You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
680 lines
21 KiB
680 lines
21 KiB
/*
|
|
* Copyright (c) 2016 Fabien Siron <fabien.siron@epita.fr>
|
|
* Copyright (c) 2017 JingPiao Chen <chenjingpiao@gmail.com>
|
|
* Copyright (c) 2017-2018 The strace developers.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "tests.h"
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <stdint.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include <netinet/tcp.h>
|
|
#include "test_netlink.h"
|
|
#include <linux/if_ether.h>
|
|
#include <linux/inet_diag.h>
|
|
#include <linux/netlink_diag.h>
|
|
#include <linux/packet_diag.h>
|
|
#ifdef AF_SMC
|
|
# include <linux/smc_diag.h>
|
|
#endif
|
|
#include <linux/sock_diag.h>
|
|
#include <linux/unix_diag.h>
|
|
|
|
#define SMC_ACTIVE 1
|
|
|
|
#define TEST_SOCK_DIAG(fd_, nlh0_, \
|
|
family_, type_, flags_, \
|
|
obj_, print_family_, ...) \
|
|
\
|
|
do { \
|
|
/* family only */ \
|
|
uint8_t family = (family_); \
|
|
TEST_NETLINK_((fd_), (nlh0_), \
|
|
type_, #type_, \
|
|
flags_, #flags_, \
|
|
sizeof(family), &family, sizeof(family), \
|
|
printf("{family=%s}", #family_)); \
|
|
\
|
|
/* family and string */ \
|
|
char buf[sizeof(family) + 4]; \
|
|
memcpy(buf, &family, sizeof(family)); \
|
|
memcpy(buf + sizeof(family), "1234", 4); \
|
|
TEST_NETLINK_((fd_), (nlh0_), \
|
|
type_, #type_, \
|
|
flags_, #flags_, \
|
|
sizeof(buf), buf, sizeof(buf), \
|
|
(print_family_); \
|
|
printf(", ...}")); \
|
|
\
|
|
/* sizeof(obj_) */ \
|
|
TEST_NETLINK_((fd_), (nlh0_), \
|
|
type_, #type_, \
|
|
flags_, #flags_, \
|
|
sizeof(obj_), &(obj_), sizeof(obj_), \
|
|
(print_family_); \
|
|
__VA_ARGS__); \
|
|
\
|
|
/* short read of sizeof(obj_) */ \
|
|
TEST_NETLINK_((fd_), (nlh0_), \
|
|
type_, #type_, \
|
|
flags_, #flags_, \
|
|
sizeof(obj_), &(obj_), sizeof(obj_) - 1, \
|
|
(print_family_); \
|
|
printf(", %p}", \
|
|
NLMSG_DATA(TEST_NETLINK_nlh) + 1));\
|
|
} while (0)
|
|
|
|
static void
|
|
test_nlmsg_type(const int fd)
|
|
{
|
|
long rc;
|
|
struct nlmsghdr nlh = {
|
|
.nlmsg_len = sizeof(nlh),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_REQUEST,
|
|
};
|
|
|
|
rc = sendto(fd, &nlh, sizeof(nlh), MSG_DONTWAIT, NULL, 0);
|
|
printf("sendto(%d, {len=%u, type=SOCK_DIAG_BY_FAMILY"
|
|
", flags=NLM_F_REQUEST, seq=0, pid=0}"
|
|
", %u, MSG_DONTWAIT, NULL, 0) = %s\n",
|
|
fd, nlh.nlmsg_len, (unsigned) sizeof(nlh), sprintrc(rc));
|
|
}
|
|
|
|
static void
|
|
test_nlmsg_flags(const int fd)
|
|
{
|
|
long rc;
|
|
struct nlmsghdr nlh = {
|
|
.nlmsg_len = sizeof(nlh),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_REQUEST | NLM_F_DUMP,
|
|
};
|
|
|
|
rc = sendto(fd, &nlh, sizeof(nlh), MSG_DONTWAIT, NULL, 0);
|
|
printf("sendto(%d, {len=%u, type=SOCK_DIAG_BY_FAMILY"
|
|
", flags=NLM_F_REQUEST|NLM_F_DUMP, seq=0, pid=0}"
|
|
", %u, MSG_DONTWAIT, NULL, 0) = %s\n",
|
|
fd, nlh.nlmsg_len, (unsigned) sizeof(nlh), sprintrc(rc));
|
|
}
|
|
|
|
static void
|
|
test_odd_family_req(const int fd)
|
|
{
|
|
uint8_t family = 0;
|
|
char buf[sizeof(family) + 4];
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(buf));
|
|
|
|
/* unspecified family only */
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY,
|
|
NLM_F_REQUEST,
|
|
sizeof(family), &family, sizeof(family),
|
|
