mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-28 06:34:12 +08:00
8a0697f23e
This adds MSG_PEEK test for SOCK_SEQPACKET. It works in the same way as SOCK_STREAM test, except it also tests MSG_TRUNC flag. Signed-off-by: Arseniy Krasnov <AVKrasnov@sberdevices.ru> Reviewed-by: Stefano Garzarella <sgarzare@redhat.com> Acked-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Paolo Abeni <pabeni@redhat.com>
1399 lines
29 KiB
C
1399 lines
29 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* vsock_test - vsock.ko test suite
|
|
*
|
|
* Copyright (C) 2017 Red Hat, Inc.
|
|
*
|
|
* Author: Stefan Hajnoczi <stefanha@redhat.com>
|
|
*/
|
|
|
|
#include <getopt.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <unistd.h>
|
|
#include <linux/kernel.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <time.h>
|
|
#include <sys/mman.h>
|
|
#include <poll.h>
|
|
|
|
#include "timeout.h"
|
|
#include "control.h"
|
|
#include "util.h"
|
|
|
|
static void test_stream_connection_reset(const struct test_opts *opts)
|
|
{
|
|
union {
|
|
struct sockaddr sa;
|
|
struct sockaddr_vm svm;
|
|
} addr = {
|
|
.svm = {
|
|
.svm_family = AF_VSOCK,
|
|
.svm_port = 1234,
|
|
.svm_cid = opts->peer_cid,
|
|
},
|
|
};
|
|
int ret;
|
|
int fd;
|
|
|
|
fd = socket(AF_VSOCK, SOCK_STREAM, 0);
|
|
|
|
timeout_begin(TIMEOUT);
|
|
do {
|
|
ret = connect(fd, &addr.sa, sizeof(addr.svm));
|
|
timeout_check("connect");
|
|
} while (ret < 0 && errno == EINTR);
|
|
timeout_end();
|
|
|
|
if (ret != -1) {
|
|
fprintf(stderr, "expected connect(2) failure, got %d\n", ret);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
if (errno != ECONNRESET) {
|
|
fprintf(stderr, "unexpected connect(2) errno %d\n", errno);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_bind_only_client(const struct test_opts *opts)
|
|
{
|
|
union {
|
|
struct sockaddr sa;
|
|
struct sockaddr_vm svm;
|
|
} addr = {
|
|
.svm = {
|
|
.svm_family = AF_VSOCK,
|
|
.svm_port = 1234,
|
|
.svm_cid = opts->peer_cid,
|
|
},
|
|
};
|
|
int ret;
|
|
int fd;
|
|
|
|
/* Wait for the server to be ready */
|
|
control_expectln("BIND");
|
|
|
|
fd = socket(AF_VSOCK, SOCK_STREAM, 0);
|
|
|
|
timeout_begin(TIMEOUT);
|
|
do {
|
|
ret = connect(fd, &addr.sa, sizeof(addr.svm));
|
|
timeout_check("connect");
|
|
} while (ret < 0 && errno == EINTR);
|
|
timeout_end();
|
|
|
|
if (ret != -1) {
|
|
fprintf(stderr, "expected connect(2) failure, got %d\n", ret);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
if (errno != ECONNRESET) {
|
|
fprintf(stderr, "unexpected connect(2) errno %d\n", errno);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Notify the server that the client has finished */
|
|
control_writeln("DONE");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_bind_only_server(const struct test_opts *opts)
|
|
{
|
|
union {
|
|
struct sockaddr sa;
|
|
struct sockaddr_vm svm;
|
|
} addr = {
|
|
.svm = {
|
|
.svm_family = AF_VSOCK,
|
|
.svm_port = 1234,
|
|
.svm_cid = VMADDR_CID_ANY,
|
|
},
|
|
};
|
|
int fd;
|
|
|
|
fd = socket(AF_VSOCK, SOCK_STREAM, 0);
|
|
|
|
if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) {
|
|
perror("bind");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Notify the client that the server is ready */
|
|
control_writeln("BIND");
|
|
|
|
/* Wait for the client to finish */
|
|
control_expectln("DONE");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_client_close_client(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
|
|
fd = vsock_stream_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
send_byte(fd, 1, 0);
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_client_close_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
|
|
fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Wait for the remote to close the connection, before check
|
|
* -EPIPE error on send.
|
|
*/
|
|
vsock_wait_remote_close(fd);
|
|
|
|
send_byte(fd, -EPIPE, 0);
|
|
recv_byte(fd, 1, 0);
|
|
recv_byte(fd, 0, 0);
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_server_close_client(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
|
|
fd = vsock_stream_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Wait for the remote to close the connection, before check
|
|
* -EPIPE error on send.
