509
 510	errno = 0;
 511	number = (unsigned int) strtoul(str, &end, 0);
 512
 513	/* entire string should be consumed by conversion
 514	 * and value should be between min and max
 515	 */
 516	if (((*end == '\0') || (*end == '\n')) && (end != str) &&
 517	    (errno != ERANGE) && (min <= number) && (number <= max)) {
 518		*value = number;
 519		return 0;
 520	}
 521
 522	return -1;
 523}
 524
 525static int expected_addr_match(struct sockaddr *sa, void *expected,
 526			       const char *desc)
 527{
 528	char addrstr[64];
 529	int rc = 0;
 530
 531	if (sa->sa_family == AF_INET) {
 532		struct sockaddr_in *s = (struct sockaddr_in *) sa;
 533		struct in_addr *exp_in = (struct in_addr *) expected;
 534
 535		if (s->sin_addr.s_addr != exp_in->s_addr) {
 536			log_error("%s address does not match expected %s",
 537				  desc,
 538				  inet_ntop(AF_INET, exp_in,
 539					    addrstr, sizeof(addrstr)));
 540			rc = 1;
 541		}
 542	} else if (sa->sa_family == AF_INET6) {
 543		struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
 544		struct in6_addr *exp_in = (struct in6_addr *) expected;
 545
 546		if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) {
 547			log_error("%s address does not match expected %s",
 548				  desc,
 549				  inet_ntop(AF_INET6, exp_in,
 550					    addrstr, sizeof(addrstr)));
 551			rc = 1;
 552		}
 553	} else {
 554		log_error("%s address does not match expected - unknown family",
 555			  desc);
 556		rc = 1;
 557	}
 558
 559	if (!rc)
 560		log_msg("%s address matches expected\n", desc);
 561
 562	return rc;
 563}
 564
 565static int show_sockstat(int sd, struct sock_args *args)
 566{
 567	struct sockaddr_in6 local_addr, remote_addr;
 568	socklen_t alen = sizeof(local_addr);
 569	struct sockaddr *sa;
 570	const char *desc;
 571	int rc = 0;
 572
 573	desc = server_mode ? "server local:" : "client local:";
 574	sa = (struct sockaddr *) &local_addr;
 575	if (getsockname(sd, sa, &alen) == 0) {
 576		log_address(desc, sa);
 577
 578		if (args->has_expected_laddr) {
 579			rc = expected_addr_match(sa, &args->expected_laddr,
 580						 "local");
 581		}
 582	} else {
 583		log_err_errno("getsockname failed");
 584	}
 585
 586	sa = (struct sockaddr *) &remote_addr;
 587	desc = server_mode ? "server peer:" : "client peer:";
 588	if (getpeername(sd, sa, &alen) == 0) {
 589		log_address(desc, sa);
 590
 591		if (args->has_expected_raddr) {
 592			rc |= expected_addr_match(sa, &args->expected_raddr,
 593						 "remote");
 594		}
 595	} else {
 596		log_err_errno("getpeername failed");
 597	}
 598
 599	return rc;
 600}
 601
 602static int get_index_from_cmsg(struct msghdr *m)
 603{
 604	struct cmsghdr *cm;
 605	int ifindex = 0;
 606	char buf[64];
 607
 608	for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(m);
 609	     m->msg_controllen != 0 && cm;
 610	     cm = (struct cmsghdr *)CMSG_NXTHDR(m, cm)) {
 611
 612		if (cm->cmsg_level == SOL_IP &&
 613		    cm->cmsg_type == IP_PKTINFO) {
 614			struct in_pktinfo *pi;
 615
 616			pi = (struct in_pktinfo *)(CMSG_DATA(cm));
 617			inet_ntop(AF_INET, &pi->ipi_addr, buf, sizeof(buf));
 618			ifindex = pi->ipi_ifindex;
 619		} else if (cm->cmsg_level == SOL_IPV6 &&
 620			   cm->cmsg_type == IPV6_PKTINFO) {
 621			struct in6_pktinfo *pi6;
 622
 623			pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
 624			inet_ntop(AF_INET6, &pi6->ipi6_addr, buf, sizeof(buf));
 625			ifindex = pi6->ipi6_ifindex;
 626		}
 627	}
 628
 629	if (ifindex) {
 630		log_msg("    pktinfo: ifindex %d dest addr %s\n",
 631			ifindex, buf);
 632	}
 633	return ifindex;
 634}
 635
 636static int send_msg_no_cmsg(int sd, void *addr, socklen_t alen)
 637{
 638	int err;
 639
 640again:
 641	err = sendto(sd, msg, msglen, 0, addr, alen);
 642	if (err < 0) {
 643		if (errno == EACCES && try_broadcast) {
 644			try_broadcast = 0;
 645			if (!set_broadcast(sd))
 646				goto again;
 647			errno = EACCES;
 648		}
 649
 650		log_err_errno("sendto failed");
 651		return 1;
 652	}
 653
 654	return 0;
 655}