printf("{family=AF_UNSPEC}"));
|
|
|
|
/* unknown family only */
|
|
family = 0xff;
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY,
|
|
NLM_F_REQUEST,
|
|
sizeof(family), &family, sizeof(family),
|
|
printf("{family=%#x /* AF_??? */}", family));
|
|
|
|
/* short read of family */
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY,
|
|
NLM_F_REQUEST,
|
|
sizeof(family), &family, sizeof(family) - 1,
|
|
printf("%p", NLMSG_DATA(TEST_NETLINK_nlh)));
|
|
|
|
/* unspecified family and string */
|
|
family = 0;
|
|
memcpy(buf, &family, sizeof(family));
|
|
memcpy(buf + sizeof(family), "1234", 4);
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY,
|
|
NLM_F_REQUEST,
|
|
sizeof(buf), buf, sizeof(buf),
|
|
printf("{family=AF_UNSPEC, \"\\x31\\x32\\x33\\x34\"}"));
|
|
|
|
/* unknown family and string */
|
|
family = 0xfd;
|
|
memcpy(buf, &family, sizeof(family));
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY,
|
|
NLM_F_REQUEST,
|
|
sizeof(buf), buf, sizeof(buf),
|
|
printf("{family=%#x /* AF_??? */"
|
|
", \"\\x31\\x32\\x33\\x34\"}", family));
|
|
}
|
|
|
|
static void
|
|
test_odd_family_msg(const int fd)
|
|
{
|
|
uint8_t family = 0;
|
|
char buf[sizeof(family) + 4];
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(buf));
|
|
|
|
/* unspecified family only */
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP,
|
|
sizeof(family), &family, sizeof(family),
|
|
printf("{family=AF_UNSPEC}"));
|
|
|
|
/* unknown family only */
|
|
family = 0xff;
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP,
|
|
sizeof(family), &family, sizeof(family),
|
|
printf("{family=%#x /* AF_??? */}", family));
|
|
|
|
/* short read of family */
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP,
|
|
sizeof(family), &family, sizeof(family) - 1,
|
|
printf("%p", NLMSG_DATA(TEST_NETLINK_nlh)));
|
|
|
|
/* unspecified family and string */
|
|
family = 0;
|
|
memcpy(buf, &family, sizeof(family));
|
|
memcpy(buf + sizeof(family), "1234", 4);
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP,
|
|
sizeof(buf), buf, sizeof(buf),
|
|
printf("{family=AF_UNSPEC, \"\\x31\\x32\\x33\\x34\"}"));
|
|
|
|
/* unknown family and string */
|
|
family = 0xfd;
|
|
memcpy(buf, &family, sizeof(family));
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP,
|
|
sizeof(buf), buf, sizeof(buf),
|
|
printf("{family=%#x /* AF_??? */"
|
|
", \"\\x31\\x32\\x33\\x34\"}", family));
|
|
}
|
|
|
|
static void
|
|
test_unix_diag_req(const int fd)
|
|
{
|
|
static const struct unix_diag_req req = {
|
|
.sdiag_family = AF_UNIX,
|
|
.sdiag_protocol = 253,
|
|
.udiag_states = 1 << TCP_ESTABLISHED | 1 << TCP_LISTEN,
|
|
.udiag_ino = 0xfacefeed,
|
|
.udiag_show = UDIAG_SHOW_NAME,
|
|
.udiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_UNIX,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST, req,
|
|
printf("{sdiag_family=AF_UNIX"),
|
|
PRINT_FIELD_U(", ", req, sdiag_protocol);
|
|
printf(", udiag_states=1<<TCP_ESTABLISHED|1<<TCP_LISTEN");
|
|
PRINT_FIELD_U(", ", req, udiag_ino);
|
|
printf(", udiag_show=UDIAG_SHOW_NAME");
|
|
PRINT_FIELD_COOKIE(", ", req, udiag_cookie);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_unix_diag_msg(const int fd)
|
|
{
|
|
static const struct unix_diag_msg msg = {
|
|
.udiag_family = AF_UNIX,
|
|
