1 // SPDX-License-Identifier: GPL-2.0
2 /* nettest - used for functional tests of networking APIs
3  *
4  * Copyright (c) 2013-2019 David Ahern <dsahern@gmail.com>. All rights reserved.
5  */
6 
7 #define _GNU_SOURCE
8 #include <features.h>
9 #include <sys/types.h>
10 #include <sys/ioctl.h>
11 #include <sys/socket.h>
12 #include <sys/wait.h>
13 #include <linux/tcp.h>
14 #include <linux/udp.h>
15 #include <arpa/inet.h>
16 #include <net/if.h>
17 #include <netinet/in.h>
18 #include <netinet/ip.h>
19 #include <netdb.h>
20 #include <fcntl.h>
21 #include <libgen.h>
22 #include <limits.h>
23 #include <sched.h>
24 #include <stdarg.h>
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <unistd.h>
29 #include <time.h>
30 #include <errno.h>
31 #include <getopt.h>
32 
33 #include <linux/xfrm.h>
34 #include <linux/ipsec.h>
35 #include <linux/pfkeyv2.h>
36 
37 #ifndef IPV6_UNICAST_IF
38 #define IPV6_UNICAST_IF         76
39 #endif
40 #ifndef IPV6_MULTICAST_IF
41 #define IPV6_MULTICAST_IF       17
42 #endif
43 
44 #define DEFAULT_PORT 12345
45 
46 #define NS_PREFIX "/run/netns/"
47 
48 #ifndef MAX
49 #define MAX(a, b)  ((a) > (b) ? (a) : (b))
50 #endif
51 #ifndef MIN
52 #define MIN(a, b)  ((a) < (b) ? (a) : (b))
53 #endif
54 
55 struct sock_args {
56 	/* local address */
57 	const char *local_addr_str;
58 	const char *client_local_addr_str;
59 	union {
60 		struct in_addr  in;
61 		struct in6_addr in6;
62 	} local_addr;
63 
64 	/* remote address */
65 	const char *remote_addr_str;
66 	union {
67 		struct in_addr  in;
68 		struct in6_addr in6;
69 	} remote_addr;
70 	int scope_id;  /* remote scope; v6 send only */
71 
72 	struct in_addr grp;     /* multicast group */
73 
74 	unsigned int has_local_ip:1,
75 		     has_remote_ip:1,
76 		     has_grp:1,
77 		     has_expected_laddr:1,
78 		     has_expected_raddr:1,
79 		     bind_test_only:1,
80 		     client_dontroute:1,
81 		     server_dontroute:1;
82 
83 	unsigned short port;
84 
85 	int type;      /* DGRAM, STREAM, RAW */
86 	int protocol;
87 	int version;   /* AF_INET/AF_INET6 */
88 
89 	int use_setsockopt;
90 	int use_freebind;
91 	int use_cmsg;
92 	uint8_t dsfield;
93 	const char *dev;
94 	const char *server_dev;
95 	int ifindex;
96 
97 	const char *clientns;
98 	const char *serverns;
99 
100 	const char *password;
101 	const char *client_pw;
102 	/* prefix for MD5 password */
103 	const char *md5_prefix_str;
104 	union {
105 		struct sockaddr_in v4;
106 		struct sockaddr_in6 v6;
107 	} md5_prefix;
108 	unsigned int prefix_len;
109 	/* 0: default, -1: force off, +1: force on */
110 	int bind_key_ifindex;
111 
112 	/* expected addresses and device index for connection */
113 	const char *expected_dev;
114 	const char *expected_server_dev;
115 	int expected_ifindex;
116 
117 	/* local address */
118 	const char *expected_laddr_str;
119 	union {
120 		struct in_addr  in;
121 		struct in6_addr in6;
122 	} expected_laddr;
123 
124 	/* remote address */
125 	const char *expected_raddr_str;
126 	union {
127 		struct in_addr  in;
128 		struct in6_addr in6;
129 	} expected_raddr;
130 
131 	/* ESP in UDP encap test */
132 	int use_xfrm;
133 
134 	/* use send() and connect() instead of sendto */
135 	int datagram_connect;
136 };
137 
138 static int server_mode;
139 static unsigned int prog_timeout = 5;
140 static unsigned int interactive;
141 static int iter = 1;
142 static char *msg = "Hello world!";
143 static int msglen;
144 static int quiet;
145 static int try_broadcast = 1;
146 
147 static char *timestamp(char *timebuf, int buflen)
148 {
149 	time_t now;
150 
151 	now = time(NULL);
152 	if (strftime(timebuf, buflen, "%T", localtime(&now)) == 0) {
153 		memset(timebuf, 0, buflen);
154 		strncpy(timebuf, "00:00:00", buflen-1);
155 	}
156 
157 	return timebuf;
158 }
159 
160 static void log_msg(const char *format, ...)
161 {
162 	char timebuf[64];
163 	va_list args;
164 
165 	if (quiet)
166 		return;
167 
168 	fprintf(stdout, "%s %s:",
169 		timestamp(timebuf, sizeof(timebuf)),
170 		server_mode ? "server" : "client");
171 	va_start(args, format);
172 	vfprintf(stdout, format, args);
173 	va_end(args);
174 
175 	fflush(stdout);
176 }
177 
178 static void log_error(const char *format, ...)
179 {
180 	char timebuf[64];
181 	va_list args;
182 
183 	if (quiet)
184 		return;
185 
186 	fprintf(stderr, "%s %s:",
187 		timestamp(timebuf, sizeof(timebuf)),
188 		server_mode ? "server" : "client");
189 	va_start(args, format);
190 	vfprintf(stderr, format, args);
191 	va_end(args);
192 
193 	fflush(stderr);
194 }
195 
196 static void log_err_errno(const char *fmt, ...)
