[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3ajts54ndduloqhl2uf7viyy7n5azu63i6waptvf3mzzwkrzr7@jebnovap7xxz>
Date: Tue, 23 Jul 2024 16:43:11 +0200
From: Stefano Garzarella <sgarzare@...hat.com>
To: Amery Hung <ameryhung@...il.com>
Cc: stefanha@...hat.com, mst@...hat.com, jasowang@...hat.com,
xuanzhuo@...ux.alibaba.com, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
pabeni@...hat.com, kys@...rosoft.com, haiyangz@...rosoft.com, wei.liu@...nel.org,
decui@...rosoft.com, bryantan@...are.com, vdasa@...are.com, pv-drivers@...are.com,
dan.carpenter@...aro.org, simon.horman@...igine.com, oxffffaa@...il.com,
kvm@...r.kernel.org, virtualization@...ts.linux-foundation.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org, linux-hyperv@...r.kernel.org,
bpf@...r.kernel.org, bobby.eshleman@...edance.com, jiang.wang@...edance.com,
amery.hung@...edance.com, xiyou.wangcong@...il.com
Subject: Re: [RFC PATCH net-next v6 14/14] test/vsock: add vsock dgram tests
On Wed, Jul 10, 2024 at 09:25:55PM GMT, Amery Hung wrote:
>From: Bobby Eshleman <bobby.eshleman@...edance.com>
>
>From: Jiang Wang <jiang.wang@...edance.com>
>
>This commit adds tests for vsock datagram.
>
>Signed-off-by: Bobby Eshleman <bobby.eshleman@...edance.com>
>Signed-off-by: Jiang Wang <jiang.wang@...edance.com>
>Signed-off-by: Amery Hung <amery.hung@...edance.com>
>---
> tools/testing/vsock/util.c | 177 ++++-
> tools/testing/vsock/util.h | 10 +
> tools/testing/vsock/vsock_test.c | 1032 ++++++++++++++++++++++++++----
> 3 files changed, 1099 insertions(+), 120 deletions(-)
>
>diff --git a/tools/testing/vsock/util.c b/tools/testing/vsock/util.c
>index 554b290fefdc..14d6cd90ca15 100644
>--- a/tools/testing/vsock/util.c
>+++ b/tools/testing/vsock/util.c
>@@ -154,7 +154,8 @@ static int vsock_connect(unsigned int cid, unsigned int port, int type)
> int ret;
> int fd;
>
>- control_expectln("LISTENING");
>+ if (type != SOCK_DGRAM)
>+ control_expectln("LISTENING");
Why it is not needed?
BTW this patch is too big to be reviewed, please split it.
Thanks,
Stefano
>
> fd = socket(AF_VSOCK, type, 0);
> if (fd < 0) {
>@@ -189,6 +190,11 @@ int vsock_seqpacket_connect(unsigned int cid, unsigned int port)
> return vsock_connect(cid, port, SOCK_SEQPACKET);
> }
>
>+int vsock_dgram_connect(unsigned int cid, unsigned int port)
>+{
>+ return vsock_connect(cid, port, SOCK_DGRAM);
>+}
>+
> /* Listen on <cid, port> and return the file descriptor. */
> static int vsock_listen(unsigned int cid, unsigned int port, int type)
> {
>@@ -287,6 +293,34 @@ int vsock_seqpacket_accept(unsigned int cid, unsigned int port,
> return vsock_accept(cid, port, clientaddrp, SOCK_SEQPACKET);
> }
>
>+int vsock_dgram_bind(unsigned int cid, unsigned int port)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = port,
>+ .svm_cid = cid,
>+ },
>+ };
>+ int fd;
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ return fd;
>+}
>+
> /* Transmit bytes from a buffer and check the return value.
> *
> * expected_ret:
>@@ -425,6 +459,147 @@ void recv_byte(int fd, int expected_ret, int flags)
> }
> }
>
>+/* Transmit bytes to the given address from a buffer and check the return value.
>+ *
>+ * expected_ret:
>+ * <0 Negative errno (for testing errors)
>+ * 0 End-of-file
>+ * >0 Success (bytes successfully written)
>+ */
>+void sendto_buf(int fd, void *buf, size_t len, struct sockaddr *dst, socklen_t addrlen,
>+ int flags, ssize_t expected_ret)
>+{
>+ ssize_t nwritten = 0;
>+ ssize_t ret;
>+
>+ timeout_begin(TIMEOUT);
>+ do {
>+ ret = sendto(fd, buf + nwritten, len - nwritten, flags, dst, addrlen);
>+ timeout_check("sendto");
>+
>+ if (ret == 0 || (ret < 0 && errno != EINTR))
>+ break;
>+
>+ nwritten += ret;
>+ } while (nwritten < len);
>+ timeout_end();
>+
>+ if (expected_ret < 0) {
>+ if (nwritten != -1) {
>+ fprintf(stderr, "bogus sendto(2) return value %zd\n",
>+ nwritten);
>+ exit(EXIT_FAILURE);
>+ }
>+ if (errno != -expected_ret) {
>+ perror("sendto");
>+ exit(EXIT_FAILURE);
>+ }
>+ return;
>+ }
>+
>+ if (ret < 0) {
>+ perror("sendto");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (nwritten != expected_ret) {
>+ if (ret == 0)
>+ fprintf(stderr, "unexpected EOF while sending
>bytes\n");
>+
>+ fprintf(stderr, "bogus sendto(2) bytes written %zd (expected %zd)\n",
>+ nwritten, expected_ret);
>+ exit(EXIT_FAILURE);
>+ }
>+}
>+
>+/* Receive bytes from the given address in a buffer and check the return value.