.udiag_type = SOCK_STREAM,
|
|
.udiag_state = TCP_FIN_WAIT1,
|
|
.udiag_ino = 0xfacefeed,
|
|
.udiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(msg));
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_UNIX,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP, msg,
|
|
printf("{udiag_family=AF_UNIX"),
|
|
printf(", udiag_type=SOCK_STREAM"
|
|
", udiag_state=TCP_FIN_WAIT1");
|
|
PRINT_FIELD_U(", ", msg, udiag_ino);
|
|
PRINT_FIELD_COOKIE(", ", msg, udiag_cookie);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_netlink_diag_req(const int fd)
|
|
{
|
|
struct netlink_diag_req req = {
|
|
.sdiag_family = AF_NETLINK,
|
|
.sdiag_protocol = NDIAG_PROTO_ALL,
|
|
.ndiag_ino = 0xfacefeed,
|
|
.ndiag_show = NDIAG_SHOW_MEMINFO,
|
|
.ndiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_NETLINK,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST, req,
|
|
printf("{sdiag_family=AF_NETLINK"),
|
|
printf(", sdiag_protocol=NDIAG_PROTO_ALL");
|
|
PRINT_FIELD_U(", ", req, ndiag_ino);
|
|
printf(", ndiag_show=NDIAG_SHOW_MEMINFO");
|
|
PRINT_FIELD_COOKIE(", ", req, ndiag_cookie);
|
|
printf("}"));
|
|
|
|
req.sdiag_protocol = NETLINK_ROUTE;
|
|
req.ndiag_show = NDIAG_SHOW_GROUPS;
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_NETLINK,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST, req,
|
|
printf("{sdiag_family=AF_NETLINK"),
|
|
printf(", sdiag_protocol=NETLINK_ROUTE");
|
|
PRINT_FIELD_U(", ", req, ndiag_ino);
|
|
printf(", ndiag_show=NDIAG_SHOW_GROUPS");
|
|
PRINT_FIELD_COOKIE(", ", req, ndiag_cookie);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_netlink_diag_msg(const int fd)
|
|
{
|
|
static const struct netlink_diag_msg msg = {
|
|
.ndiag_family = AF_NETLINK,
|
|
.ndiag_type = SOCK_RAW,
|
|
.ndiag_protocol = NETLINK_ROUTE,
|
|
.ndiag_state = NETLINK_CONNECTED,
|
|
.ndiag_portid = 0xbadc0ded,
|
|
.ndiag_dst_portid = 0xdeadbeef,
|
|
.ndiag_dst_group = 0xfacefeed,
|
|
.ndiag_ino = 0xdaeefacd,
|
|
.ndiag_cookie = { 0xbadc0ded, 0xdeadbeef }
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(msg));
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_NETLINK,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP, msg,
|
|
printf("{ndiag_family=AF_NETLINK"),
|
|
printf(", ndiag_type=SOCK_RAW"
|
|
", ndiag_protocol=NETLINK_ROUTE"
|
|
", ndiag_state=NETLINK_CONNECTED");
|
|
PRINT_FIELD_U(", ", msg, ndiag_portid);
|
|
PRINT_FIELD_U(", ", msg, ndiag_dst_portid);
|
|
PRINT_FIELD_U(", ", msg, ndiag_dst_group);
|
|
PRINT_FIELD_U(", ", msg, ndiag_ino);
|
|
PRINT_FIELD_COOKIE(", ", msg, ndiag_cookie);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_packet_diag_req(const int fd)
|
|
{
|
|
static const struct packet_diag_req req = {
|
|
.sdiag_family = AF_PACKET,
|
|
.sdiag_protocol = ETH_P_LOOP,
|
|
.pdiag_ino = 0xfacefeed,
|
|
.pdiag_show = PACKET_SHOW_INFO,
|
|
.pdiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_PACKET,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST, req,
|
|
printf("{sdiag_family=AF_PACKET"),
|
|
printf(", sdiag_protocol=%#x", req.sdiag_protocol);
|
|
PRINT_FIELD_U(", ", req, pdiag_ino);
|
|
printf(", pdiag_show=PACKET_SHOW_INFO");
|
|
PRINT_FIELD_COOKIE(", ", req, pdiag_cookie);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_packet_diag_msg(const int fd)
