WIP FPC-III support
[linux/fpc-iii.git] / tools / testing / selftests / net / nettest.c
blobf75c53ce0a2d08c9324bf77681b695afe6d58d9e
1 // SPDX-License-Identifier: GPL-2.0
2 /* nettest - used for functional tests of networking APIs
4 * Copyright (c) 2013-2019 David Ahern <dsahern@gmail.com>. All rights reserved.
5 */
7 #define _GNU_SOURCE
8 #include <features.h>
9 #include <sys/types.h>
10 #include <sys/ioctl.h>
11 #include <sys/socket.h>
12 #include <linux/tcp.h>
13 #include <arpa/inet.h>
14 #include <net/if.h>
15 #include <netinet/in.h>
16 #include <netdb.h>
17 #include <fcntl.h>
18 #include <libgen.h>
19 #include <limits.h>
20 #include <stdarg.h>
21 #include <stdio.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <unistd.h>
25 #include <time.h>
26 #include <errno.h>
28 #ifndef IPV6_UNICAST_IF
29 #define IPV6_UNICAST_IF 76
30 #endif
31 #ifndef IPV6_MULTICAST_IF
32 #define IPV6_MULTICAST_IF 17
33 #endif
35 #define DEFAULT_PORT 12345
37 #ifndef MAX
38 #define MAX(a, b) ((a) > (b) ? (a) : (b))
39 #endif
40 #ifndef MIN
41 #define MIN(a, b) ((a) < (b) ? (a) : (b))
42 #endif
44 struct sock_args {
45 /* local address */
46 union {
47 struct in_addr in;
48 struct in6_addr in6;
49 } local_addr;
51 /* remote address */
52 union {
53 struct in_addr in;
54 struct in6_addr in6;
55 } remote_addr;
56 int scope_id; /* remote scope; v6 send only */
58 struct in_addr grp; /* multicast group */
60 unsigned int has_local_ip:1,
61 has_remote_ip:1,
62 has_grp:1,
63 has_expected_laddr:1,
64 has_expected_raddr:1,
65 bind_test_only:1;
67 unsigned short port;
69 int type; /* DGRAM, STREAM, RAW */
70 int protocol;
71 int version; /* AF_INET/AF_INET6 */
73 int use_setsockopt;
74 int use_cmsg;
75 const char *dev;
76 int ifindex;
78 const char *password;
79 /* prefix for MD5 password */
80 union {
81 struct sockaddr_in v4;
82 struct sockaddr_in6 v6;
83 } md5_prefix;
84 unsigned int prefix_len;
86 /* expected addresses and device index for connection */
87 int expected_ifindex;
89 /* local address */
90 union {
91 struct in_addr in;
92 struct in6_addr in6;
93 } expected_laddr;
95 /* remote address */
96 union {
97 struct in_addr in;
98 struct in6_addr in6;
99 } expected_raddr;
102 static int server_mode;
103 static unsigned int prog_timeout = 5;
104 static unsigned int interactive;
105 static int iter = 1;
106 static char *msg = "Hello world!";
107 static int msglen;
108 static int quiet;
109 static int try_broadcast = 1;
111 static char *timestamp(char *timebuf, int buflen)
113 time_t now;
115 now = time(NULL);
116 if (strftime(timebuf, buflen, "%T", localtime(&now)) == 0) {
117 memset(timebuf, 0, buflen);
118 strncpy(timebuf, "00:00:00", buflen-1);
121 return timebuf;
124 static void log_msg(const char *format, ...)
126 char timebuf[64];
127 va_list args;
129 if (quiet)
130 return;
132 fprintf(stdout, "%s %s:",
133 timestamp(timebuf, sizeof(timebuf)),
134 server_mode ? "server" : "client");
135 va_start(args, format);
136 vfprintf(stdout, format, args);
137 va_end(args);
139 fflush(stdout);
142 static void log_error(const char *format, ...)
144 char timebuf[64];
145 va_list args;
147 if (quiet)
148 return;
150 fprintf(stderr, "%s %s:",
151 timestamp(timebuf, sizeof(timebuf)),
152 server_mode ? "server" : "client");
153 va_start(args, format);
154 vfprintf(stderr, format, args);
155 va_end(args);
157 fflush(stderr);
160 static void log_err_errno(const char *fmt, ...)
162 char timebuf[64];
163 va_list args;
165 if (quiet)
166 return;
168 fprintf(stderr, "%s %s: ",
169 timestamp(timebuf, sizeof(timebuf)),
170 server_mode ? "server" : "client");
171 va_start(args, fmt);
172 vfprintf(stderr, fmt, args);
173 va_end(args);
175 fprintf(stderr, ": %d: %s\n", errno, strerror(errno));
176 fflush(stderr);
179 static void log_address(const char *desc, struct sockaddr *sa)
181 char addrstr[64];
183 if (quiet)
184 return;
186 if (sa->sa_family == AF_INET) {
187 struct sockaddr_in *s = (struct sockaddr_in *) sa;
189 log_msg("%s %s:%d",
190 desc,
191 inet_ntop(AF_INET, &s->sin_addr, addrstr,
192 sizeof(addrstr)),
193 ntohs(s->sin_port));
195 } else if (sa->sa_family == AF_INET6) {
196 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
198 log_msg("%s [%s]:%d",
199 desc,
200 inet_ntop(AF_INET6, &s6->sin6_addr, addrstr,
201 sizeof(addrstr)),
202 ntohs(s6->sin6_port));
205 printf("\n");
207 fflush(stdout);
210 static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args)
212 int keylen = strlen(args->password);
213 struct tcp_md5sig md5sig = {};
214 int opt = TCP_MD5SIG;
215 int rc;
217 md5sig.tcpm_keylen = keylen;
218 memcpy(md5sig.tcpm_key, args->password, keylen);
220 if (args->prefix_len) {
221 opt = TCP_MD5SIG_EXT;
222 md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_PREFIX;
224 md5sig.tcpm_prefixlen = args->prefix_len;
225 addr = &args->md5_prefix;
227 memcpy(&md5sig.tcpm_addr, addr, alen);