197 {
198 	char timebuf[64];
199 	va_list args;
200 
201 	if (quiet)
202 		return;
203 
204 	fprintf(stderr, "%s %s: ",
205 		timestamp(timebuf, sizeof(timebuf)),
206 		server_mode ? "server" : "client");
207 	va_start(args, fmt);
208 	vfprintf(stderr, fmt, args);
209 	va_end(args);
210 
211 	fprintf(stderr, ": %d: %s\n", errno, strerror(errno));
212 	fflush(stderr);
213 }
214 
215 static void log_address(const char *desc, struct sockaddr *sa)
216 {
217 	char addrstr[64];
218 
219 	if (quiet)
220 		return;
221 
222 	if (sa->sa_family == AF_INET) {
223 		struct sockaddr_in *s = (struct sockaddr_in *) sa;
224 
225 		log_msg("%s %s:%d\n",
226 			desc,
227 			inet_ntop(AF_INET, &s->sin_addr, addrstr,
228 				  sizeof(addrstr)),
229 			ntohs(s->sin_port));
230 
231 	} else if (sa->sa_family == AF_INET6) {
232 		struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
233 
234 		log_msg("%s [%s]:%d\n",
235 			desc,
236 			inet_ntop(AF_INET6, &s6->sin6_addr, addrstr,
237 				  sizeof(addrstr)),
238 			ntohs(s6->sin6_port));
239 	}
240 
241 	fflush(stdout);
242 }
243 
244 static int switch_ns(const char *ns)
245 {
246 	char path[PATH_MAX];
247 	int fd, ret;
248 
249 	if (geteuid())
250 		log_error("warning: likely need root to set netns %s!\n", ns);
251 
252 	snprintf(path, sizeof(path), "%s%s", NS_PREFIX, ns);
253 	fd = open(path, 0);
254 	if (fd < 0) {
255 		log_err_errno("Failed to open netns path; can not switch netns");
256 		return 1;
257 	}
258 
259 	ret = setns(fd, CLONE_NEWNET);
260 	close(fd);
261 
262 	return ret;
263 }
264 
265 static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args)
266 {
267 	int keylen = strlen(args->password);
268 	struct tcp_md5sig md5sig = {};
269 	int opt = TCP_MD5SIG;
270 	int rc;
271 
272 	md5sig.tcpm_keylen = keylen;
273 	memcpy(md5sig.tcpm_key, args->password, keylen);
274 
275 	if (args->prefix_len) {
276 		opt = TCP_MD5SIG_EXT;
277 		md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_PREFIX;
278 
279 		md5sig.tcpm_prefixlen = args->prefix_len;
280 		addr = &args->md5_prefix;
281 	}
282 	memcpy(&md5sig.tcpm_addr, addr, alen);
283 
284 	if ((args->ifindex && args->bind_key_ifindex >= 0) || args->bind_key_ifindex >= 1) {
285 		opt = TCP_MD5SIG_EXT;
286 		md5sig.tcpm_flags |= TCP_MD5SIG_FLAG_IFINDEX;
287 
288 		md5sig.tcpm_ifindex = args->ifindex;
289 		log_msg("TCP_MD5SIG_FLAG_IFINDEX set tcpm_ifindex=%d\n", md5sig.tcpm_ifindex);
290 	} else {
291 		log_msg("TCP_MD5SIG_FLAG_IFINDEX off\n", md5sig.tcpm_ifindex);
292 	}
293 
294 	rc = setsockopt(sd, IPPROTO_TCP, opt, &md5sig, sizeof(md5sig));
295 	if (rc < 0) {
296 		/* ENOENT is harmless. Returned when a password is cleared */
297 		if (errno == ENOENT)
298 			rc = 0;
299 		else
300 			log_err_errno("setsockopt(TCP_MD5SIG)");
301 	}
302 
303 	return rc;
304 }
305 
306 static int tcp_md5_remote(int sd, struct sock_args *args)
307 {
308 	struct sockaddr_in sin = {
309 		.sin_family = AF_INET,
310 	};
311 	struct sockaddr_in6 sin6 = {
312 		.sin6_family = AF_INET6,
313 	};
314 	void *addr;
315 	int alen;
316 
317 	switch (args->version) {
318 	case AF_INET:
319 		sin.sin_port = htons(args->port);
320 		sin.sin_addr = args->md5_prefix.v4.sin_addr;
321 		addr = &sin;
322 		alen = sizeof(sin);
323 		break;
324 	case AF_INET6:
325 		sin6.sin6_port = htons(args->port);
326 		sin6.sin6_addr = args->md5_prefix.v6.sin6_addr;
327 		addr = &sin6;
328 		alen = sizeof(sin6);
329 		break;
330 	default:
331 		log_error("unknown address family\n");
332 		exit(1);
333 	}
334 
335 	if (tcp_md5sig(sd, addr, alen, args))
336 		return -1;
337 
338 	return 0;
339 }
340 
341 static int get_ifidx(const char *ifname)
342 {
343 	struct ifreq ifdata;
344 	int sd, rc;
345 
346 	if (!ifname || *ifname == '\0')
347 		return -1;
348 
349 	memset(&ifdata, 0, sizeof(ifdata));
350 
351 	strcpy(ifdata.ifr_name, ifname);
352 
353 	sd = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
354 	if (sd < 0) {
355 		log_err_errno("socket failed");
356 		return -1;
357 	}
358 
359 	rc = ioctl(sd, SIOCGIFINDEX, (char *)&ifdata);
360 	close(sd);
361 	if (rc != 0) {
362 		log_err_errno("ioctl(SIOCGIFINDEX) failed");
363 		return -1;
364 	}
365 
366 	return ifdata.ifr_ifindex;
367 }
368 
369 static int bind_to_device(int sd, const char *name)
370 {
371 	int rc;
372 
373 	rc = setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
374 	if (rc < 0)
375 		log_err_errno("setsockopt(SO_BINDTODEVICE)");
376 
377 	return rc;
378 }
379 
380 static int get_bind_to_device(int sd, char *name, size_t len)
381 {
382 	int rc;
383 	socklen_t optlen = len;
384 
385 	name[0] = '\0';
386 	rc = getsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, name, &optlen);
387 	if (rc < 0)
388 		log_err_errno("setsockopt(SO_BINDTODEVICE)");
389 
390 	return rc;
391 }
392 
393 static int check_device(int sd, struct sock_args *args)
394 {
395 	int ifindex = 0;
396 	char name[32];
397 
398 	if (get_bind_to_device(sd, name, sizeof(name)))
399 		*name = '\0';
400 	else
401 		ifindex = get_ifidx(name);
402 
403 	log_msg("    bound to device %s/%d\n",
404 		*name ? name : "<none>", ifindex);
405 
406 	if (!args->expected_ifindex)
407 		return 0;
408 
409 	if (args->expected_ifindex != ifindex) {
410 		log_error("Device index mismatch: expected %d have %d\n",
411 			  args->expected_ifindex, ifindex);
412 		return 1;
413 	}
414 
415 	log_msg("Device index matches: expected %d have %d\n",
416 		args->expected_ifindex, ifindex);
417 
418 	return 0;
419 }
420 
421 static int set_pktinfo_v4(int sd)
422 {
423 	int one = 1;
424 	int rc;
425 
426 	rc = setsockopt(sd, SOL_IP, IP_PKTINFO, &one, sizeof(one));
427 	if (rc < 0 && rc != -ENOTSUP)
428 		log_err_errno("setsockopt(IP_PKTINFO)");
429 
430 	return rc;
431 }
432 
433 static int set_recvpktinfo_v6(int sd)
434 {
435 	int one = 1;
436 	int rc;
437 
438 	rc = setsockopt(sd, SOL_IPV6, IPV6_RECVPKTINFO, &one, sizeof(one));
439 	if (rc < 0 && rc != -ENOTSUP)
440 		log_err_errno("setsockopt(IPV6_RECVPKTINFO)");
441 
442 	return rc;
443 }
444 
445 static int set_recverr_v4(int sd)
446 {
447 	int one = 1;
448 	int rc;
449 
450 	rc = setsockopt(sd, SOL_IP, IP_RECVERR, &one, sizeof(one));
451 	if (rc < 0 && rc != -ENOTSUP)
452 		log_err_errno("setsockopt(IP_RECVERR)");
453 
454 	return rc;
455 }
456 
457 static int set_recverr_v6(int sd)
458 {
459 	int one = 1;
460 	int rc;
461 
462 	rc = setsockopt(sd, SOL_IPV6, IPV6_RECVERR, &one, sizeof(one));
463 	if (rc < 0 && rc != -ENOTSUP)
