Message ID | 20240710212555.1617795-15-amery.hung@bytedance.com (mailing list archive) |
---|---|
State | RFC |
Delegated to: | Netdev Maintainers |
Headers | show |
Series | virtio/vsock: support datagrams | expand |
+static void test_dgram_sendto_client(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, ^^^ port is not hardcoded, it is 'opts->peer_port' + .svm_cid = opts->peer_cid, + }, + }; + int fd; Thanks, Arseniy
On Wed, Jul 10, 2024 at 09:25:55PM GMT, Amery Hung wrote: >From: Bobby Eshleman <bobby.eshleman@bytedance.com> > >From: Jiang Wang <jiang.wang@bytedance.com> > >This commit adds tests for vsock datagram. > >Signed-off-by: Bobby Eshleman <bobby.eshleman@bytedance.com> >Signed-off-by: Jiang Wang <jiang.wang@bytedance.com> >Signed-off-by: Amery Hung <amery.hung@bytedance.com> >--- > tools/testing/vsock/util.c | 177 ++++- > tools/testing/vsock/util.h | 10 + > tools/testing/vsock/vsock_test.c | 1032 ++++++++++++++++++++++++++---- > 3 files changed, 1099 insertions(+), 120 deletions(-) > >diff --git a/tools/testing/vsock/util.c b/tools/testing/vsock/util.c >index 554b290fefdc..14d6cd90ca15 100644 >--- a/tools/testing/vsock/util.c >+++ b/tools/testing/vsock/util.c >@@ -154,7 +154,8 @@ static int vsock_connect(unsigned int cid, unsigned int port, int type) > int ret; > int fd; > >- control_expectln("LISTENING"); >+ if (type != SOCK_DGRAM) >+ control_expectln("LISTENING"); Why it is not needed? BTW this patch is too big to be reviewed, please split it. Thanks, Stefano > > fd = socket(AF_VSOCK, type, 0); > if (fd < 0) { >@@ -189,6 +190,11 @@ int vsock_seqpacket_connect(unsigned int cid, unsigned int port) > return vsock_connect(cid, port, SOCK_SEQPACKET); > } > >+int vsock_dgram_connect(unsigned int cid, unsigned int port) >+{ >+ return vsock_connect(cid, port, SOCK_DGRAM); >+} >+ > /* Listen on <cid, port> and return the file descriptor. */ > static int vsock_listen(unsigned int cid, unsigned int port, int type) > { >@@ -287,6 +293,34 @@ int vsock_seqpacket_accept(unsigned int cid, unsigned int port, > return vsock_accept(cid, port, clientaddrp, SOCK_SEQPACKET); > } > >+int vsock_dgram_bind(unsigned int cid, unsigned int port) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = port, >+ .svm_cid = cid, >+ }, >+ }; >+ int fd; >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ return fd; >+} >+ > /* Transmit bytes from a buffer and check the return value. > * > * expected_ret: >@@ -425,6 +459,147 @@ void recv_byte(int fd, int expected_ret, int flags) > } > } > >+/* Transmit bytes to the given address from a buffer and check the return value. >+ * >+ * expected_ret: >+ * <0 Negative errno (for testing errors) >+ * 0 End-of-file >+ * >0 Success (bytes successfully written) >+ */ >+void sendto_buf(int fd, void *buf, size_t len, struct sockaddr *dst, socklen_t addrlen, >+ int flags, ssize_t expected_ret) >+{ >+ ssize_t nwritten = 0; >+ ssize_t ret; >+ >+ timeout_begin(TIMEOUT); >+ do { >+ ret = sendto(fd, buf + nwritten, len - nwritten, flags, dst, addrlen); >+ timeout_check("sendto"); >+ >+ if (ret == 0 || (ret < 0 && errno != EINTR)) >+ break; >+ >+ nwritten += ret; >+ } while (nwritten < len); >+ timeout_end(); >+ >+ if (expected_ret < 0) { >+ if (nwritten != -1) { >+ fprintf(stderr, "bogus sendto(2) return value %zd\n", >+ nwritten); >+ exit(EXIT_FAILURE); >+ } >+ if (errno != -expected_ret) { >+ perror("sendto"); >+ exit(EXIT_FAILURE); >+ } >+ return; >+ } >+ >+ if (ret < 0) { >+ perror("sendto"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (nwritten != expected_ret) { >+ if (ret == 0) >+ fprintf(stderr, "unexpected EOF while sending >bytes\n"); >+ >+ fprintf(stderr, "bogus sendto(2) bytes written %zd (expected %zd)\n", >+ nwritten, expected_ret); >+ exit(EXIT_FAILURE); >+ } >+} >+ >+/* Receive bytes from the given address in a buffer and check the return value. >+ * >+ * expected_ret: >+ * <0 Negative errno (for testing errors) >+ * 0 End-of-file >+ * >0 Success (bytes successfully read) >+ */ >+void recvfrom_buf(int fd, void *buf, size_t len, struct sockaddr *src, socklen_t *addrlen, >+ int flags, ssize_t expected_ret) >+{ >+ ssize_t nread = 0; >+ ssize_t ret; >+ >+ timeout_begin(TIMEOUT); >+ do { >+ ret = recvfrom(fd, buf + nread, len - nread, flags, src, addrlen); >+ timeout_check("recvfrom"); >+ >+ if (ret == 0 || (ret < 0 && errno != EINTR)) >+ break; >+ >+ nread += ret; >+ } while (nread < len); >+ timeout_end(); >+ >+ if (expected_ret < 0) { >+ if (nread != -1) { >+ fprintf(stderr, "bogus recvfrom(2) return value %zd\n", >+ nread); >+ exit(EXIT_FAILURE); >+ } >+ if (errno != -expected_ret) { >+ perror("recvfrom"); >+ exit(EXIT_FAILURE); >+ } >+ return; >+ } >+ >+ if (ret < 0) { >+ perror("recvfrom"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (nread != expected_ret) { >+ if (ret == 0) >+ fprintf(stderr, "unexpected EOF while receiving bytes\n"); >+ >+ fprintf(stderr, "bogus recv(2) bytes read %zd (expected %zd)\n", >+ nread, expected_ret); >+ exit(EXIT_FAILURE); >+ } >+} >+ >+/* Transmit one byte to the given address and check the return value. >+ * >+ * expected_ret: >+ * <0 Negative errno (for testing errors) >+ * 0 End-of-file >+ * 1 Success >+ */ >+void sendto_byte(int fd, struct sockaddr *dst, socklen_t addrlen, >+ int expected_ret, int flags) >+{ >+ uint8_t byte = 'A'; >+ >+ sendto_buf(fd, &byte, sizeof(byte), dst, addrlen, flags, expected_ret); >+} >+ >+/* Receive one byte from the given address and check the return value. >+ * >+ * expected_ret: >+ * <0 Negative errno (for testing errors) >+ * 0 End-of-file >+ * 1 Success >+ */ >+void recvfrom_byte(int fd, struct sockaddr *src, socklen_t *addrlen, >+ int expected_ret, int flags) >+{ >+ uint8_t byte; >+ >+ recvfrom_buf(fd, &byte, sizeof(byte), src, addrlen, flags, expected_ret); >+ >+ if (byte != 'A') { >+ fprintf(stderr, "unexpected byte read %c\n", byte); >+ exit(EXIT_FAILURE); >+ } >+} >+ > /* Run test cases. The program terminates if a failure occurs. */ > void run_tests(const struct test_case *test_cases, > const struct test_opts *opts) >diff --git a/tools/testing/vsock/util.h b/tools/testing/vsock/util.h >index e95e62485959..3367262b53c9 100644 >--- a/tools/testing/vsock/util.h >+++ b/tools/testing/vsock/util.h >@@ -43,17 +43,27 @@ int vsock_stream_connect(unsigned int cid, unsigned int port); > int vsock_bind_connect(unsigned int cid, unsigned int port, > unsigned int bind_port, int type); > int vsock_seqpacket_connect(unsigned int cid, unsigned int port); >+int vsock_dgram_connect(unsigned int cid, unsigned int port); > int vsock_stream_accept(unsigned int cid, unsigned int port, > struct sockaddr_vm *clientaddrp); > int vsock_stream_listen(unsigned int cid, unsigned int port); > int vsock_seqpacket_accept(unsigned int cid, unsigned int port, > struct sockaddr_vm *clientaddrp); >+int vsock_dgram_bind(unsigned int cid, unsigned int port); > void vsock_wait_remote_close(int fd); > void send_buf(int fd, const void *buf, size_t len, int flags, > ssize_t expected_ret); > void recv_buf(int fd, void *buf, size_t len, int flags, ssize_t expected_ret); > void send_byte(int fd, int expected_ret, int flags); > void recv_byte(int fd, int expected_ret, int flags); >+void sendto_buf(int fd, void *buf, size_t len, struct sockaddr *dst, >+ socklen_t addrlen, int flags, ssize_t expected_ret); >+void recvfrom_buf(int fd, void *buf, size_t len, struct sockaddr *src, >+ socklen_t *addrlen, int flags, ssize_t expected_ret); >+void sendto_byte(int fd, struct sockaddr *dst, socklen_t addrlen, >+ int expected_ret, int flags); >+void recvfrom_byte(int fd, struct sockaddr *src, socklen_t *addrlen, >+ int expected_ret, int flags); > void run_tests(const struct test_case *test_cases, > const struct test_opts *opts); > void list_tests(const struct test_case *test_cases); >diff --git a/tools/testing/vsock/vsock_test.c b/tools/testing/vsock/vsock_test.c >index f851f8961247..1e1576ca87d0 100644 >--- a/tools/testing/vsock/vsock_test.c >+++ b/tools/testing/vsock/vsock_test.c >@@ -13,6 +13,7 @@ > #include <string.h> > #include <errno.h> > #include <unistd.h> >+#include <linux/errqueue.h> > #include <linux/kernel.h> > #include <sys/types.h> > #include <sys/socket.h> >@@ -26,6 +27,12 @@ > #include "control.h" > #include "util.h" > >+#ifndef SOL_VSOCK >+#define SOL_VSOCK 287 >+#endif >+ >+#define DGRAM_MSG_CNT 16 >+ > static void test_stream_connection_reset(const struct test_opts *opts) > { > union { >@@ -1403,125 +1410,912 @@ static void test_stream_cred_upd_on_set_rcvlowat(const struct test_opts *opts) > test_stream_credit_update_test(opts, false); > } > >-static struct test_case test_cases[] = { >- { >- .name = "SOCK_STREAM connection reset", >- .run_client = test_stream_connection_reset, >- }, >- { >- .name = "SOCK_STREAM bind only", >- .run_client = test_stream_bind_only_client, >- .run_server = test_stream_bind_only_server, >- }, >- { >- .name = "SOCK_STREAM client close", >- .run_client = test_stream_client_close_client, >- .run_server = test_stream_client_close_server, >- }, >- { >- .name = "SOCK_STREAM server close", >- .run_client = test_stream_server_close_client, >- .run_server = test_stream_server_close_server, >- }, >- { >- .name = "SOCK_STREAM multiple connections", >- .run_client = test_stream_multiconn_client, >- .run_server = test_stream_multiconn_server, >- }, >- { >- .name = "SOCK_STREAM MSG_PEEK", >- .run_client = test_stream_msg_peek_client, >- .run_server = test_stream_msg_peek_server, >- }, >- { >- .name = "SOCK_SEQPACKET msg bounds", >- .run_client = test_seqpacket_msg_bounds_client, >- .run_server = test_seqpacket_msg_bounds_server, >- }, >- { >- .name = "SOCK_SEQPACKET MSG_TRUNC flag", >- .run_client = test_seqpacket_msg_trunc_client, >- .run_server = test_seqpacket_msg_trunc_server, >- }, >- { >- .name = "SOCK_SEQPACKET timeout", >- .run_client = test_seqpacket_timeout_client, >- .run_server = test_seqpacket_timeout_server, >- }, >- { >- .name = "SOCK_SEQPACKET invalid receive buffer", >- .run_client = test_seqpacket_invalid_rec_buffer_client, >- .run_server = test_seqpacket_invalid_rec_buffer_server, >- }, >- { >- .name = "SOCK_STREAM poll() + SO_RCVLOWAT", >- .run_client = test_stream_poll_rcvlowat_client, >- .run_server = test_stream_poll_rcvlowat_server, >- }, >- { >- .name = "SOCK_SEQPACKET big message", >- .run_client = test_seqpacket_bigmsg_client, >- .run_server = test_seqpacket_bigmsg_server, >- }, >- { >- .name = "SOCK_STREAM test invalid buffer", >- .run_client = test_stream_inv_buf_client, >- .run_server = test_stream_inv_buf_server, >- }, >- { >- .name = "SOCK_SEQPACKET test invalid buffer", >- .run_client = test_seqpacket_inv_buf_client, >- .run_server = test_seqpacket_inv_buf_server, >- }, >- { >- .name = "SOCK_STREAM virtio skb merge", >- .run_client = test_stream_virtio_skb_merge_client, >- .run_server = test_stream_virtio_skb_merge_server, >- }, >- { >- .name = "SOCK_SEQPACKET MSG_PEEK", >- .run_client = test_seqpacket_msg_peek_client, >- .run_server = test_seqpacket_msg_peek_server, >- }, >- { >- .name = "SOCK_STREAM SHUT_WR", >- .run_client = test_stream_shutwr_client, >- .run_server = test_stream_shutwr_server, >- }, >- { >- .name = "SOCK_STREAM SHUT_RD", >- .run_client = test_stream_shutrd_client, >- .run_server = test_stream_shutrd_server, >- }, >- { >- .name = "SOCK_STREAM MSG_ZEROCOPY", >- .run_client = test_stream_msgzcopy_client, >- .run_server = test_stream_msgzcopy_server, >- }, >- { >- .name = "SOCK_SEQPACKET MSG_ZEROCOPY", >- .run_client = test_seqpacket_msgzcopy_client, >- .run_server = test_seqpacket_msgzcopy_server, >- }, >- { >- .name = "SOCK_STREAM MSG_ZEROCOPY empty MSG_ERRQUEUE", >- .run_client = test_stream_msgzcopy_empty_errq_client, >- .run_server = test_stream_msgzcopy_empty_errq_server, >- }, >- { >- .name = "SOCK_STREAM double bind connect", >- .run_client = test_double_bind_connect_client, >- .run_server = test_double_bind_connect_server, >- }, >- { >- .name = "SOCK_STREAM virtio credit update + SO_RCVLOWAT", >- .run_client = test_stream_rcvlowat_def_cred_upd_client, >- .run_server = test_stream_cred_upd_on_set_rcvlowat, >- }, >- { >- .name = "SOCK_STREAM virtio credit update + low rx_bytes", >- .run_client = test_stream_rcvlowat_def_cred_upd_client, >- .run_server = test_stream_cred_upd_on_low_rx_bytes, >+static void test_dgram_sendto_client(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = opts->peer_cid, >+ }, >+ }; >+ int fd; >+ >+ /* Wait for the server to be ready */ >+ control_expectln("BIND"); >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0); >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_sendto_server(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = VMADDR_CID_ANY, >+ }, >+ }; >+ socklen_t addrlen = sizeof(addr.sa); >+ unsigned long sock_buf_size; >+ int fd; >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Set receive buffer to maximum */ >+ sock_buf_size = -1; >+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, >+ &sock_buf_size, sizeof(sock_buf_size))) { >+ perror("setsockopt(SO_RECVBUF)"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Notify the client that the server is ready */ >+ control_writeln("BIND"); >+ >+ recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0); >+ >+ /* Wait for the client to finish */ >+ control_expectln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_sendto_auto_bind_client(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = opts->peer_cid, >+ }, >+ }; >+ struct sockaddr_vm bind_addr; >+ socklen_t addrlen; >+ unsigned int port; >+ int fd; >+ >+ /* Wait for the server to be ready */ >+ control_expectln("BIND"); >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0); >+ >+ /* Get auto-bound port after sendto */ >+ addrlen = sizeof(bind_addr); >+ if (getsockname(fd, (struct sockaddr *)&bind_addr, &addrlen)) { >+ perror("getsockname"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Send the port number to the server */ >+ port = bind_addr.svm_port; >+ sendto_buf(fd, &port, sizeof(port), &addr.sa, sizeof(addr.svm), 0, sizeof(port)); >+ >+ addr.svm.svm_port = port; >+ recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0); >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_sendto_auto_bind_server(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = VMADDR_CID_ANY, >+ }, >+ }; >+ socklen_t addrlen = sizeof(addr.sa); >+ unsigned long sock_buf_size; >+ unsigned int port; >+ int fd; >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Set receive buffer to maximum */ >+ sock_buf_size = -1; >+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, >+ &sock_buf_size, sizeof(sock_buf_size))) { >+ perror("setsockopt(SO_RECVBUF)"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Notify the client that the server is ready */ >+ control_writeln("BIND"); >+ >+ recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0); >+ >+ /* Receive the port the client is listening to */ >+ recvfrom_buf(fd, &port, sizeof(port), &addr.sa, &addrlen, 0, sizeof(port)); >+ >+ addr.svm.svm_port = port; >+ addr.svm.svm_cid = opts->peer_cid; >+ sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0); >+ >+ /* Wait for the client to finish */ >+ control_expectln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_connect_client(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = opts->peer_cid, >+ }, >+ }; >+ int ret; >+ int fd; >+ >+ /* Wait for the server to be ready */ >+ control_expectln("BIND"); >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ ret = connect(fd, &addr.sa, sizeof(addr.svm)); >+ if (ret < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ send_byte(fd, 1, 0); >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_connect_server(const struct test_opts *opts) >+{ >+ test_dgram_sendto_server(opts); >+} >+ >+static void test_dgram_multiconn_sendto_client(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = opts->peer_cid, >+ }, >+ }; >+ int fds[MULTICONN_NFDS]; >+ int i; >+ >+ /* Wait for the server to be ready */ >+ control_expectln("BIND"); >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) { >+ fds[i] = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fds[i] < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ } >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) { >+ sendto_byte(fds[i], &addr.sa, sizeof(addr.svm), 1, 0); >+ >+ /* This is here to make explicit the case of the test failing >+ * due to packet loss. The test fails when recv() times out >+ * otherwise, which is much more confusing. >+ */ >+ control_expectln("PKTRECV"); >+ } >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) >+ close(fds[i]); >+} >+ >+static void test_dgram_multiconn_sendto_server(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = VMADDR_CID_ANY, >+ }, >+ }; >+ int len = sizeof(addr.sa); >+ int fd; >+ int i; >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Notify the client that the server is ready */ >+ control_writeln("BIND"); >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) { >+ recvfrom_byte(fd, &addr.sa, &len, 1, 0); >+ control_writeln("PKTRECV"); >+ } >+ >+ /* Wait for the client to finish */ >+ control_expectln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_multiconn_send_client(const struct test_opts *opts) >+{ >+ int fds[MULTICONN_NFDS]; >+ int i; >+ >+ /* Wait for the server to be ready */ >+ control_expectln("BIND"); >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) { >+ fds[i] = vsock_dgram_connect(opts->peer_cid, 1234); >+ if (fds[i] < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ } >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) { >+ send_byte(fds[i], 1, 0); >+ /* This is here to make explicit the case of the test failing >+ * due to packet loss. >+ */ >+ control_expectln("PKTRECV"); >+ } >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) >+ close(fds[i]); >+} >+ >+static void test_dgram_multiconn_send_server(const struct test_opts *opts) >+{ >+ union { >+ struct sockaddr sa; >+ struct sockaddr_vm svm; >+ } addr = { >+ .svm = { >+ .svm_family = AF_VSOCK, >+ .svm_port = 1234, >+ .svm_cid = VMADDR_CID_ANY, >+ }, >+ }; >+ unsigned long sock_buf_size; >+ int fd; >+ int i; >+ >+ fd = socket(AF_VSOCK, SOCK_DGRAM, 0); >+ if (fd < 0) { >+ perror("socket"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Set receive buffer to maximum */ >+ sock_buf_size = -1; >+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, >+ &sock_buf_size, sizeof(sock_buf_size))) { >+ perror("setsockopt(SO_RECVBUF)"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Notify the client that the server is ready */ >+ control_writeln("BIND"); >+ >+ for (i = 0; i < MULTICONN_NFDS; i++) { >+ recv_byte(fd, 1, 0); >+ control_writeln("PKTRECV"); >+ } >+ >+ /* Wait for the client to finish */ >+ control_expectln("DONE"); >+ >+ close(fd); >+} >+ >+/* >+ * This test is similar to the seqpacket msg bounds tests, but it is unreliable >+ * because it may also fail in the unlikely case that packets are dropped. >+ */ >+static void test_dgram_bounds_unreliable_client(const struct test_opts *opts) >+{ >+ unsigned long recv_buf_size; >+ unsigned long *hashes; >+ size_t max_msg_size; >+ int page_size; >+ int fd; >+ int i; >+ >+ fd = vsock_dgram_connect(opts->peer_cid, 1234); >+ if (fd < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ hashes = malloc(DGRAM_MSG_CNT * sizeof(unsigned long)); >+ if (!hashes) { >+ perror("malloc"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Let the server know the client is ready */ >+ control_writeln("CLNTREADY"); >+ >+ /* Wait, until receiver sets buffer size. */ >+ control_expectln("SRVREADY"); >+ >+ recv_buf_size = control_readulong(); >+ >+ page_size = getpagesize(); >+ max_msg_size = MAX_MSG_PAGES * page_size; >+ >+ for (i = 0; i < DGRAM_MSG_CNT; i++) { >+ ssize_t send_size; >+ size_t buf_size; >+ void *buf; >+ >+ /* Use "small" buffers and "big" buffers. */ >+ if (opts->peer_cid <= VMADDR_CID_HOST && (i & 1)) >+ buf_size = page_size + >+ (rand() % (max_msg_size - page_size)); >+ else >+ buf_size = 1 + (rand() % page_size); >+ >+ buf_size = min(buf_size, recv_buf_size); >+ >+ buf = malloc(buf_size); >+ >+ if (!buf) { >+ perror("malloc"); >+ exit(EXIT_FAILURE); >+ } >+ >+ memset(buf, rand() & 0xff, buf_size); >+ >+ send_size = send(fd, buf, buf_size, 0); >+ if (send_size < 0) { >+ perror("send"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (send_size != buf_size) { >+ fprintf(stderr, "Invalid send size\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* In theory the implementation isn't required to transmit >+ * these packets in order, so we use this PKTSENT/PKTRECV >+ * message sequence so that server and client coordinate >+ * sending and receiving one packet at a time. The client sends >+ * a packet and waits until it has been received before sending >+ * another. >+ * >+ * Also in theory these packets can be lost and the test will >+ * fail for that reason. >+ */ >+ control_writeln("PKTSENT"); >+ control_expectln("PKTRECV"); >+ >+ /* Send the server a hash of the packet */ >+ hashes[i] = hash_djb2(buf, buf_size); >+ free(buf); >+ } >+ >+ control_writeln("SENDDONE"); >+ close(fd); >+ >+ for (i = 0; i < DGRAM_MSG_CNT; i++) { >+ if (hashes[i] != control_readulong()) >+ fprintf(stderr, "broken dgram message bounds or packet loss\n"); >+ } >+ free(hashes); >+} >+ >+static void test_dgram_bounds_unreliable_server(const struct test_opts *opts) >+{ >+ unsigned long hashes[DGRAM_MSG_CNT]; >+ unsigned long sock_buf_size; >+ struct msghdr msg = {0}; >+ struct iovec iov = {0}; >+ socklen_t len; >+ int fd; >+ int i; >+ >+ fd = vsock_dgram_bind(VMADDR_CID_ANY, 1234); >+ if (fd < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Set receive buffer to maximum */ >+ sock_buf_size = -1; >+ if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, >+ &sock_buf_size, sizeof(sock_buf_size))) { >+ perror("setsockopt(SO_RECVBUF)"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Retrieve the receive buffer size */ >+ len = sizeof(sock_buf_size); >+ if (getsockopt(fd, SOL_SOCKET, SO_RCVBUF, >+ &sock_buf_size, &len)) { >+ perror("getsockopt(SO_RECVBUF)"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Client ready to receive parameters */ >+ control_expectln("CLNTREADY"); >+ >+ /* Ready to receive data. */ >+ control_writeln("SRVREADY"); >+ >+ if (opts->peer_cid > VMADDR_CID_HOST) >+ control_writeulong(sock_buf_size); >+ else >+ control_writeulong(getpagesize()); >+ >+ iov.iov_len = MAX_MSG_PAGES * getpagesize(); >+ iov.iov_base = malloc(iov.iov_len); >+ if (!iov.iov_base) { >+ perror("malloc"); >+ exit(EXIT_FAILURE); >+ } >+ >+ msg.msg_iov = &iov; >+ msg.msg_iovlen = 1; >+ >+ for (i = 0; i < DGRAM_MSG_CNT; i++) { >+ ssize_t recv_size; >+ >+ control_expectln("PKTSENT"); >+ recv_size = recvmsg(fd, &msg, 0); >+ control_writeln("PKTRECV"); >+ >+ if (!recv_size) >+ break; >+ >+ if (recv_size < 0) { >+ perror("recvmsg"); >+ exit(EXIT_FAILURE); >+ } >+ >+ hashes[i] = hash_djb2(msg.msg_iov[0].iov_base, recv_size); >+ } >+ >+ control_expectln("SENDDONE"); >+ >+ free(iov.iov_base); >+ close(fd); >+ >+ for (i = 0; i < DGRAM_MSG_CNT; i++) >+ control_writeulong(hashes[i]); >+} >+ >+#define POLL_TIMEOUT_MS 1000 >+void vsock_recv_error(int fd) >+{ >+ struct sock_extended_err *serr; >+ struct msghdr msg = { 0 }; >+ struct pollfd fds = { 0 }; >+ char cmsg_data[128]; >+ struct cmsghdr *cm; >+ ssize_t res; >+ >+ fds.fd = fd; >+ fds.events = 0; >+ >+ if (poll(&fds, 1, POLL_TIMEOUT_MS) < 0) { >+ perror("poll"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (!(fds.revents & POLLERR)) { >+ fprintf(stderr, "POLLERR expected\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ msg.msg_control = cmsg_data; >+ msg.msg_controllen = sizeof(cmsg_data); >+ >+ res = recvmsg(fd, &msg, MSG_ERRQUEUE); >+ if (res) { >+ fprintf(stderr, "failed to read error queue: %zi\n", res); >+ exit(EXIT_FAILURE); >+ } >+ >+ cm = CMSG_FIRSTHDR(&msg); >+ if (!cm) { >+ fprintf(stderr, "cmsg: no cmsg\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (cm->cmsg_level != SOL_VSOCK) { >+ fprintf(stderr, "cmsg: unexpected 'cmsg_level'\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (cm->cmsg_type != 0) { >+ fprintf(stderr, "cmsg: unexpected 'cmsg_type'\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ serr = (void *)CMSG_DATA(cm); >+ if (serr->ee_origin != 0) { >+ fprintf(stderr, "serr: unexpected 'ee_origin'\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (serr->ee_errno != EHOSTUNREACH) { >+ fprintf(stderr, "serr: wrong error code: %u\n", serr->ee_errno); >+ exit(EXIT_FAILURE); >+ } >+} >+ >+/* >+ * Attempt to send a packet larger than the client's RX buffer. Test that the >+ * packet was dropped and that there is an error in the error queue. >+ */ >+static void test_dgram_drop_big_packets_server(const struct test_opts *opts) >+{ >+ unsigned long client_rx_buf_size; >+ size_t buf_size; >+ void *buf; >+ int fd; >+ >+ if (opts->peer_cid <= VMADDR_CID_HOST) { >+ printf("The server's peer must be a guest (not CID %u), skipped...\n", >+ opts->peer_cid); >+ return; >+ } >+ >+ /* Wait for the server to be ready */ >+ control_expectln("READY"); >+ >+ fd = vsock_dgram_connect(opts->peer_cid, 1234); >+ if (fd < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ client_rx_buf_size = control_readulong(); >+ >+ buf_size = client_rx_buf_size + 1; >+ buf = malloc(buf_size); >+ if (!buf) { >+ perror("malloc"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Even though the buffer is exceeded, the send() should still succeed. */ >+ if (send(fd, buf, buf_size, 0) < 0) { >+ perror("send"); >+ exit(EXIT_FAILURE); >+ } >+ >+ vsock_recv_error(fd); >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+ >+ close(fd); >+} >+ >+static void test_dgram_drop_big_packets_client(const struct test_opts *opts) >+{ >+ unsigned long buf_size = getpagesize(); >+ >+ if (opts->peer_cid > VMADDR_CID_HOST) { >+ printf("The client's peer must be the host (not CID %u), skipped...