|
|
{
|
|
static const struct packet_diag_msg msg = {
|
|
.pdiag_family = AF_PACKET,
|
|
.pdiag_type = SOCK_STREAM,
|
|
.pdiag_num = 0x9100,
|
|
.pdiag_ino = 0xfacefeed,
|
|
.pdiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(msg));
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_PACKET,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP, msg,
|
|
printf("{pdiag_family=AF_PACKET"),
|
|
printf(", pdiag_type=SOCK_STREAM");
|
|
printf(", pdiag_num=ETH_P_QINQ1");
|
|
PRINT_FIELD_U(", ", msg, pdiag_ino);
|
|
PRINT_FIELD_COOKIE(", ", msg, pdiag_cookie);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_inet_diag_sockid(const int fd)
|
|
{
|
|
const char address[] = "12.34.56.78";
|
|
const char address6[] = "12:34:56:78:90:ab:cd:ef";
|
|
struct inet_diag_req_v2 req = {
|
|
.sdiag_family = AF_INET,
|
|
.idiag_ext = 1 << (INET_DIAG_CONG - 1),
|
|
.sdiag_protocol = IPPROTO_TCP,
|
|
.idiag_states = 1 << TCP_CLOSE,
|
|
.id = {
|
|
.idiag_sport = 0xfacd,
|
|
.idiag_dport = 0xdead,
|
|
.idiag_if = ifindex_lo(),
|
|
.idiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
},
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
|
|
if (!inet_pton(AF_INET, address, &req.id.idiag_src) ||
|
|
!inet_pton(AF_INET, address, &req.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST,
|
|
sizeof(req), &req, sizeof(req),
|
|
printf("{sdiag_family=AF_INET"),
|
|
printf(", sdiag_protocol=IPPROTO_TCP"
|
|
", idiag_ext=1<<(INET_DIAG_CONG-1)"
|
|
", idiag_states=1<<TCP_CLOSE"
|
|
", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", idiag_src=inet_addr(\"%s\")"
|
|
", idiag_dst=inet_addr(\"%s\")",
|
|
ntohs(req.id.idiag_sport),
|
|
ntohs(req.id.idiag_dport),
|
|
address, address);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", req.id, idiag_cookie);
|
|
printf("}}"));
|
|
|
|
req.sdiag_family = AF_INET6;
|
|
if (!inet_pton(AF_INET6, address6, &req.id.idiag_src) ||
|
|
!inet_pton(AF_INET6, address6, &req.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_NETLINK(fd, nlh0,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST,
|
|
sizeof(req), &req, sizeof(req),
|
|
printf("{sdiag_family=AF_INET6"),
|
|
printf(", sdiag_protocol=IPPROTO_TCP"
|
|
", idiag_ext=1<<(INET_DIAG_CONG-1)"
|
|
", idiag_states=1<<TCP_CLOSE"
|
|
", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", inet_pton(AF_INET6, \"%s\", &idiag_src)"
|
|
", inet_pton(AF_INET6, \"%s\", &idiag_dst)",
|
|
ntohs(req.id.idiag_sport),
|
|
ntohs(req.id.idiag_dport),
|
|
address6, address6);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", req.id, idiag_cookie);
|
|
printf("}}"));
|
|
}
|
|
|
|
static void
|
|
test_inet_diag_req(const int fd)
|
|
{
|
|
const char address[] = "12.34.56.78";
|
|
struct inet_diag_req req = {
|
|
.idiag_family = AF_INET,
|
|
.idiag_src_len = 0xde,
|
|
.idiag_dst_len = 0xba,
|
|
.idiag_ext = 1 << (INET_DIAG_TOS - 1),
|
|
.id = {
|
|
.idiag_sport = 0xdead,
|
|
.idiag_dport = 0xadcd,
|
|
.idiag_if = ifindex_lo(),
|
|
.idiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
},
|
|
.idiag_states = 1 << TCP_LAST_ACK,
|
|
.idiag_dbs = 0xfacefeed,
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
|
|
if (!inet_pton(AF_INET, address, &req.id.idiag_src) ||
|
|
!inet_pton(AF_INET, address, &req.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_INET,