 656
 657static int send_msg_cmsg(int sd, void *addr, socklen_t alen,
 658			 int ifindex, int version)
 659{
 660	unsigned char cmsgbuf[64];
 661	struct iovec iov[2];
 662	struct cmsghdr *cm;
 663	struct msghdr m;
 664	int err;
 665
 666	iov[0].iov_base = msg;
 667	iov[0].iov_len = msglen;
 668	m.msg_iov = iov;
 669	m.msg_iovlen = 1;
 670	m.msg_name = (caddr_t)addr;
 671	m.msg_namelen = alen;
 672
 673	memset(cmsgbuf, 0, sizeof(cmsgbuf));
 674	cm = (struct cmsghdr *)cmsgbuf;
 675	m.msg_control = (caddr_t)cm;
 676
 677	if (version == AF_INET) {
 678		struct in_pktinfo *pi;
 679
 680		cm->cmsg_level = SOL_IP;
 681		cm->cmsg_type = IP_PKTINFO;
 682		cm->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
 683		pi = (struct in_pktinfo *)(CMSG_DATA(cm));
 684		pi->ipi_ifindex = ifindex;
 685
 686		m.msg_controllen = cm->cmsg_len;
 687
 688	} else if (version == AF_INET6) {
 689		struct in6_pktinfo *pi6;
 690
 691		cm->cmsg_level = SOL_IPV6;
 692		cm->cmsg_type = IPV6_PKTINFO;
 693		cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
 694
 695		pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
 696		pi6->ipi6_ifindex = ifindex;
 697
 698		m.msg_controllen = cm->cmsg_len;
 699	}
 700
 701again:
 702	err = sendmsg(sd, &m, 0);
 703	if (err < 0) {
 704		if (errno == EACCES && try_broadcast) {
 705			try_broadcast = 0;
 706			if (!set_broadcast(sd))
 707				goto again;
 708			errno = EACCES;
 709		}
 710
 711		log_err_errno("sendmsg failed");
 712		return 1;
 713	}
 714
 715	return 0;
 716}
 717
 718
 719static int send_msg(int sd, void *addr, socklen_t alen, struct sock_args *args)
 720{
 721	if (args->type == SOCK_STREAM) {
 722		if (write(sd, msg, msglen) < 0) {
 723			log_err_errno("write failed sending msg to peer");
 724			return 1;
 725		}
 726	} else if (args->ifindex && args->use_cmsg) {
 727		if (send_msg_cmsg(sd, addr, alen, args->ifindex, args->version))
 728			return 1;
 729	} else {
 730		if (send_msg_no_cmsg(sd, addr, alen))
 731			return 1;
 732	}
 733
 734	log_msg("Sent message:\n");
 735	log_msg("    %.24s%s\n", msg, msglen > 24 ? " ..." : "");
 736
 737	return 0;
 738}
 739
 740static int socket_read_dgram(int sd, struct sock_args *args)
 741{
 742	unsigned char addr[sizeof(struct sockaddr_in6)];
 743	struct sockaddr *sa = (struct sockaddr *) addr;
 744	socklen_t alen = sizeof(addr);
 745	struct iovec iov[2];
 746	struct msghdr m = {
 747		.msg_name = (caddr_t)addr,
 748		.msg_namelen = alen,
 749		.msg_iov = iov,
 750		.msg_iovlen = 1,
 751	};
 752	unsigned char cmsgbuf[256];
 753	struct cmsghdr *cm = (struct cmsghdr *)cmsgbuf;
 754	char buf[16*1024];
 755	int ifindex;
 756	int len;
 757
 758	iov[0].iov_base = (caddr_t)buf;
 759	iov[0].iov_len = sizeof(buf);
 760
 761	memset(cmsgbuf, 0, sizeof(cmsgbuf));
 762	m.msg_control = (caddr_t)cm;
 763	m.msg_controllen = sizeof(cmsgbuf);
 764
 765	len = recvmsg(sd, &m, 0);
 766	if (len == 0) {
 767		log_msg("peer closed connection.\n");
 768		return 0;
 769	} else if (len < 0) {
 770		log_msg("failed to read message: %d: %s\n",
 771			errno, strerror(errno));
 772		return -1;
 773	}
 774
 775	buf[len] = '\0';
 776
 777	log_address("Message from:", sa);
 778	log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
 779
 780	ifindex = get_index_from_cmsg(&m);
 781	if (args->expected_ifindex) {
 782		if (args->expected_ifindex != ifindex) {
 783			log_error("Device index mismatch: expected %d have %d\n",
 784				  args->expected_ifindex, ifindex);
 785			return -1;
 786		}
 787		log_msg("Device index matches: expected %d have %d\n",
 788			args->expected_ifindex, ifindex);
 789	}
 790
 791	if (!interactive && server_mode) {
 792		if (sa->sa_family == AF_INET6) {
 793			struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
 794			struct in6_addr *in6 = &s6->sin6_addr;
 795
 796			if (IN6_IS_ADDR_V4MAPPED(in6)) {
 797				const uint32_t *pa = (uint32_t *) &in6->s6_addr;
 798				struct in_addr in4;
 799				struct sockaddr_in *sin;
 800
 801				sin = (struct sockaddr_in *) addr;
 802				pa += 3;