|
|
*/
|
|
vsock_wait_remote_close(fd);
|
|
|
|
send_byte(fd, -EPIPE, 0);
|
|
recv_byte(fd, 1, 0);
|
|
recv_byte(fd, 0, 0);
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_server_close_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
|
|
fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
send_byte(fd, 1, 0);
|
|
close(fd);
|
|
}
|
|
|
|
/* With the standard socket sizes, VMCI is able to support about 100
|
|
* concurrent stream connections.
|
|
*/
|
|
#define MULTICONN_NFDS 100
|
|
|
|
static void test_stream_multiconn_client(const struct test_opts *opts)
|
|
{
|
|
int fds[MULTICONN_NFDS];
|
|
int i;
|
|
|
|
for (i = 0; i < MULTICONN_NFDS; i++) {
|
|
fds[i] = vsock_stream_connect(opts->peer_cid, 1234);
|
|
if (fds[i] < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < MULTICONN_NFDS; i++) {
|
|
if (i % 2)
|
|
recv_byte(fds[i], 1, 0);
|
|
else
|
|
send_byte(fds[i], 1, 0);
|
|
}
|
|
|
|
for (i = 0; i < MULTICONN_NFDS; i++)
|
|
close(fds[i]);
|
|
}
|
|
|
|
static void test_stream_multiconn_server(const struct test_opts *opts)
|
|
{
|
|
int fds[MULTICONN_NFDS];
|
|
int i;
|
|
|
|
for (i = 0; i < MULTICONN_NFDS; i++) {
|
|
fds[i] = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fds[i] < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < MULTICONN_NFDS; i++) {
|
|
if (i % 2)
|
|
send_byte(fds[i], 1, 0);
|
|
else
|
|
recv_byte(fds[i], 1, 0);
|
|
}
|
|
|
|
for (i = 0; i < MULTICONN_NFDS; i++)
|
|
close(fds[i]);
|
|
}
|
|
|
|
#define MSG_PEEK_BUF_LEN 64
|
|
|
|
static void test_msg_peek_client(const struct test_opts *opts,
|
|
bool seqpacket)
|
|
{
|
|
unsigned char buf[MSG_PEEK_BUF_LEN];
|
|
ssize_t send_size;
|
|
int fd;
|
|
int i;
|
|
|
|
if (seqpacket)
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
else
|
|
fd = vsock_stream_connect(opts->peer_cid, 1234);
|
|
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
for (i = 0; i < sizeof(buf); i++)
|
|
buf[i] = rand() & 0xFF;
|
|
|
|
control_expectln("SRVREADY");
|
|
|
|
send_size = send(fd, buf, sizeof(buf), 0);
|
|
|
|
if (send_size < 0) {
|
|
perror("send");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (send_size != sizeof(buf)) {
|
|
fprintf(stderr, "Invalid send size %zi\n", send_size);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_msg_peek_server(const struct test_opts *opts,
|
|
bool seqpacket)
|
|
{
|
|
unsigned char buf_half[MSG_PEEK_BUF_LEN / 2];
|
|
unsigned char buf_normal[MSG_PEEK_BUF_LEN];
|
|
unsigned char buf_peek[MSG_PEEK_BUF_LEN];
|
|
ssize_t res;
|
|
int fd;
|
|
|
|
if (seqpacket)
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
else
|
|
fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Peek from empty socket. */
|
|
res = recv(fd, buf_peek, sizeof(buf_peek), MSG_PEEK | MSG_DONTWAIT);
|
|
if (res != -1) {
|
|
fprintf(stderr, "expected recv(2) failure, got %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (errno != EAGAIN) {
|
|
perror("EAGAIN expected");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("SRVREADY");
|
|
|
|
/* Peek part of data. */
|
|
res = recv(fd, buf_half, sizeof(buf_half), MSG_PEEK);
|
|
if (res != sizeof(buf_half)) {
|
|
fprintf(stderr, "recv(2) + MSG_PEEK, expected %zu, got %zi\n",
|
|
sizeof(buf_half), res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Peek whole data. */
|
|
res = recv(fd, buf_peek, sizeof(buf_peek), MSG_PEEK);
|
|
if (res != sizeof(buf_peek)) {
|
|
fprintf(stderr, "recv(2) + MSG_PEEK, expected %zu, got %zi\n",
|
|
sizeof(buf_peek), res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Compare partial and full peek. */
|
|
if (memcmp(buf_half, buf_peek, sizeof(buf_half))) {
|
|
fprintf(stderr, "Partial peek data mismatch\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (seqpacket) {
|
|
/* This type of socket supports MSG_TRUNC flag,
|
|
* so check it with MSG_PEEK. We must get length
|
|
* of the message.