229 if (args->ifindex) {
230 opt = TCP_MD5SIG_EXT;
231 md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_IFINDEX;
233 md5sig.tcpm_ifindex = args->ifindex;
236 rc = setsockopt(sd, IPPROTO_TCP, opt, &md5sig, sizeof(md5sig));
237 if (rc < 0) {
238 /* ENOENT is harmless. Returned when a password is cleared */
239 if (errno == ENOENT)
240 rc = 0;
241 else
242 log_err_errno("setsockopt(TCP_MD5SIG)");
245 return rc;
248 static int tcp_md5_remote(int sd, struct sock_args *args)
250 struct sockaddr_in sin = {
251 .sin_family = AF_INET,
253 struct sockaddr_in6 sin6 = {
254 .sin6_family = AF_INET6,
256 void *addr;
257 int alen;
259 switch (args->version) {
260 case AF_INET:
261 sin.sin_port = htons(args->port);
262 sin.sin_addr = args->remote_addr.in;
263 addr = &sin;
264 alen = sizeof(sin);
265 break;
266 case AF_INET6:
267 sin6.sin6_port = htons(args->port);
268 sin6.sin6_addr = args->remote_addr.in6;
269 addr = &sin6;
270 alen = sizeof(sin6);
271 break;
272 default:
273 log_error("unknown address family\n");
274 exit(1);
277 if (tcp_md5sig(sd, addr, alen, args))
278 return -1;
280 return 0;
283 static int get_ifidx(const char *ifname)
285 struct ifreq ifdata;
286 int sd, rc;
288 if (!ifname || *ifname == '\0')
289 return -1;
291 memset(&ifdata, 0, sizeof(ifdata));
293 strcpy(ifdata.ifr_name, ifname);
295 sd = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
296 if (sd < 0) {
297 log_err_errno("socket failed");
298 return -1;
301 rc = ioctl(sd, SIOCGIFINDEX, (char *)&ifdata);
302 close(sd);
303 if (rc != 0) {
304 log_err_errno("ioctl(SIOCGIFINDEX) failed");
305 return -1;
308 return ifdata.ifr_ifindex;
311 static int bind_to_device(int sd, const char *name)
313 int rc;
315 rc = setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
316 if (rc < 0)
317 log_err_errno("setsockopt(SO_BINDTODEVICE)");
319 return rc;
322 static int get_bind_to_device(int sd, char *name, size_t len)
324 int rc;
325 socklen_t optlen = len;
327 name[0] = '\0';
328 rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
329 if (rc < 0)
330 log_err_errno("setsockopt(SO_BINDTODEVICE)");
332 return rc;
335 static int check_device(int sd, struct sock_args *args)
337 int ifindex = 0;
338 char name[32];
340 if (get_bind_to_device(sd, name, sizeof(name)))
341 *name = '\0';
342 else
343 ifindex = get_ifidx(name);
345 log_msg(" bound to device %s/%d\n",
346 *name ? name : "<none>", ifindex);
348 if (!args->expected_ifindex)
349 return 0;
351 if (args->expected_ifindex != ifindex) {
352 log_error("Device index mismatch: expected %d have %d\n",
353 args->expected_ifindex, ifindex);
354 return 1;
357 log_msg("Device index matches: expected %d have %d\n",
358 args->expected_ifindex, ifindex);
360 return 0;
363 static int set_pktinfo_v4(int sd)
365 int one = 1;
366 int rc;
368 rc = setsockopt(sd, SOL_IP, IP_PKTINFO, &one, sizeof(one));
369 if (rc < 0 && rc != -ENOTSUP)
370 log_err_errno("setsockopt(IP_PKTINFO)");
372 return rc;
375 static int set_recvpktinfo_v6(int sd)
377 int one = 1;
378 int rc;
380 rc = setsockopt(sd, SOL_IPV6, IPV6_RECVPKTINFO, &one, sizeof(one));
381 if (rc < 0 && rc != -ENOTSUP)
382 log_err_errno("setsockopt(IPV6_RECVPKTINFO)");
384 return rc;
387 static int set_recverr_v4(int sd)
389 int one = 1;
390 int rc;
392 rc = setsockopt(sd, SOL_IP, IP_RECVERR, &one, sizeof(one));
393 if (rc < 0 && rc != -ENOTSUP)
394 log_err_errno("setsockopt(IP_RECVERR)");
396 return rc;
399 static int set_recverr_v6(int sd)
401 int one = 1;
402 int rc;
404 rc = setsockopt(sd, SOL_IPV6, IPV6_RECVERR, &one, sizeof(one));
405 if (rc < 0 && rc != -ENOTSUP)
406 log_err_errno("setsockopt(IPV6_RECVERR)");
408 return rc;
411 static int set_unicast_if(int sd, int ifindex, int version)
413 int opt = IP_UNICAST_IF;
414 int level = SOL_IP;
415 int rc;
417 ifindex = htonl(ifindex);
419 if (version == AF_INET6) {
420 opt = IPV6_UNICAST_IF;
421 level = SOL_IPV6;
423 rc = setsockopt(sd, level, opt, &ifindex, sizeof(ifindex));
424 if (rc < 0)
425 log_err_errno("setsockopt(IP_UNICAST_IF)");
427 return rc;
430 static int set_multicast_if(int sd, int ifindex)
432 struct ip_mreqn mreq = { .imr_ifindex = ifindex };
433 int rc;
435 rc = setsockopt(sd, SOL_IP, IP_MULTICAST_IF, &mreq, sizeof(mreq));
436 if (rc < 0)
437 log_err_errno("setsockopt(IP_MULTICAST_IF)");
439 return rc;
442 static int set_membership(int sd, uint32_t grp, uint32_t addr, int ifindex)
444 uint32_t if_addr = addr;
445 struct ip_mreqn mreq;
446 int rc;
448 if (addr == htonl(INADDR_ANY) && !ifindex) {
449 log_error("Either local address or device needs to be given for multicast membership\n");
450 return -1;
453 mreq.imr_multiaddr.s_addr = grp;
454 mreq.imr_address.s_addr = if_addr;
455 mreq.imr_ifindex = ifindex;
457 rc = setsockopt(sd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq));
458 if (rc < 0) {
459 log_err_errno("setsockopt(IP_ADD_MEMBERSHIP)");