>+ *
>+ * expected_ret:
>+ * <0 Negative errno (for testing errors)
>+ * 0 End-of-file
>+ * >0 Success (bytes successfully read)
>+ */
>+void recvfrom_buf(int fd, void *buf, size_t len, struct sockaddr *src, socklen_t *addrlen,
>+ int flags, ssize_t expected_ret)
>+{
>+ ssize_t nread = 0;
>+ ssize_t ret;
>+
>+ timeout_begin(TIMEOUT);
>+ do {
>+ ret = recvfrom(fd, buf + nread, len - nread, flags, src, addrlen);
>+ timeout_check("recvfrom");
>+
>+ if (ret == 0 || (ret < 0 && errno != EINTR))
>+ break;
>+
>+ nread += ret;
>+ } while (nread < len);
>+ timeout_end();
>+
>+ if (expected_ret < 0) {
>+ if (nread != -1) {
>+ fprintf(stderr, "bogus recvfrom(2) return value %zd\n",
>+ nread);
>+ exit(EXIT_FAILURE);
>+ }
>+ if (errno != -expected_ret) {
>+ perror("recvfrom");
>+ exit(EXIT_FAILURE);
>+ }
>+ return;
>+ }
>+
>+ if (ret < 0) {
>+ perror("recvfrom");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (nread != expected_ret) {
>+ if (ret == 0)
>+ fprintf(stderr, "unexpected EOF while receiving bytes\n");
>+
>+ fprintf(stderr, "bogus recv(2) bytes read %zd (expected %zd)\n",
>+ nread, expected_ret);
>+ exit(EXIT_FAILURE);
>+ }
>+}
>+
>+/* Transmit one byte to the given address and check the return value.
>+ *
>+ * expected_ret:
>+ * <0 Negative errno (for testing errors)
>+ * 0 End-of-file
>+ * 1 Success
>+ */
>+void sendto_byte(int fd, struct sockaddr *dst, socklen_t addrlen,
>+ int expected_ret, int flags)
>+{
>+ uint8_t byte = 'A';
>+
>+ sendto_buf(fd, &byte, sizeof(byte), dst, addrlen, flags, expected_ret);
>+}
>+
>+/* Receive one byte from the given address and check the return value.
>+ *
>+ * expected_ret:
>+ * <0 Negative errno (for testing errors)
>+ * 0 End-of-file
>+ * 1 Success
>+ */
>+void recvfrom_byte(int fd, struct sockaddr *src, socklen_t *addrlen,
>+ int expected_ret, int flags)
>+{
>+ uint8_t byte;
>+
>+ recvfrom_buf(fd, &byte, sizeof(byte), src, addrlen, flags, expected_ret);
>+
>+ if (byte != 'A') {
>+ fprintf(stderr, "unexpected byte read %c\n", byte);
>+ exit(EXIT_FAILURE);
>+ }
>+}
>+
> /* Run test cases. The program terminates if a failure occurs. */
> void run_tests(const struct test_case *test_cases,
> const struct test_opts *opts)
>diff --git a/tools/testing/vsock/util.h b/tools/testing/vsock/util.h
>index e95e62485959..3367262b53c9 100644
>--- a/tools/testing/vsock/util.h
>+++ b/tools/testing/vsock/util.h
>@@ -43,17 +43,27 @@ int vsock_stream_connect(unsigned int cid, unsigned int port);
> int vsock_bind_connect(unsigned int cid, unsigned int port,
> unsigned int bind_port, int type);
> int vsock_seqpacket_connect(unsigned int cid, unsigned int port);
>+int vsock_dgram_connect(unsigned int cid, unsigned int port);
> int vsock_stream_accept(unsigned int cid, unsigned int port,
> struct sockaddr_vm *clientaddrp);
> int vsock_stream_listen(unsigned int cid, unsigned int port);
> int vsock_seqpacket_accept(unsigned int cid, unsigned int port,
> struct sockaddr_vm *clientaddrp);
>+int vsock_dgram_bind(unsigned int cid, unsigned int port);
> void vsock_wait_remote_close(int fd);
> void send_buf(int fd, const void *buf, size_t len, int flags,
> ssize_t expected_ret);
> void recv_buf(int fd, void *buf, size_t len, int flags, ssize_t expected_ret);
> void send_byte(int fd, int expected_ret, int flags);
> void recv_byte(int fd, int expected_ret, int flags);
>+void sendto_buf(int fd, void *buf, size_t len, struct sockaddr *dst,
>+ socklen_t addrlen, int flags, ssize_t expected_ret);
>+void recvfrom_buf(int fd, void *buf, size_t len, struct sockaddr *src,
>+ socklen_t *addrlen, int flags, ssize_t expected_ret);
>+void sendto_byte(int fd, struct sockaddr *dst, socklen_t addrlen,
>+ int expected_ret, int flags);
>+void recvfrom_byte(int fd, struct sockaddr *src, socklen_t *addrlen,
>+ int expected_ret, int flags);
> void run_tests(const struct test_case *test_cases,
> const struct test_opts *opts);
> void list_tests(const struct test_case *test_cases);
>diff --git a/tools/testing/vsock/vsock_test.c b/tools/testing/vsock/vsock_test.c
>index f851f8961247..1e1576ca87d0 100644
>--- a/tools/testing/vsock/vsock_test.c
>+++ b/tools/testing/vsock/vsock_test.c
>@@ -13,6 +13,7 @@
> #include <string.h>
> #include <errno.h>
> #include <unistd.h>