|
|
TCPDIAG_GETSOCK, NLM_F_REQUEST, req,
|
|
printf("{idiag_family=AF_INET"),
|
|
PRINT_FIELD_U(", ", req, idiag_src_len);
|
|
PRINT_FIELD_U(", ", req, idiag_dst_len);
|
|
printf(", idiag_ext=1<<(INET_DIAG_TOS-1)");
|
|
printf(", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", idiag_src=inet_addr(\"%s\")"
|
|
", idiag_dst=inet_addr(\"%s\")",
|
|
ntohs(req.id.idiag_sport),
|
|
ntohs(req.id.idiag_dport),
|
|
address, address);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", req.id, idiag_cookie);
|
|
printf("}, idiag_states=1<<TCP_LAST_ACK");
|
|
PRINT_FIELD_U(", ", req, idiag_dbs);
|
|
printf("}"));
|
|
}
|
|
|
|
static void
|
|
test_inet_diag_req_v2(const int fd)
|
|
{
|
|
const char address[] = "87.65.43.21";
|
|
struct inet_diag_req_v2 req = {
|
|
.sdiag_family = AF_INET,
|
|
.idiag_ext = 1 << (INET_DIAG_CONG - 1),
|
|
.sdiag_protocol = IPPROTO_TCP,
|
|
.idiag_states = 1 << TCP_CLOSE,
|
|
.id = {
|
|
.idiag_sport = 0xfacd,
|
|
.idiag_dport = 0xdead,
|
|
.idiag_if = ifindex_lo(),
|
|
.idiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
},
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
|
|
if (!inet_pton(AF_INET, address, &req.id.idiag_src) ||
|
|
!inet_pton(AF_INET, address, &req.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_INET,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST, req,
|
|
printf("{sdiag_family=AF_INET"),
|
|
printf(", sdiag_protocol=IPPROTO_TCP"
|
|
", idiag_ext=1<<(INET_DIAG_CONG-1)"
|
|
", idiag_states=1<<TCP_CLOSE"
|
|
", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", idiag_src=inet_addr(\"%s\")"
|
|
", idiag_dst=inet_addr(\"%s\")",
|
|
ntohs(req.id.idiag_sport),
|
|
ntohs(req.id.idiag_dport),
|
|
address, address);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", req.id, idiag_cookie);
|
|
printf("}}"));
|
|
}
|
|
|
|
static void
|
|
test_inet_diag_msg(const int fd)
|
|
{
|
|
const char address[] = "11.22.33.44";
|
|
struct inet_diag_msg msg = {
|
|
.idiag_family = AF_INET,
|
|
.idiag_state = TCP_LISTEN,
|
|
.idiag_timer = 0xfa,
|
|
.idiag_retrans = 0xde,
|
|
.id = {
|
|
.idiag_sport = 0xfacf,
|
|
.idiag_dport = 0xdead,
|
|
.idiag_if = ifindex_lo(),
|
|
.idiag_cookie = { 0xdeadbeef, 0xbadc0ded }
|
|
},
|
|
.idiag_expires = 0xfacefeed,
|
|
.idiag_rqueue = 0xdeadbeef,
|
|
.idiag_wqueue = 0xadcdfafc,
|
|
.idiag_uid = 0xdecefaeb,
|
|
.idiag_inode = 0xbadc0ded,
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(msg));
|
|
|
|
if (!inet_pton(AF_INET, address, &msg.id.idiag_src) ||
|
|
!inet_pton(AF_INET, address, &msg.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_INET,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP, msg,
|
|
printf("{idiag_family=AF_INET"),
|
|
printf(", idiag_state=TCP_LISTEN");
|
|
PRINT_FIELD_U(", ", msg, idiag_timer);
|
|
PRINT_FIELD_U(", ", msg, idiag_retrans);
|
|
printf(", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", idiag_src=inet_addr(\"%s\")"
|
|
", idiag_dst=inet_addr(\"%s\")",
|
|
ntohs(msg.id.idiag_sport),
|
|
ntohs(msg.id.idiag_dport),
|
|
address, address);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", msg.id, idiag_cookie);
|
|
PRINT_FIELD_U("}, ", msg, idiag_expires);
|
|
PRINT_FIELD_U(", ", msg, idiag_rqueue);
|
|
PRINT_FIELD_U(", ", msg, idiag_wqueue);