460 return -1;
463 return 0;
466 static int set_broadcast(int sd)
468 unsigned int one = 1;
469 int rc = 0;
471 if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST, &one, sizeof(one)) != 0) {
472 log_err_errno("setsockopt(SO_BROADCAST)");
473 rc = -1;
476 return rc;
479 static int set_reuseport(int sd)
481 unsigned int one = 1;
482 int rc = 0;
484 if (setsockopt(sd, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one)) != 0) {
485 log_err_errno("setsockopt(SO_REUSEPORT)");
486 rc = -1;
489 return rc;
492 static int set_reuseaddr(int sd)
494 unsigned int one = 1;
495 int rc = 0;
497 if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) != 0) {
498 log_err_errno("setsockopt(SO_REUSEADDR)");
499 rc = -1;
502 return rc;
505 static int str_to_uint(const char *str, int min, int max, unsigned int *value)
507 int number;
508 char *end;
510 errno = 0;
511 number = (unsigned int) strtoul(str, &end, 0);
513 /* entire string should be consumed by conversion
514 * and value should be between min and max
516 if (((*end == '\0') || (*end == '\n')) && (end != str) &&
517 (errno != ERANGE) && (min <= number) && (number <= max)) {
518 *value = number;
519 return 0;
522 return -1;
525 static int expected_addr_match(struct sockaddr *sa, void *expected,
526 const char *desc)
528 char addrstr[64];
529 int rc = 0;
531 if (sa->sa_family == AF_INET) {
532 struct sockaddr_in *s = (struct sockaddr_in *) sa;
533 struct in_addr *exp_in = (struct in_addr *) expected;
535 if (s->sin_addr.s_addr != exp_in->s_addr) {
536 log_error("%s address does not match expected %s",
537 desc,
538 inet_ntop(AF_INET, exp_in,
539 addrstr, sizeof(addrstr)));
540 rc = 1;
542 } else if (sa->sa_family == AF_INET6) {
543 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
544 struct in6_addr *exp_in = (struct in6_addr *) expected;
546 if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) {
547 log_error("%s address does not match expected %s",
548 desc,
549 inet_ntop(AF_INET6, exp_in,
550 addrstr, sizeof(addrstr)));
551 rc = 1;
553 } else {
554 log_error("%s address does not match expected - unknown family",
555 desc);
556 rc = 1;
559 if (!rc)
560 log_msg("%s address matches expected\n", desc);
562 return rc;
565 static int show_sockstat(int sd, struct sock_args *args)
567 struct sockaddr_in6 local_addr, remote_addr;
568 socklen_t alen = sizeof(local_addr);
569 struct sockaddr *sa;
570 const char *desc;
571 int rc = 0;
573 desc = server_mode ? "server local:" : "client local:";
574 sa = (struct sockaddr *) &local_addr;
575 if (getsockname(sd, sa, &alen) == 0) {
576 log_address(desc, sa);
578 if (args->has_expected_laddr) {
579 rc = expected_addr_match(sa, &args->expected_laddr,
580 "local");
582 } else {
583 log_err_errno("getsockname failed");
586 sa = (struct sockaddr *) &remote_addr;
587 desc = server_mode ? "server peer:" : "client peer:";
588 if (getpeername(sd, sa, &alen) == 0) {
589 log_address(desc, sa);
591 if (args->has_expected_raddr) {
592 rc |= expected_addr_match(sa, &args->expected_raddr,
593 "remote");
595 } else {
596 log_err_errno("getpeername failed");
599 return rc;
602 static int get_index_from_cmsg(struct msghdr *m)
604 struct cmsghdr *cm;
605 int ifindex = 0;
606 char buf[64];
608 for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(m);
609 m->msg_controllen != 0 && cm;
610 cm = (struct cmsghdr *)CMSG_NXTHDR(m, cm)) {
612 if (cm->cmsg_level == SOL_IP &&
613 cm->cmsg_type == IP_PKTINFO) {
614 struct in_pktinfo *pi;
616 pi = (struct in_pktinfo *)(CMSG_DATA(cm));
617 inet_ntop(AF_INET, &pi->ipi_addr, buf, sizeof(buf));
618 ifindex = pi->ipi_ifindex;
619 } else if (cm->cmsg_level == SOL_IPV6 &&
620 cm->cmsg_type == IPV6_PKTINFO) {
621 struct in6_pktinfo *pi6;
623 pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
624 inet_ntop(AF_INET6, &pi6->ipi6_addr, buf, sizeof(buf));
625 ifindex = pi6->ipi6_ifindex;
629 if (ifindex) {
630 log_msg(" pktinfo: ifindex %d dest addr %s\n",
631 ifindex, buf);
633 return ifindex;
636 static int send_msg_no_cmsg(int sd, void *addr, socklen_t alen)
638 int err;
640 again:
641 err = sendto(sd, msg, msglen, 0, addr, alen);
642 if (err < 0) {
643 if (errno == EACCES && try_broadcast) {
644 try_broadcast = 0;
645 if (!set_broadcast(sd))
646 goto again;
647 errno = EACCES;
650 log_err_errno("sendto failed");
651 return 1;
654 return 0;
657 static int send_msg_cmsg(int sd, void *addr, socklen_t alen,
658 int ifindex, int version)
660 unsigned char cmsgbuf[64];
661 struct iovec iov[2];
662 struct cmsghdr *cm;
663 struct msghdr m;
664 int err;
666 iov[0].iov_base = msg;
667 iov[0].iov_len = msglen;
668 m.msg_iov = iov;
669 m.msg_iovlen = 1;
670 m.msg_name = (caddr_t)addr;
671 m.msg_namelen = alen;
673 memset(cmsgbuf, 0, sizeof(cmsgbuf));
674 cm = (struct cmsghdr *)cmsgbuf;
675 m.msg_control = (caddr_t)cm;
677 if (version == AF_INET) {
678 struct in_pktinfo *pi;