|
|
*/
|
|
res = recv(fd, buf_half, sizeof(buf_half), MSG_PEEK |
|
|
MSG_TRUNC);
|
|
if (res != sizeof(buf_peek)) {
|
|
fprintf(stderr,
|
|
"recv(2) + MSG_PEEK | MSG_TRUNC, exp %zu, got %zi\n",
|
|
sizeof(buf_half), res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
res = recv(fd, buf_normal, sizeof(buf_normal), 0);
|
|
if (res != sizeof(buf_normal)) {
|
|
fprintf(stderr, "recv(2), expected %zu, got %zi\n",
|
|
sizeof(buf_normal), res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Compare full peek and normal read. */
|
|
if (memcmp(buf_peek, buf_normal, sizeof(buf_peek))) {
|
|
fprintf(stderr, "Full peek data mismatch\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_msg_peek_client(const struct test_opts *opts)
|
|
{
|
|
return test_msg_peek_client(opts, false);
|
|
}
|
|
|
|
static void test_stream_msg_peek_server(const struct test_opts *opts)
|
|
{
|
|
return test_msg_peek_server(opts, false);
|
|
}
|
|
|
|
#define SOCK_BUF_SIZE (2 * 1024 * 1024)
|
|
#define MAX_MSG_SIZE (32 * 1024)
|
|
|
|
static void test_seqpacket_msg_bounds_client(const struct test_opts *opts)
|
|
{
|
|
unsigned long curr_hash;
|
|
int page_size;
|
|
int msg_count;
|
|
int fd;
|
|
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Wait, until receiver sets buffer size. */
|
|
control_expectln("SRVREADY");
|
|
|
|
curr_hash = 0;
|
|
page_size = getpagesize();
|
|
msg_count = SOCK_BUF_SIZE / MAX_MSG_SIZE;
|
|
|
|
for (int i = 0; i < msg_count; i++) {
|
|
ssize_t send_size;
|
|
size_t buf_size;
|
|
int flags;
|
|
void *buf;
|
|
|
|
/* Use "small" buffers and "big" buffers. */
|
|
if (i & 1)
|
|
buf_size = page_size +
|
|
(rand() % (MAX_MSG_SIZE - page_size));
|
|
else
|
|
buf_size = 1 + (rand() % page_size);
|
|
|
|
buf = malloc(buf_size);
|
|
|
|
if (!buf) {
|
|
perror("malloc");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
memset(buf, rand() & 0xff, buf_size);
|
|
/* Set at least one MSG_EOR + some random. */
|
|
if (i == (msg_count / 2) || (rand() & 1)) {
|
|
flags = MSG_EOR;
|
|
curr_hash++;
|
|
} else {
|
|
flags = 0;
|
|
}
|
|
|
|
send_size = send(fd, buf, buf_size, flags);
|
|
|
|
if (send_size < 0) {
|
|
perror("send");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (send_size != buf_size) {
|
|
fprintf(stderr, "Invalid send size\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/*
|
|
* Hash sum is computed at both client and server in
|
|
* the same way:
|
|
* H += hash('message data')
|
|
* Such hash "controls" both data integrity and message
|
|
* bounds. After data exchange, both sums are compared
|
|
* using control socket, and if message bounds wasn't
|
|
* broken - two values must be equal.
|
|
*/
|
|
curr_hash += hash_djb2(buf, buf_size);
|
|
free(buf);
|
|
}
|
|
|
|
control_writeln("SENDDONE");
|
|
control_writeulong(curr_hash);
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_msg_bounds_server(const struct test_opts *opts)
|
|
{
|
|
unsigned long sock_buf_size;
|
|
unsigned long remote_hash;
|
|
unsigned long curr_hash;
|
|
int fd;
|
|
char buf[MAX_MSG_SIZE];
|
|
struct msghdr msg = {0};
|
|
struct iovec iov = {0};
|
|
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
sock_buf_size = SOCK_BUF_SIZE;
|
|
|
|
if (setsockopt(fd, AF_VSOCK, SO_VM_SOCKETS_BUFFER_MAX_SIZE,
|
|
&sock_buf_size, sizeof(sock_buf_size))) {
|
|
perror("setsockopt(SO_VM_SOCKETS_BUFFER_MAX_SIZE)");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (setsockopt(fd, AF_VSOCK, SO_VM_SOCKETS_BUFFER_SIZE,
|
|
&sock_buf_size, sizeof(sock_buf_size))) {
|
|
perror("setsockopt(SO_VM_SOCKETS_BUFFER_SIZE)");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Ready to receive data. */
|
|
control_writeln("SRVREADY");
|
|
/* Wait, until peer sends whole data. */
|
|
control_expectln("SENDDONE");
|
|
iov.iov_base = buf;
|
|
iov.iov_len = sizeof(buf);
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
|
|
curr_hash = 0;
|
|
|
|
while (1) {
|
|
ssize_t recv_size;
|
|
|
|
recv_size = recvmsg(fd, &msg, 0);
|
|
|
|
if (!recv_size)
|
|
break;
|
|
|
|
if (recv_size < 0) {
|
|
perror("recvmsg");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (msg.msg_flags & MSG_EOR)
|
|
curr_hash++;
|
|
|
|
curr_hash += hash_djb2(msg.msg_iov[0].iov_base, recv_size);
|
|
}
|
|
|
|
close(fd);
|
|
remote_hash = control_readulong();
|
|
|
|
if (curr_hash != remote_hash) {
|
|
fprintf(stderr, "Message bounds broken\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