464 		log_err_errno("setsockopt(IPV6_RECVERR)");
465 
466 	return rc;
467 }
468 
469 static int set_unicast_if(int sd, int ifindex, int version)
470 {
471 	int opt = IP_UNICAST_IF;
472 	int level = SOL_IP;
473 	int rc;
474 
475 	ifindex = htonl(ifindex);
476 
477 	if (version == AF_INET6) {
478 		opt = IPV6_UNICAST_IF;
479 		level = SOL_IPV6;
480 	}
481 	rc = setsockopt(sd, level, opt, &ifindex, sizeof(ifindex));
482 	if (rc < 0)
483 		log_err_errno("setsockopt(IP_UNICAST_IF)");
484 
485 	return rc;
486 }
487 
488 static int set_multicast_if(int sd, int ifindex)
489 {
490 	struct ip_mreqn mreq = { .imr_ifindex = ifindex };
491 	int rc;
492 
493 	rc = setsockopt(sd, SOL_IP, IP_MULTICAST_IF, &mreq, sizeof(mreq));
494 	if (rc < 0)
495 		log_err_errno("setsockopt(IP_MULTICAST_IF)");
496 
497 	return rc;
498 }
499 
500 static int set_membership(int sd, uint32_t grp, uint32_t addr, int ifindex)
501 {
502 	uint32_t if_addr = addr;
503 	struct ip_mreqn mreq;
504 	int rc;
505 
506 	if (addr == htonl(INADDR_ANY) && !ifindex) {
507 		log_error("Either local address or device needs to be given for multicast membership\n");
508 		return -1;
509 	}
510 
511 	mreq.imr_multiaddr.s_addr = grp;
512 	mreq.imr_address.s_addr = if_addr;
513 	mreq.imr_ifindex = ifindex;
514 
515 	rc = setsockopt(sd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq));
516 	if (rc < 0) {
517 		log_err_errno("setsockopt(IP_ADD_MEMBERSHIP)");
518 		return -1;
519 	}
520 
521 	return 0;
522 }
523 
524 static int set_freebind(int sd, int version)
525 {
526 	unsigned int one = 1;
527 	int rc = 0;
528 
529 	switch (version) {
530 	case AF_INET:
531 		if (setsockopt(sd, SOL_IP, IP_FREEBIND, &one, sizeof(one))) {
532 			log_err_errno("setsockopt(IP_FREEBIND)");
533 			rc = -1;
534 		}
535 		break;
536 	case AF_INET6:
537 		if (setsockopt(sd, SOL_IPV6, IPV6_FREEBIND, &one, sizeof(one))) {
538 			log_err_errno("setsockopt(IPV6_FREEBIND");
539 			rc = -1;
540 		}
541 		break;
542 	}
543 
544 	return rc;
545 }
546 
547 static int set_broadcast(int sd)
548 {
549 	unsigned int one = 1;
550 	int rc = 0;
551 
552 	if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST, &one, sizeof(one)) != 0) {
553 		log_err_errno("setsockopt(SO_BROADCAST)");
554 		rc = -1;
555 	}
556 
557 	return rc;
558 }
559 
560 static int set_reuseport(int sd)
561 {
562 	unsigned int one = 1;
563 	int rc = 0;
564 
565 	if (setsockopt(sd, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one)) != 0) {
566 		log_err_errno("setsockopt(SO_REUSEPORT)");
567 		rc = -1;
568 	}
569 
570 	return rc;
571 }
572 
573 static int set_reuseaddr(int sd)
574 {
575 	unsigned int one = 1;
576 	int rc = 0;
577 
578 	if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) != 0) {
579 		log_err_errno("setsockopt(SO_REUSEADDR)");
580 		rc = -1;
581 	}
582 
583 	return rc;
584 }
585 
586 static int set_dsfield(int sd, int version, int dsfield)
587 {
588 	if (!dsfield)
589 		return 0;
590 
591 	switch (version) {
592 	case AF_INET:
593 		if (setsockopt(sd, SOL_IP, IP_TOS, &dsfield,
594 			       sizeof(dsfield)) < 0) {
595 			log_err_errno("setsockopt(IP_TOS)");
596 			return -1;
597 		}
598 		break;
599 
600 	case AF_INET6:
601 		if (setsockopt(sd, SOL_IPV6, IPV6_TCLASS, &dsfield,
602 			       sizeof(dsfield)) < 0) {
603 			log_err_errno("setsockopt(IPV6_TCLASS)");
604 			return -1;
605 		}
606 		break;
607 
608 	default:
609 		log_error("Invalid address family\n");
610 		return -1;
611 	}
612 
613 	return 0;
614 }
615 
616 static int set_dontroute(int sd)
617 {
618 	unsigned int one = 1;
619 
620 	if (setsockopt(sd, SOL_SOCKET, SO_DONTROUTE, &one, sizeof(one)) < 0) {
621 		log_err_errno("setsockopt(SO_DONTROUTE)");
622 		return -1;
623 	}
624 
625 	return 0;
626 }
627 
628 static int str_to_uint(const char *str, int min, int max, unsigned int *value)
629 {
630 	int number;
631 	char *end;
632 
633 	errno = 0;
634 	number = (unsigned int) strtoul(str, &end, 0);
635 
636 	/* entire string should be consumed by conversion
637 	 * and value should be between min and max
638 	 */
639 	if (((*end == '\0') || (*end == '\n')) && (end != str) &&
640 	    (errno != ERANGE) && (min <= number) && (number <= max)) {
641 		*value = number;
642 		return 0;
643 	}
644 
645 	return -1;
646 }
647 
648 static int resolve_devices(struct sock_args *args)
649 {
650 	if (args->dev) {
651 		args->ifindex = get_ifidx(args->dev);
652 		if (args->ifindex < 0) {
653 			log_error("Invalid device name\n");
654 			return 1;
655 		}
656 	}
657 
658 	if (args->expected_dev) {
659 		unsigned int tmp;
660 
661 		if (str_to_uint(args->expected_dev, 0, INT_MAX, &tmp) == 0) {
662 			args->expected_ifindex = (int)tmp;
663 		} else {
664 			args->expected_ifindex = get_ifidx(args->expected_dev);
665 			if (args->expected_ifindex < 0) {
666 				fprintf(stderr, "Invalid expected device\n");
667 				return 1;
668 			}
669 		}
670 	}
671 
672 	return 0;
673 }
674 
675 static int expected_addr_match(struct sockaddr *sa, void *expected,
676 			       const char *desc)
677 {
678 	char addrstr[64];
679 	int rc = 0;
680 
681 	if (sa->sa_family == AF_INET) {
682 		struct sockaddr_in *s = (struct sockaddr_in *) sa;
683 		struct in_addr *exp_in = (struct in_addr *) expected;
684 
685 		if (s->sin_addr.s_addr != exp_in->s_addr) {
686 			log_error("%s address does not match expected %s\n",
687 				  desc,
688 				  inet_ntop(AF_INET, exp_in,
689 					    addrstr, sizeof(addrstr)));
690 			rc = 1;
691 		}
692 	} else if (sa->sa_family == AF_INET6) {
693 		struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
694 		struct in6_addr *exp_in = (struct in6_addr *) expected;
695 
696 		if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) {
697 			log_error("%s address does not match expected %s\n",
698 				  desc,
699 				  inet_ntop(AF_INET6, exp_in,
700 					    addrstr, sizeof(addrstr)));
701 			rc = 1;
702 		}
703 	} else {
704 		log_error("%s address does not match expected - unknown family\n",
705 			  desc);
706 		rc = 1;
707 	}
708 
709 	if (!rc)
710 		log_msg("%s address matches expected\n", desc);
711 
712 	return rc;
713 }
714 
715 static int show_sockstat(int sd, struct sock_args *args)
716 {
717 	struct sockaddr_in6 local_addr, remote_addr;
718 	socklen_t alen = sizeof(local_addr);
719 	struct sockaddr *sa;
720 	const char *desc;
721 	int rc = 0;
722 
723 	desc = server_mode ? "server local:" : "client local:";
724 	sa = (struct sockaddr *) &local_addr;
725 	if (getsockname(sd, sa, &alen) == 0) {
726 		log_address(desc, sa);