680 cm->cmsg_level = SOL_IP;
681 cm->cmsg_type = IP_PKTINFO;
682 cm->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
683 pi = (struct in_pktinfo *)(CMSG_DATA(cm));
684 pi->ipi_ifindex = ifindex;
686 m.msg_controllen = cm->cmsg_len;
688 } else if (version == AF_INET6) {
689 struct in6_pktinfo *pi6;
691 cm->cmsg_level = SOL_IPV6;
692 cm->cmsg_type = IPV6_PKTINFO;
693 cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
695 pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
696 pi6->ipi6_ifindex = ifindex;
698 m.msg_controllen = cm->cmsg_len;
701 again:
702 err = sendmsg(sd, &m, 0);
703 if (err < 0) {
704 if (errno == EACCES && try_broadcast) {
705 try_broadcast = 0;
706 if (!set_broadcast(sd))
707 goto again;
708 errno = EACCES;
711 log_err_errno("sendmsg failed");
712 return 1;
715 return 0;
719 static int send_msg(int sd, void *addr, socklen_t alen, struct sock_args *args)
721 if (args->type == SOCK_STREAM) {
722 if (write(sd, msg, msglen) < 0) {
723 log_err_errno("write failed sending msg to peer");
724 return 1;
726 } else if (args->ifindex && args->use_cmsg) {
727 if (send_msg_cmsg(sd, addr, alen, args->ifindex, args->version))
728 return 1;
729 } else {
730 if (send_msg_no_cmsg(sd, addr, alen))
731 return 1;
734 log_msg("Sent message:\n");
735 log_msg(" %.24s%s\n", msg, msglen > 24 ? " ..." : "");
737 return 0;
740 static int socket_read_dgram(int sd, struct sock_args *args)
742 unsigned char addr[sizeof(struct sockaddr_in6)];
743 struct sockaddr *sa = (struct sockaddr *) addr;
744 socklen_t alen = sizeof(addr);
745 struct iovec iov[2];
746 struct msghdr m = {
747 .msg_name = (caddr_t)addr,
748 .msg_namelen = alen,
749 .msg_iov = iov,
750 .msg_iovlen = 1,
752 unsigned char cmsgbuf[256];
753 struct cmsghdr *cm = (struct cmsghdr *)cmsgbuf;
754 char buf[16*1024];
755 int ifindex;
756 int len;
758 iov[0].iov_base = (caddr_t)buf;
759 iov[0].iov_len = sizeof(buf);
761 memset(cmsgbuf, 0, sizeof(cmsgbuf));
762 m.msg_control = (caddr_t)cm;
763 m.msg_controllen = sizeof(cmsgbuf);
765 len = recvmsg(sd, &m, 0);
766 if (len == 0) {
767 log_msg("peer closed connection.\n");
768 return 0;
769 } else if (len < 0) {
770 log_msg("failed to read message: %d: %s\n",
771 errno, strerror(errno));
772 return -1;
775 buf[len] = '\0';
777 log_address("Message from:", sa);
778 log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
780 ifindex = get_index_from_cmsg(&m);
781 if (args->expected_ifindex) {
782 if (args->expected_ifindex != ifindex) {
783 log_error("Device index mismatch: expected %d have %d\n",
784 args->expected_ifindex, ifindex);
785 return -1;
787 log_msg("Device index matches: expected %d have %d\n",
788 args->expected_ifindex, ifindex);
791 if (!interactive && server_mode) {
792 if (sa->sa_family == AF_INET6) {
793 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
794 struct in6_addr *in6 = &s6->sin6_addr;
796 if (IN6_IS_ADDR_V4MAPPED(in6)) {
797 const uint32_t *pa = (uint32_t *) &in6->s6_addr;
798 struct in_addr in4;
799 struct sockaddr_in *sin;
801 sin = (struct sockaddr_in *) addr;
802 pa += 3;
803 in4.s_addr = *pa;
804 sin->sin_addr = in4;
805 sin->sin_family = AF_INET;
806 if (send_msg_cmsg(sd, addr, alen,
807 ifindex, AF_INET) < 0)
808 goto out_err;
811 again:
812 iov[0].iov_len = len;
814 if (args->version == AF_INET6) {
815 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
817 if (args->dev) {
818 /* avoid PKTINFO conflicts with bindtodev */
819 if (sendto(sd, buf, len, 0,
820 (void *) addr, alen) < 0)
821 goto out_err;
822 } else {
823 /* kernel is allowing scope_id to be set to VRF
824 * index for LLA. for sends to global address
825 * reset scope id
827 s6->sin6_scope_id = ifindex;
828 if (sendmsg(sd, &m, 0) < 0)
829 goto out_err;
831 } else {
832 int err;
834 err = sendmsg(sd, &m, 0);
835 if (err < 0) {
836 if (errno == EACCES && try_broadcast) {
837 try_broadcast = 0;
838 if (!set_broadcast(sd))
839 goto again;
840 errno = EACCES;
842 goto out_err;
845 log_msg("Sent message:\n");
846 log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
849 return 1;
850 out_err:
851 log_err_errno("failed to send msg to peer");
852 return -1;
855 static int socket_read_stream(int sd)
857 char buf[1024];
858 int len;
860 len = read(sd, buf, sizeof(buf)-1);
861 if (len == 0) {
862 log_msg("client closed connection.\n");
863 return 0;
864 } else if (len < 0) {
865 log_msg("failed to read message\n");
866 return -1;
869 buf[len] = '\0';
870 log_msg("Incoming message:\n");
871 log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
873 if (!interactive && server_mode) {
874 if (write(sd, buf, len) < 0) {
875 log_err_errno("failed to send buf");
876 return -1;
878 log_msg("Sent message:\n");
879 log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
882 return 1;
885 static int socket_read(int sd, struct sock_args *args)
887 if (args->type == SOCK_STREAM)