#define MESSAGE_TRUNC_SZ 32
|
|
static void test_seqpacket_msg_trunc_client(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
char buf[MESSAGE_TRUNC_SZ];
|
|
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (send(fd, buf, sizeof(buf), 0) != sizeof(buf)) {
|
|
perror("send failed");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("SENDDONE");
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_msg_trunc_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
char buf[MESSAGE_TRUNC_SZ / 2];
|
|
struct msghdr msg = {0};
|
|
struct iovec iov = {0};
|
|
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_expectln("SENDDONE");
|
|
iov.iov_base = buf;
|
|
iov.iov_len = sizeof(buf);
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
|
|
ssize_t ret = recvmsg(fd, &msg, MSG_TRUNC);
|
|
|
|
if (ret != MESSAGE_TRUNC_SZ) {
|
|
printf("%zi\n", ret);
|
|
perror("MSG_TRUNC doesn't work");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (!(msg.msg_flags & MSG_TRUNC)) {
|
|
fprintf(stderr, "MSG_TRUNC expected\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static time_t current_nsec(void)
|
|
{
|
|
struct timespec ts;
|
|
|
|
if (clock_gettime(CLOCK_REALTIME, &ts)) {
|
|
perror("clock_gettime(3) failed");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
return (ts.tv_sec * 1000000000ULL) + ts.tv_nsec;
|
|
}
|
|
|
|
#define RCVTIMEO_TIMEOUT_SEC 1
|
|
#define READ_OVERHEAD_NSEC 250000000 /* 0.25 sec */
|
|
|
|
static void test_seqpacket_timeout_client(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
struct timeval tv;
|
|
char dummy;
|
|
time_t read_enter_ns;
|
|
time_t read_overhead_ns;
|
|
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
tv.tv_sec = RCVTIMEO_TIMEOUT_SEC;
|
|
tv.tv_usec = 0;
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, (void *)&tv, sizeof(tv)) == -1) {
|
|
perror("setsockopt(SO_RCVTIMEO)");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
read_enter_ns = current_nsec();
|
|
|
|
if (read(fd, &dummy, sizeof(dummy)) != -1) {
|
|
fprintf(stderr,
|
|
"expected 'dummy' read(2) failure\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (errno != EAGAIN) {
|
|
perror("EAGAIN expected");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
read_overhead_ns = current_nsec() - read_enter_ns -
|
|
1000000000ULL * RCVTIMEO_TIMEOUT_SEC;
|
|
|
|
if (read_overhead_ns > READ_OVERHEAD_NSEC) {
|
|
fprintf(stderr,
|
|
"too much time in read(2), %lu > %i ns\n",
|
|
read_overhead_ns, READ_OVERHEAD_NSEC);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("WAITDONE");
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_timeout_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_expectln("WAITDONE");
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_bigmsg_client(const struct test_opts *opts)
|
|
{
|
|
unsigned long sock_buf_size;
|
|
ssize_t send_size;
|
|
socklen_t len;
|
|
void *data;
|
|
int fd;
|
|
|
|
len = sizeof(sock_buf_size);
|
|
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (getsockopt(fd, AF_VSOCK, SO_VM_SOCKETS_BUFFER_SIZE,
|
|
&sock_buf_size, &len)) {
|
|
perror("getsockopt");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
sock_buf_size++;
|
|
|
|
data = malloc(sock_buf_size);
|
|
if (!data) {
|
|
perror("malloc");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
send_size = send(fd, data, sock_buf_size, 0);
|
|
if (send_size != -1) {
|
|
fprintf(stderr, "expected 'send(2)' failure, got %zi\n",
|
|
send_size);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (errno != EMSGSIZE) {
|
|
fprintf(stderr, "expected EMSGSIZE in 'errno', got %i\n",
|
|
errno);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("CLISENT");
|
|
|
|
free(data);
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_bigmsg_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_expectln("CLISENT");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
#define BUF_PATTERN_1 'a'
|
|
#define BUF_PATTERN_2 'b'
|
|
|
|
static void test_seqpacket_invalid_rec_buffer_client(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
unsigned char *buf1;
|
|
unsigned char *buf2;
|
|
int buf_size = getpagesize() * 3;
|
|
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
buf1 = malloc(buf_size);
|
|
if (!buf1) {
|
|
perror("'malloc()' for 'buf1'");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
buf2 = malloc(buf_size);
|
|
if (!buf2) {
|
|
perror("'malloc()' for 'buf2'");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