727 
728 		if (args->has_expected_laddr) {
729 			rc = expected_addr_match(sa, &args->expected_laddr,
730 						 "local");
731 		}
732 	} else {
733 		log_err_errno("getsockname failed");
734 	}
735 
736 	sa = (struct sockaddr *) &remote_addr;
737 	desc = server_mode ? "server peer:" : "client peer:";
738 	if (getpeername(sd, sa, &alen) == 0) {
739 		log_address(desc, sa);
740 
741 		if (args->has_expected_raddr) {
742 			rc |= expected_addr_match(sa, &args->expected_raddr,
743 						 "remote");
744 		}
745 	} else {
746 		log_err_errno("getpeername failed");
747 	}
748 
749 	return rc;
750 }
751 
752 enum addr_type {
753 	ADDR_TYPE_LOCAL,
754 	ADDR_TYPE_REMOTE,
755 	ADDR_TYPE_MCAST,
756 	ADDR_TYPE_EXPECTED_LOCAL,
757 	ADDR_TYPE_EXPECTED_REMOTE,
758 	ADDR_TYPE_MD5_PREFIX,
759 };
760 
761 static int convert_addr(struct sock_args *args, const char *_str,
762 			enum addr_type atype)
763 {
764 	int pfx_len_max = args->version == AF_INET6 ? 128 : 32;
765 	int family = args->version;
766 	char *str, *dev, *sep;
767 	struct in6_addr *in6;
768 	struct in_addr  *in;
769 	const char *desc;
770 	void *addr;
771 	int rc = 0;
772 
773 	str = strdup(_str);
774 	if (!str)
775 		return -ENOMEM;
776 
777 	switch (atype) {
778 	case ADDR_TYPE_LOCAL:
779 		desc = "local";
780 		addr = &args->local_addr;
781 		break;
782 	case ADDR_TYPE_REMOTE:
783 		desc = "remote";
784 		addr = &args->remote_addr;
785 		break;
786 	case ADDR_TYPE_MCAST:
787 		desc = "mcast grp";
788 		addr = &args->grp;
789 		break;
790 	case ADDR_TYPE_EXPECTED_LOCAL:
791 		desc = "expected local";
792 		addr = &args->expected_laddr;
793 		break;
794 	case ADDR_TYPE_EXPECTED_REMOTE:
795 		desc = "expected remote";
796 		addr = &args->expected_raddr;
797 		break;
798 	case ADDR_TYPE_MD5_PREFIX:
799 		desc = "md5 prefix";
800 		if (family == AF_INET) {
801 			args->md5_prefix.v4.sin_family = AF_INET;
802 			addr = &args->md5_prefix.v4.sin_addr;
803 		} else if (family == AF_INET6) {
804 			args->md5_prefix.v6.sin6_family = AF_INET6;
805 			addr = &args->md5_prefix.v6.sin6_addr;
806 		} else
807 			return 1;
808 
809 		sep = strchr(str, '/');
810 		if (sep) {
811 			*sep = '\0';
812 			sep++;
813 			if (str_to_uint(sep, 1, pfx_len_max,
814 					&args->prefix_len) != 0) {
815 				fprintf(stderr, "Invalid port\n");
816 				return 1;
817 			}
818 		} else {
819 			args->prefix_len = 0;
820 		}
821 		break;
822 	default:
823 		log_error("unknown address type\n");
824 		exit(1);
825 	}
826 
827 	switch (family) {
828 	case AF_INET:
829 		in  = (struct in_addr *) addr;
830 		if (str) {
831 			if (inet_pton(AF_INET, str, in) == 0) {
832 				log_error("Invalid %s IP address\n", desc);
833 				rc = -1;
834 				goto out;
835 			}
836 		} else {
837 			in->s_addr = htonl(INADDR_ANY);
838 		}
839 		break;
840 
841 	case AF_INET6:
842 		dev = strchr(str, '%');
843 		if (dev) {
844 			*dev = '\0';
845 			dev++;
846 		}
847 
848 		in6 = (struct in6_addr *) addr;
849 		if (str) {
850 			if (inet_pton(AF_INET6, str, in6) == 0) {
851 				log_error("Invalid %s IPv6 address\n", desc);
852 				rc = -1;
853 				goto out;
854 			}
855 		} else {
856 			*in6 = in6addr_any;
857 		}
858 		if (dev) {
859 			args->scope_id = get_ifidx(dev);
860 			if (args->scope_id < 0) {
861 				log_error("Invalid scope on %s IPv6 address\n",
862 					  desc);
863 				rc = -1;
864 				goto out;
865 			}
866 		}
867 		break;
868 
869 	default:
870 		log_error("Invalid address family\n");
871 	}
872 
873 out:
874 	free(str);
875 	return rc;
876 }
877 
878 static int validate_addresses(struct sock_args *args)
879 {
880 	if (args->local_addr_str &&
881 	    convert_addr(args, args->local_addr_str, ADDR_TYPE_LOCAL) < 0)
882 		return 1;
883 
884 	if (args->remote_addr_str &&
885 	    convert_addr(args, args->remote_addr_str, ADDR_TYPE_REMOTE) < 0)
886 		return 1;
887 
888 	if (args->md5_prefix_str &&
889 	    convert_addr(args, args->md5_prefix_str,
890 			 ADDR_TYPE_MD5_PREFIX) < 0)
891 		return 1;
892 
893 	if (args->expected_laddr_str &&
894 	    convert_addr(args, args->expected_laddr_str,
895 			 ADDR_TYPE_EXPECTED_LOCAL))
896 		return 1;
897 
898 	if (args->expected_raddr_str &&
899 	    convert_addr(args, args->expected_raddr_str,
900 			 ADDR_TYPE_EXPECTED_REMOTE))
901 		return 1;
902 
903 	return 0;
904 }
905 
906 static int get_index_from_cmsg(struct msghdr *m)
907 {
908 	struct cmsghdr *cm;
909 	int ifindex = 0;
910 	char buf[64];
911 
912 	for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(m);
913 	     m->msg_controllen != 0 && cm;
914 	     cm = (struct cmsghdr *)CMSG_NXTHDR(m, cm)) {
915 
916 		if (cm->cmsg_level == SOL_IP &&
917 		    cm->cmsg_type == IP_PKTINFO) {
918 			struct in_pktinfo *pi;
919 
920 			pi = (struct in_pktinfo *)(CMSG_DATA(cm));
921 			inet_ntop(AF_INET, &pi->ipi_addr, buf, sizeof(buf));
922 			ifindex = pi->ipi_ifindex;
923 		} else if (cm->cmsg_level == SOL_IPV6 &&
924 			   cm->cmsg_type == IPV6_PKTINFO) {
925 			struct in6_pktinfo *pi6;
926 
927 			pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
928 			inet_ntop(AF_INET6, &pi6->ipi6_addr, buf, sizeof(buf));
929 			ifindex = pi6->ipi6_ifindex;
930 		}
931 	}
932 
933 	if (ifindex) {
934 		log_msg("    pktinfo: ifindex %d dest addr %s\n",
935 			ifindex, buf);
936 	}
937 	return ifindex;
938 }
939 
940 static int send_msg_no_cmsg(int sd, void *addr, socklen_t alen)
941 {
942 	int err;
943 
944 again:
945 	err = sendto(sd, msg, msglen, 0, addr, alen);
946 	if (err < 0) {
947 		if (errno == EACCES && try_broadcast) {
948 			try_broadcast = 0;
949 			if (!set_broadcast(sd))
950 				goto again;
951 			errno = EACCES;
952 		}
953 
954 		log_err_errno("sendto failed");
955 		return 1;
956 	}
957 
958 	return 0;
959 }
960 
961 static int send_msg_cmsg(int sd, void *addr, socklen_t alen,
962 			 int ifindex, int version)
963 {
964 	unsigned char cmsgbuf[64];
965 	struct iovec iov[2];
966 	struct cmsghdr *cm;
967 	struct msghdr m;
968 	int err;
969 
970 	iov[0].iov_base = msg;
971 	iov[0].iov_len = msglen;
972 	m.msg_iov = iov;
973 	m.msg_iovlen = 1;
974 	m.msg_name = (caddr_t)addr;
975 	m.msg_namelen = alen;
976 
977 	memset(cmsgbuf, 0, sizeof(cmsgbuf));
978 	cm = (struct cmsghdr *)cmsgbuf;
979 	m.msg_control = (caddr_t)cm;
980 
981 	if (version == AF_INET) {
982 		struct in_pktinfo *pi;
983 
984 		cm->cmsg_level = SOL_IP;
985 		cm->cmsg_type = IP_PKTINFO;
986 		cm->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
987 		pi = (struct in_pktinfo *)(CMSG_DATA(cm));