>+#include <linux/errqueue.h>
> #include <linux/kernel.h>
> #include <sys/types.h>
> #include <sys/socket.h>
>@@ -26,6 +27,12 @@
> #include "control.h"
> #include "util.h"
>
>+#ifndef SOL_VSOCK
>+#define SOL_VSOCK 287
>+#endif
>+
>+#define DGRAM_MSG_CNT 16
>+
> static void test_stream_connection_reset(const struct test_opts *opts)
> {
> union {
>@@ -1403,125 +1410,912 @@ static void test_stream_cred_upd_on_set_rcvlowat(const struct test_opts *opts)
> test_stream_credit_update_test(opts, false);
> }
>
>-static struct test_case test_cases[] = {
>- {
>- .name = "SOCK_STREAM connection reset",
>- .run_client = test_stream_connection_reset,
>- },
>- {
>- .name = "SOCK_STREAM bind only",
>- .run_client = test_stream_bind_only_client,
>- .run_server = test_stream_bind_only_server,
>- },
>- {
>- .name = "SOCK_STREAM client close",
>- .run_client = test_stream_client_close_client,
>- .run_server = test_stream_client_close_server,
>- },
>- {
>- .name = "SOCK_STREAM server close",
>- .run_client = test_stream_server_close_client,
>- .run_server = test_stream_server_close_server,
>- },
>- {
>- .name = "SOCK_STREAM multiple connections",
>- .run_client = test_stream_multiconn_client,
>- .run_server = test_stream_multiconn_server,
>- },
>- {
>- .name = "SOCK_STREAM MSG_PEEK",
>- .run_client = test_stream_msg_peek_client,
>- .run_server = test_stream_msg_peek_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET msg bounds",
>- .run_client = test_seqpacket_msg_bounds_client,
>- .run_server = test_seqpacket_msg_bounds_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET MSG_TRUNC flag",
>- .run_client = test_seqpacket_msg_trunc_client,
>- .run_server = test_seqpacket_msg_trunc_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET timeout",
>- .run_client = test_seqpacket_timeout_client,
>- .run_server = test_seqpacket_timeout_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET invalid receive buffer",
>- .run_client = test_seqpacket_invalid_rec_buffer_client,
>- .run_server = test_seqpacket_invalid_rec_buffer_server,
>- },
>- {
>- .name = "SOCK_STREAM poll() + SO_RCVLOWAT",
>- .run_client = test_stream_poll_rcvlowat_client,
>- .run_server = test_stream_poll_rcvlowat_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET big message",
>- .run_client = test_seqpacket_bigmsg_client,
>- .run_server = test_seqpacket_bigmsg_server,
>- },
>- {
>- .name = "SOCK_STREAM test invalid buffer",
>- .run_client = test_stream_inv_buf_client,
>- .run_server = test_stream_inv_buf_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET test invalid buffer",
>- .run_client = test_seqpacket_inv_buf_client,
>- .run_server = test_seqpacket_inv_buf_server,
>- },
>- {
>- .name = "SOCK_STREAM virtio skb merge",
>- .run_client = test_stream_virtio_skb_merge_client,
>- .run_server = test_stream_virtio_skb_merge_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET MSG_PEEK",
>- .run_client = test_seqpacket_msg_peek_client,
>- .run_server = test_seqpacket_msg_peek_server,
>- },
>- {
>- .name = "SOCK_STREAM SHUT_WR",
>- .run_client = test_stream_shutwr_client,
>- .run_server = test_stream_shutwr_server,
>- },
>- {
>- .name = "SOCK_STREAM SHUT_RD",
>- .run_client = test_stream_shutrd_client,
>- .run_server = test_stream_shutrd_server,
>- },
>- {
>- .name = "SOCK_STREAM MSG_ZEROCOPY",
>- .run_client = test_stream_msgzcopy_client,
>- .run_server = test_stream_msgzcopy_server,
>- },
>- {
>- .name = "SOCK_SEQPACKET MSG_ZEROCOPY",
>- .run_client = test_seqpacket_msgzcopy_client,
>- .run_server = test_seqpacket_msgzcopy_server,
>- },
>- {
>- .name = "SOCK_STREAM MSG_ZEROCOPY empty MSG_ERRQUEUE",
>- .run_client = test_stream_msgzcopy_empty_errq_client,
>- .run_server = test_stream_msgzcopy_empty_errq_server,
>- },
>- {
>- .name = "SOCK_STREAM double bind connect",
>- .run_client = test_double_bind_connect_client,
>- .run_server = test_double_bind_connect_server,
>- },
>- {
>- .name = "SOCK_STREAM virtio credit update + SO_RCVLOWAT",
>- .run_client = test_stream_rcvlowat_def_cred_upd_client,
>- .run_server = test_stream_cred_upd_on_set_rcvlowat,
>- },
>- {
>- .name = "SOCK_STREAM virtio credit update + low rx_bytes",
>- .run_client = test_stream_rcvlowat_def_cred_upd_client,
>- .run_server = test_stream_cred_upd_on_low_rx_bytes,