888 return socket_read_stream(sd);
890 return socket_read_dgram(sd, args);
893 static int stdin_to_socket(int sd, int type, void *addr, socklen_t alen)
895 char buf[1024];
896 int len;
898 if (fgets(buf, sizeof(buf), stdin) == NULL)
899 return 0;
901 len = strlen(buf);
902 if (type == SOCK_STREAM) {
903 if (write(sd, buf, len) < 0) {
904 log_err_errno("failed to send buf");
905 return -1;
907 } else {
908 int err;
910 again:
911 err = sendto(sd, buf, len, 0, addr, alen);
912 if (err < 0) {
913 if (errno == EACCES && try_broadcast) {
914 try_broadcast = 0;
915 if (!set_broadcast(sd))
916 goto again;
917 errno = EACCES;
919 log_err_errno("failed to send msg to peer");
920 return -1;
923 log_msg("Sent message:\n");
924 log_msg(" %.24s%s\n", buf, len > 24 ? " ..." : "");
926 return 1;
929 static void set_recv_attr(int sd, int version)
931 if (version == AF_INET6) {
932 set_recvpktinfo_v6(sd);
933 set_recverr_v6(sd);
934 } else {
935 set_pktinfo_v4(sd);
936 set_recverr_v4(sd);
940 static int msg_loop(int client, int sd, void *addr, socklen_t alen,
941 struct sock_args *args)
943 struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
944 fd_set rfds;
945 int nfds;
946 int rc;
948 if (args->type != SOCK_STREAM)
949 set_recv_attr(sd, args->version);
951 if (msg) {
952 msglen = strlen(msg);
954 /* client sends first message */
955 if (client) {
956 if (send_msg(sd, addr, alen, args))
957 return 1;
959 if (!interactive) {
960 ptval = &timeout;
961 if (!prog_timeout)
962 timeout.tv_sec = 5;
966 nfds = interactive ? MAX(fileno(stdin), sd) + 1 : sd + 1;
967 while (1) {
968 FD_ZERO(&rfds);
969 FD_SET(sd, &rfds);
970 if (interactive)
971 FD_SET(fileno(stdin), &rfds);
973 rc = select(nfds, &rfds, NULL, NULL, ptval);
974 if (rc < 0) {
975 if (errno == EINTR)
976 continue;
978 rc = 1;
979 log_err_errno("select failed");
980 break;
981 } else if (rc == 0) {
982 log_error("Timed out waiting for response\n");
983 rc = 2;
984 break;
987 if (FD_ISSET(sd, &rfds)) {
988 rc = socket_read(sd, args);
989 if (rc < 0) {
990 rc = 1;
991 break;
993 if (rc == 0)
994 break;
997 rc = 0;
999 if (FD_ISSET(fileno(stdin), &rfds)) {
1000 if (stdin_to_socket(sd, args->type, addr, alen) <= 0)
1001 break;
1004 if (interactive)
1005 continue;
1007 if (iter != -1) {
1008 --iter;
1009 if (iter == 0)
1010 break;
1013 log_msg("Going into quiet mode\n");
1014 quiet = 1;
1016 if (client) {
1017 if (send_msg(sd, addr, alen, args)) {
1018 rc = 1;
1019 break;
1024 return rc;
1027 static int msock_init(struct sock_args *args, int server)
1029 uint32_t if_addr = htonl(INADDR_ANY);
1030 struct sockaddr_in laddr = {
1031 .sin_family = AF_INET,
1032 .sin_port = htons(args->port),
1034 int one = 1;
1035 int sd;
1037 if (!server && args->has_local_ip)
1038 if_addr = args->local_addr.in.s_addr;
1040 sd = socket(PF_INET, SOCK_DGRAM, 0);
1041 if (sd < 0) {
1042 log_err_errno("socket");
1043 return -1;
1046 if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR,
1047 (char *)&one, sizeof(one)) < 0) {
1048 log_err_errno("Setting SO_REUSEADDR error");
1049 goto out_err;
1052 if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST,
1053 (char *)&one, sizeof(one)) < 0)
1054 log_err_errno("Setting SO_BROADCAST error");
1056 if (args->dev && bind_to_device(sd, args->dev) != 0)
1057 goto out_err;
1058 else if (args->use_setsockopt &&
1059 set_multicast_if(sd, args->ifindex))
1060 goto out_err;
1062 laddr.sin_addr.s_addr = if_addr;
1064 if (bind(sd, (struct sockaddr *) &laddr, sizeof(laddr)) < 0) {
1065 log_err_errno("bind failed");
1066 goto out_err;
1069 if (server &&
1070 set_membership(sd, args->grp.s_addr,
1071 args->local_addr.in.s_addr, args->ifindex))
1072 goto out_err;
1074 return sd;
1075 out_err:
1076 close(sd);
1077 return -1;
1080 static int msock_server(struct sock_args *args)
1082 return msock_init(args, 1);
1085 static int msock_client(struct sock_args *args)
1087 return msock_init(args, 0);
1090 static int bind_socket(int sd, struct sock_args *args)
1092 struct sockaddr_in serv_addr = {
1093 .sin_family = AF_INET,
1095 struct sockaddr_in6 serv6_addr = {
1096 .sin6_family = AF_INET6,
1098 void *addr;
1099 socklen_t alen;
1101 if (!args->has_local_ip && args->type == SOCK_RAW)
1102 return 0;
1104 switch (args->version) {
1105 case AF_INET:
1106 serv_addr.sin_port = htons(args->port);
1107 serv_addr.sin_addr = args->local_addr.in;
1108 addr = &serv_addr;
1109 alen = sizeof(serv_addr);
1110 break;
1112 case AF_INET6:
1113 serv6_addr.sin6_port = htons(args->port);
1114 serv6_addr.sin6_addr = args->local_addr.in6;
1115 addr = &serv6_addr;
1116 alen = sizeof(serv6_addr);
1117 break;
1119 default:
1120 log_error("Invalid address family\n");
1121 return -1;
1124 if (bind(sd, addr, alen) < 0) {
1125 log_err_errno("error binding socket");
1126 return -1;
1129 return 0;
1132 static int lsock_init(struct sock_args *args)
1134 long flags;