memset(buf1, BUF_PATTERN_1, buf_size);
|
|
memset(buf2, BUF_PATTERN_2, buf_size);
|
|
|
|
if (send(fd, buf1, buf_size, 0) != buf_size) {
|
|
perror("send failed");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (send(fd, buf2, buf_size, 0) != buf_size) {
|
|
perror("send failed");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_invalid_rec_buffer_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
unsigned char *broken_buf;
|
|
unsigned char *valid_buf;
|
|
int page_size = getpagesize();
|
|
int buf_size = page_size * 3;
|
|
ssize_t res;
|
|
int prot = PROT_READ | PROT_WRITE;
|
|
int flags = MAP_PRIVATE | MAP_ANONYMOUS;
|
|
int i;
|
|
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Setup first buffer. */
|
|
broken_buf = mmap(NULL, buf_size, prot, flags, -1, 0);
|
|
if (broken_buf == MAP_FAILED) {
|
|
perror("mmap for 'broken_buf'");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Unmap "hole" in buffer. */
|
|
if (munmap(broken_buf + page_size, page_size)) {
|
|
perror("'broken_buf' setup");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
valid_buf = mmap(NULL, buf_size, prot, flags, -1, 0);
|
|
if (valid_buf == MAP_FAILED) {
|
|
perror("mmap for 'valid_buf'");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Try to fill buffer with unmapped middle. */
|
|
res = read(fd, broken_buf, buf_size);
|
|
if (res != -1) {
|
|
fprintf(stderr,
|
|
"expected 'broken_buf' read(2) failure, got %zi\n",
|
|
res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (errno != EFAULT) {
|
|
perror("unexpected errno of 'broken_buf'");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Try to fill valid buffer. */
|
|
res = read(fd, valid_buf, buf_size);
|
|
if (res < 0) {
|
|
perror("unexpected 'valid_buf' read(2) failure");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (res != buf_size) {
|
|
fprintf(stderr,
|
|
"invalid 'valid_buf' read(2), expected %i, got %zi\n",
|
|
buf_size, res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
for (i = 0; i < buf_size; i++) {
|
|
if (valid_buf[i] != BUF_PATTERN_2) {
|
|
fprintf(stderr,
|
|
"invalid pattern for 'valid_buf' at %i, expected %hhX, got %hhX\n",
|
|
i, BUF_PATTERN_2, valid_buf[i]);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
/* Unmap buffers. */
|
|
munmap(broken_buf, page_size);
|
|
munmap(broken_buf + page_size * 2, page_size);
|
|
munmap(valid_buf, buf_size);
|
|
close(fd);
|
|
}
|
|
|
|
#define RCVLOWAT_BUF_SIZE 128
|
|
|
|
static void test_stream_poll_rcvlowat_server(const struct test_opts *opts)
|
|
{
|
|
int fd;
|
|
int i;
|
|
|
|
fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Send 1 byte. */
|
|
send_byte(fd, 1, 0);
|
|
|
|
control_writeln("SRVSENT");
|
|
|
|
/* Wait until client is ready to receive rest of data. */
|
|
control_expectln("CLNSENT");
|
|
|
|
for (i = 0; i < RCVLOWAT_BUF_SIZE - 1; i++)
|
|
send_byte(fd, 1, 0);
|
|
|
|
/* Keep socket in active state. */
|
|
control_expectln("POLLDONE");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_poll_rcvlowat_client(const struct test_opts *opts)
|
|
{
|
|
unsigned long lowat_val = RCVLOWAT_BUF_SIZE;
|
|
char buf[RCVLOWAT_BUF_SIZE];
|
|
struct pollfd fds;
|
|
ssize_t read_res;
|
|
short poll_flags;
|
|
int fd;
|
|
|
|
fd = vsock_stream_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_RCVLOWAT,
|
|
&lowat_val, sizeof(lowat_val))) {
|
|
perror("setsockopt(SO_RCVLOWAT)");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_expectln("SRVSENT");
|
|
|
|
/* At this point, server sent 1 byte. */
|
|
fds.fd = fd;
|
|
poll_flags = POLLIN | POLLRDNORM;
|
|
fds.events = poll_flags;
|
|
|
|
/* Try to wait for 1 sec. */
|
|
if (poll(&fds, 1, 1000) < 0) {
|
|
perror("poll");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* poll() must return nothing. */
|
|
if (fds.revents) {
|
|
fprintf(stderr, "Unexpected poll result %hx\n",
|
|
fds.revents);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Tell server to send rest of data. */
|
|
control_writeln("CLNSENT");
|
|
|
|
/* Poll for data. */
|
|
if (poll(&fds, 1, 10000) < 0) {
|
|
perror("poll");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Only these two bits are expected. */
|
|
if (fds.revents != poll_flags) {
|
|
fprintf(stderr, "Unexpected poll result %hx\n",
|
|
fds.revents);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Use MSG_DONTWAIT, if call is going to wait, EAGAIN
|
|
* will be returned.