988 		pi->ipi_ifindex = ifindex;
989 
990 		m.msg_controllen = cm->cmsg_len;
991 
992 	} else if (version == AF_INET6) {
993 		struct in6_pktinfo *pi6;
994 
995 		cm->cmsg_level = SOL_IPV6;
996 		cm->cmsg_type = IPV6_PKTINFO;
997 		cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
998 
999 		pi6 = (struct in6_pktinfo *)(CMSG_DATA(cm));
1000 		pi6->ipi6_ifindex = ifindex;
1001 
1002 		m.msg_controllen = cm->cmsg_len;
1003 	}
1004 
1005 again:
1006 	err = sendmsg(sd, &m, 0);
1007 	if (err < 0) {
1008 		if (errno == EACCES && try_broadcast) {
1009 			try_broadcast = 0;
1010 			if (!set_broadcast(sd))
1011 				goto again;
1012 			errno = EACCES;
1013 		}
1014 
1015 		log_err_errno("sendmsg failed");
1016 		return 1;
1017 	}
1018 
1019 	return 0;
1020 }
1021 
1022 
1023 static int send_msg(int sd, void *addr, socklen_t alen, struct sock_args *args)
1024 {
1025 	if (args->type == SOCK_STREAM) {
1026 		if (write(sd, msg, msglen) < 0) {
1027 			log_err_errno("write failed sending msg to peer");
1028 			return 1;
1029 		}
1030 	} else if (args->datagram_connect) {
1031 		if (send(sd, msg, msglen, 0) < 0) {
1032 			log_err_errno("send failed sending msg to peer");
1033 			return 1;
1034 		}
1035 	} else if (args->ifindex && args->use_cmsg) {
1036 		if (send_msg_cmsg(sd, addr, alen, args->ifindex, args->version))
1037 			return 1;
1038 	} else {
1039 		if (send_msg_no_cmsg(sd, addr, alen))
1040 			return 1;
1041 	}
1042 
1043 	log_msg("Sent message:\n");
1044 	log_msg("    %.24s%s\n", msg, msglen > 24 ? " ..." : "");
1045 
1046 	return 0;
1047 }
1048 
1049 static int socket_read_dgram(int sd, struct sock_args *args)
1050 {
1051 	unsigned char addr[sizeof(struct sockaddr_in6)];
1052 	struct sockaddr *sa = (struct sockaddr *) addr;
1053 	socklen_t alen = sizeof(addr);
1054 	struct iovec iov[2];
1055 	struct msghdr m = {
1056 		.msg_name = (caddr_t)addr,
1057 		.msg_namelen = alen,
1058 		.msg_iov = iov,
1059 		.msg_iovlen = 1,
1060 	};
1061 	unsigned char cmsgbuf[256];
1062 	struct cmsghdr *cm = (struct cmsghdr *)cmsgbuf;
1063 	char buf[16*1024];
1064 	int ifindex;
1065 	int len;
1066 
1067 	iov[0].iov_base = (caddr_t)buf;
1068 	iov[0].iov_len = sizeof(buf);
1069 
1070 	memset(cmsgbuf, 0, sizeof(cmsgbuf));
1071 	m.msg_control = (caddr_t)cm;
1072 	m.msg_controllen = sizeof(cmsgbuf);
1073 
1074 	len = recvmsg(sd, &m, 0);
1075 	if (len == 0) {
1076 		log_msg("peer closed connection.\n");
1077 		return 0;
1078 	} else if (len < 0) {
1079 		log_msg("failed to read message: %d: %s\n",
1080 			errno, strerror(errno));
1081 		return -1;
1082 	}
1083 
1084 	buf[len] = '\0';
1085 
1086 	log_address("Message from:", sa);
1087 	log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
1088 
1089 	ifindex = get_index_from_cmsg(&m);
1090 	if (args->expected_ifindex) {
1091 		if (args->expected_ifindex != ifindex) {
1092 			log_error("Device index mismatch: expected %d have %d\n",
1093 				  args->expected_ifindex, ifindex);
1094 			return -1;
1095 		}
1096 		log_msg("Device index matches: expected %d have %d\n",
1097 			args->expected_ifindex, ifindex);
1098 	}
1099 
1100 	if (!interactive && server_mode) {
1101 		if (sa->sa_family == AF_INET6) {
1102 			struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
1103 			struct in6_addr *in6 = &s6->sin6_addr;
1104 
1105 			if (IN6_IS_ADDR_V4MAPPED(in6)) {
1106 				const uint32_t *pa = (uint32_t *) &in6->s6_addr;
1107 				struct in_addr in4;
1108 				struct sockaddr_in *sin;
1109 
1110 				sin = (struct sockaddr_in *) addr;
1111 				pa += 3;
1112 				in4.s_addr = *pa;
1113 				sin->sin_addr = in4;
1114 				sin->sin_family = AF_INET;
1115 				if (send_msg_cmsg(sd, addr, alen,
1116 						  ifindex, AF_INET) < 0)
1117 					goto out_err;
1118 			}
1119 		}
1120 again:
1121 		iov[0].iov_len = len;
1122 
1123 		if (args->version == AF_INET6) {
1124 			struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
1125 
1126 			if (args->dev) {
1127 				/* avoid PKTINFO conflicts with bindtodev */
1128 				if (sendto(sd, buf, len, 0,
1129 					   (void *) addr, alen) < 0)
1130 					goto out_err;
1131 			} else {
1132 				/* kernel is allowing scope_id to be set to VRF
1133 				 * index for LLA. for sends to global address
1134 				 * reset scope id
1135 				 */
1136 				s6->sin6_scope_id = ifindex;
1137 				if (sendmsg(sd, &m, 0) < 0)
1138 					goto out_err;
1139 			}
1140 		} else {
1141 			int err;
1142 
1143 			err = sendmsg(sd, &m, 0);
1144 			if (err < 0) {
1145 				if (errno == EACCES && try_broadcast) {
1146 					try_broadcast = 0;
1147 					if (!set_broadcast(sd))
1148 						goto again;
1149 					errno = EACCES;
1150 				}
1151 				goto out_err;
1152 			}
1153 		}
1154 		log_msg("Sent message:\n");
1155 		log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
1156 	}
1157 
1158 	return 1;
1159 out_err:
1160 	log_err_errno("failed to send msg to peer");
1161 	return -1;
1162 }
1163 
1164 static int socket_read_stream(int sd)
1165 {
1166 	char buf[1024];
1167 	int len;
1168 
1169 	len = read(sd, buf, sizeof(buf)-1);
1170 	if (len == 0) {
1171 		log_msg("client closed connection.\n");
1172 		return 0;
1173 	} else if (len < 0) {
1174 		log_msg("failed to read message\n");
1175 		return -1;
1176 	}
1177 
1178 	buf[len] = '\0';
1179 	log_msg("Incoming message:\n");
1180 	log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
1181 
1182 	if (!interactive && server_mode) {
1183 		if (write(sd, buf, len) < 0) {
1184 			log_err_errno("failed to send buf");
1185 			return -1;
1186 		}
1187 		log_msg("Sent message:\n");
1188 		log_msg("     %.24s%s\n", buf, len > 24 ? " ..." : "");
1189 	}
1190 
1191 	return 1;
1192 }
1193 
1194 static int socket_read(int sd, struct sock_args *args)
1195 {
1196 	if (args->type == SOCK_STREAM)
1197 		return socket_read_stream(sd);
1198 
1199 	return socket_read_dgram(sd, args);
1200 }
1201 
1202 static int stdin_to_socket(int sd, int type, void *addr, socklen_t alen)
1203 {
1204 	char buf[1024];
1205 	int len;
1206 
1207 	if (fgets(buf, sizeof(buf), stdin) == NULL)
1208 		return 0;
1209 
1210 	len = strlen(buf);
1211 	if (type == SOCK_STREAM) {
1212 		if (write(sd, buf, len) < 0) {
1213 			log_err_errno("failed to send buf");
1214 			return -1;
1215 		}
1216 	} else {
1217 		int err;
1218 
1219 again:
1220 		err = sendto(sd, buf, len, 0, addr, alen);
1221 		if (err < 0) {
1222 			if (errno == EACCES && try_broadcast) {
1223 				try_broadcast = 0;
1224 				if (!set_broadcast(sd))
1225 					goto again;