>+static void test_dgram_sendto_client(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = opts->peer_cid,
>+ },
>+ };
>+ int fd;
>+
>+ /* Wait for the server to be ready */
>+ control_expectln("BIND");
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0);
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_sendto_server(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = VMADDR_CID_ANY,
>+ },
>+ };
>+ socklen_t addrlen = sizeof(addr.sa);
>+ unsigned long sock_buf_size;
>+ int fd;
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Set receive buffer to maximum */
>+ sock_buf_size = -1;
>+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF,
>+ &sock_buf_size, sizeof(sock_buf_size))) {
>+ perror("setsockopt(SO_RECVBUF)");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Notify the client that the server is ready */
>+ control_writeln("BIND");
>+
>+ recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0);
>+
>+ /* Wait for the client to finish */
>+ control_expectln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_sendto_auto_bind_client(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = opts->peer_cid,
>+ },
>+ };
>+ struct sockaddr_vm bind_addr;
>+ socklen_t addrlen;
>+ unsigned int port;
>+ int fd;
>+
>+ /* Wait for the server to be ready */
>+ control_expectln("BIND");
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0);
>+
>+ /* Get auto-bound port after sendto */
>+ addrlen = sizeof(bind_addr);
>+ if (getsockname(fd, (struct sockaddr *)&bind_addr, &addrlen)) {
>+ perror("getsockname");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Send the port number to the server */
>+ port = bind_addr.svm_port;
>+ sendto_buf(fd, &port, sizeof(port), &addr.sa, sizeof(addr.svm), 0, sizeof(port));
>+
>+ addr.svm.svm_port = port;
>+ recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0);
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_sendto_auto_bind_server(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = VMADDR_CID_ANY,
>+ },
>+ };
>+ socklen_t addrlen = sizeof(addr.sa);
>+ unsigned long sock_buf_size;
>+ unsigned int port;
>+ int fd;
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Set receive buffer to maximum */
>+ sock_buf_size = -1;
>+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF,
>+ &sock_buf_size, sizeof(sock_buf_size))) {
>+ perror("setsockopt(SO_RECVBUF)");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Notify the client that the server is ready */
>+ control_writeln("BIND");
>+
>+ recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0);
>+
>+ /* Receive the port the client is listening to */
>+ recvfrom_buf(fd, &port, sizeof(port), &addr.sa, &addrlen, 0, sizeof(port));
>+
>+ addr.svm.svm_port = port;
>+ addr.svm.svm_cid = opts->peer_cid;
>+ sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0);
>+
>+ /* Wait for the client to finish */
>+ control_expectln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_connect_client(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = opts->peer_cid,
>+ },
>+ };
>+ int ret;
>+ int fd;
>+
>+ /* Wait for the server to be ready */
>+ control_expectln("BIND");
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ ret = connect(fd, &addr.sa, sizeof(addr.svm));
>+ if (ret < 0) {
>+ perror("connect");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ send_byte(fd, 1, 0);
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_connect_server(const struct test_opts *opts)
>+{
>+ test_dgram_sendto_server(opts);
>+}
>+
>+static void test_dgram_multiconn_sendto_client(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = opts->peer_cid,
>+ },
>+ };
>+ int fds[MULTICONN_NFDS];
>+ int i;
>+
>+ /* Wait for the server to be ready */
>+ control_expectln("BIND");
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++) {
>+ fds[i] = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fds[i] < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+ }
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++) {
>+ sendto_byte(fds[i], &addr.sa, sizeof(addr.svm), 1, 0);
>+
>+ /* This is here to make explicit the case of the test failing
>+ * due to packet loss. The test fails when recv() times out
>+ * otherwise, which is much more confusing.