|
|
*/
|
|
read_res = recv(fd, buf, sizeof(buf), MSG_DONTWAIT);
|
|
if (read_res != RCVLOWAT_BUF_SIZE) {
|
|
fprintf(stderr, "Unexpected recv result %zi\n",
|
|
read_res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("POLLDONE");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
#define INV_BUF_TEST_DATA_LEN 512
|
|
|
|
static void test_inv_buf_client(const struct test_opts *opts, bool stream)
|
|
{
|
|
unsigned char data[INV_BUF_TEST_DATA_LEN] = {0};
|
|
ssize_t ret;
|
|
int fd;
|
|
|
|
if (stream)
|
|
fd = vsock_stream_connect(opts->peer_cid, 1234);
|
|
else
|
|
fd = vsock_seqpacket_connect(opts->peer_cid, 1234);
|
|
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_expectln("SENDDONE");
|
|
|
|
/* Use invalid buffer here. */
|
|
ret = recv(fd, NULL, sizeof(data), 0);
|
|
if (ret != -1) {
|
|
fprintf(stderr, "expected recv(2) failure, got %zi\n", ret);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (errno != EFAULT) {
|
|
fprintf(stderr, "unexpected recv(2) errno %d\n", errno);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
ret = recv(fd, data, sizeof(data), MSG_DONTWAIT);
|
|
|
|
if (stream) {
|
|
/* For SOCK_STREAM we must continue reading. */
|
|
if (ret != sizeof(data)) {
|
|
fprintf(stderr, "expected recv(2) success, got %zi\n", ret);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
/* Don't check errno in case of success. */
|
|
} else {
|
|
/* For SOCK_SEQPACKET socket's queue must be empty. */
|
|
if (ret != -1) {
|
|
fprintf(stderr, "expected recv(2) failure, got %zi\n", ret);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (errno != EAGAIN) {
|
|
fprintf(stderr, "unexpected recv(2) errno %d\n", errno);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
control_writeln("DONE");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_inv_buf_server(const struct test_opts *opts, bool stream)
|
|
{
|
|
unsigned char data[INV_BUF_TEST_DATA_LEN] = {0};
|
|
ssize_t res;
|
|
int fd;
|
|
|
|
if (stream)
|
|
fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
else
|
|
fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
res = send(fd, data, sizeof(data), 0);
|
|
if (res != sizeof(data)) {
|
|
fprintf(stderr, "unexpected send(2) result %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("SENDDONE");
|
|
|
|
control_expectln("DONE");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_inv_buf_client(const struct test_opts *opts)
|
|
{
|
|
test_inv_buf_client(opts, true);
|
|
}
|
|
|
|
static void test_stream_inv_buf_server(const struct test_opts *opts)
|
|
{
|
|
test_inv_buf_server(opts, true);
|
|
}
|
|
|
|
static void test_seqpacket_inv_buf_client(const struct test_opts *opts)
|
|
{
|
|
test_inv_buf_client(opts, false);
|
|
}
|
|
|
|
static void test_seqpacket_inv_buf_server(const struct test_opts *opts)
|
|
{
|
|
test_inv_buf_server(opts, false);
|
|
}
|
|
|
|
#define HELLO_STR "HELLO"
|
|
#define WORLD_STR "WORLD"
|
|
|
|
static void test_stream_virtio_skb_merge_client(const struct test_opts *opts)
|
|
{
|
|
ssize_t res;
|
|
int fd;
|
|
|
|
fd = vsock_stream_connect(opts->peer_cid, 1234);
|
|
if (fd < 0) {
|
|
perror("connect");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
/* Send first skbuff. */
|
|
res = send(fd, HELLO_STR, strlen(HELLO_STR), 0);
|
|
if (res != strlen(HELLO_STR)) {
|
|
fprintf(stderr, "unexpected send(2) result %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("SEND0");
|
|
/* Peer reads part of first skbuff. */
|
|
control_expectln("REPLY0");
|
|
|
|
/* Send second skbuff, it will be appended to the first. */
|
|
res = send(fd, WORLD_STR, strlen(WORLD_STR), 0);
|
|
if (res != strlen(WORLD_STR)) {
|
|
fprintf(stderr, "unexpected send(2) result %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("SEND1");
|
|
/* Peer reads merged skbuff packet. */
|
|