1226 				errno = EACCES;
1227 			}
1228 			log_err_errno("failed to send msg to peer");
1229 			return -1;
1230 		}
1231 	}
1232 	log_msg("Sent message:\n");
1233 	log_msg("    %.24s%s\n", buf, len > 24 ? " ..." : "");
1234 
1235 	return 1;
1236 }
1237 
1238 static void set_recv_attr(int sd, int version)
1239 {
1240 	if (version == AF_INET6) {
1241 		set_recvpktinfo_v6(sd);
1242 		set_recverr_v6(sd);
1243 	} else {
1244 		set_pktinfo_v4(sd);
1245 		set_recverr_v4(sd);
1246 	}
1247 }
1248 
1249 static int msg_loop(int client, int sd, void *addr, socklen_t alen,
1250 		    struct sock_args *args)
1251 {
1252 	struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
1253 	fd_set rfds;
1254 	int nfds;
1255 	int rc;
1256 
1257 	if (args->type != SOCK_STREAM)
1258 		set_recv_attr(sd, args->version);
1259 
1260 	if (msg) {
1261 		msglen = strlen(msg);
1262 
1263 		/* client sends first message */
1264 		if (client) {
1265 			if (send_msg(sd, addr, alen, args))
1266 				return 1;
1267 		}
1268 		if (!interactive) {
1269 			ptval = &timeout;
1270 			if (!prog_timeout)
1271 				timeout.tv_sec = 5;
1272 		}
1273 	}
1274 
1275 	nfds = interactive ? MAX(fileno(stdin), sd)  + 1 : sd + 1;
1276 	while (1) {
1277 		FD_ZERO(&rfds);
1278 		FD_SET(sd, &rfds);
1279 		if (interactive)
1280 			FD_SET(fileno(stdin), &rfds);
1281 
1282 		rc = select(nfds, &rfds, NULL, NULL, ptval);
1283 		if (rc < 0) {
1284 			if (errno == EINTR)
1285 				continue;
1286 
1287 			rc = 1;
1288 			log_err_errno("select failed");
1289 			break;
1290 		} else if (rc == 0) {
1291 			log_error("Timed out waiting for response\n");
1292 			rc = 2;
1293 			break;
1294 		}
1295 
1296 		if (FD_ISSET(sd, &rfds)) {
1297 			rc = socket_read(sd, args);
1298 			if (rc < 0) {
1299 				rc = 1;
1300 				break;
1301 			}
1302 			if (rc == 0)
1303 				break;
1304 		}
1305 
1306 		rc = 0;
1307 
1308 		if (FD_ISSET(fileno(stdin), &rfds)) {
1309 			if (stdin_to_socket(sd, args->type, addr, alen) <= 0)
1310 				break;
1311 		}
1312 
1313 		if (interactive)
1314 			continue;
1315 
1316 		if (iter != -1) {
1317 			--iter;
1318 			if (iter == 0)
1319 				break;
1320 		}
1321 
1322 		log_msg("Going into quiet mode\n");
1323 		quiet = 1;
1324 
1325 		if (client) {
1326 			if (send_msg(sd, addr, alen, args)) {
1327 				rc = 1;
1328 				break;
1329 			}
1330 		}
1331 	}
1332 
1333 	return rc;
1334 }
1335 
1336 static int msock_init(struct sock_args *args, int server)
1337 {
1338 	uint32_t if_addr = htonl(INADDR_ANY);
1339 	struct sockaddr_in laddr = {
1340 		.sin_family = AF_INET,
1341 		.sin_port = htons(args->port),
1342 	};
1343 	int one = 1;
1344 	int sd;
1345 
1346 	if (!server && args->has_local_ip)
1347 		if_addr = args->local_addr.in.s_addr;
1348 
1349 	sd = socket(PF_INET, SOCK_DGRAM, 0);
1350 	if (sd < 0) {
1351 		log_err_errno("socket");
1352 		return -1;
1353 	}
1354 
1355 	if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR,
1356 		       (char *)&one, sizeof(one)) < 0) {
1357 		log_err_errno("Setting SO_REUSEADDR error");
1358 		goto out_err;
1359 	}
1360 
1361 	if (setsockopt(sd, SOL_SOCKET, SO_BROADCAST,
1362 		       (char *)&one, sizeof(one)) < 0)
1363 		log_err_errno("Setting SO_BROADCAST error");
1364 
1365 	if (set_dsfield(sd, AF_INET, args->dsfield) != 0)
1366 		goto out_err;
1367 
1368 	if (server) {
1369 		if (args->server_dontroute && set_dontroute(sd) != 0)
1370 			goto out_err;
1371 	} else {
1372 		if (args->client_dontroute && set_dontroute(sd) != 0)
1373 			goto out_err;
1374 	}
1375 
1376 	if (args->dev && bind_to_device(sd, args->dev) != 0)
1377 		goto out_err;
1378 	else if (args->use_setsockopt &&
1379 		 set_multicast_if(sd, args->ifindex))
1380 		goto out_err;
1381 
1382 	laddr.sin_addr.s_addr = if_addr;
1383 
1384 	if (bind(sd, (struct sockaddr *) &laddr, sizeof(laddr)) < 0) {
1385 		log_err_errno("bind failed");
1386 		goto out_err;
1387 	}
1388 
1389 	if (server &&
1390 	    set_membership(sd, args->grp.s_addr,
1391 			   args->local_addr.in.s_addr, args->ifindex))
1392 		goto out_err;
1393 
1394 	return sd;
1395 out_err:
1396 	close(sd);
1397 	return -1;
1398 }
1399 
1400 static int msock_server(struct sock_args *args)
1401 {
1402 	return msock_init(args, 1);
1403 }
1404 
1405 static int msock_client(struct sock_args *args)
1406 {
1407 	return msock_init(args, 0);
1408 }
1409 
1410 static int bind_socket(int sd, struct sock_args *args)
1411 {
1412 	struct sockaddr_in serv_addr = {
1413 		.sin_family = AF_INET,
1414 	};
1415 	struct sockaddr_in6 serv6_addr = {
1416 		.sin6_family = AF_INET6,
1417 	};
1418 	void *addr;
1419 	socklen_t alen;
1420 
1421 	if (!args->has_local_ip && args->type == SOCK_RAW)
1422 		return 0;
1423 
1424 	switch (args->version) {
1425 	case AF_INET:
1426 		serv_addr.sin_port = htons(args->port);
1427 		serv_addr.sin_addr = args->local_addr.in;
1428 		addr = &serv_addr;
1429 		alen = sizeof(serv_addr);
1430 		break;
1431 
1432 	case AF_INET6:
1433 		serv6_addr.sin6_port = htons(args->port);
1434 		serv6_addr.sin6_addr = args->local_addr.in6;
1435 		addr = &serv6_addr;
1436 		alen = sizeof(serv6_addr);
1437 		break;
1438 
1439 	default:
1440 		log_error("Invalid address family\n");
1441 		return -1;
1442 	}
1443 
1444 	if (bind(sd, addr, alen) < 0) {
1445 		log_err_errno("error binding socket");
1446 		return -1;
1447 	}
1448 
1449 	return 0;
1450 }
1451 
1452 static int config_xfrm_policy(int sd, struct sock_args *args)
1453 {
1454 	struct xfrm_userpolicy_info policy = {};
1455 	int type = UDP_ENCAP_ESPINUDP;
1456 	int xfrm_af = IP_XFRM_POLICY;
1457 	int level = SOL_IP;
1458 
1459 	if (args->type != SOCK_DGRAM) {
1460 		log_error("Invalid socket type. Only DGRAM could be used for XFRM\n");
1461 		return 1;
1462 	}
1463 
1464 	policy.action = XFRM_POLICY_ALLOW;
1465 	policy.sel.family = args->version;
1466 	if (args->version == AF_INET6) {
1467 		xfrm_af = IPV6_XFRM_POLICY;
1468 		level = SOL_IPV6;
1469 	}
1470 
1471 	policy.dir = XFRM_POLICY_OUT;
1472 	if (setsockopt(sd, level, xfrm_af, &policy, sizeof(policy)) < 0)
1473 		return 1;
1474 
1475 	policy.dir = XFRM_POLICY_IN;
1476 	if (setsockopt(sd, level, xfrm_af, &policy, sizeof(policy)) < 0)
1477 		return 1;
1478 
1479 	if (setsockopt(sd, IPPROTO_UDP, UDP_ENCAP, &type, sizeof(type)) < 0) {
1480 		log_err_errno("Failed to set xfrm encap");
1481 		return 1;
1482 	}
1483 
1484 	return 0;
1485 }
1486 
1487 static int lsock_init(struct sock_args *args)
1488 {
1489 	long flags;
1490 	int sd;
1491 