1135 int sd;
1137 sd = socket(args->version, args->type, args->protocol);
1138 if (sd < 0) {
1139 log_err_errno("Error opening socket");
1140 return -1;
1143 if (set_reuseaddr(sd) != 0)
1144 goto err;
1146 if (set_reuseport(sd) != 0)
1147 goto err;
1149 if (args->dev && bind_to_device(sd, args->dev) != 0)
1150 goto err;
1151 else if (args->use_setsockopt &&
1152 set_unicast_if(sd, args->ifindex, args->version))
1153 goto err;
1155 if (bind_socket(sd, args))
1156 goto err;
1158 if (args->bind_test_only)
1159 goto out;
1161 if (args->type == SOCK_STREAM && listen(sd, 1) < 0) {
1162 log_err_errno("listen failed");
1163 goto err;
1166 flags = fcntl(sd, F_GETFL);
1167 if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
1168 log_err_errno("Failed to set non-blocking option");
1169 goto err;
1172 if (fcntl(sd, F_SETFD, FD_CLOEXEC) < 0)
1173 log_err_errno("Failed to set close-on-exec flag");
1175 out:
1176 return sd;
1178 err:
1179 close(sd);
1180 return -1;
1183 static int do_server(struct sock_args *args)
1185 struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
1186 unsigned char addr[sizeof(struct sockaddr_in6)] = {};
1187 socklen_t alen = sizeof(addr);
1188 int lsd, csd = -1;
1190 fd_set rfds;
1191 int rc;
1193 if (prog_timeout)
1194 ptval = &timeout;
1196 if (args->has_grp)
1197 lsd = msock_server(args);
1198 else
1199 lsd = lsock_init(args);
1201 if (lsd < 0)
1202 return 1;
1204 if (args->bind_test_only) {
1205 close(lsd);
1206 return 0;
1209 if (args->type != SOCK_STREAM) {
1210 rc = msg_loop(0, lsd, (void *) addr, alen, args);
1211 close(lsd);
1212 return rc;
1215 if (args->password && tcp_md5_remote(lsd, args)) {
1216 close(lsd);
1217 return 1;
1220 while (1) {
1221 log_msg("\n");
1222 log_msg("waiting for client connection.\n");
1223 FD_ZERO(&rfds);
1224 FD_SET(lsd, &rfds);
1226 rc = select(lsd+1, &rfds, NULL, NULL, ptval);
1227 if (rc == 0) {
1228 rc = 2;
1229 break;
1232 if (rc < 0) {
1233 if (errno == EINTR)
1234 continue;
1236 log_err_errno("select failed");
1237 break;
1240 if (FD_ISSET(lsd, &rfds)) {
1242 csd = accept(lsd, (void *) addr, &alen);
1243 if (csd < 0) {
1244 log_err_errno("accept failed");
1245 break;
1248 rc = show_sockstat(csd, args);
1249 if (rc)
1250 break;
1252 rc = check_device(csd, args);
1253 if (rc)
1254 break;
1257 rc = msg_loop(0, csd, (void *) addr, alen, args);
1258 close(csd);
1260 if (!interactive)
1261 break;
1264 close(lsd);
1266 return rc;
1269 static int wait_for_connect(int sd)
1271 struct timeval _tv = { .tv_sec = prog_timeout }, *tv = NULL;
1272 fd_set wfd;
1273 int val = 0, sz = sizeof(val);
1274 int rc;
1276 FD_ZERO(&wfd);
1277 FD_SET(sd, &wfd);
1279 if (prog_timeout)
1280 tv = &_tv;
1282 rc = select(FD_SETSIZE, NULL, &wfd, NULL, tv);
1283 if (rc == 0) {
1284 log_error("connect timed out\n");
1285 return -2;
1286 } else if (rc < 0) {
1287 log_err_errno("select failed");
1288 return -3;
1291 if (getsockopt(sd, SOL_SOCKET, SO_ERROR, &val, (socklen_t *)&sz) < 0) {
1292 log_err_errno("getsockopt(SO_ERROR) failed");
1293 return -4;
1296 if (val != 0) {
1297 log_error("connect failed: %d: %s\n", val, strerror(val));
1298 return -1;
1301 return 0;
1304 static int connectsock(void *addr, socklen_t alen, struct sock_args *args)
1306 int sd, rc = -1;
1307 long flags;
1309 sd = socket(args->version, args->type, args->protocol);
1310 if (sd < 0) {
1311 log_err_errno("Failed to create socket");
1312 return -1;
1315 flags = fcntl(sd, F_GETFL);
1316 if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
1317 log_err_errno("Failed to set non-blocking option");
1318 goto err;
1321 if (set_reuseport(sd) != 0)
1322 goto err;
1324 if (args->dev && bind_to_device(sd, args->dev) != 0)
1325 goto err;
1326 else if (args->use_setsockopt &&
1327 set_unicast_if(sd, args->ifindex, args->version))
1328 goto err;
1330 if (args->has_local_ip && bind_socket(sd, args))
1331 goto err;
1333 if (args->type != SOCK_STREAM)
1334 goto out;
1336 if (args->password && tcp_md5sig(sd, addr, alen, args))
1337 goto err;
1339 if (args->bind_test_only)
1340 goto out;
1342 if (connect(sd, addr, alen) < 0) {
1343 if (errno != EINPROGRESS) {
1344 log_err_errno("Failed to connect to remote host");
1345 rc = -1;
1346 goto err;
1348 rc = wait_for_connect(sd);
1349 if (rc < 0)
1350 goto err;
1352 out:
1353 return sd;
1355 err:
1356 close(sd);
1357 return rc;
1360 static int do_client(struct sock_args *args)
1362 struct sockaddr_in sin = {
1363 .sin_family = AF_INET,
1365 struct sockaddr_in6 sin6 = {
1366 .sin6_family = AF_INET6,
1368 void *addr;
1369 int alen;
1370 int rc = 0;
1371 int sd;
1373 if (!args->has_remote_ip && !args->has_grp) {
1374 fprintf(stderr, "remote IP or multicast group not given\n");
1375 return 1;
1378 switch (args->version) {
1379 case AF_INET:
1380 sin.sin_port = htons(args->port);
1381 if (args->has_grp)
1382 sin.sin_addr = args->grp;