control_expectln("REPLY1");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_stream_virtio_skb_merge_server(const struct test_opts *opts)
|
|
{
|
|
unsigned char buf[64];
|
|
ssize_t res;
|
|
int fd;
|
|
|
|
fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, NULL);
|
|
if (fd < 0) {
|
|
perror("accept");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_expectln("SEND0");
|
|
|
|
/* Read skbuff partially. */
|
|
res = recv(fd, buf, 2, 0);
|
|
if (res != 2) {
|
|
fprintf(stderr, "expected recv(2) returns 2 bytes, got %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("REPLY0");
|
|
control_expectln("SEND1");
|
|
|
|
res = recv(fd, buf + 2, sizeof(buf) - 2, 0);
|
|
if (res != 8) {
|
|
fprintf(stderr, "expected recv(2) returns 8 bytes, got %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
res = recv(fd, buf, sizeof(buf) - 8 - 2, MSG_DONTWAIT);
|
|
if (res != -1) {
|
|
fprintf(stderr, "expected recv(2) failure, got %zi\n", res);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (memcmp(buf, HELLO_STR WORLD_STR, strlen(HELLO_STR WORLD_STR))) {
|
|
fprintf(stderr, "pattern mismatch\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
control_writeln("REPLY1");
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void test_seqpacket_msg_peek_client(const struct test_opts *opts)
|
|
{
|
|
return test_msg_peek_client(opts, true);
|
|
}
|
|
|
|
static void test_seqpacket_msg_peek_server(const struct test_opts *opts)
|
|
{
|
|
return test_msg_peek_server(opts, true);
|
|
}
|
|
|
|
static struct test_case test_cases[] = {
|
|
{
|
|
.name = "SOCK_STREAM connection reset",
|
|
.run_client = test_stream_connection_reset,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM bind only",
|
|
.run_client = test_stream_bind_only_client,
|
|
.run_server = test_stream_bind_only_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM client close",
|
|
.run_client = test_stream_client_close_client,
|
|
.run_server = test_stream_client_close_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM server close",
|
|
.run_client = test_stream_server_close_client,
|
|
.run_server = test_stream_server_close_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM multiple connections",
|
|
.run_client = test_stream_multiconn_client,
|
|
.run_server = test_stream_multiconn_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM MSG_PEEK",
|
|
.run_client = test_stream_msg_peek_client,
|
|
.run_server = test_stream_msg_peek_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET msg bounds",
|
|
.run_client = test_seqpacket_msg_bounds_client,
|
|
.run_server = test_seqpacket_msg_bounds_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET MSG_TRUNC flag",
|
|
.run_client = test_seqpacket_msg_trunc_client,
|
|
.run_server = test_seqpacket_msg_trunc_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET timeout",
|
|
.run_client = test_seqpacket_timeout_client,
|
|
.run_server = test_seqpacket_timeout_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET invalid receive buffer",
|
|
.run_client = test_seqpacket_invalid_rec_buffer_client,
|
|
.run_server = test_seqpacket_invalid_rec_buffer_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM poll() + SO_RCVLOWAT",
|
|
.run_client = test_stream_poll_rcvlowat_client,
|
|
.run_server = test_stream_poll_rcvlowat_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET big message",
|
|
.run_client = test_seqpacket_bigmsg_client,
|
|
.run_server = test_seqpacket_bigmsg_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM test invalid buffer",
|
|
.run_client = test_stream_inv_buf_client,
|
|
.run_server = test_stream_inv_buf_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET test invalid buffer",
|
|
.run_client = test_seqpacket_inv_buf_client,
|
|
.run_server = test_seqpacket_inv_buf_server,
|
|
},
|
|
{
|
|