1492 	sd = socket(args->version, args->type, args->protocol);
1493 	if (sd < 0) {
1494 		log_err_errno("Error opening socket");
1495 		return  -1;
1496 	}
1497 
1498 	if (set_reuseaddr(sd) != 0)
1499 		goto err;
1500 
1501 	if (set_reuseport(sd) != 0)
1502 		goto err;
1503 
1504 	if (set_dsfield(sd, args->version, args->dsfield) != 0)
1505 		goto err;
1506 
1507 	if (args->server_dontroute && set_dontroute(sd) != 0)
1508 		goto err;
1509 
1510 	if (args->dev && bind_to_device(sd, args->dev) != 0)
1511 		goto err;
1512 	else if (args->use_setsockopt &&
1513 		 set_unicast_if(sd, args->ifindex, args->version))
1514 		goto err;
1515 
1516 	if (args->use_freebind && set_freebind(sd, args->version))
1517 		goto err;
1518 
1519 	if (bind_socket(sd, args))
1520 		goto err;
1521 
1522 	if (args->bind_test_only)
1523 		goto out;
1524 
1525 	if (args->type == SOCK_STREAM && listen(sd, 1) < 0) {
1526 		log_err_errno("listen failed");
1527 		goto err;
1528 	}
1529 
1530 	flags = fcntl(sd, F_GETFL);
1531 	if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
1532 		log_err_errno("Failed to set non-blocking option");
1533 		goto err;
1534 	}
1535 
1536 	if (fcntl(sd, F_SETFD, FD_CLOEXEC) < 0)
1537 		log_err_errno("Failed to set close-on-exec flag");
1538 
1539 	if (args->use_xfrm && config_xfrm_policy(sd, args)) {
1540 		log_err_errno("Failed to set xfrm policy");
1541 		goto err;
1542 	}
1543 
1544 out:
1545 	return sd;
1546 
1547 err:
1548 	close(sd);
1549 	return -1;
1550 }
1551 
1552 static void ipc_write(int fd, int message)
1553 {
1554 	/* Not in both_mode, so there's no process to signal */
1555 	if (fd < 0)
1556 		return;
1557 
1558 	if (write(fd, &message, sizeof(message)) < 0)
1559 		log_err_errno("Failed to send client status");
1560 }
1561 
1562 static int do_server(struct sock_args *args, int ipc_fd)
1563 {
1564 	/* ipc_fd = -1 if no parent process to signal */
1565 	struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
1566 	unsigned char addr[sizeof(struct sockaddr_in6)] = {};
1567 	socklen_t alen = sizeof(addr);
1568 	int lsd, csd = -1;
1569 
1570 	fd_set rfds;
1571 	int rc;
1572 
1573 	if (args->serverns) {
1574 		if (switch_ns(args->serverns)) {
1575 			log_error("Could not set server netns to %s\n",
1576 				  args->serverns);
1577 			goto err_exit;
1578 		}
1579 		log_msg("Switched server netns\n");
1580 	}
1581 
1582 	args->dev = args->server_dev;
1583 	args->expected_dev = args->expected_server_dev;
1584 	if (resolve_devices(args) || validate_addresses(args))
1585 		goto err_exit;
1586 
1587 	if (prog_timeout)
1588 		ptval = &timeout;
1589 
1590 	if (args->has_grp)
1591 		lsd = msock_server(args);
1592 	else
1593 		lsd = lsock_init(args);
1594 
1595 	if (lsd < 0)
1596 		goto err_exit;
1597 
1598 	if (args->bind_test_only) {
1599 		close(lsd);
1600 		ipc_write(ipc_fd, 1);
1601 		return 0;
1602 	}
1603 
1604 	if (args->type != SOCK_STREAM) {
1605 		ipc_write(ipc_fd, 1);
1606 		rc = msg_loop(0, lsd, (void *) addr, alen, args);
1607 		close(lsd);
1608 		return rc;
1609 	}
1610 
1611 	if (args->password && tcp_md5_remote(lsd, args)) {
1612 		close(lsd);
1613 		goto err_exit;
1614 	}
1615 
1616 	ipc_write(ipc_fd, 1);
1617 	while (1) {
1618 		log_msg("waiting for client connection.\n");
1619 		FD_ZERO(&rfds);
1620 		FD_SET(lsd, &rfds);
1621 
1622 		rc = select(lsd+1, &rfds, NULL, NULL, ptval);
1623 		if (rc == 0) {
1624 			rc = 2;
1625 			break;
1626 		}
1627 
1628 		if (rc < 0) {
1629 			if (errno == EINTR)
1630 				continue;
1631 
1632 			log_err_errno("select failed");
1633 			break;
1634 		}
1635 
1636 		if (FD_ISSET(lsd, &rfds)) {
1637 
1638 			csd = accept(lsd, (void *) addr, &alen);
1639 			if (csd < 0) {
1640 				log_err_errno("accept failed");
1641 				break;
1642 			}
1643 
1644 			rc = show_sockstat(csd, args);
1645 			if (rc)
1646 				break;
1647 
1648 			rc = check_device(csd, args);
1649 			if (rc)
1650 				break;
1651 		}
1652 
1653 		rc = msg_loop(0, csd, (void *) addr, alen, args);
1654 		close(csd);
1655 
1656 		if (!interactive)
1657 			break;
1658 	}
1659 
1660 	close(lsd);
1661 
1662 	return rc;
1663 err_exit:
1664 	ipc_write(ipc_fd, 0);
1665 	return 1;
1666 }
1667 
1668 static int wait_for_connect(int sd)
1669 {
1670 	struct timeval _tv = { .tv_sec = prog_timeout }, *tv = NULL;
1671 	fd_set wfd;
1672 	int val = 0, sz = sizeof(val);
1673 	int rc;
1674 
1675 	FD_ZERO(&wfd);
1676 	FD_SET(sd, &wfd);
1677 
1678 	if (prog_timeout)
1679 		tv = &_tv;
1680 
1681 	rc = select(FD_SETSIZE, NULL, &wfd, NULL, tv);
1682 	if (rc == 0) {
1683 		log_error("connect timed out\n");
1684 		return -2;
1685 	} else if (rc < 0) {
1686 		log_err_errno("select failed");
1687 		return -3;
1688 	}
1689 
1690 	if (getsockopt(sd, SOL_SOCKET, SO_ERROR, &val, (socklen_t *)&sz) < 0) {
1691 		log_err_errno("getsockopt(SO_ERROR) failed");
1692 		return -4;
1693 	}
1694 
1695 	if (val != 0) {
1696 		log_error("connect failed: %d: %s\n", val, strerror(val));
1697 		return -1;
1698 	}
1699 
1700 	return 0;
1701 }
1702 
1703 static int connectsock(void *addr, socklen_t alen, struct sock_args *args)
1704 {
1705 	int sd, rc = -1;
1706 	long flags;
1707 
1708 	sd = socket(args->version, args->type, args->protocol);
1709 	if (sd < 0) {
1710 		log_err_errno("Failed to create socket");
1711 		return -1;
1712 	}
1713 
1714 	flags = fcntl(sd, F_GETFL);
1715 	if ((flags < 0) || (fcntl(sd, F_SETFL, flags|O_NONBLOCK) < 0)) {
1716 		log_err_errno("Failed to set non-blocking option");
1717 		goto err;
1718 	}
1719 
1720 	if (set_reuseport(sd) != 0)
1721 		goto err;
1722 
1723 	if (set_dsfield(sd, args->version, args->dsfield) != 0)
1724 		goto err;
1725 
1726 	if (args->client_dontroute && set_dontroute(sd) != 0)
1727 		goto err;
1728 
1729 	if (args->dev && bind_to_device(sd, args->dev) != 0)
1730 		goto err;
1731 	else if (args->use_setsockopt &&
1732 		 set_unicast_if(sd, args->ifindex, args->version))
1733 		goto err;
1734 
1735 	if (args->has_local_ip && bind_socket(sd, args))
1736 		goto err;
1737 
1738 	if (args->type != SOCK_STREAM && !args->datagram_connect)
1739 		goto out;
1740 
1741 	if (args->password && tcp_md5sig(sd, addr, alen, args))
1742 		goto err;
1743 
1744 	if (args->bind_test_only)
1745 		goto out;
1746 
1747 	if (connect(sd, addr, alen) < 0) {
1748 		if (errno != EINPROGRESS) {
1749 			log_err_errno("Failed to connect to remote host");
1750 			rc = -1;
1751 			goto err;
1752 		}
1753 		rc = wait_for_connect(sd);
1754 		if (rc < 0)
1755 			goto err;
1756 	}
1757 out:
1758 	return sd;