1383 else
1384 sin.sin_addr = args->remote_addr.in;
1385 addr = &sin;
1386 alen = sizeof(sin);
1387 break;
1388 case AF_INET6:
1389 sin6.sin6_port = htons(args->port);
1390 sin6.sin6_addr = args->remote_addr.in6;
1391 sin6.sin6_scope_id = args->scope_id;
1392 addr = &sin6;
1393 alen = sizeof(sin6);
1394 break;
1397 if (args->has_grp)
1398 sd = msock_client(args);
1399 else
1400 sd = connectsock(addr, alen, args);
1402 if (sd < 0)
1403 return -sd;
1405 if (args->bind_test_only)
1406 goto out;
1408 if (args->type == SOCK_STREAM) {
1409 rc = show_sockstat(sd, args);
1410 if (rc != 0)
1411 goto out;
1414 rc = msg_loop(1, sd, addr, alen, args);
1416 out:
1417 close(sd);
1419 return rc;
1422 enum addr_type {
1423 ADDR_TYPE_LOCAL,
1424 ADDR_TYPE_REMOTE,
1425 ADDR_TYPE_MCAST,
1426 ADDR_TYPE_EXPECTED_LOCAL,
1427 ADDR_TYPE_EXPECTED_REMOTE,
1428 ADDR_TYPE_MD5_PREFIX,
1431 static int convert_addr(struct sock_args *args, const char *_str,
1432 enum addr_type atype)
1434 int pfx_len_max = args->version == AF_INET6 ? 128 : 32;
1435 int family = args->version;
1436 char *str, *dev, *sep;
1437 struct in6_addr *in6;
1438 struct in_addr *in;
1439 const char *desc;
1440 void *addr;
1441 int rc = 0;
1443 str = strdup(_str);
1444 if (!str)
1445 return -ENOMEM;
1447 switch (atype) {
1448 case ADDR_TYPE_LOCAL:
1449 desc = "local";
1450 addr = &args->local_addr;
1451 break;
1452 case ADDR_TYPE_REMOTE:
1453 desc = "remote";
1454 addr = &args->remote_addr;
1455 break;
1456 case ADDR_TYPE_MCAST:
1457 desc = "mcast grp";
1458 addr = &args->grp;
1459 break;
1460 case ADDR_TYPE_EXPECTED_LOCAL:
1461 desc = "expected local";
1462 addr = &args->expected_laddr;
1463 break;
1464 case ADDR_TYPE_EXPECTED_REMOTE:
1465 desc = "expected remote";
1466 addr = &args->expected_raddr;
1467 break;
1468 case ADDR_TYPE_MD5_PREFIX:
1469 desc = "md5 prefix";
1470 if (family == AF_INET) {
1471 args->md5_prefix.v4.sin_family = AF_INET;
1472 addr = &args->md5_prefix.v4.sin_addr;
1473 } else if (family == AF_INET6) {
1474 args->md5_prefix.v6.sin6_family = AF_INET6;
1475 addr = &args->md5_prefix.v6.sin6_addr;
1476 } else
1477 return 1;
1479 sep = strchr(str, '/');
1480 if (sep) {
1481 *sep = '\0';
1482 sep++;
1483 if (str_to_uint(sep, 1, pfx_len_max,
1484 &args->prefix_len) != 0) {
1485 fprintf(stderr, "Invalid port\n");
1486 return 1;
1488 } else {
1489 args->prefix_len = pfx_len_max;
1491 break;
1492 default:
1493 log_error("unknown address type");
1494 exit(1);
1497 switch (family) {
1498 case AF_INET:
1499 in = (struct in_addr *) addr;
1500 if (str) {
1501 if (inet_pton(AF_INET, str, in) == 0) {
1502 log_error("Invalid %s IP address\n", desc);
1503 rc = -1;
1504 goto out;
1506 } else {
1507 in->s_addr = htonl(INADDR_ANY);
1509 break;
1511 case AF_INET6:
1512 dev = strchr(str, '%');
1513 if (dev) {
1514 *dev = '\0';
1515 dev++;
1518 in6 = (struct in6_addr *) addr;
1519 if (str) {
1520 if (inet_pton(AF_INET6, str, in6) == 0) {
1521 log_error("Invalid %s IPv6 address\n", desc);
1522 rc = -1;
1523 goto out;
1525 } else {
1526 *in6 = in6addr_any;
1528 if (dev) {
1529 args->scope_id = get_ifidx(dev);
1530 if (args->scope_id < 0) {
1531 log_error("Invalid scope on %s IPv6 address\n",
1532 desc);
1533 rc = -1;
1534 goto out;
1537 break;
1539 default:
1540 log_error("Invalid address family\n");
1543 out:
1544 free(str);
1545 return rc;
1548 static char *random_msg(int len)
1550 int i, n = 0, olen = len + 1;
1551 char *m;
1553 if (len <= 0)
1554 return NULL;
1556 m = malloc(olen);
1557 if (!m)
1558 return NULL;
1560 while (len > 26) {
1561 i = snprintf(m + n, olen - n, "%.26s",
1562 "abcdefghijklmnopqrstuvwxyz");
1563 n += i;
1564 len -= i;
1566 i = snprintf(m + n, olen - n, "%.*s", len,
1567 "abcdefghijklmnopqrstuvwxyz");
1568 return m;
1571 #define GETOPT_STR "sr:l:p:t:g:P:DRn:M:m:d:SCi6L:0:1:2:Fbq"
1573 static void print_usage(char *prog)
1575 printf(
1576 "usage: %s OPTS\n"
1577 "Required:\n"
1578 " -r addr remote address to connect to (client mode only)\n"
1579 " -p port port to connect to (client mode)/listen on (server mode)\n"
1580 " (default: %d)\n"
1581 " -s server mode (default: client mode)\n"
1582 " -t timeout seconds (default: none)\n"
1583 "\n"
1584 "Optional:\n"
1585 " -F Restart server loop\n"
1586 " -6 IPv6 (default is IPv4)\n"
1587 " -P proto protocol for socket: icmp, ospf (default: none)\n"
1588 " -D|R datagram (D) / raw (R) socket (default stream)\n"
1589 " -l addr local address to bind to\n"
1590 "\n"
1591 " -d dev bind socket to given device name\n"
1592 " -S use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n"
1593 " to set device binding\n"
1594 " -C use cmsg and IP_PKTINFO to specify device binding\n"
1595 "\n"
1596 " -L len send random message of given length\n"
1597 " -n num number of times to send message\n"
1598 "\n"
1599 " -M password use MD5 sum protection\n"
1600 " -m prefix/len prefix and length to use for MD5 key\n"