\n", >+ opts->peer_cid); >+ return; >+ } >+ >+ control_writeln("READY"); >+ control_writeulong(buf_size); >+ control_expectln("DONE"); >+} >+ >+static void test_stream_dgram_address_collision_client(const struct test_opts *opts) >+{ >+ int dgram_fd, stream_fd; >+ >+ stream_fd = vsock_stream_connect(opts->peer_cid, 1234); >+ if (stream_fd < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* This simply tests if connect() causes address collision client-side. >+ * Keep in mind that there is no exchange of packets with the >+ * bound socket on the server. >+ */ >+ dgram_fd = vsock_dgram_connect(opts->peer_cid, 1234); >+ if (dgram_fd < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ close(stream_fd); >+ close(dgram_fd); >+ >+ /* Notify the server that the client has finished */ >+ control_writeln("DONE"); >+} >+ >+static void test_stream_dgram_address_collision_server(const struct test_opts *opts) >+{ >+ int dgram_fd, stream_fd; >+ struct sockaddr_vm addr; >+ socklen_t addrlen; >+ >+ stream_fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, 0); >+ if (stream_fd < 0) { >+ perror("accept"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Retrieve the CID/port for re-use. */ >+ addrlen = sizeof(addr); >+ if (getsockname(stream_fd, (struct sockaddr *)&addr, &addrlen)) { >+ perror("getsockname"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* See not in the client function about the pairwise connect call. */ >+ dgram_fd = vsock_dgram_bind(addr.svm_cid, addr.svm_port); >+ if (dgram_fd < 0) { >+ perror("bind"); >+ exit(EXIT_FAILURE); >+ } >+ >+ control_expectln("DONE"); >+ >+ close(stream_fd); >+ close(dgram_fd); >+} >+ >+static struct test_case test_cases[] = { >+ { >+ .name = "SOCK_STREAM connection reset", >+ .run_client = test_stream_connection_reset, >+ }, >+ { >+ .name = "SOCK_STREAM bind only", >+ .run_client = test_stream_bind_only_client, >+ .run_server = test_stream_bind_only_server, >+ }, >+ { >+ .name = "SOCK_STREAM client close", >+ .run_client = test_stream_client_close_client, >+ .run_server = test_stream_client_close_server, >+ }, >+ { >+ .name = "SOCK_STREAM server close", >+ .run_client = test_stream_server_close_client, >+ .run_server = test_stream_server_close_server, >+ }, >+ { >+ .name = "SOCK_STREAM multiple connections", >+ .run_client = test_stream_multiconn_client, >+ .run_server = test_stream_multiconn_server, >+ }, >+ { >+ .name = "SOCK_STREAM MSG_PEEK", >+ .run_client = test_stream_msg_peek_client, >+ .run_server = test_stream_msg_peek_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET msg bounds", >+ .run_client = test_seqpacket_msg_bounds_client, >+ .run_server = test_seqpacket_msg_bounds_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET MSG_TRUNC flag", >+ .run_client = test_seqpacket_msg_trunc_client, >+ .run_server = test_seqpacket_msg_trunc_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET timeout", >+ .run_client = test_seqpacket_timeout_client, >+ .run_server = test_seqpacket_timeout_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET invalid receive buffer", >+ .run_client = test_seqpacket_invalid_rec_buffer_client, >+ .run_server = test_seqpacket_invalid_rec_buffer_server, >+ }, >+ { >+ .name = "SOCK_STREAM poll() + SO_RCVLOWAT", >+ .run_client = test_stream_poll_rcvlowat_client, >+ .run_server = test_stream_poll_rcvlowat_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET big message", >+ .run_client = test_seqpacket_bigmsg_client, >+ .run_server = test_seqpacket_bigmsg_server, >+ }, >+ { >+ .name = "SOCK_STREAM test invalid buffer", >+ .run_client = test_stream_inv_buf_client, >+ .run_server = test_stream_inv_buf_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET test invalid buffer", >+ .run_client = test_seqpacket_inv_buf_client, >+ .run_server = test_seqpacket_inv_buf_server, >+ }, >+ { >+ .name = "SOCK_STREAM virtio skb merge", >+ .run_client = test_stream_virtio_skb_merge_client, >+ .run_server = test_stream_virtio_skb_merge_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET MSG_PEEK", >+ .run_client = test_seqpacket_msg_peek_client, >+ .run_server = test_seqpacket_msg_peek_server, >+ }, >+ { >+ .name = "SOCK_STREAM SHUT_WR", >+ .run_client = test_stream_shutwr_client, >+ .run_server = test_stream_shutwr_server, >+ }, >+ { >+ .name = "SOCK_STREAM SHUT_RD", >+ .run_client = test_stream_shutrd_client, >+ .run_server = test_stream_shutrd_server, >+ }, >+ { >+ .name = "SOCK_STREAM MSG_ZEROCOPY", >+ .run_client = test_stream_msgzcopy_client, >+ .run_server = test_stream_msgzcopy_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET MSG_ZEROCOPY", >+ .run_client = test_seqpacket_msgzcopy_client, >+ .run_server = test_seqpacket_msgzcopy_server, >+ }, >+ { >+ .name = "SOCK_STREAM MSG_ZEROCOPY empty MSG_ERRQUEUE", >+ .run_client = test_stream_msgzcopy_empty_errq_client, >+ .run_server = test_stream_msgzcopy_empty_errq_server, >+ }, >+ { >+ .name = "SOCK_STREAM double bind connect", >+ .run_client = test_double_bind_connect_client, >+ .run_server = test_double_bind_connect_server, >+ }, >+ { >+ .name = "SOCK_STREAM virtio credit update + SO_RCVLOWAT", >+ .run_client = test_stream_rcvlowat_def_cred_upd_client, >+ .run_server = test_stream_cred_upd_on_set_rcvlowat, >+ }, >+ { >+ .name = "SOCK_STREAM virtio credit update + low rx_bytes", >+ .run_client = test_stream_rcvlowat_def_cred_upd_client, >+ .run_server = test_stream_cred_upd_on_low_rx_bytes, >+ }, >+ { >+ .name = "SOCK_DGRAM client sendto", >+ .run_client = test_dgram_sendto_client, >+ .run_server = test_dgram_sendto_server, >+ }, >+ { >+ .name = "SOCK_DGRAM client sendto auto bind", >+ .run_client = test_dgram_sendto_auto_bind_client, >+ .run_server = test_dgram_sendto_auto_bind_server, >+ }, >+ { >+ .name = "SOCK_DGRAM client connect", >+ .run_client = test_dgram_connect_client, >+ .run_server = test_dgram_connect_server, >+ }, >+ { >+ .name = "SOCK_DGRAM multiple connections using sendto", >+ .run_client = test_dgram_multiconn_sendto_client, >+ .run_server = test_dgram_multiconn_sendto_server, >+ }, >+ { >+ .name = "SOCK_DGRAM multiple connections using send", >+ .run_client = test_dgram_multiconn_send_client, >+ .run_server = test_dgram_multiconn_send_server, >+ }, >+ { >+ .name = "SOCK_DGRAM msg bounds unreliable", >+ .run_client = test_dgram_bounds_unreliable_client, >+ .run_server = test_dgram_bounds_unreliable_server, >+ }, >+ { >+ .name = "SOCK_DGRAM drop big packets", >+ .run_client = test_dgram_drop_big_packets_client, >+ .run_server = test_dgram_drop_big_packets_server, >+ }, >+ { >+ .name = "SOCK_STREAM and SOCK_DGRAM address collision", >+ .run_client = test_stream_dgram_address_collision_client, >+ .run_server = test_stream_dgram_address_collision_server, > }, > {}, > }; >-- >2.20.1 >
On Tue, Jul 23, 2024 at 7:43 AM Stefano Garzarella <sgarzare@redhat.com> wrote: > > On Wed, Jul 10, 2024 at 09:25:55PM GMT, Amery Hung wrote: > >From: Bobby Eshleman <bobby.eshleman@bytedance.com> > > > >From: Jiang Wang <jiang.wang@bytedance.com> > > > >This commit adds tests for vsock datagram. > > > >Signed-off-by: Bobby Eshleman <bobby.eshleman@bytedance.com> > >Signed-off-by: Jiang Wang <jiang.wang@bytedance.com> > >Signed-off-by: Amery Hung <amery.hung@bytedance.com> > >--- > > tools/testing/vsock/util.c | 177 ++++- > > tools/testing/vsock/util.h | 10 + > > tools/testing/vsock/vsock_test.c | 1032 ++++++++++++++++++++++++++---- > > 3 files changed, 1099 insertions(+), 120 deletions(-) > > > >diff --git a/tools/testing/vsock/util.c b/tools/testing/vsock/util.c > >index 554b290fefdc..14d6cd90ca15 100644 > >--- a/tools/testing/vsock/util.c > >+++ b/tools/testing/vsock/util.c > >@@ -154,7 +154,8 @@ static int vsock_connect(unsigned int cid, unsigned int port, int type) > > int ret; > > int fd; > > > >- control_expectln("LISTENING"); > >+ if (type != SOCK_DGRAM) > >+ control_expectln("LISTENING"); > > Why it is not needed? > I think we actually need it. I will add control_write("LISTENING") in vsock_dgram_bind(). > BTW this patch is too big to be reviewed, please split it. Will do. Thank you, Amery > > Thanks, > Stefano > > > > > fd = socket(AF_VSOCK, type, 0); > > if (fd < 0) { > >@@ -189,6 +190,11 @@ int vsock_seqpacket_connect(unsigned int cid, unsigned int port) > > return vsock_connect(cid, port, SOCK_SEQPACKET); > > } > > [...]