 803				in4.s_addr = *pa;
 804				sin->sin_addr = in4;
 805				sin->sin_family = AF_INET;
 806				if (send_msg_cmsg(sd, addr, alen,
 807						  ifindex, AF_INET) < 0)
 808					goto out_err;
 809			}
 810		}
 811again:
 812		iov[0].iov_len = len;
 813
 814		if (args->version == AF_INET6) {
 815			struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
 816
 817			if (args->dev) {
 818				/* avoid PKTINFO conflicts with bindtodev */
 819				if (sendto(sd, buf, len, 0,
 820					   (void *) addr, alen) < 0)
 821					goto out_err;
 822			} else {
 823				/* kernel is allowing scope_id to be set to VRF
 824				 * index for LLA. for sends to global address
 825				 * reset scope id
 826				 */
 827				s6->sin6_scope_id = ifindex;
 828				if (sendmsg(sd, &m, 0) < 0)
 829					goto out_err;
 830			}
 831		} else {
 832			int err;
 833
 834			err = sendmsg(sd, &m, 0);
 835			if (err < 0) {
 836				if (errno == EACCES && try_broadcast) {
 837					try_broadcast = 0;
 838					if (!set_broadcast(sd))
 839						goto again;
 840					errno = EACCES;
 841				}
 842				goto out_err;
 843			}
 844		}
 845		log_msg("Sent message:\n");
 846		log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
 847	}
 848
 849	return 1;
 850out_err:
 851	log_err_errno("failed to send msg to peer");
 852	return -1;
 853}
 854
 855static int socket_read_stream(int sd)
 856{
 857	char buf[1024];
 858	int len;
 859
 860	len = read(sd, buf, sizeof(buf)-1);
 861	if (len == 0) {
 862		log_msg("client closed connection.\n");
 863		return 0;
 864	} else if (len < 0) {
 865		log_msg("failed to read message\n");
 866		return -1;
 867	}
 868
 869	buf[len] = '\0';
 870	log_msg("Incoming message:\n");
 871	log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
 872
 873	if (!interactive && server_mode) {
 874		if (write(sd, buf, len) < 0) {
 875			log_err_errno("failed to send buf");
 876			return -1;
 877		}
 878		log_msg("Sent message:\n");
 879		log_msg("     %.24s%s\n", buf, len > 24 ? " ..." : "");
 880	}
 881
 882	return 1;
 883}
 884
 885static int socket_read(int sd, struct sock_args *args)
 886{
 887	if (args->type == SOCK_STREAM)
 888		return socket_read_stream(sd);
 889
 890	return socket_read_dgram(sd, args);
 891}
 892
 893static int stdin_to_socket(int sd, int type, void *addr, socklen_t alen)
 894{
 895	char buf[1024];
 896	int len;
 897
 898	if (fgets(buf, sizeof(buf), stdin) == NULL)
 899		return 0;
 900
 901	len = strlen(buf);
 902	if (type == SOCK_STREAM) {
 903		if (write(sd, buf, len) < 0) {
 904			log_err_errno("failed to send buf");
 905			return -1;
 906		}
 907	} else {
 908		int err;
 909
 910again:
 911		err = sendto(sd, buf, len, 0, addr, alen);
 912		if (err < 0) {
 913			if (errno == EACCES && try_broadcast) {
 914				try_broadcast = 0;
 915				if (!set_broadcast(sd))
 916					goto again;
 917				errno = EACCES;
 918			}
 919			log_err_errno("failed to send msg to peer");
 920			return -1;
 921		}
 922	}
 923	log_msg("Sent message:\n");
 924	log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
 925
 926	return 1;
 927}
 928
 929static void set_recv_attr(int sd, int version)
 930{
 931	if (version == AF_INET6) {
 932		set_recvpktinfo_v6(sd);
 933		set_recverr_v6(sd);
 934	} else {
 935		set_pktinfo_v4(sd);
 936		set_recverr_v4(sd);
 937	}
 938}
 939
 940static int msg_loop(int client, int sd, void *addr, socklen_t alen,
 941		    struct sock_args *args)
 942{
 943	struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
 944	fd_set rfds;
 945	int nfds;
 946	int rc;
 947
 948	if (args->type != SOCK_STREAM)
 949		set_recv_attr(sd, args->version);
 950
 951	if (msg) {
 952		msglen = strlen(msg);
 953
 954		/* client sends first message */
 955		if (client) {
 956			if (send_msg(sd, addr, alen, args))
 957				return 1;
 958		}
 959		if (!interactive) {
 960			ptval = &timeout;
 961			if (!prog_timeout)
 962				timeout.tv_sec = 5;
 963		}
 964	}
 965
 966	nfds = interactive ? MAX(fileno(stdin), sd)  + 1 : sd + 1;
 967	while (1) {
 968		FD_ZERO(&rfds);