>+ */
>+ control_expectln("PKTRECV");
>+ }
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++)
>+ close(fds[i]);
>+}
>+
>+static void test_dgram_multiconn_sendto_server(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = VMADDR_CID_ANY,
>+ },
>+ };
>+ int len = sizeof(addr.sa);
>+ int fd;
>+ int i;
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Notify the client that the server is ready */
>+ control_writeln("BIND");
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++) {
>+ recvfrom_byte(fd, &addr.sa, &len, 1, 0);
>+ control_writeln("PKTRECV");
>+ }
>+
>+ /* Wait for the client to finish */
>+ control_expectln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_multiconn_send_client(const struct test_opts *opts)
>+{
>+ int fds[MULTICONN_NFDS];
>+ int i;
>+
>+ /* Wait for the server to be ready */
>+ control_expectln("BIND");
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++) {
>+ fds[i] = vsock_dgram_connect(opts->peer_cid, 1234);
>+ if (fds[i] < 0) {
>+ perror("connect");
>+ exit(EXIT_FAILURE);
>+ }
>+ }
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++) {
>+ send_byte(fds[i], 1, 0);
>+ /* This is here to make explicit the case of the test failing
>+ * due to packet loss.
>+ */
>+ control_expectln("PKTRECV");
>+ }
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++)
>+ close(fds[i]);
>+}
>+
>+static void test_dgram_multiconn_send_server(const struct test_opts *opts)
>+{
>+ union {
>+ struct sockaddr sa;
>+ struct sockaddr_vm svm;
>+ } addr = {
>+ .svm = {
>+ .svm_family = AF_VSOCK,
>+ .svm_port = 1234,
>+ .svm_cid = VMADDR_CID_ANY,
>+ },
>+ };
>+ unsigned long sock_buf_size;
>+ int fd;
>+ int i;
>+
>+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0);
>+ if (fd < 0) {
>+ perror("socket");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Set receive buffer to maximum */
>+ sock_buf_size = -1;
>+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF,
>+ &sock_buf_size, sizeof(sock_buf_size))) {
>+ perror("setsockopt(SO_RECVBUF)");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Notify the client that the server is ready */
>+ control_writeln("BIND");
>+
>+ for (i = 0; i < MULTICONN_NFDS; i++) {
>+ recv_byte(fd, 1, 0);
>+ control_writeln("PKTRECV");
>+ }
>+
>+ /* Wait for the client to finish */
>+ control_expectln("DONE");
>+
>+ close(fd);
>+}
>+
>+/*
>+ * This test is similar to the seqpacket msg bounds tests, but it is unreliable
>+ * because it may also fail in the unlikely case that packets are dropped.
>+ */
>+static void test_dgram_bounds_unreliable_client(const struct test_opts *opts)
>+{
>+ unsigned long recv_buf_size;
>+ unsigned long *hashes;
>+ size_t max_msg_size;
>+ int page_size;
>+ int fd;
>+ int i;
>+
>+ fd = vsock_dgram_connect(opts->peer_cid, 1234);
>+ if (fd < 0) {
>+ perror("connect");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ hashes = malloc(DGRAM_MSG_CNT * sizeof(unsigned long));
>+ if (!hashes) {
>+ perror("malloc");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Let the server know the client is ready */
>+ control_writeln("CLNTREADY");
>+
>+ /* Wait, until receiver sets buffer size. */
>+ control_expectln("SRVREADY");
>+
>+ recv_buf_size = control_readulong();
>+
>+ page_size = getpagesize();
>+ max_msg_size = MAX_MSG_PAGES * page_size;
>+
>+ for (i = 0; i < DGRAM_MSG_CNT; i++) {
>+ ssize_t send_size;
>+ size_t buf_size;
>+ void *buf;
>+
>+ /* Use "small" buffers and "big" buffers. */
>+ if (opts->peer_cid <= VMADDR_CID_HOST && (i & 1))
>+ buf_size = page_size +
>+ (rand() % (max_msg_size - page_size));
>+ else
>+ buf_size = 1 + (rand() % page_size);
>+
>+ buf_size = min(buf_size, recv_buf_size);
>+
>+ buf = malloc(buf_size);
>+
>+ if (!buf) {
>+ perror("malloc");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ memset(buf, rand() & 0xff, buf_size);
>+
>+ send_size = send(fd, buf, buf_size, 0);
>+ if (send_size < 0) {
>+ perror("send");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (send_size != buf_size) {
>+ fprintf(stderr, "Invalid send size\n");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* In theory the implementation isn't required to transmit
>+ * these packets in order, so we use this PKTSENT/PKTRECV
>+ * message sequence so that server and client coordinate
>+ * sending and receiving one packet at a time. The client sends
>+ * a packet and waits until it has been received before sending
>+ * another.
