linux_dsm_epyc7002/tools/testing/selftests/net/tcp_inq.c
Thomas Gleixner 3e5580c465 treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 253
Based on 1 normalized pattern(s):

  license gplv2

and 1 additional normalized pattern(s):

  this program is free software you can redistribute it and or modify it
  under the terms and conditions of the gnu general public license version
  2 as published by the free software foundation this program is
  distributed in the hope it will be useful but without any warranty
  without even the implied warranty of merchantability or fitness for a
  particular purpose see the gnu general public license for more details

extracted by the scancode license scanner the SPDX license identifier

  GPL-2.0-only

has been chosen to replace the boilerplate/reference in 5 file(s).

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Richard Fontana <rfontana@redhat.com>
Reviewed-by: Allison Randal <allison@lohutok.net>
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Steve Winslow <swinslow@gmail.com>
Reviewed-by: Alexios Zavras <alexios.zavras@intel.com>
Cc: linux-spdx@vger.kernel.org
Link: https://lkml.kernel.org/r/20190529141332.723143934@linutronix.de
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2019-06-05 17:30:27 +02:00

180 lines
4.1 KiB
C

// SPDX-License-Identifier: GPL-2.0-only
/*
* Copyright 2018 Google Inc.
* Author: Soheil Hassas Yeganeh (soheil@google.com)
*
* Simple example on how to use TCP_INQ and TCP_CM_INQ.
*/
#define _GNU_SOURCE
#include <error.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <pthread.h>
#include <stdio.h>
#include <errno.h>
#include <stdlib.h>
#include <string.h>
#include <sys/socket.h>
#include <unistd.h>
#ifndef TCP_INQ
#define TCP_INQ 36
#endif
#ifndef TCP_CM_INQ
#define TCP_CM_INQ TCP_INQ
#endif
#define BUF_SIZE 8192
#define CMSG_SIZE 32
static int family = AF_INET6;
static socklen_t addr_len = sizeof(struct sockaddr_in6);
static int port = 4974;
static void setup_loopback_addr(int family, struct sockaddr_storage *sockaddr)
{
struct sockaddr_in6 *addr6 = (void *) sockaddr;
struct sockaddr_in *addr4 = (void *) sockaddr;
switch (family) {
case PF_INET:
memset(addr4, 0, sizeof(*addr4));
addr4->sin_family = AF_INET;
addr4->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
addr4->sin_port = htons(port);
break;
case PF_INET6:
memset(addr6, 0, sizeof(*addr6));
addr6->sin6_family = AF_INET6;
addr6->sin6_addr = in6addr_loopback;
addr6->sin6_port = htons(port);
break;
default:
error(1, 0, "illegal family");
}
}
void *start_server(void *arg)
{
int server_fd = (int)(unsigned long)arg;
struct sockaddr_in addr;
socklen_t addrlen = sizeof(addr);
char *buf;
int fd;
int r;
buf = malloc(BUF_SIZE);
for (;;) {
fd = accept(server_fd, (struct sockaddr *)&addr, &addrlen);
if (fd == -1) {
perror("accept");
break;
}
do {
r = send(fd, buf, BUF_SIZE, 0);
} while (r < 0 && errno == EINTR);
if (r < 0)
perror("send");
if (r != BUF_SIZE)
fprintf(stderr, "can only send %d bytes\n", r);
/* TCP_INQ can overestimate in-queue by one byte if we send
* the FIN packet. Sleep for 1 second, so that the client
* likely invoked recvmsg().
*/
sleep(1);
close(fd);
}
free(buf);
close(server_fd);
pthread_exit(0);
}
int main(int argc, char *argv[])
{
struct sockaddr_storage listen_addr, addr;
int c, one = 1, inq = -1;
pthread_t server_thread;
char cmsgbuf[CMSG_SIZE];
struct iovec iov[1];
struct cmsghdr *cm;
struct msghdr msg;
int server_fd, fd;
char *buf;
while ((c = getopt(argc, argv, "46p:")) != -1) {
switch (c) {
case '4':
family = PF_INET;
addr_len = sizeof(struct sockaddr_in);
break;
case '6':
family = PF_INET6;
addr_len = sizeof(struct sockaddr_in6);
break;
case 'p':
port = atoi(optarg);
break;
}
}
server_fd = socket(family, SOCK_STREAM, 0);
if (server_fd < 0)
error(1, errno, "server socket");
setup_loopback_addr(family, &listen_addr);
if (setsockopt(server_fd, SOL_SOCKET, SO_REUSEADDR,
&one, sizeof(one)) != 0)
error(1, errno, "setsockopt(SO_REUSEADDR)");
if (bind(server_fd, (const struct sockaddr *)&listen_addr,
addr_len) == -1)
error(1, errno, "bind");
if (listen(server_fd, 128) == -1)
error(1, errno, "listen");
if (pthread_create(&server_thread, NULL, start_server,
(void *)(unsigned long)server_fd) != 0)
error(1, errno, "pthread_create");
fd = socket(family, SOCK_STREAM, 0);
if (fd < 0)
error(1, errno, "client socket");
setup_loopback_addr(family, &addr);
if (connect(fd, (const struct sockaddr *)&addr, addr_len) == -1)
error(1, errno, "connect");
if (setsockopt(fd, SOL_TCP, TCP_INQ, &one, sizeof(one)) != 0)
error(1, errno, "setsockopt(TCP_INQ)");
msg.msg_name = NULL;
msg.msg_namelen = 0;
msg.msg_iov = iov;
msg.msg_iovlen = 1;
msg.msg_control = cmsgbuf;
msg.msg_controllen = sizeof(cmsgbuf);
msg.msg_flags = 0;
buf = malloc(BUF_SIZE);
iov[0].iov_base = buf;
iov[0].iov_len = BUF_SIZE / 2;
if (recvmsg(fd, &msg, 0) != iov[0].iov_len)
error(1, errno, "recvmsg");
if (msg.msg_flags & MSG_CTRUNC)
error(1, 0, "control message is truncated");
for (cm = CMSG_FIRSTHDR(&msg); cm; cm = CMSG_NXTHDR(&msg, cm))
if (cm->cmsg_level == SOL_TCP && cm->cmsg_type == TCP_CM_INQ)
inq = *((int *) CMSG_DATA(cm));
if (inq != BUF_SIZE - iov[0].iov_len) {
fprintf(stderr, "unexpected inq: %d\n", inq);
exit(1);
}
printf("PASSED\n");
free(buf);
close(fd);
return 0;
}