 969		FD_SET(sd, &rfds);
 970		if (interactive)
 971			FD_SET(fileno(stdin), &rfds);
 972
 973		rc = select(nfds, &rfds, NULL, NULL, ptval);
 974		if (rc < 0) {
 975			if (errno == EINTR)
 976				continue;
 977
 978			rc = 1;
 979			log_err_errno("select failed");
 980			break;
 981		} else if (rc == 0) {
 982			log_error("Timed out waiting for response\n");
 983			rc = 2;
 984			break;
 985		}
 986
 987		if (FD_ISSET(sd, &rfds)) {
 988			rc = socket_read(sd, args);
 989			if (rc < 0) {
 990				rc = 1;
 991				break;
 992			}
 993			if (rc == 0)
 994				break;
 995		}
 996
 997		rc = 0;
 998
 999		if (FD_ISSET(fileno(stdin), &rfds)) {
1000			if (stdin_to_socket(sd, args->type, addr, alen) <= 0)
1001				break;
1002		}
1003
1004		if (interactive)
1005			continue;
1006
1007		if (iter != -1) {
1008			--iter;
1009			if (iter == 0)
1010				break;
1011		}
1012
1013		log_msg("Going into quiet mode\n");
1014		quiet = 1;
1015
1016		if (client) {
1017			if (send_msg(sd, addr, alen, args)) {
1018				rc = 1;
1019				break;
1020			}
1021		}
1022	}
1023
1024	return rc;
1025}
1026
1027static int msock_init(struct sock_args *args, int server)
1028{
1029	uint32_t if_addr = htonl(INADDR_ANY);
1030	struct sockaddr_in laddr = {
1031		.sin_family = AF_INET,
1032		.sin_port = htons(args->port),
1033	};
1034	int one = 1;
1035	int sd;
1036
1037	if (!server && args->has_local_ip)
1038		if_addr = args->local_addr.in.s_addr;
1039
1040	sd = socket(PF_INET, SOCK_DGRAM, 0);
1041	if (sd < 0) {
1042		log_err_errno("socket");
1043		return -1;
1044	}
1045
1046	if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR,
1047		       (char *)&one, sizeof(one)) < 0) {
1048		log_err_errno("Setting SO_REUSEADDR error");
1049		goto out_err;
1050	}
1051
1052	if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST,
1053		       (char *)&one, sizeof(one)) < 0)
1054		log_err_errno("Setting SO_BROADCAST error");
1055
1056	if (args->dev && bind_to_device(sd, args->dev) != 0)
1057		goto out_err;
1058	else if (args->use_setsockopt &&
1059		 set_multicast_if(sd, args->ifindex))
1060		goto out_err;
1061
1062	laddr.sin_addr.s_addr = if_addr;
1063
1064	if (bind(sd, (struct sockaddr *) &laddr, sizeof(laddr)) < 0) {
1065		log_err_errno("bind failed");
1066		goto out_err;
1067	}
1068
1069	if (server &&
1070	    set_membership(sd, args->grp.s_addr,
1071			   args->local_addr.in.s_addr, args->ifindex))
1072		goto out_err;
1073
1074	return sd;
1075out_err:
1076	close(sd);
1077	return -1;
1078}
1079
1080static int msock_server(struct sock_args *args)
1081{
1082	return msock_init(args, 1);
1083}
1084
1085static int msock_client(struct sock_args *args)
1086{
1087	return msock_init(args, 0);
1088}
1089
1090static int bind_socket(int sd, struct sock_args *args)
1091{
1092	struct sockaddr_in serv_addr = {
1093		.sin_family = AF_INET,
1094	};
1095	struct sockaddr_in6 serv6_addr = {
1096		.sin6_family = AF_INET6,
1097	};
1098	void *addr;
1099	socklen_t alen;
1100
1101	if (!args->has_local_ip && args->type == SOCK_RAW)
1102		return 0;
1103
1104	switch (args->version) {
1105	case AF_INET:
1106		serv_addr.sin_port = htons(args->port);
1107		serv_addr.sin_addr = args->local_addr.in;
1108		addr = &serv_addr;
1109		alen = sizeof(serv_addr);
1110		break;
1111
1112	case AF_INET6:
1113		serv6_addr.sin6_port = htons(args->port);
1114		serv6_addr.sin6_addr = args->local_addr.in6;
1115		addr = &serv6_addr;
1116		alen = sizeof(serv6_addr);
1117		break;
1118
1119	default:
1120		log_error("Invalid address family\n");
1121		return -1;
1122	}
1123
1124	if (bind(sd, addr, alen) < 0) {
1125		log_err_errno("error binding socket");
1126		return -1;
1127	}
1128
1129	return 0;
1130}
1131
1132static int lsock_init(struct sock_args *args)
1133{
1134	long flags;
1135	int sd;
1136
1137	sd = socket(args->version, args->type, args->protocol);
1138	if (sd < 0) {
1139		log_err_errno("Error opening socket");
1140		return  -1;
1141	}
1142
1143	if (set_reuseaddr(sd) != 0)
1144		goto err;
1145
1146	if (set_reuseport(sd) != 0)
1147		goto err;