diff --git a/tools/testing/vsock/util.c b/tools/testing/vsock/util.c index 554b290fefdc..14d6cd90ca15 100644 --- a/tools/testing/vsock/util.c +++ b/tools/testing/vsock/util.c @@ -154,7 +154,8 @@ static int vsock_connect(unsigned int cid, unsigned int port, int type) int ret; int fd; - control_expectln("LISTENING"); + if (type != SOCK_DGRAM) + control_expectln("LISTENING"); fd = socket(AF_VSOCK, type, 0); if (fd < 0) { @@ -189,6 +190,11 @@ int vsock_seqpacket_connect(unsigned int cid, unsigned int port) return vsock_connect(cid, port, SOCK_SEQPACKET); } +int vsock_dgram_connect(unsigned int cid, unsigned int port) +{ + return vsock_connect(cid, port, SOCK_DGRAM); +} + /* Listen on <cid, port> and return the file descriptor. */ static int vsock_listen(unsigned int cid, unsigned int port, int type) { @@ -287,6 +293,34 @@ int vsock_seqpacket_accept(unsigned int cid, unsigned int port, return vsock_accept(cid, port, clientaddrp, SOCK_SEQPACKET); } +int vsock_dgram_bind(unsigned int cid, unsigned int port) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = port, + .svm_cid = cid, + }, + }; + int fd; + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + return fd; +} + /* Transmit bytes from a buffer and check the return value. * * expected_ret: @@ -425,6 +459,147 @@ void recv_byte(int fd, int expected_ret, int flags) } } +/* Transmit bytes to the given address from a buffer and check the return value. + * + * expected_ret: + * <0 Negative errno (for testing errors) + * 0 End-of-file + * >0 Success (bytes successfully written) + */ +void sendto_buf(int fd, void *buf, size_t len, struct sockaddr *dst, socklen_t addrlen, + int flags, ssize_t expected_ret) +{ + ssize_t nwritten = 0; + ssize_t ret; + + timeout_begin(TIMEOUT); + do { + ret = sendto(fd, buf + nwritten, len - nwritten, flags, dst, addrlen); + timeout_check("sendto"); + + if (ret == 0 || (ret < 0 && errno != EINTR)) + break; + + nwritten += ret; + } while (nwritten < len); + timeout_end(); + + if (expected_ret < 0) { + if (nwritten != -1) { + fprintf(stderr, "bogus sendto(2) return value %zd\n", + nwritten); + exit(EXIT_FAILURE); + } + if (errno != -expected_ret) { + perror("sendto"); + exit(EXIT_FAILURE); + } + return; + } + + if (ret < 0) { + perror("sendto"); + exit(EXIT_FAILURE); + } + + if (nwritten != expected_ret) { + if (ret == 0) + fprintf(stderr, "unexpected EOF while sending bytes\n"); + + fprintf(stderr, "bogus sendto(2) bytes written %zd (expected %zd)\n", + nwritten, expected_ret); + exit(EXIT_FAILURE); + } +} + +/* Receive bytes from the given address in a buffer and check the return value. + * + * expected_ret: + * <0 Negative errno (for testing errors) + * 0 End-of-file + * >0 Success (bytes successfully read) + */ +void recvfrom_buf(int fd, void *buf, size_t len, struct sockaddr *src, socklen_t *addrlen, + int flags, ssize_t expected_ret) +{ + ssize_t nread = 0; + ssize_t ret; + + timeout_begin(TIMEOUT); + do { + ret = recvfrom(fd, buf + nread, len - nread, flags, src, addrlen); + timeout_check("recvfrom"); + + if (ret == 0 || (ret < 0 && errno != EINTR)) + break; + + nread += ret; + } while (nread < len); + timeout_end(); + + if (expected_ret < 0) { + if (nread != -1) { + fprintf(stderr, "bogus recvfrom(2) return value %zd\n", + nread); + exit(EXIT_FAILURE); + } + if (errno != -expected_ret) { + perror("recvfrom"); + exit(EXIT_FAILURE); + } + return; + } + + if (ret < 0) { + perror("recvfrom"); + exit(EXIT_FAILURE); + } + + if (nread != expected_ret) { + if (ret == 0) + fprintf(stderr, "unexpected EOF while receiving bytes\n"); + + fprintf(stderr, "bogus recv(2) bytes read %zd (expected %zd)\n", + nread, expected_ret); + exit(EXIT_FAILURE); + } +} + +/* Transmit one byte to the given address and check the return value. + * + * expected_ret: + * <0 Negative errno (for testing errors) + * 0 End-of-file + * 1 Success + */ +void sendto_byte(int fd, struct sockaddr *dst, socklen_t addrlen, + int expected_ret, int flags) +{ + uint8_t byte = 'A'; + + sendto_buf(fd, &byte, sizeof(byte), dst, addrlen, flags, expected_ret); +} + +/* Receive one byte from the given address and check the return value. + * + * expected_ret: + * <0 Negative errno (for testing errors) + * 0 End-of-file + * 1 Success + */ +void recvfrom_byte(int fd, struct sockaddr *src, socklen_t *addrlen, + int expected_ret, int flags) +{ + uint8_t byte; + + recvfrom_buf(fd, &byte, sizeof(byte), src, addrlen, flags, expected_ret); + + if (byte != 'A') { + fprintf(stderr, "unexpected byte read %c\n", byte); + exit(EXIT_FAILURE); + } +} + /* Run test cases. The program terminates if a failure occurs. */ void run_tests(const struct test_case *test_cases, const struct test_opts *opts) diff --git a/tools/testing/vsock/util.h b/tools/testing/vsock/util.h index e95e62485959..3367262b53c9 100644 --- a/tools/testing/vsock/util.h +++ b/tools/testing/vsock/util.h @@ -43,17 +43,27 @@ int vsock_stream_connect(unsigned int cid, unsigned int port); int vsock_bind_connect(unsigned int cid, unsigned int port, unsigned int bind_port, int type); int vsock_seqpacket_connect(unsigned int cid, unsigned int port); +int vsock_dgram_connect(unsigned int cid, unsigned int port); int vsock_stream_accept(unsigned int cid, unsigned int port, struct sockaddr_vm *clientaddrp); int vsock_stream_listen(unsigned int cid, unsigned int port); int vsock_seqpacket_accept(unsigned int cid, unsigned int port, struct sockaddr_vm *clientaddrp); +int vsock_dgram_bind(unsigned int cid, unsigned int port); void vsock_wait_remote_close(int fd); void send_buf(int fd, const void *buf, size_t len, int flags, ssize_t expected_ret); void recv_buf(int fd, void *buf, size_t len, int flags, ssize_t expected_ret); void send_byte(int fd, int expected_ret, int flags); void recv_byte(int fd, int expected_ret, int flags); +void sendto_buf(int fd, void *buf, size_t len, struct sockaddr *dst, + socklen_t addrlen, int flags, ssize_t expected_ret); +void recvfrom_buf(int fd, void *buf, size_t len, struct sockaddr *src, + socklen_t *addrlen, int flags, ssize_t expected_ret); +void sendto_byte(int fd, struct sockaddr *dst, socklen_t addrlen, + int expected_ret, int flags); +void recvfrom_byte(int fd, struct sockaddr *src, socklen_t *addrlen, + int expected_ret, int flags); void run_tests(const struct test_case *test_cases, const struct test_opts *opts); void list_tests(const struct test_case *test_cases); diff --git a/tools/testing/vsock/vsock_test.c b/tools/testing/vsock/vsock_test.c index f851f8961247..1e1576ca87d0 100644 --- a/tools/testing/vsock/vsock_test.c +++ b/tools/testing/vsock/vsock_test.c @@ -13,6 +13,7 @@ #include <string.h> #include <errno.h> #include <unistd.h> +#include <linux/errqueue.h> #include <linux/kernel.h> #include <sys/types.h> #include <sys/socket.h> @@ -26,6 +27,12 @@ #include "control.h" #include "util.h" +#ifndef SOL_VSOCK +#define SOL_VSOCK 287 +#endif + +#define DGRAM_MSG_CNT 16 + static void test_stream_connection_reset(const struct test_opts *opts) { union { @@ -1403,125 +1410,912 @@ static void test_stream_cred_upd_on_set_rcvlowat(const struct test_opts *opts) test_stream_credit_update_test(opts, false); } -static struct test_case test_cases[] = { - { - .name = "SOCK_STREAM connection reset", - .run_client = test_stream_connection_reset, - }, - { - .name = "SOCK_STREAM bind only", - .run_client = test_stream_bind_only_client, - .run_server = test_stream_bind_only_server, - }, - { - .name = "SOCK_STREAM client close", - .run_client = test_stream_client_close_client, - .run_server = test_stream_client_close_server, - }, - { - .name = "SOCK_STREAM server close", - .run_client = test_stream_server_close_client, - .run_server = test_stream_server_close_server, - }, - { - .name = "SOCK_STREAM multiple connections", - .run_client = test_stream_multiconn_client, - .run_server = test_stream_multiconn_server, - }, - { - .name = "SOCK_STREAM MSG_PEEK", - .run_client = test_stream_msg_peek_client, - .run_server = test_stream_msg_peek_server, - }, - { - .name = "SOCK_SEQPACKET msg bounds", - .run_client = test_seqpacket_msg_bounds_client, - .run_server = test_seqpacket_msg_bounds_server, - }, - { - .name = "SOCK_SEQPACKET MSG_TRUNC flag", - .run_client = test_seqpacket_msg_trunc_client, - .run_server = test_seqpacket_msg_trunc_server, - }, - { - .name = "SOCK_SEQPACKET timeout", - .run_client = test_seqpacket_timeout_client, - .run_server = test_seqpacket_timeout_server, - }, - { - .name = "SOCK_SEQPACKET invalid receive buffer", - .run_client = test_seqpacket_invalid_rec_buffer_client, - .run_server = test_seqpacket_invalid_rec_buffer_server, - }, - { - .name = "SOCK_STREAM poll() + SO_RCVLOWAT", - .run_client = test_stream_poll_rcvlowat_client, - .run_server = test_stream_poll_rcvlowat_server, - }, - { - .name = "SOCK_SEQPACKET big message", - .run_client = test_seqpacket_bigmsg_client, - .run_server = test_seqpacket_bigmsg_server, - }, - { - .name = "SOCK_STREAM test invalid buffer", - .run_client = test_stream_inv_buf_client, - .run_server = test_stream_inv_buf_server, - }, - { - .name = "SOCK_SEQPACKET test invalid buffer", - .run_client = test_seqpacket_inv_buf_client, - .run_server = test_seqpacket_inv_buf_server, - }, - { - .name = "SOCK_STREAM virtio skb merge", - .run_client = test_stream_virtio_skb_merge_client, - .run_server = test_stream_virtio_skb_merge_server, - }, - { - .name = "SOCK_SEQPACKET MSG_PEEK", - .run_client = test_seqpacket_msg_peek_client, - .run_server = test_seqpacket_msg_peek_server, - }, - { - .name = "SOCK_STREAM SHUT_WR", - .run_client = test_stream_shutwr_client, - .run_server = test_stream_shutwr_server, - }, - { - .name = "SOCK_STREAM SHUT_RD", - .run_client = test_stream_shutrd_client, - .run_server = test_stream_shutrd_server, - }, - { - .name = "SOCK_STREAM MSG_ZEROCOPY", - .run_client = test_stream_msgzcopy_client, - .run_server = test_stream_msgzcopy_server, - }, - { - .name = "SOCK_SEQPACKET MSG_ZEROCOPY", - .run_client = test_seqpacket_msgzcopy_client, - .run_server = test_seqpacket_msgzcopy_server, - }, - { - .name = "SOCK_STREAM MSG_ZEROCOPY empty MSG_ERRQUEUE", - .run_client = test_stream_msgzcopy_empty_errq_client, - .run_server = test_stream_msgzcopy_empty_errq_server, - }, - { - .name = "SOCK_STREAM double bind connect", - .run_client = test_double_bind_connect_client, - .run_server = test_double_bind_connect_server, - }, - { - .name = "SOCK_STREAM virtio credit update + SO_RCVLOWAT", - .run_client = test_stream_rcvlowat_def_cred_upd_client, - .run_server = test_stream_cred_upd_on_set_rcvlowat, - }, - { - .name = "SOCK_STREAM virtio credit update + low rx_bytes", - .run_client = test_stream_rcvlowat_def_cred_upd_client, - .run_server = test_stream_cred_upd_on_low_rx_bytes, +static void test_dgram_sendto_client(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = opts->peer_cid, + }, + }; + int fd; + + /* Wait for the server to be ready */ + control_expectln("BIND"); + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0); + + /* Notify the server that the client has finished */ + control_writeln("DONE"); + + close(fd); +} + +static void test_dgram_sendto_server(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = VMADDR_CID_ANY, + }, + }; + socklen_t addrlen = sizeof(addr.sa); + unsigned long sock_buf_size; + int fd; + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + /* Set receive buffer to maximum */ + sock_buf_size = -1; + if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, + &sock_buf_size, sizeof(sock_buf_size))) { + perror("setsockopt(SO_RECVBUF)"); + exit(EXIT_FAILURE); + } + + /* Notify the client that the server is ready */ + control_writeln("BIND"); + + recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0); + + /* Wait for the client to finish */ + control_expectln("DONE"); + + close(fd); +} + +static void test_dgram_sendto_auto_bind_client(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = opts->peer_cid, + }, + }; + struct sockaddr_vm bind_addr; + socklen_t addrlen; + unsigned int port; + int fd; + + /* Wait for the server to be ready */ + control_expectln("BIND"); + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0); + + /* Get auto-bound port after sendto */ + addrlen = sizeof(bind_addr); + if (getsockname(fd, (struct sockaddr *)&bind_addr, &addrlen)) { + perror("getsockname"); + exit(EXIT_FAILURE); + } + + /* Send the port number to the server */ + port = bind_addr.svm_port; + sendto_buf(fd, &port, sizeof(port), &addr.sa, sizeof(addr.svm), 0, sizeof(port)); + + addr.svm.svm_port = port; + recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0); + + /* Notify the server that the client has finished */ + control_writeln("DONE"); + + close(fd); +} + +static void test_dgram_sendto_auto_bind_server(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = VMADDR_CID_ANY, + }, + }; + socklen_t addrlen = sizeof(addr.sa); + unsigned long sock_buf_size; + unsigned int port; + int fd; + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + /* Set receive buffer to maximum */ + sock_buf_size = -1; + if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, + &sock_buf_size, sizeof(sock_buf_size))) { + perror("setsockopt(SO_RECVBUF)"); + exit(EXIT_FAILURE); + } + + /* Notify the client that the server is ready */ + control_writeln("BIND"); + + recvfrom_byte(fd, &addr.sa, &addrlen, 1, 0); + + /* Receive the port the client is listening to */ + recvfrom_buf(fd, &port, sizeof(port), &addr.sa, &addrlen, 0, sizeof(port)); + + addr.svm.svm_port = port; + addr.svm.svm_cid = opts->peer_cid; + sendto_byte(fd, &addr.sa, sizeof(addr.svm), 1, 0); + + /* Wait for the client to finish */ + control_expectln("DONE"); + + close(fd); +} + +static void test_dgram_connect_client(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = opts->peer_cid, + }, + }; + int ret; + int fd; + + /* Wait for the server to be ready */ + control_expectln("BIND"); + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + ret = connect(fd, &addr.sa, sizeof(addr.svm)); + if (ret < 0) { + perror("connect"); + exit(EXIT_FAILURE); + } + + send_byte(fd, 1, 0); + + /* Notify the server that the client has finished */ + control_writeln("DONE"); + + close(fd); +} + +static void test_dgram_connect_server(const struct test_opts *opts) +{ + test_dgram_sendto_server(opts); +} + +static void test_dgram_multiconn_sendto_client(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = opts->peer_cid, + }, + }; + int fds[MULTICONN_NFDS]; + int i; + + /* Wait for the server to be ready */ + control_expectln("BIND"); + + for (i = 0; i < MULTICONN_NFDS; i++) { + fds[i] = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fds[i] < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + } + + for (i = 0; i < MULTICONN_NFDS; i++) { + sendto_byte(fds[i], &addr.sa, sizeof(addr.svm), 1, 0); + + /* This is here to make explicit the case of the test failing + * due to packet loss. The test fails when recv() times out + * otherwise, which is much more confusing. + */ + control_expectln("PKTRECV"); + } + + /* Notify the server that the client has finished */ + control_writeln("DONE"); + + for (i = 0; i < MULTICONN_NFDS; i++) + close(fds[i]); +} + +static void test_dgram_multiconn_sendto_server(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = VMADDR_CID_ANY, + }, + }; + int