.name = "SOCK_STREAM virtio skb merge",
|
|
.run_client = test_stream_virtio_skb_merge_client,
|
|
.run_server = test_stream_virtio_skb_merge_server,
|
|
},
|
|
{
|
|
.name = "SOCK_SEQPACKET MSG_PEEK",
|
|
.run_client = test_seqpacket_msg_peek_client,
|
|
.run_server = test_seqpacket_msg_peek_server,
|
|
},
|
|
{},
|
|
};
|
|
|
|
static const char optstring[] = "";
|
|
static const struct option longopts[] = {
|
|
{
|
|
.name = "control-host",
|
|
.has_arg = required_argument,
|
|
.val = 'H',
|
|
},
|
|
{
|
|
.name = "control-port",
|
|
.has_arg = required_argument,
|
|
.val = 'P',
|
|
},
|
|
{
|
|
.name = "mode",
|
|
.has_arg = required_argument,
|
|
.val = 'm',
|
|
},
|
|
{
|
|
.name = "peer-cid",
|
|
.has_arg = required_argument,
|
|
.val = 'p',
|
|
},
|
|
{
|
|
.name = "list",
|
|
.has_arg = no_argument,
|
|
.val = 'l',
|
|
},
|
|
{
|
|
.name = "skip",
|
|
.has_arg = required_argument,
|
|
.val = 's',
|
|
},
|
|
{
|
|
.name = "help",
|
|
.has_arg = no_argument,
|
|
.val = '?',
|
|
},
|
|
{},
|
|
};
|
|
|
|
static void usage(void)
|
|
{
|
|
fprintf(stderr, "Usage: vsock_test [--help] [--control-host=<host>] --control-port=<port> --mode=client|server --peer-cid=<cid> [--list] [--skip=<test_id>]\n"
|
|
"\n"
|
|
" Server: vsock_test --control-port=1234 --mode=server --peer-cid=3\n"
|
|
" Client: vsock_test --control-host=192.168.0.1 --control-port=1234 --mode=client --peer-cid=2\n"
|
|
"\n"
|
|
"Run vsock.ko tests. Must be launched in both guest\n"
|
|
"and host. One side must use --mode=client and\n"
|
|
"the other side must use --mode=server.\n"
|
|
"\n"
|
|
"A TCP control socket connection is used to coordinate tests\n"
|
|
"between the client and the server. The server requires a\n"
|
|
"listen address and the client requires an address to\n"
|
|
"connect to.\n"
|
|
"\n"
|
|
"The CID of the other side must be given with --peer-cid=<cid>.\n"
|
|
"\n"
|
|
"Options:\n"
|
|
" --help This help message\n"
|
|
" --control-host <host> Server IP address to connect to\n"
|
|
" --control-port <port> Server port to listen on/connect to\n"
|
|
" --mode client|server Server or client mode\n"
|
|
" --peer-cid <cid> CID of the other side\n"
|
|
" --list List of tests that will be executed\n"
|
|
" --skip <test_id> Test ID to skip;\n"
|
|
" use multiple --skip options to skip more tests\n"
|
|
);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
const char *control_host = NULL;
|
|
const char *control_port = NULL;
|
|
struct test_opts opts = {
|
|
.mode = TEST_MODE_UNSET,
|
|
.peer_cid = VMADDR_CID_ANY,
|
|
};
|
|
|
|
srand(time(NULL));
|
|
init_signals();
|
|
|
|
for (;;) {
|
|
int opt = getopt_long(argc, argv, optstring, longopts, NULL);
|
|
|
|
if (opt == -1)
|
|
break;
|
|
|
|
switch (opt) {
|
|
case 'H':
|
|
control_host = optarg;
|
|
break;
|
|
case 'm':
|
|
if (strcmp(optarg, "client") == 0)
|
|
opts.mode = TEST_MODE_CLIENT;
|
|
else if (strcmp(optarg, "server") == 0)
|
|
opts.mode = TEST_MODE_SERVER;
|
|
else {
|
|
fprintf(stderr, "--mode must be \"client\" or \"server\"\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
break;
|
|
case 'p':
|
|
opts.peer_cid = parse_cid(optarg);
|
|
break;
|
|
case 'P':
|
|
control_port = optarg;
|
|
break;
|
|
case 'l':
|
|
list_tests(test_cases);
|
|
break;
|
|
case 's':
|
|
skip_test(test_cases, ARRAY_SIZE(test_cases) - 1,
|
|
optarg);
|
|
break;
|
|
case '?':
|
|
default:
|
|
usage();
|
|
}
|
|
}
|
|
|
|
if (!control_port)
|
|
usage();
|
|
if (opts.mode == TEST_MODE_UNSET)
|
|
usage();
|
|
if (opts.peer_cid == VMADDR_CID_ANY)
|
|
usage();
|
|
|
|
if (!control_host) {
|
|
if (opts.mode != TEST_MODE_SERVER)
|
|
usage();
|
|
control_host = "0.0.0.0";
|
|
}
|
|
|
|
control_init(control_host, control_port,
|
|
opts.mode == TEST_MODE_SERVER);
|
|
|
|
run_tests(test_cases, &opts);
|
|
|
|
control_cleanup();
|
|
return EXIT_SUCCESS;
|
|
}
|