1148
1149	if (args->dev && bind_to_device(sd, args->dev) != 0)
1150		goto err;
1151	else if (args->use_setsockopt &&
1152		 set_unicast_if(sd, args->ifindex, args->version))
1153		goto err;
1154
1155	if (bind_socket(sd, args))
1156		goto err;
1157
1158	if (args->bind_test_only)
1159		goto out;
1160
1161	if (args->type == SOCK_STREAM && listen(sd, 1) < 0) {
1162		log_err_errno("listen failed");
1163		goto err;
1164	}
1165
1166	flags = fcntl(sd, F_GETFL);
1167	if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
1168		log_err_errno("Failed to set non-blocking option");
1169		goto err;
1170	}
1171
1172	if (fcntl(sd, F_SETFD, FD_CLOEXEC) < 0)
1173		log_err_errno("Failed to set close-on-exec flag");
1174
1175out:
1176	return sd;
1177
1178err:
1179	close(sd);
1180	return -1;
1181}
1182
1183static int do_server(struct sock_args *args)
1184{
1185	struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
1186	unsigned char addr[sizeof(struct sockaddr_in6)] = {};
1187	socklen_t alen = sizeof(addr);
1188	int lsd, csd = -1;
1189
1190	fd_set rfds;
1191	int rc;
1192
1193	if (prog_timeout)
1194		ptval = &timeout;
1195
1196	if (args->has_grp)
1197		lsd = msock_server(args);
1198	else
1199		lsd = lsock_init(args);
1200
1201	if (lsd < 0)
1202		return 1;
1203
1204	if (args->bind_test_only) {
1205		close(lsd);
1206		return 0;
1207	}
1208
1209	if (args->type != SOCK_STREAM) {
1210		rc = msg_loop(0, lsd, (void *) addr, alen, args);
1211		close(lsd);
1212		return rc;
1213	}
1214
1215	if (args->password && tcp_md5_remote(lsd, args)) {
1216		close(lsd);
1217		return 1;
1218	}
1219
1220	while (1) {
1221		log_msg("\n");
1222		log_msg("waiting for client connection.\n");
1223		FD_ZERO(&rfds);
1224		FD_SET(lsd, &rfds);
1225
1226		rc = select(lsd+1, &rfds, NULL, NULL, ptval);
1227		if (rc == 0) {
1228			rc = 2;
1229			break;
1230		}
1231
1232		if (rc < 0) {
1233			if (errno == EINTR)
1234				continue;
1235
1236			log_err_errno("select failed");
1237			break;
1238		}
1239
1240		if (FD_ISSET(lsd, &rfds)) {
1241
1242			csd = accept(lsd, (void *) addr, &alen);
1243			if (csd < 0) {
1244				log_err_errno("accept failed");
1245				break;
1246			}
1247
1248			rc = show_sockstat(csd, args);
1249			if (rc)
1250				break;
1251
1252			rc = check_device(csd, args);
1253			if (rc)
1254				break;
1255		}
1256
1257		rc = msg_loop(0, csd, (void *) addr, alen, args);
1258		close(csd);
1259
1260		if (!interactive)
1261			break;
1262	}
1263
1264	close(lsd);
1265
1266	return rc;
1267}
1268
1269static int wait_for_connect(int sd)
1270{
1271	struct timeval _tv = { .tv_sec = prog_timeout }, *tv = NULL;
1272	fd_set wfd;
1273	int val = 0, sz = sizeof(val);
1274	int rc;
1275
1276	FD_ZERO(&wfd);
1277	FD_SET(sd, &wfd);
1278
1279	if (prog_timeout)
1280		tv = &_tv;
1281
1282	rc = select(FD_SETSIZE, NULL, &wfd, NULL, tv);
1283	if (rc == 0) {
1284		log_error("connect timed out\n");
1285		return -2;
1286	} else if (rc < 0) {
1287		log_err_errno("select failed");
1288		return -3;
1289	}
1290
1291	if (getsockopt(sd, SOL_SOCKET, SO_ERROR, &val, (socklen_t *)&sz) < 0) {
1292		log_err_errno("getsockopt(SO_ERROR) failed");
1293		return -4;
1294	}
1295
1296	if (val != 0) {
1297		log_error("connect failed: %d: %s\n", val, strerror(val));
1298		return -1;
1299	}
1300
1301	return 0;
1302}
1303
1304static int connectsock(void *addr, socklen_t alen, struct sock_args *args)
1305{
1306	int sd, rc = -1;
1307	long flags;
1308
1309	sd = socket(args->version, args->type, args->protocol);
1310	if (sd < 0) {
1311		log_err_errno("Failed to create socket");
1312		return -1;
1313	}
1314
1315	flags = fcntl(sd, F_GETFL);
1316	if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
1317		log_err_errno("Failed to set non-blocking option");
1318		goto err;
1319	}
1320
1321	if (set_reuseport(sd) != 0)
1322		goto err;
1323
1324	if (args->dev && bind_to_device(sd, args->dev) != 0)
1325		goto err;
1326	else if (args->use_setsockopt &&
1327		 set_unicast_if(sd, args->ifindex, args->version))
1328		goto err;
1329