1601 " -g grp multicast group (e.g., 239.1.1.1)\n"
1602 " -i interactive mode (default is echo and terminate)\n"
1603 "\n"
1604 " -0 addr Expected local address\n"
1605 " -1 addr Expected remote address\n"
1606 " -2 dev Expected device name (or index) to receive packet\n"
1607 "\n"
1608 " -b Bind test only.\n"
1609 " -q Be quiet. Run test without printing anything.\n"
1610 , prog, DEFAULT_PORT);
1613 int main(int argc, char *argv[])
1615 struct sock_args args = {
1616 .version = AF_INET,
1617 .type = SOCK_STREAM,
1618 .port = DEFAULT_PORT,
1620 struct protoent *pe;
1621 unsigned int tmp;
1622 int forever = 0;
1624 /* process inputs */
1625 extern char *optarg;
1626 int rc = 0;
1629 * process input args
1632 while ((rc = getopt(argc, argv, GETOPT_STR)) != -1) {
1633 switch (rc) {
1634 case 's':
1635 server_mode = 1;
1636 break;
1637 case 'F':
1638 forever = 1;
1639 break;
1640 case 'l':
1641 args.has_local_ip = 1;
1642 if (convert_addr(&args, optarg, ADDR_TYPE_LOCAL) < 0)
1643 return 1;
1644 break;
1645 case 'r':
1646 args.has_remote_ip = 1;
1647 if (convert_addr(&args, optarg, ADDR_TYPE_REMOTE) < 0)
1648 return 1;
1649 break;
1650 case 'p':
1651 if (str_to_uint(optarg, 1, 65535, &tmp) != 0) {
1652 fprintf(stderr, "Invalid port\n");
1653 return 1;
1655 args.port = (unsigned short) tmp;
1656 break;
1657 case 't':
1658 if (str_to_uint(optarg, 0, INT_MAX,
1659 &prog_timeout) != 0) {
1660 fprintf(stderr, "Invalid timeout\n");
1661 return 1;
1663 break;
1664 case 'D':
1665 args.type = SOCK_DGRAM;
1666 break;
1667 case 'R':
1668 args.type = SOCK_RAW;
1669 args.port = 0;
1670 if (!args.protocol)
1671 args.protocol = IPPROTO_RAW;
1672 break;
1673 case 'P':
1674 pe = getprotobyname(optarg);
1675 if (pe) {
1676 args.protocol = pe->p_proto;
1677 } else {
1678 if (str_to_uint(optarg, 0, 0xffff, &tmp) != 0) {
1679 fprintf(stderr, "Invalid protocol\n");
1680 return 1;
1682 args.protocol = tmp;
1684 break;
1685 case 'n':
1686 iter = atoi(optarg);
1687 break;
1688 case 'L':
1689 msg = random_msg(atoi(optarg));
1690 break;
1691 case 'M':
1692 args.password = optarg;
1693 break;
1694 case 'm':
1695 if (convert_addr(&args, optarg, ADDR_TYPE_MD5_PREFIX) < 0)
1696 return 1;
1697 break;
1698 case 'S':
1699 args.use_setsockopt = 1;
1700 break;
1701 case 'C':
1702 args.use_cmsg = 1;
1703 break;
1704 case 'd':
1705 args.dev = optarg;
1706 args.ifindex = get_ifidx(optarg);
1707 if (args.ifindex < 0) {
1708 fprintf(stderr, "Invalid device name\n");
1709 return 1;
1711 break;
1712 case 'i':
1713 interactive = 1;
1714 break;
1715 case 'g':
1716 args.has_grp = 1;
1717 if (convert_addr(&args, optarg, ADDR_TYPE_MCAST) < 0)
1718 return 1;
1719 args.type = SOCK_DGRAM;
1720 break;
1721 case '6':
1722 args.version = AF_INET6;
1723 break;
1724 case 'b':
1725 args.bind_test_only = 1;
1726 break;
1727 case '0':
1728 args.has_expected_laddr = 1;
1729 if (convert_addr(&args, optarg,
1730 ADDR_TYPE_EXPECTED_LOCAL))
1731 return 1;
1732 break;
1733 case '1':
1734 args.has_expected_raddr = 1;
1735 if (convert_addr(&args, optarg,
1736 ADDR_TYPE_EXPECTED_REMOTE))
1737 return 1;
1739 break;
1740 case '2':
1741 if (str_to_uint(optarg, 0, INT_MAX, &tmp) == 0) {
1742 args.expected_ifindex = (int)tmp;
1743 } else {
1744 args.expected_ifindex = get_ifidx(optarg);
1745 if (args.expected_ifindex < 0) {
1746 fprintf(stderr,
1747 "Invalid expected device\n");
1748 return 1;
1751 break;
1752 case 'q':
1753 quiet = 1;
1754 break;
1755 default:
1756 print_usage(argv[0]);
1757 return 1;
1761 if (args.password &&
1762 ((!args.has_remote_ip && !args.prefix_len) || args.type != SOCK_STREAM)) {
1763 log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n");
1764 return 1;
1767 if (args.prefix_len && !args.password) {
1768 log_error("Prefix range for MD5 protection specified without a password\n");
1769 return 1;
1772 if ((args.use_setsockopt || args.use_cmsg) && !args.ifindex) {
1773 fprintf(stderr, "Device binding not specified\n");
1774 return 1;
1776 if (args.use_setsockopt || args.use_cmsg)
1777 args.dev = NULL;
1779 if (iter == 0) {
1780 fprintf(stderr, "Invalid number of messages to send\n");
1781 return 1;
1784 if (args.type == SOCK_STREAM && !args.protocol)
1785 args.protocol = IPPROTO_TCP;
1786 if (args.type == SOCK_DGRAM && !args.protocol)
1787 args.protocol = IPPROTO_UDP;
1789 if ((args.type == SOCK_STREAM || args.type == SOCK_DGRAM) &&
1790 args.port == 0) {
1791 fprintf(stderr, "Invalid port number\n");
1792 return 1;
1795 if (!server_mode && !args.has_grp &&
1796 !args.has_remote_ip && !args.has_local_ip) {
1797 fprintf(stderr,
1798 "Local (server mode) or remote IP (client IP) required\n");
1799 return 1;
1802 if (interactive) {
1803 prog_timeout = 0;
1804 msg = NULL;
1807 if (server_mode) {
1808 do {
1809 rc = do_server(&args);
1810 } while (forever);
1812 return rc;
1814 return do_client(&args);