>+ *
>+ * Also in theory these packets can be lost and the test will
>+ * fail for that reason.
>+ */
>+ control_writeln("PKTSENT");
>+ control_expectln("PKTRECV");
>+
>+ /* Send the server a hash of the packet */
>+ hashes[i] = hash_djb2(buf, buf_size);
>+ free(buf);
>+ }
>+
>+ control_writeln("SENDDONE");
>+ close(fd);
>+
>+ for (i = 0; i < DGRAM_MSG_CNT; i++) {
>+ if (hashes[i] != control_readulong())
>+ fprintf(stderr, "broken dgram message bounds or packet loss\n");
>+ }
>+ free(hashes);
>+}
>+
>+static void test_dgram_bounds_unreliable_server(const struct test_opts *opts)
>+{
>+ unsigned long hashes[DGRAM_MSG_CNT];
>+ unsigned long sock_buf_size;
>+ struct msghdr msg = {0};
>+ struct iovec iov = {0};
>+ socklen_t len;
>+ int fd;
>+ int i;
>+
>+ fd = vsock_dgram_bind(VMADDR_CID_ANY, 1234);
>+ if (fd < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Set receive buffer to maximum */
>+ sock_buf_size = -1;
>+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF,
>+ &sock_buf_size, sizeof(sock_buf_size))) {
>+ perror("setsockopt(SO_RECVBUF)");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Retrieve the receive buffer size */
>+ len = sizeof(sock_buf_size);
>+ if (getsockopt(fd, SOL_SOCKET, SO_RCVBUF,
>+ &sock_buf_size, &len)) {
>+ perror("getsockopt(SO_RECVBUF)");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Client ready to receive parameters */
>+ control_expectln("CLNTREADY");
>+
>+ /* Ready to receive data. */
>+ control_writeln("SRVREADY");
>+
>+ if (opts->peer_cid > VMADDR_CID_HOST)
>+ control_writeulong(sock_buf_size);
>+ else
>+ control_writeulong(getpagesize());
>+
>+ iov.iov_len = MAX_MSG_PAGES * getpagesize();
>+ iov.iov_base = malloc(iov.iov_len);
>+ if (!iov.iov_base) {
>+ perror("malloc");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ msg.msg_iov = &iov;
>+ msg.msg_iovlen = 1;
>+
>+ for (i = 0; i < DGRAM_MSG_CNT; i++) {
>+ ssize_t recv_size;
>+
>+ control_expectln("PKTSENT");
>+ recv_size = recvmsg(fd, &msg, 0);
>+ control_writeln("PKTRECV");
>+
>+ if (!recv_size)
>+ break;
>+
>+ if (recv_size < 0) {
>+ perror("recvmsg");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ hashes[i] = hash_djb2(msg.msg_iov[0].iov_base, recv_size);
>+ }
>+
>+ control_expectln("SENDDONE");
>+
>+ free(iov.iov_base);
>+ close(fd);
>+
>+ for (i = 0; i < DGRAM_MSG_CNT; i++)
>+ control_writeulong(hashes[i]);
>+}
>+
>+#define POLL_TIMEOUT_MS 1000
>+void vsock_recv_error(int fd)
>+{
>+ struct sock_extended_err *serr;
>+ struct msghdr msg = { 0 };
>+ struct pollfd fds = { 0 };
>+ char cmsg_data[128];
>+ struct cmsghdr *cm;
>+ ssize_t res;
>+
>+ fds.fd = fd;
>+ fds.events = 0;
>+
>+ if (poll(&fds, 1, POLL_TIMEOUT_MS) < 0) {
>+ perror("poll");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (!(fds.revents & POLLERR)) {
>+ fprintf(stderr, "POLLERR expected\n");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ msg.msg_control = cmsg_data;
>+ msg.msg_controllen = sizeof(cmsg_data);
>+
>+ res = recvmsg(fd, &msg, MSG_ERRQUEUE);
>+ if (res) {
>+ fprintf(stderr, "failed to read error queue: %zi\n", res);
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ cm = CMSG_FIRSTHDR(&msg);
>+ if (!cm) {
>+ fprintf(stderr, "cmsg: no cmsg\n");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (cm->cmsg_level != SOL_VSOCK) {
>+ fprintf(stderr, "cmsg: unexpected 'cmsg_level'\n");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (cm->cmsg_type != 0) {
>+ fprintf(stderr, "cmsg: unexpected 'cmsg_type'\n");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ serr = (void *)CMSG_DATA(cm);
>+ if (serr->ee_origin != 0) {
>+ fprintf(stderr, "serr: unexpected 'ee_origin'\n");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ if (serr->ee_errno != EHOSTUNREACH) {
>+ fprintf(stderr, "serr: wrong error code: %u\n", serr->ee_errno);
>+ exit(EXIT_FAILURE);
>+ }
>+}
>+
>+/*
>+ * Attempt to send a packet larger than the client's RX buffer. Test that the
>+ * packet was dropped and that there is an error in the error queue.