1330	if (args->has_local_ip && bind_socket(sd, args))
1331		goto err;
1332
1333	if (args->type != SOCK_STREAM)
1334		goto out;
1335
1336	if (args->password && tcp_md5sig(sd, addr, alen, args))
1337		goto err;
1338
1339	if (args->bind_test_only)
1340		goto out;
1341
1342	if (connect(sd, addr, alen) < 0) {
1343		if (errno != EINPROGRESS) {
1344			log_err_errno("Failed to connect to remote host");
1345			rc = -1;
1346			goto err;
1347		}
1348		rc = wait_for_connect(sd);
1349		if (rc < 0)
1350			goto err;
1351	}
1352out:
1353	return sd;
1354
1355err:
1356	close(sd);
1357	return rc;
1358}
1359
1360static int do_client(struct sock_args *args)
1361{
1362	struct sockaddr_in sin = {
1363		.sin_family = AF_INET,
1364	};
1365	struct sockaddr_in6 sin6 = {
1366		.sin6_family = AF_INET6,
1367	};
1368	void *addr;
1369	int alen;
1370	int rc = 0;
1371	int sd;
1372
1373	if (!args->has_remote_ip && !args->has_grp) {
1374		fprintf(stderr, "remote IP or multicast group not given\n");
1375		return 1;
1376	}
1377
1378	switch (args->version) {
1379	case AF_INET:
1380		sin.sin_port = htons(args->port);
1381		if (args->has_grp)
1382			sin.sin_addr = args->grp;
1383		else
1384			sin.sin_addr = args->remote_addr.in;
1385		addr = &sin;
1386		alen = sizeof(sin);
1387		break;
1388	case AF_INET6:
1389		sin6.sin6_port = htons(args->port);
1390		sin6.sin6_addr = args->remote_addr.in6;
1391		sin6.sin6_scope_id = args->scope_id;
1392		addr = &sin6;
1393		alen = sizeof(sin6);
1394		break;
1395	}
1396
1397	if (args->has_grp)
1398		sd = msock_client(args);
1399	else
1400		sd = connectsock(addr, alen, args);
1401
1402	if (sd < 0)
1403		return -sd;
1404
1405	if (args->bind_test_only)
1406		goto out;
1407
1408	if (args->type == SOCK_STREAM) {
1409		rc = show_sockstat(sd, args);
1410		if (rc != 0)
1411			goto out;
1412	}
1413
1414	rc = msg_loop(1, sd, addr, alen, args);
1415
1416out:
1417	close(sd);
1418
1419	return rc;
1420}
1421
1422enum addr_type {
1423	ADDR_TYPE_LOCAL,
1424	ADDR_TYPE_REMOTE,
1425	ADDR_TYPE_MCAST,
1426	ADDR_TYPE_EXPECTED_LOCAL,
1427	ADDR_TYPE_EXPECTED_REMOTE,
1428	ADDR_TYPE_MD5_PREFIX,
1429};
1430
1431static int convert_addr(struct sock_args *args, const char *_str,
1432			enum addr_type atype)
1433{
1434	int pfx_len_max = args->version == AF_INET6 ? 128 : 32;
1435	int family = args->version;
1436	char *str, *dev, *sep;
1437	struct in6_addr *in6;
1438	struct in_addr  *in;
1439	const char *desc;
1440	void *addr;
1441	int rc = 0;
1442
1443	str = strdup(_str);
1444	if (!str)
1445		return -ENOMEM;
1446
1447	switch (atype) {
1448	case ADDR_TYPE_LOCAL:
1449		desc = "local";
1450		addr = &args->local_addr;
1451		break;
1452	case ADDR_TYPE_REMOTE:
1453		desc = "remote";
1454		addr = &args->remote_addr;
1455		break;
1456	case ADDR_TYPE_MCAST:
1457		desc = "mcast grp";
1458		addr = &args->grp;
1459		break;
1460	case ADDR_TYPE_EXPECTED_LOCAL:
1461		desc = "expected local";
1462		addr = &args->expected_laddr;
1463		break;
1464	case ADDR_TYPE_EXPECTED_REMOTE:
1465		desc = "expected remote";
1466		addr = &args->expected_raddr;
1467		break;
1468	case ADDR_TYPE_MD5_PREFIX:
1469		desc = "md5 prefix";
1470		if (family == AF_INET) {
1471			args->md5_prefix.v4.sin_family = AF_INET;
1472			addr = &args->md5_prefix.v4.sin_addr;
1473		} else if (family == AF_INET6) {
1474			args->md5_prefix.v6.sin6_family = AF_INET6;
1475			addr = &args->md5_prefix.v6.sin6_addr;
1476		} else
1477			return 1;
1478
1479		sep = strchr(str, '/');
1480		if (sep) {
1481			*sep = '\0';
1482			sep++;
1483			if (str_to_uint(sep, 1, pfx_len_max,
1484					&args->prefix_len) != 0) {
1485				fprintf(stderr, "Invalid port\n");
1486				return 1;
1487			}
1488		} else {
1489			args->prefix_len = pfx_len_max;
1490		}
1491		break;
1492	default:
1493		log_error("unknown address type");
1494		exit(1);
1495	}
1496
1497	switch (family) {
1498	case AF_INET:
1499		in  = (struct in_addr *) addr;
1500		if (str) {
1501			if (inet_pton(AF_INET, str, in) == 0) {
1502				log_error("Invalid %s IP address\n", desc);
1503				rc = -1;
1504				goto out;