|
|
PRINT_FIELD_U(", ", msg, idiag_uid);
|
|
PRINT_FIELD_U(", ", msg, idiag_inode);
|
|
printf("}"));
|
|
}
|
|
|
|
#ifdef AF_SMC
|
|
static void
|
|
test_smc_diag_req(const int fd)
|
|
{
|
|
const char address[] = "43.21.56.78";
|
|
struct smc_diag_req req = {
|
|
.diag_family = AF_SMC,
|
|
.diag_ext = 1 << (SMC_DIAG_CONNINFO - 1),
|
|
.id = {
|
|
.idiag_sport = 0xdead,
|
|
.idiag_dport = 0xadcd,
|
|
.idiag_if = ifindex_lo(),
|
|
.idiag_cookie = { 0xdeadbeef, 0xbadc0ded },
|
|
},
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(req));
|
|
|
|
if (!inet_pton(AF_INET, address, &req.id.idiag_src) ||
|
|
!inet_pton(AF_INET, address, &req.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_SMC,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_REQUEST, req,
|
|
printf("{diag_family=AF_SMC"),
|
|
printf(", diag_ext=1<<(SMC_DIAG_CONNINFO-1)");
|
|
printf(", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", idiag_src=inet_addr(\"%s\")"
|
|
", idiag_dst=inet_addr(\"%s\")",
|
|
ntohs(req.id.idiag_sport),
|
|
ntohs(req.id.idiag_dport),
|
|
address, address);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", req.id, idiag_cookie);
|
|
printf("}}"));
|
|
}
|
|
|
|
static void
|
|
test_smc_diag_msg(const int fd)
|
|
{
|
|
const char address[] = "34.87.12.90";
|
|
struct smc_diag_msg msg = {
|
|
.diag_family = AF_SMC,
|
|
.diag_state = SMC_ACTIVE,
|
|
.diag_fallback = 0x1,
|
|
.diag_shutdown = 0xba,
|
|
.id = {
|
|
.idiag_sport = 0xdead,
|
|
.idiag_dport = 0xadcd,
|
|
.idiag_if = ifindex_lo(),
|
|
.idiag_cookie = { 0xdeadbeef, 0xbadc0ded },
|
|
},
|
|
.diag_uid = 0xadcdfafc,
|
|
.diag_inode = 0xbadc0ded,
|
|
};
|
|
void *const nlh0 = midtail_alloc(NLMSG_HDRLEN, sizeof(msg));
|
|
|
|
if (!inet_pton(AF_INET, address, &msg.id.idiag_src) ||
|
|
!inet_pton(AF_INET, address, &msg.id.idiag_dst))
|
|
perror_msg_and_skip("inet_pton");
|
|
|
|
TEST_SOCK_DIAG(fd, nlh0, AF_SMC,
|
|
SOCK_DIAG_BY_FAMILY, NLM_F_DUMP, msg,
|
|
printf("{diag_family=AF_SMC"),
|
|
printf(", diag_state=SMC_ACTIVE");
|
|
printf(", diag_fallback=SMC_DIAG_MODE_FALLBACK_TCP");
|
|
PRINT_FIELD_U(", ", msg, diag_shutdown);
|
|
printf(", id={idiag_sport=htons(%u)"
|
|
", idiag_dport=htons(%u)"
|
|
", idiag_src=inet_addr(\"%s\")"
|
|
", idiag_dst=inet_addr(\"%s\")",
|
|
ntohs(msg.id.idiag_sport),
|
|
ntohs(msg.id.idiag_dport),
|
|
address, address);
|
|
printf(", idiag_if=" IFINDEX_LO_STR);
|
|
PRINT_FIELD_COOKIE(", ", msg.id, idiag_cookie);
|
|
PRINT_FIELD_U("}, ", msg, diag_uid);
|
|
PRINT_FIELD_U(", ", msg, diag_inode);
|
|
printf("}"));
|
|
}
|
|
#endif
|
|
|
|
int
|
|
main(void)
|
|
{
|
|
skip_if_unavailable("/proc/self/fd/");
|
|
|
|
int fd = create_nl_socket(NETLINK_SOCK_DIAG);
|
|
|
|
test_nlmsg_type(fd);
|
|
test_nlmsg_flags(fd);
|
|
test_odd_family_req(fd);
|
|
test_odd_family_msg(fd);
|
|
test_unix_diag_req(fd);
|
|
test_unix_diag_msg(fd);
|
|
test_netlink_diag_req(fd);
|
|
test_netlink_diag_msg(fd);
|
|
test_packet_diag_req(fd);
|
|
test_packet_diag_msg(fd);
|
|
test_inet_diag_sockid(fd);
|
|
test_inet_diag_req(fd);
|
|
test_inet_diag_req_v2(fd);
|
|
test_inet_diag_msg(fd);
|
|
#ifdef AF_SMC
|
|
test_smc_diag_req(fd);
|
|
test_smc_diag_msg(fd);
|
|
#endif
|
|
|
|
printf("+++ exited with 0 +++\n");
|
|
|
|
return 0;
|
|
}
|