>+ */
>+static void test_dgram_drop_big_packets_server(const struct test_opts *opts)
>+{
>+ unsigned long client_rx_buf_size;
>+ size_t buf_size;
>+ void *buf;
>+ int fd;
>+
>+ if (opts->peer_cid <= VMADDR_CID_HOST) {
>+ printf("The server's peer must be a guest (not CID %u), skipped...\n",
>+ opts->peer_cid);
>+ return;
>+ }
>+
>+ /* Wait for the server to be ready */
>+ control_expectln("READY");
>+
>+ fd = vsock_dgram_connect(opts->peer_cid, 1234);
>+ if (fd < 0) {
>+ perror("connect");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ client_rx_buf_size = control_readulong();
>+
>+ buf_size = client_rx_buf_size + 1;
>+ buf = malloc(buf_size);
>+ if (!buf) {
>+ perror("malloc");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Even though the buffer is exceeded, the send() should still succeed. */
>+ if (send(fd, buf, buf_size, 0) < 0) {
>+ perror("send");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ vsock_recv_error(fd);
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+
>+ close(fd);
>+}
>+
>+static void test_dgram_drop_big_packets_client(const struct test_opts *opts)
>+{
>+ unsigned long buf_size = getpagesize();
>+
>+ if (opts->peer_cid > VMADDR_CID_HOST) {
>+ printf("The client's peer must be the host (not CID %u), skipped...\n",
>+ opts->peer_cid);
>+ return;
>+ }
>+
>+ control_writeln("READY");
>+ control_writeulong(buf_size);
>+ control_expectln("DONE");
>+}
>+
>+static void test_stream_dgram_address_collision_client(const struct test_opts *opts)
>+{
>+ int dgram_fd, stream_fd;
>+
>+ stream_fd = vsock_stream_connect(opts->peer_cid, 1234);
>+ if (stream_fd < 0) {
>+ perror("connect");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* This simply tests if connect() causes address collision client-side.
>+ * Keep in mind that there is no exchange of packets with the
>+ * bound socket on the server.
>+ */
>+ dgram_fd = vsock_dgram_connect(opts->peer_cid, 1234);
>+ if (dgram_fd < 0) {
>+ perror("connect");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ close(stream_fd);
>+ close(dgram_fd);
>+
>+ /* Notify the server that the client has finished */
>+ control_writeln("DONE");
>+}
>+
>+static void test_stream_dgram_address_collision_server(const struct test_opts *opts)
>+{
>+ int dgram_fd, stream_fd;
>+ struct sockaddr_vm addr;
>+ socklen_t addrlen;
>+
>+ stream_fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, 0);
>+ if (stream_fd < 0) {
>+ perror("accept");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* Retrieve the CID/port for re-use. */
>+ addrlen = sizeof(addr);
>+ if (getsockname(stream_fd, (struct sockaddr *)&addr, &addrlen)) {
>+ perror("getsockname");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ /* See not in the client function about the pairwise connect call. */
>+ dgram_fd = vsock_dgram_bind(addr.svm_cid, addr.svm_port);
>+ if (dgram_fd < 0) {
>+ perror("bind");
>+ exit(EXIT_FAILURE);
>+ }
>+
>+ control_expectln("DONE");
>+
>+ close(stream_fd);
>+ close(dgram_fd);
>+}
>+
>+static struct test_case test_cases[] = {
>+ {
>+ .name = "SOCK_STREAM connection reset",
>+ .run_client = test_stream_connection_reset,
>+ },
>+ {
>+ .name = "SOCK_STREAM bind only",
>+ .run_client = test_stream_bind_only_client,
>+ .run_server = test_stream_bind_only_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM client close",
>+ .run_client = test_stream_client_close_client,
>+ .run_server = test_stream_client_close_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM server close",
>+ .run_client = test_stream_server_close_client,
>+ .run_server = test_stream_server_close_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM multiple connections",
>+ .run_client = test_stream_multiconn_client,
>+ .run_server = test_stream_multiconn_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM MSG_PEEK",
>+ .run_client = test_stream_msg_peek_client,
>+ .run_server = test_stream_msg_peek_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET msg bounds",
>+ .run_client = test_seqpacket_msg_bounds_client,
>+ .run_server = test_seqpacket_msg_bounds_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET MSG_TRUNC flag",