len = sizeof(addr.sa); + int fd; + int i; + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + /* Notify the client that the server is ready */ + control_writeln("BIND"); + + for (i = 0; i < MULTICONN_NFDS; i++) { + recvfrom_byte(fd, &addr.sa, &len, 1, 0); + control_writeln("PKTRECV"); + } + + /* Wait for the client to finish */ + control_expectln("DONE"); + + close(fd); +} + +static void test_dgram_multiconn_send_client(const struct test_opts *opts) +{ + int fds[MULTICONN_NFDS]; + int i; + + /* Wait for the server to be ready */ + control_expectln("BIND"); + + for (i = 0; i < MULTICONN_NFDS; i++) { + fds[i] = vsock_dgram_connect(opts->peer_cid, 1234); + if (fds[i] < 0) { + perror("connect"); + exit(EXIT_FAILURE); + } + } + + for (i = 0; i < MULTICONN_NFDS; i++) { + send_byte(fds[i], 1, 0); + /* This is here to make explicit the case of the test failing + * due to packet loss. + */ + control_expectln("PKTRECV"); + } + + /* Notify the server that the client has finished */ + control_writeln("DONE"); + + for (i = 0; i < MULTICONN_NFDS; i++) + close(fds[i]); +} + +static void test_dgram_multiconn_send_server(const struct test_opts *opts) +{ + union { + struct sockaddr sa; + struct sockaddr_vm svm; + } addr = { + .svm = { + .svm_family = AF_VSOCK, + .svm_port = 1234, + .svm_cid = VMADDR_CID_ANY, + }, + }; + unsigned long sock_buf_size; + int fd; + int i; + + fd = socket(AF_VSOCK, SOCK_DGRAM, 0); + if (fd < 0) { + perror("socket"); + exit(EXIT_FAILURE); + } + + if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + /* Set receive buffer to maximum */ + sock_buf_size = -1; + if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, + &sock_buf_size, sizeof(sock_buf_size))) { + perror("setsockopt(SO_RECVBUF)"); + exit(EXIT_FAILURE); + } + + /* Notify the client that the server is ready */ + control_writeln("BIND"); + + for (i = 0; i < MULTICONN_NFDS; i++) { + recv_byte(fd, 1, 0); + control_writeln("PKTRECV"); + } + + /* Wait for the client to finish */ + control_expectln("DONE"); + + close(fd); +} + +/* + * This test is similar to the seqpacket msg bounds tests, but it is unreliable + * because it may also fail in the unlikely case that packets are dropped. + */ +static void test_dgram_bounds_unreliable_client(const struct test_opts *opts) +{ + unsigned long recv_buf_size; + unsigned long *hashes; + size_t max_msg_size; + int page_size; + int fd; + int i; + + fd = vsock_dgram_connect(opts->peer_cid, 1234); + if (fd < 0) { + perror("connect"); + exit(EXIT_FAILURE); + } + + hashes = malloc(DGRAM_MSG_CNT * sizeof(unsigned long)); + if (!hashes) { + perror("malloc"); + exit(EXIT_FAILURE); + } + + /* Let the server know the client is ready */ + control_writeln("CLNTREADY"); + + /* Wait, until receiver sets buffer size. */ + control_expectln("SRVREADY"); + + recv_buf_size = control_readulong(); + + page_size = getpagesize(); + max_msg_size = MAX_MSG_PAGES * page_size; + + for (i = 0; i < DGRAM_MSG_CNT; i++) { + ssize_t send_size; + size_t buf_size; + void *buf; + + /* Use "small" buffers and "big" buffers. */ + if (opts->peer_cid <= VMADDR_CID_HOST && (i & 1)) + buf_size = page_size + + (rand() % (max_msg_size - page_size)); + else + buf_size = 1 + (rand() % page_size); + + buf_size = min(buf_size, recv_buf_size); + + buf = malloc(buf_size); + + if (!buf) { + perror("malloc"); + exit(EXIT_FAILURE); + } + + memset(buf, rand() & 0xff, buf_size); + + send_size = send(fd, buf, buf_size, 0); + if (send_size < 0) { + perror("send"); + exit(EXIT_FAILURE); + } + + if (send_size != buf_size) { + fprintf(stderr, "Invalid send size\n"); + exit(EXIT_FAILURE); + } + + /* In theory the implementation isn't required to transmit + * these packets in order, so we use this PKTSENT/PKTRECV + * message sequence so that server and client coordinate + * sending and receiving one packet at a time. The client sends + * a packet and waits until it has been received before sending + * another. + * + * Also in theory these packets can be lost and the test will + * fail for that reason. + */ + control_writeln("PKTSENT"); + control_expectln("PKTRECV"); + + /* Send the server a hash of the packet */ + hashes[i] = hash_djb2(buf, buf_size); + free(buf); + } + + control_writeln("SENDDONE"); + close(fd); + + for (i = 0; i < DGRAM_MSG_CNT; i++) { + if (hashes[i] != control_readulong()) + fprintf(stderr, "broken dgram message bounds or packet loss\n"); + } + free(hashes); +} + +static void test_dgram_bounds_unreliable_server(const struct test_opts *opts) +{ + unsigned long hashes[DGRAM_MSG_CNT]; + unsigned long sock_buf_size; + struct msghdr msg = {0}; + struct iovec iov = {0}; + socklen_t len; + int fd; + int i; + + fd = vsock_dgram_bind(VMADDR_CID_ANY, 1234); + if (fd < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + /* Set receive buffer to maximum */ + sock_buf_size = -1; + if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, + &sock_buf_size, sizeof(sock_buf_size))) { + perror("setsockopt(SO_RECVBUF)"); + exit(EXIT_FAILURE); + } + + /* Retrieve the receive buffer size */ + len = sizeof(sock_buf_size); + if (getsockopt(fd, SOL_SOCKET, SO_RCVBUF, + &sock_buf_size, &len)) { + perror("getsockopt(SO_RECVBUF)"); + exit(EXIT_FAILURE); + } + + /* Client ready to receive parameters */ + control_expectln("CLNTREADY"); + + /* Ready to receive data. */ + control_writeln("SRVREADY"); + + if (opts->peer_cid > VMADDR_CID_HOST) + control_writeulong(sock_buf_size); + else + control_writeulong(getpagesize()); + + iov.iov_len = MAX_MSG_PAGES * getpagesize(); + iov.iov_base = malloc(iov.iov_len); + if (!iov.iov_base) { + perror("malloc"); + exit(EXIT_FAILURE); + } + + msg.msg_iov = &iov; + msg.msg_iovlen = 1; + + for (i = 0; i < DGRAM_MSG_CNT; i++) { + ssize_t recv_size; + + control_expectln("PKTSENT"); + recv_size = recvmsg(fd, &msg, 0); + control_writeln("PKTRECV"); + + if (!recv_size) + break; + + if (recv_size < 0) { + perror("recvmsg"); + exit(EXIT_FAILURE); + } + + hashes[i] = hash_djb2(msg.msg_iov[0].iov_base, recv_size); + } + + control_expectln("SENDDONE"); + + free(iov.iov_base); + close(fd); + + for (i = 0; i < DGRAM_MSG_CNT; i++) + control_writeulong(hashes[i]); +} + +#define POLL_TIMEOUT_MS 1000 +void vsock_recv_error(int fd) +{ + struct sock_extended_err *serr; + struct msghdr msg = { 0 }; + struct pollfd fds = { 0 }; + char cmsg_data[128]; + struct cmsghdr *cm; + ssize_t res; + + fds.fd = fd; + fds.events = 0; + + if (poll(&fds, 1, POLL_TIMEOUT_MS) < 0) { + perror("poll"); + exit(EXIT_FAILURE); + } + + if (!(fds.revents & POLLERR)) { + fprintf(stderr, "POLLERR expected\n"); + exit(EXIT_FAILURE); + } + + msg.msg_control = cmsg_data; + msg.msg_controllen = sizeof(cmsg_data); + + res = recvmsg(fd, &msg, MSG_ERRQUEUE); + if (res) { + fprintf(stderr, "failed to read error queue: %zi\n", res); + exit(EXIT_FAILURE); + } + + cm = CMSG_FIRSTHDR(&msg); + if (!cm) { + fprintf(stderr, "cmsg: no cmsg\n"); + exit(EXIT_FAILURE); + } + + if (cm->cmsg_level != SOL_VSOCK) { + fprintf(stderr, "cmsg: unexpected 'cmsg_level'\n"); + exit(EXIT_FAILURE); + } + + if (cm->cmsg_type != 0) { + fprintf(stderr, "cmsg: unexpected 'cmsg_type'\n"); + exit(EXIT_FAILURE); + } + + serr = (void *)CMSG_DATA(cm); + if (serr->ee_origin != 0) { + fprintf(stderr, "serr: unexpected 'ee_origin'\n"); + exit(EXIT_FAILURE); + } + + if (serr->ee_errno != EHOSTUNREACH) { + fprintf(stderr, "serr: wrong error code: %u\n", serr->ee_errno); + exit(EXIT_FAILURE); + } +} + +/* + * Attempt to send a packet larger than the client's RX buffer. Test that the + * packet was dropped and that there is an error in the error queue. + */ +static void test_dgram_drop_big_packets_server(const struct test_opts *opts) +{ + unsigned long client_rx_buf_size; + size_t buf_size; + void *buf; + int fd; + + if (opts->peer_cid <= VMADDR_CID_HOST) { + printf("The server's peer must be a guest (not CID %u), skipped...