diff --git a/gtests/net/packetdrill/run_system_call.c b/gtests/net/packetdrill/run_system_call.c index de752955ddeff4fb5c4685378213b734e912dd1c..7081003d1dbfcd2f3b6dc3f9399872044957b164 100644 --- a/gtests/net/packetdrill/run_system_call.c +++ b/gtests/net/packetdrill/run_system_call.c @@ -1753,11 +1753,37 @@ static int run_syscall_connect(struct state *state, socket->script.remote.port = 0; socket->script.local.port = 0; socket->live.remote.ip = state->config->live_remote_ip; - socket->live.remote.port = htons(state->config->live_connect_port); + socket->live.remote.port = htons(state->config->live_connect_port); DEBUGP("success: setting socket to state %d\n", socket->state); return STATUS_OK; } +static int run_syscall_sctp_peeloff(struct state *state, + int script_copy_fd, + int script_new_fd, + int live_new_fd, + char **error) { + struct socket *copy_socket = NULL, *new_socket, *temp_socket; + copy_socket = find_socket_by_script_fd(state, script_copy_fd); + assert(copy_socket != NULL); + if (copy_socket->state == SOCKET_NEW) { + asprintf(error, "socket is not new"); + return STATUS_ERR; + } + new_socket = find_socket_by_script_fd(state, script_new_fd); + assert(new_socket == NULL); + new_socket = socket_new(state); + temp_socket = new_socket->next; + + memcpy(new_socket, copy_socket, sizeof(struct socket)); + new_socket->next = temp_socket; + new_socket->live.fd = live_new_fd; + new_socket->script.fd = script_new_fd; + DEBUGP("success: setting socket to state %d\n", new_socket->state); + return STATUS_OK; +} + + /**************************************************************************** * Here we have the parsing and invocation of the system calls that * we support... @@ -3972,6 +3998,62 @@ static int get_sockaddr_from_list(struct expression *expr, size_t *addr_size, st } #endif +static int syscall_sctp_send(struct state *state, struct syscall_spec *syscall, + struct expression_list *args, + char **error) +{ +#if defined(__FreeBSD__) || defined(linux) + int script_fd, live_fd, flags, result; + size_t len; + void *msg; + struct expression *len_expr, *info_expr; + struct sctp_sndrcvinfo info; + + if (check_arg_count(args, 5, error)) + return STATUS_ERR; + if (s32_arg(args, 0, &script_fd, error)) + return STATUS_ERR; + if (to_live_fd(state, script_fd, &live_fd, error)) + return STATUS_ERR; + if (ellipsis_arg(args, 1, error)) + return STATUS_ERR; + len_expr = get_arg(args, 2, error); + if (get_u32(len_expr, &len, error)) { + return STATUS_ERR; + } + info_expr = get_arg(args, 3, error); + if (check_type(info_expr, EXPR_SCTP_SNDRCVINFO, error)) { + return STATUS_ERR; + } + if (parse_expression_to_sctp_sndrcvinfo(info_expr, &info, true, error)) { + return STATUS_ERR; + } + if (s32_arg(args, 4, &flags, error)) { + return STATUS_ERR; + } + msg = calloc(len, 1); + assert(msg != NULL); + + begin_syscall(state, syscall); + + result = sctp_send(live_fd, msg, len, &info, flags); + free(msg); + + if (end_syscall(state, syscall, CHECK_EXACT, result, error)) { + return STATUS_ERR; + } + if (check_sctp_sndrcvinfo(info_expr->value.sctp_sndrcvinfo, &info, error)) { + return STATUS_ERR; + } + + return STATUS_OK; +#else + asprintf(error, "sctp_send is not supported"); + return STATUS_ERR; +#endif +} + + static int syscall_sctp_sendv(struct state *state, struct syscall_spec *syscall, struct expression_list *args, char **error) @@ -4810,6 +4892,46 @@ static int syscall_sctp_connectx(struct state *state, struct syscall_spec *sysca #endif } +static int syscall_sctp_peeloff(struct state *state, struct syscall_spec *syscall, + struct expression_list *args, + char **error) +{ +#if defined(__FreeBSD__) || defined(linux) + int live_fd, script_fd, result, script_new_fd; + sctp_assoc_t assoc_id; + struct expression *expr_assoc; + if (check_arg_count(args, 2, error)) + return STATUS_ERR; + if (s32_arg(args, 0, &script_fd, error)) + return STATUS_ERR; + if (to_live_fd(state, script_fd, &live_fd, error)) + return STATUS_ERR; + expr_assoc = get_arg(args, 1, error); + if (get_u32(expr_assoc, &assoc_id, error)) + return STATUS_ERR; + + //check connection Type and set assoc_id if one-to-many style socket + + begin_syscall(state, syscall); + + result = sctp_peeloff(live_fd, assoc_id); + + if (end_syscall(state, syscall, CHECK_NON_NEGATIVE, result, error)) + return STATUS_ERR; + + if (get_s32(syscall->result, &script_new_fd, error)) + return STATUS_ERR; + if (run_syscall_sctp_peeloff(state, script_fd, script_new_fd, result, error)) { + asprintf(error, "can't copy socket definition"); + return STATUS_ERR; + } + + return STATUS_OK; +#else + asprintf(error, "sctp_connectx is not supported"); + return STATUS_ERR; +#endif +} /* A dispatch table with all the system calls that we support... */ struct system_call_entry { @@ -4819,6 +4941,7 @@ struct system_call_entry { struct expression_list *args, char **error); }; + struct system_call_entry system_call_table[] = { {"socket", syscall_socket}, {"bind", syscall_bind}, @@ -4842,12 +4965,14 @@ struct system_call_entry system_call_table[] = { {"getsockopt", syscall_getsockopt}, {"setsockopt", syscall_setsockopt}, {"poll", syscall_poll}, + {"sctp_send", syscall_sctp_send}, {"sctp_sendmsg", syscall_sctp_sendmsg}, {"sctp_recvmsg", syscall_sctp_recvmsg}, {"sctp_sendv", syscall_sctp_sendv}, {"sctp_recvv", syscall_sctp_recvv}, {"sctp_bindx", syscall_sctp_bindx}, - {"sctp_connectx", syscall_sctp_connectx} + {"sctp_connectx", syscall_sctp_connectx}, + {"sctp_peeloff", syscall_sctp_peeloff} }; /* Evaluate the system call arguments and invoke the system call. */ diff --git a/gtests/net/packetdrill/tests/bsd/sctp/sctp_active_x.pkt b/gtests/net/packetdrill/tests/bsd/sctp/sctp_active_x.pkt index e8927bdabe1e1a5da477d1c09220fddf79ed6ae9..44c1d95e76e685bd1e14974c88da5a9757fd3fbf 100644 --- a/gtests/net/packetdrill/tests/bsd/sctp/sctp_active_x.pkt +++ b/gtests/net/packetdrill/tests/bsd/sctp/sctp_active_x.pkt @@ -1,4 +1,5 @@ -+0.0 socket(..., SOCK_STREAM, IPPROTO_SCTP) = 3 + + 0.0 socket(..., SOCK_STREAM, IPPROTO_SCTP) = 3 +0.0 fcntl(3, F_GETFL) = 0x2 (flags O_RDWR) +0.0 fcntl(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 @@ -11,7 +12,19 @@ +0.0 > sctp: COOKIE_ECHO[flgs=0, len=4, val=...] +0.1 < sctp: COOKIE_ACK[flgs=0] -+0.0 getsockopt(3, SOL_SOCKET, SO_ERROR, [0], [4]) = 0 ++0.0 sctp_sendmsg(3, ..., 1000, ..., ..., htonl(1234), SCTP_UNORDERED, 1, 0, 0) = 1000 +* > sctp: DATA[flgs=UBE, len=1016, tsn=1, sid=1, ssn=0, ppid=1234] ++0.0 < sctp: SACK[flgs=0, cum_tsn=1, a_rwnd=1500, gaps=[], dups=[]] + ++0.0 sctp_peeloff(3, 4) = 4 + ++0.0 sctp_sendmsg(3, ..., 1000, ..., ..., htonl(1234), SCTP_UNORDERED, 1, 0, 0) = 1000 +* > sctp: DATA[flgs=UBE, len=1016, tsn=1, sid=1, ssn=0, ppid=1234] ++0.0 < sctp: SACK[flgs=0, cum_tsn=1, a_rwnd=1500, gaps=[], dups=[]] + ++0.0 sctp_sendmsg(4, ..., 1000, ..., ..., htonl(1234), SCTP_UNORDERED, 1, 0, 0) = 1000 +* > sctp: DATA[flgs=UBE, len=1016, tsn=1, sid=1, ssn=0, ppid=1234] ++0.0 < sctp: SACK[flgs=0, cum_tsn=1, a_rwnd=1500, gaps=[], dups=[]] +0.0 < sctp: SHUTDOWN[flgs=0, cum_tsn=0] * > sctp: SHUTDOWN_ACK[flgs=0] diff --git a/gtests/net/packetdrill/tests/bsd/sctp/sctp_send.pkt b/gtests/net/packetdrill/tests/bsd/sctp/sctp_send.pkt new file mode 100644 index 0000000000000000000000000000000000000000..dd3e13911825b78a56cb92b365c497f847661f3b --- /dev/null +++ b/gtests/net/packetdrill/tests/bsd/sctp/sctp_send.pkt @@ -0,0 +1,46 @@ +--tolerance_usecs=100000 + + 0.0 socket(..., SOCK_STREAM, IPPROTO_SCTP) = 3 ++0.0 fcntl(3, F_GETFL) = 0x2 (flags O_RDWR) ++0.0 fcntl(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 ++0.0 bind(3, ..., ...) = 0 +// Check the handshake with an empty(!) cookie ++0.1 connect(3, ..., ...) = -1 EINPROGRESS (Operation now in progress) ++0.0 > sctp: INIT[flgs=0, tag=1, a_rwnd=..., os=..., is=..., tsn=1, ...] ++0.1 < sctp: INIT_ACK[flgs=0, tag=2, a_rwnd=1500, os=16, is=16, tsn=1, STATE_COOKIE[len=4, val=...]] ++0.0 > sctp: COOKIE_ECHO[flgs=0, len=4, val=...] ++0.1 < sctp: COOKIE_ACK[flgs=0] ++0.0 getsockopt(3, SOL_SOCKET, SO_ERROR, [0], [4]) = 0 +//sendmsg(sd, msghdr, flags) + ++0.0 setsockopt(3, IPPROTO_SCTP, SCTP_PEER_ADDR_PARAMS, {spp_address={sa_family=AF_INET, sin_port=htons(8080), sin_addr=inet_addr("192.0.2.1")}, +spp_hbinterval=0, spp_pathmaxrxt=8, spp_pathmtu=1468, spp_flags=SPP_HB_DISABLE, spp_ipv6_flowlabel=0, spp_dscp=0}, 152) = 0 + ++1.0 sctp_send(3, ..., 1000, {sinfo_stream=3, + sinfo_ssn=3, + sinfo_flags=0, + sinfo_ppid=htonl(7), + sinfo_context=0, + sinfo_timetolive=0, + sinfo_tsn=1, + sinfo_cumtsn=6, + sinfo_assoc_id=3}, 0) = 1000 +* > sctp: DATA[flgs=BE, len=1016, tsn=1, sid=3, ssn=0, ppid=7] ++0.0 < sctp: SACK[flgs=0, cum_tsn=1, a_rwnd=1500, gaps=[], dups=[]] + ++1.0 sctp_send(3, ..., 1000, {sinfo_stream=3, + sinfo_ssn=3, + sinfo_flags=0, + sinfo_ppid=htonl(1234), + sinfo_context=0, + sinfo_timetolive=0, + sinfo_tsn=2, + sinfo_cumtsn=2, + sinfo_assoc_id=3}, 0) = 1000 +* > sctp: DATA[flgs=BE, len=1016, tsn=2, sid=3, ssn=1, ppid=1234] ++0.0 < sctp: SACK[flgs=0, cum_tsn=2, a_rwnd=1500, gaps=[], dups=[]] + ++0.0 close(3) = 0 ++0.0 > sctp: SHUTDOWN[flgs=0, cum_tsn=0] ++0.1 < sctp: SHUTDOWN_ACK[flgs=0] ++0.0 > sctp: SHUTDOWN_COMPLETE[flgs=0]