1505			}
1506		} else {
1507			in->s_addr = htonl(INADDR_ANY);
1508		}
1509		break;
1510
1511	case AF_INET6:
1512		dev = strchr(str, '%');
1513		if (dev) {
1514			*dev = '\0';
1515			dev++;
1516		}
1517
1518		in6 = (struct in6_addr *) addr;
1519		if (str) {
1520			if (inet_pton(AF_INET6, str, in6) == 0) {
1521				log_error("Invalid %s IPv6 address\n", desc);
1522				rc = -1;
1523				goto out;
1524			}
1525		} else {
1526			*in6 = in6addr_any;
1527		}
1528		if (dev) {
1529			args->scope_id = get_ifidx(dev);
1530			if (args->scope_id < 0) {
1531				log_error("Invalid scope on %s IPv6 address\n",
1532					  desc);
1533				rc = -1;
1534				goto out;
1535			}
1536		}
1537		break;
1538
1539	default:
1540		log_error("Invalid address family\n");
1541	}
1542
1543out:
1544	free(str);
1545	return rc;
1546}
1547
1548static char *random_msg(int len)
1549{
1550	int i, n = 0, olen = len + 1;
1551	char *m;
1552
1553	if (len <= 0)
1554		return NULL;
1555
1556	m = malloc(olen);
1557	if (!m)
1558		return NULL;
1559
1560	while (len > 26) {
1561		i = snprintf(m + n, olen - n, "%.26s",
1562			     "abcdefghijklmnopqrstuvwxyz");
1563		n += i;
1564		len -= i;
1565	}
1566	i = snprintf(m + n, olen - n, "%.*s", len,
1567		     "abcdefghijklmnopqrstuvwxyz");
1568	return m;
1569}
1570
1571#define GETOPT_STR  "sr:l:p:t:g:P:DRn:M:m:d:SCi6L:0:1:2:Fbq"
1572
1573static void print_usage(char *prog)
1574{
1575	printf(
1576	"usage: %s OPTS\n"
1577	"Required:\n"
1578	"    -r addr       remote address to connect to (client mode only)\n"
1579	"    -p port       port to connect to (client mode)/listen on (server mode)\n"
1580	"                  (default: %d)\n"
1581	"    -s            server mode (default: client mode)\n"
1582	"    -t            timeout seconds (default: none)\n"
1583	"\n"
1584	"Optional:\n"
1585	"    -F            Restart server loop\n"
1586	"    -6            IPv6 (default is IPv4)\n"
1587	"    -P proto      protocol for socket: icmp, ospf (default: none)\n"
1588	"    -D|R          datagram (D) / raw (R) socket (default stream)\n"
1589	"    -l addr       local address to bind to\n"
1590	"\n"
1591	"    -d dev        bind socket to given device name\n"
1592	"    -S            use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n"
1593	"                  to set device binding\n"
1594	"    -C            use cmsg and IP_PKTINFO to specify device binding\n"
1595	"\n"
1596	"    -L len        send random message of given length\n"
1597	"    -n num        number of times to send message\n"
1598	"\n"
1599	"    -M password   use MD5 sum protection\n"
1600	"    -m prefix/len prefix and length to use for MD5 key\n"
1601	"    -g grp        multicast group (e.g., 239.1.1.1)\n"
1602	"    -i            interactive mode (default is echo and terminate)\n"
1603	"\n"
1604	"    -0 addr       Expected local address\n"
1605	"    -1 addr       Expected remote address\n"
1606	"    -2 dev        Expected device name (or index) to receive packet\n"
1607	"\n"
1608	"    -b            Bind test only.\n"
1609	"    -q            Be quiet. Run test without printing anything.\n"
1610	, prog, DEFAULT_PORT);
1611}
1612
1613int main(int argc, char *argv[])
1614{
1615	struct sock_args args = {
1616		.version = AF_INET,
1617		.type    = SOCK_STREAM,
1618		.port    = DEFAULT_PORT,
1619	};
1620	struct protoent *pe;
1621	unsigned int tmp;
1622	int forever = 0;
1623
1624	/* process inputs */
1625	extern char *optarg;
1626	int rc = 0;
1627
1628	/*
1629	 * process input args
1630	 */
1631
1632	while ((rc = getopt(argc, argv, GETOPT_STR)) != -1) {
1633		switch (rc) {
1634		case 's':
1635			server_mode = 1;
1636			break;
1637		case 'F':
1638			forever = 1;
1639			break;
1640		case 'l':
1641			args.has_local_ip = 1;
1642			if (convert_addr(&args, optarg, ADDR_TYPE_LOCAL) < 0)
1643				return 1;
1644			break;
1645		case 'r':
1646			args.has_remote_ip = 1;
1647			if (convert_addr(&args, optarg, ADDR_TYPE_REMOTE) < 0)
1648				return 1;
1649			break;
1650		case 'p':
1651			if (str_to_uint(optarg, 1, 65535, &tmp) != 0) {