>+ .run_client = test_seqpacket_msg_trunc_client,
>+ .run_server = test_seqpacket_msg_trunc_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET timeout",
>+ .run_client = test_seqpacket_timeout_client,
>+ .run_server = test_seqpacket_timeout_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET invalid receive buffer",
>+ .run_client = test_seqpacket_invalid_rec_buffer_client,
>+ .run_server = test_seqpacket_invalid_rec_buffer_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM poll() + SO_RCVLOWAT",
>+ .run_client = test_stream_poll_rcvlowat_client,
>+ .run_server = test_stream_poll_rcvlowat_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET big message",
>+ .run_client = test_seqpacket_bigmsg_client,
>+ .run_server = test_seqpacket_bigmsg_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM test invalid buffer",
>+ .run_client = test_stream_inv_buf_client,
>+ .run_server = test_stream_inv_buf_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET test invalid buffer",
>+ .run_client = test_seqpacket_inv_buf_client,
>+ .run_server = test_seqpacket_inv_buf_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM virtio skb merge",
>+ .run_client = test_stream_virtio_skb_merge_client,
>+ .run_server = test_stream_virtio_skb_merge_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET MSG_PEEK",
>+ .run_client = test_seqpacket_msg_peek_client,
>+ .run_server = test_seqpacket_msg_peek_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM SHUT_WR",
>+ .run_client = test_stream_shutwr_client,
>+ .run_server = test_stream_shutwr_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM SHUT_RD",
>+ .run_client = test_stream_shutrd_client,
>+ .run_server = test_stream_shutrd_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM MSG_ZEROCOPY",
>+ .run_client = test_stream_msgzcopy_client,
>+ .run_server = test_stream_msgzcopy_server,
>+ },
>+ {
>+ .name = "SOCK_SEQPACKET MSG_ZEROCOPY",
>+ .run_client = test_seqpacket_msgzcopy_client,
>+ .run_server = test_seqpacket_msgzcopy_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM MSG_ZEROCOPY empty MSG_ERRQUEUE",
>+ .run_client = test_stream_msgzcopy_empty_errq_client,
>+ .run_server = test_stream_msgzcopy_empty_errq_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM double bind connect",
>+ .run_client = test_double_bind_connect_client,
>+ .run_server = test_double_bind_connect_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM virtio credit update + SO_RCVLOWAT",
>+ .run_client = test_stream_rcvlowat_def_cred_upd_client,
>+ .run_server = test_stream_cred_upd_on_set_rcvlowat,
>+ },
>+ {
>+ .name = "SOCK_STREAM virtio credit update + low rx_bytes",
>+ .run_client = test_stream_rcvlowat_def_cred_upd_client,
>+ .run_server = test_stream_cred_upd_on_low_rx_bytes,
>+ },
>+ {
>+ .name = "SOCK_DGRAM client sendto",
>+ .run_client = test_dgram_sendto_client,
>+ .run_server = test_dgram_sendto_server,
>+ },
>+ {
>+ .name = "SOCK_DGRAM client sendto auto bind",
>+ .run_client = test_dgram_sendto_auto_bind_client,
>+ .run_server = test_dgram_sendto_auto_bind_server,
>+ },
>+ {
>+ .name = "SOCK_DGRAM client connect",
>+ .run_client = test_dgram_connect_client,
>+ .run_server = test_dgram_connect_server,
>+ },
>+ {
>+ .name = "SOCK_DGRAM multiple connections using sendto",
>+ .run_client = test_dgram_multiconn_sendto_client,
>+ .run_server = test_dgram_multiconn_sendto_server,
>+ },
>+ {
>+ .name = "SOCK_DGRAM multiple connections using send",
>+ .run_client = test_dgram_multiconn_send_client,
>+ .run_server = test_dgram_multiconn_send_server,
>+ },
>+ {
>+ .name = "SOCK_DGRAM msg bounds unreliable",
>+ .run_client = test_dgram_bounds_unreliable_client,
>+ .run_server = test_dgram_bounds_unreliable_server,
>+ },
>+ {
>+ .name = "SOCK_DGRAM drop big packets",
>+ .run_client = test_dgram_drop_big_packets_client,
>+ .run_server = test_dgram_drop_big_packets_server,
>+ },
>+ {
>+ .name = "SOCK_STREAM and SOCK_DGRAM address collision",
>+ .run_client = test_stream_dgram_address_collision_client,
>+ .run_server = test_stream_dgram_address_collision_server,
> },
> {},
> };
>--
>2.20.1
>
Powered by blists - more mailing lists