\n", + opts->peer_cid); + return; + } + + /* Wait for the server to be ready */ + control_expectln("READY"); + + fd = vsock_dgram_connect(opts->peer_cid, 1234); + if (fd < 0) { + perror("connect"); + exit(EXIT_FAILURE); + } + + client_rx_buf_size = control_readulong(); + + buf_size = client_rx_buf_size + 1; + buf = malloc(buf_size); + if (!buf) { + perror("malloc"); + exit(EXIT_FAILURE); + } + + /* Even though the buffer is exceeded, the send() should still succeed. */ + if (send(fd, buf, buf_size, 0) < 0) { + perror("send"); + exit(EXIT_FAILURE); + } + + vsock_recv_error(fd); + + /* Notify the server that the client has finished */ + control_writeln("DONE"); + + close(fd); +} + +static void test_dgram_drop_big_packets_client(const struct test_opts *opts) +{ + unsigned long buf_size = getpagesize(); + + if (opts->peer_cid > VMADDR_CID_HOST) { + printf("The client's peer must be the host (not CID %u), skipped...\n", + opts->peer_cid); + return; + } + + control_writeln("READY"); + control_writeulong(buf_size); + control_expectln("DONE"); +} + +static void test_stream_dgram_address_collision_client(const struct test_opts *opts) +{ + int dgram_fd, stream_fd; + + stream_fd = vsock_stream_connect(opts->peer_cid, 1234); + if (stream_fd < 0) { + perror("connect"); + exit(EXIT_FAILURE); + } + + /* This simply tests if connect() causes address collision client-side. + * Keep in mind that there is no exchange of packets with the + * bound socket on the server. + */ + dgram_fd = vsock_dgram_connect(opts->peer_cid, 1234); + if (dgram_fd < 0) { + perror("connect"); + exit(EXIT_FAILURE); + } + + close(stream_fd); + close(dgram_fd); + + /* Notify the server that the client has finished */ + control_writeln("DONE"); +} + +static void test_stream_dgram_address_collision_server(const struct test_opts *opts) +{ + int dgram_fd, stream_fd; + struct sockaddr_vm addr; + socklen_t addrlen; + + stream_fd = vsock_stream_accept(VMADDR_CID_ANY, 1234, 0); + if (stream_fd < 0) { + perror("accept"); + exit(EXIT_FAILURE); + } + + /* Retrieve the CID/port for re-use. */ + addrlen = sizeof(addr); + if (getsockname(stream_fd, (struct sockaddr *)&addr, &addrlen)) { + perror("getsockname"); + exit(EXIT_FAILURE); + } + + /* See not in the client function about the pairwise connect call. */ + dgram_fd = vsock_dgram_bind(addr.svm_cid, addr.svm_port); + if (dgram_fd < 0) { + perror("bind"); + exit(EXIT_FAILURE); + } + + control_expectln("DONE"); + + close(stream_fd); + close(dgram_fd); +} + +static struct test_case test_cases[] = { + { + .name = "SOCK_STREAM connection reset", + .run_client = test_stream_connection_reset, + }, + { + .name = "SOCK_STREAM bind only", + .run_client = test_stream_bind_only_client, + .run_server = test_stream_bind_only_server, + }, + { + .name = "SOCK_STREAM client close", + .run_client = test_stream_client_close_client, + .run_server = test_stream_client_close_server, + }, + { + .name = "SOCK_STREAM server close", + .run_client = test_stream_server_close_client, + .run_server = test_stream_server_close_server, + }, + { + .name = "SOCK_STREAM multiple connections", + .run_client = test_stream_multiconn_client, + .run_server = test_stream_multiconn_server, + }, + { + .name = "SOCK_STREAM MSG_PEEK", + .run_client = test_stream_msg_peek_client, + .run_server = test_stream_msg_peek_server, + }, + { + .name = "SOCK_SEQPACKET msg bounds", + .run_client = test_seqpacket_msg_bounds_client, + .run_server = test_seqpacket_msg_bounds_server, + }, + { + .name = "SOCK_SEQPACKET MSG_TRUNC flag", + .run_client = test_seqpacket_msg_trunc_client, + .run_server = test_seqpacket_msg_trunc_server, + }, + { + .name = "SOCK_SEQPACKET timeout", + .run_client = test_seqpacket_timeout_client, + .run_server = test_seqpacket_timeout_server, + }, + { + .name = "SOCK_SEQPACKET invalid receive buffer", + .run_client = test_seqpacket_invalid_rec_buffer_client, + .run_server = test_seqpacket_invalid_rec_buffer_server, + }, + { + .name = "SOCK_STREAM poll() + SO_RCVLOWAT", + .run_client = test_stream_poll_rcvlowat_client, + .run_server = test_stream_poll_rcvlowat_server, + }, + { + .name = "SOCK_SEQPACKET big message", + .run_client = test_seqpacket_bigmsg_client, + .run_server = test_seqpacket_bigmsg_server, + }, + { + .name = "SOCK_STREAM test invalid buffer", + .run_client = test_stream_inv_buf_client, + .run_server = test_stream_inv_buf_server, + }, + { + .name = "SOCK_SEQPACKET test invalid buffer", + .run_client = test_seqpacket_inv_buf_client, + .run_server = test_seqpacket_inv_buf_server, + }, + { + .name = "SOCK_STREAM virtio skb merge", + .run_client = test_stream_virtio_skb_merge_client, + .run_server = test_stream_virtio_skb_merge_server, + }, + { + .name = "SOCK_SEQPACKET MSG_PEEK", + .run_client = test_seqpacket_msg_peek_client, + .run_server = test_seqpacket_msg_peek_server, + }, + { + .name = "SOCK_STREAM SHUT_WR", + .run_client = test_stream_shutwr_client, + .run_server = test_stream_shutwr_server, + }, + { + .name = "SOCK_STREAM SHUT_RD", + .run_client = test_stream_shutrd_client, + .run_server = test_stream_shutrd_server, + }, + { + .name = "SOCK_STREAM MSG_ZEROCOPY", + .run_client = test_stream_msgzcopy_client, + .run_server = test_stream_msgzcopy_server, + }, + { + .name = "SOCK_SEQPACKET MSG_ZEROCOPY", + .run_client = test_seqpacket_msgzcopy_client, + .run_server = test_seqpacket_msgzcopy_server, + }, + { + .name = "SOCK_STREAM MSG_ZEROCOPY empty MSG_ERRQUEUE", + .run_client = test_stream_msgzcopy_empty_errq_client, + .run_server = test_stream_msgzcopy_empty_errq_server, + }, + { + .name = "SOCK_STREAM double bind connect", + .run_client = test_double_bind_connect_client, + .run_server = test_double_bind_connect_server, + }, + { + .name = "SOCK_STREAM virtio credit update + SO_RCVLOWAT", + .run_client = test_stream_rcvlowat_def_cred_upd_client, + .run_server = test_stream_cred_upd_on_set_rcvlowat, + }, + { + .name = "SOCK_STREAM virtio credit update + low rx_bytes", + .run_client = test_stream_rcvlowat_def_cred_upd_client, + .run_server = test_stream_cred_upd_on_low_rx_bytes, + }, + { + .name = "SOCK_DGRAM client sendto", + .run_client = test_dgram_sendto_client, + .run_server = test_dgram_sendto_server, + }, + { + .name = "SOCK_DGRAM client sendto auto bind", + .run_client = test_dgram_sendto_auto_bind_client, + .run_server = test_dgram_sendto_auto_bind_server, + }, + { + .name = "SOCK_DGRAM client connect", + .run_client = test_dgram_connect_client, + .run_server = test_dgram_connect_server, + }, + { + .name = "SOCK_DGRAM multiple connections using sendto", + .run_client = test_dgram_multiconn_sendto_client, + .run_server = test_dgram_multiconn_sendto_server, + }, + { + .name = "SOCK_DGRAM multiple connections using send", + .run_client = test_dgram_multiconn_send_client, + .run_server = test_dgram_multiconn_send_server, + }, + { + .name = "SOCK_DGRAM msg bounds unreliable", + .run_client = test_dgram_bounds_unreliable_client, + .run_server = test_dgram_bounds_unreliable_server, + }, + { + .name = "SOCK_DGRAM drop big packets", + .run_client = test_dgram_drop_big_packets_client, + .run_server = test_dgram_drop_big_packets_server, + }, + { + .name = "SOCK_STREAM and SOCK_DGRAM address collision", + .run_client = test_stream_dgram_address_collision_client, + .run_server = test_stream_dgram_address_collision_server, }, {}, };