1652				fprintf(stderr, "Invalid port\n");
1653				return 1;
1654			}
1655			args.port = (unsigned short) tmp;
1656			break;
1657		case 't':
1658			if (str_to_uint(optarg, 0, INT_MAX,
1659					&prog_timeout) != 0) {
1660				fprintf(stderr, "Invalid timeout\n");
1661				return 1;
1662			}
1663			break;
1664		case 'D':
1665			args.type = SOCK_DGRAM;
1666			break;
1667		case 'R':
1668			args.type = SOCK_RAW;
1669			args.port = 0;
1670			break;
1671		case 'P':
1672			pe = getprotobyname(optarg);
1673			if (pe) {
1674				args.protocol = pe->p_proto;
1675			} else {
1676				if (str_to_uint(optarg, 0, 0xffff, &tmp) != 0) {
1677					fprintf(stderr, "Invalid protocol\n");
1678					return 1;
1679				}
1680				args.protocol = tmp;
1681			}
1682			break;
1683		case 'n':
1684			iter = atoi(optarg);
1685			break;
1686		case 'L':
1687			msg = random_msg(atoi(optarg));
1688			break;
1689		case 'M':
1690			args.password = optarg;
1691			break;
1692		case 'm':
1693			if (convert_addr(&args, optarg, ADDR_TYPE_MD5_PREFIX) < 0)
1694				return 1;
1695			break;
1696		case 'S':
1697			args.use_setsockopt = 1;
1698			break;
1699		case 'C':
1700			args.use_cmsg = 1;
1701			break;
1702		case 'd':
1703			args.dev = optarg;
1704			args.ifindex = get_ifidx(optarg);
1705			if (args.ifindex < 0) {
1706				fprintf(stderr, "Invalid device name\n");
1707				return 1;
1708			}
1709			break;
1710		case 'i':
1711			interactive = 1;
1712			break;
1713		case 'g':
1714			args.has_grp = 1;
1715			if (convert_addr(&args, optarg, ADDR_TYPE_MCAST) < 0)
1716				return 1;
1717			args.type = SOCK_DGRAM;
1718			break;
1719		case '6':
1720			args.version = AF_INET6;
1721			break;
1722		case 'b':
1723			args.bind_test_only = 1;
1724			break;
1725		case '0':
1726			args.has_expected_laddr = 1;
1727			if (convert_addr(&args, optarg,
1728					 ADDR_TYPE_EXPECTED_LOCAL))
1729				return 1;
1730			break;
1731		case '1':
1732			args.has_expected_raddr = 1;
1733			if (convert_addr(&args, optarg,
1734					 ADDR_TYPE_EXPECTED_REMOTE))
1735				return 1;
1736
1737			break;
1738		case '2':
1739			if (str_to_uint(optarg, 0, INT_MAX, &tmp) == 0) {
1740				args.expected_ifindex = (int)tmp;
1741			} else {
1742				args.expected_ifindex = get_ifidx(optarg);
1743				if (args.expected_ifindex < 0) {
1744					fprintf(stderr,
1745						"Invalid expected device\n");
1746					return 1;
1747				}
1748			}
1749			break;
1750		case 'q':
1751			quiet = 1;
1752			break;
1753		default:
1754			print_usage(argv[0]);
1755			return 1;
1756		}
1757	}
1758
1759	if (args.password &&
1760	    ((!args.has_remote_ip && !args.prefix_len) || args.type != SOCK_STREAM)) {
1761		log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n");
1762		return 1;
1763	}
1764
1765	if (args.prefix_len && !args.password) {
1766		log_error("Prefix range for MD5 protection specified without a password\n");
1767		return 1;
1768	}
1769
1770	if ((args.use_setsockopt || args.use_cmsg) && !args.ifindex) {
1771		fprintf(stderr, "Device binding not specified\n");
1772		return 1;
1773	}
1774	if (args.use_setsockopt || args.use_cmsg)
1775		args.dev = NULL;
1776
1777	if (iter == 0) {
1778		fprintf(stderr, "Invalid number of messages to send\n");
1779		return 1;
1780	}
1781
1782	if (args.type == SOCK_STREAM && !args.protocol)
1783		args.protocol = IPPROTO_TCP;
1784	if (args.type == SOCK_DGRAM && !args.protocol)
1785		args.protocol = IPPROTO_UDP;
1786
1787	if ((args.type == SOCK_STREAM || args.type == SOCK_DGRAM) &&
1788	     args.port == 0) {
1789		fprintf(stderr, "Invalid port number\n");
1790		return 1;
1791	}
1792
1793	if (!server_mode && !args.has_grp &&
1794	    !args.has_remote_ip && !args.has_local_ip) {
1795		fprintf(stderr,
1796			"Local (server mode) or remote IP (client IP) required\n");
1797		return 1;
1798	}
1799
1800	if (interactive) {
1801		prog_timeout = 0;
1802		msg = NULL;
1803	}
1804
1805	if (server_mode) {
1806		do {
1807			rc = do_server(&args);
1808		} while (forever);
1809
1810		return rc;
1811	}
1812	return do_client(&args);
1813}