1759 
1760 err:
1761 	close(sd);
1762 	return rc;
1763 }
1764 
1765 static int do_client(struct sock_args *args)
1766 {
1767 	struct sockaddr_in sin = {
1768 		.sin_family = AF_INET,
1769 	};
1770 	struct sockaddr_in6 sin6 = {
1771 		.sin6_family = AF_INET6,
1772 	};
1773 	void *addr;
1774 	int alen;
1775 	int rc = 0;
1776 	int sd;
1777 
1778 	if (!args->has_remote_ip && !args->has_grp) {
1779 		fprintf(stderr, "remote IP or multicast group not given\n");
1780 		return 1;
1781 	}
1782 
1783 	if (args->clientns) {
1784 		if (switch_ns(args->clientns)) {
1785 			log_error("Could not set client netns to %s\n",
1786 				  args->clientns);
1787 			return 1;
1788 		}
1789 		log_msg("Switched client netns\n");
1790 	}
1791 
1792 	args->local_addr_str = args->client_local_addr_str;
1793 	if (resolve_devices(args) || validate_addresses(args))
1794 		return 1;
1795 
1796 	if ((args->use_setsockopt || args->use_cmsg) && !args->ifindex) {
1797 		fprintf(stderr, "Device binding not specified\n");
1798 		return 1;
1799 	}
1800 	if (args->use_setsockopt || args->use_cmsg)
1801 		args->dev = NULL;
1802 
1803 	switch (args->version) {
1804 	case AF_INET:
1805 		sin.sin_port = htons(args->port);
1806 		if (args->has_grp)
1807 			sin.sin_addr = args->grp;
1808 		else
1809 			sin.sin_addr = args->remote_addr.in;
1810 		addr = &sin;
1811 		alen = sizeof(sin);
1812 		break;
1813 	case AF_INET6:
1814 		sin6.sin6_port = htons(args->port);
1815 		sin6.sin6_addr = args->remote_addr.in6;
1816 		sin6.sin6_scope_id = args->scope_id;
1817 		addr = &sin6;
1818 		alen = sizeof(sin6);
1819 		break;
1820 	}
1821 
1822 	args->password = args->client_pw;
1823 
1824 	if (args->has_grp)
1825 		sd = msock_client(args);
1826 	else
1827 		sd = connectsock(addr, alen, args);
1828 
1829 	if (sd < 0)
1830 		return -sd;
1831 
1832 	if (args->bind_test_only)
1833 		goto out;
1834 
1835 	if (args->type == SOCK_STREAM) {
1836 		rc = show_sockstat(sd, args);
1837 		if (rc != 0)
1838 			goto out;
1839 	}
1840 
1841 	rc = msg_loop(1, sd, addr, alen, args);
1842 
1843 out:
1844 	close(sd);
1845 
1846 	return rc;
1847 }
1848 
1849 static char *random_msg(int len)
1850 {
1851 	int i, n = 0, olen = len + 1;
1852 	char *m;
1853 
1854 	if (len <= 0)
1855 		return NULL;
1856 
1857 	m = malloc(olen);
1858 	if (!m)
1859 		return NULL;
1860 
1861 	while (len > 26) {
1862 		i = snprintf(m + n, olen - n, "%.26s",
1863 			     "abcdefghijklmnopqrstuvwxyz");
1864 		n += i;
1865 		len -= i;
1866 	}
1867 	i = snprintf(m + n, olen - n, "%.*s", len,
1868 		     "abcdefghijklmnopqrstuvwxyz");
1869 	return m;
1870 }
1871 
1872 static int ipc_child(int fd, struct sock_args *args)
1873 {
1874 	char *outbuf, *errbuf;
1875 	int rc = 1;
1876 
1877 	outbuf = malloc(4096);
1878 	errbuf = malloc(4096);
1879 	if (!outbuf || !errbuf) {
1880 		fprintf(stderr, "server: Failed to allocate buffers for stdout and stderr\n");
1881 		goto out;
1882 	}
1883 
1884 	setbuffer(stdout, outbuf, 4096);
1885 	setbuffer(stderr, errbuf, 4096);
1886 
1887 	server_mode = 1; /* to tell log_msg in case we are in both_mode */
1888 
1889 	/* when running in both mode, address validation applies
1890 	 * solely to client side
1891 	 */
1892 	args->has_expected_laddr = 0;
1893 	args->has_expected_raddr = 0;
1894 
1895 	rc = do_server(args, fd);
1896 
1897 out:
1898 	free(outbuf);
1899 	free(errbuf);
1900 
1901 	return rc;
1902 }
1903 
1904 static int ipc_parent(int cpid, int fd, struct sock_args *args)
1905 {
1906 	int client_status;
1907 	int status;
1908 	int buf;
1909 
1910 	/* do the client-side function here in the parent process,
1911 	 * waiting to be told when to continue
1912 	 */
1913 	if (read(fd, &buf, sizeof(buf)) <= 0) {
1914 		log_err_errno("Failed to read IPC status from status");
1915 		return 1;
1916 	}
1917 	if (!buf) {
1918 		log_error("Server failed; can not continue\n");
1919 		return 1;
1920 	}
1921 	log_msg("Server is ready\n");
1922 
1923 	client_status = do_client(args);
1924 	log_msg("parent is done!\n");
1925 
1926 	if (kill(cpid, 0) == 0)
1927 		kill(cpid, SIGKILL);
1928 
1929 	wait(&status);
1930 	return client_status;
1931 }
1932 
1933 #define GETOPT_STR  "sr:l:c:Q:p:t:g:P:DRn:M:X:m:d:I:BN:O:SUCi6xL:0:1:2:3:Fbqf"
1934 #define OPT_FORCE_BIND_KEY_IFINDEX 1001
1935 #define OPT_NO_BIND_KEY_IFINDEX 1002
1936 #define OPT_CLIENT_DONTROUTE 1003
1937 #define OPT_SERVER_DONTROUTE 1004
1938 
1939 static struct option long_opts[] = {
1940 	{"force-bind-key-ifindex", 0, 0, OPT_FORCE_BIND_KEY_IFINDEX},
1941 	{"no-bind-key-ifindex", 0, 0, OPT_NO_BIND_KEY_IFINDEX},
1942 	{"client-dontroute", 0, 0, OPT_CLIENT_DONTROUTE},
1943 	{"server-dontroute", 0, 0, OPT_SERVER_DONTROUTE},
1944 	{0, 0, 0, 0}
1945 };
1946 
1947 static void print_usage(char *prog)
1948 {
1949 	printf(
1950 	"usage: %s OPTS\n"
1951 	"Required:\n"
1952 	"    -r addr       remote address to connect to (client mode only)\n"
1953 	"    -p port       port to connect to (client mode)/listen on (server mode)\n"
1954 	"                  (default: %d)\n"
1955 	"    -s            server mode (default: client mode)\n"
1956 	"    -t            timeout seconds (default: none)\n"
1957 	"\n"
1958 	"Optional:\n"
1959 	"    -B            do both client and server via fork and IPC\n"
1960 	"    -N ns         set client to network namespace ns (requires root)\n"
1961 	"    -O ns         set server to network namespace ns (requires root)\n"
1962 	"    -F            Restart server loop\n"
1963 	"    -6            IPv6 (default is IPv4)\n"
1964 	"    -P proto      protocol for socket: icmp, ospf (default: none)\n"
1965 	"    -D|R          datagram (D) / raw (R) socket (default stream)\n"
1966 	"    -l addr       local address to bind to in server mode\n"
1967 	"    -c addr       local address to bind to in client mode\n"
1968 	"    -Q dsfield    DS Field value of the socket (the IP_TOS or\n"
1969 	"                  IPV6_TCLASS socket option)\n"
1970 	"    -x            configure XFRM policy on socket\n"
1971 	"\n"
1972 	"    -d dev        bind socket to given device name\n"
1973 	"    -I dev        bind socket to given device name - server mode\n"
1974 	"    -S            use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n"
1975 	"                  to set device binding\n"
1976 	"    -U            Use connect() and send() for datagram sockets\n"
1977 	"    -f            bind socket with the IP[V6]_FREEBIND option\n"
1978 	"    -C            use cmsg and IP_PKTINFO to specify device binding\n"
1979 	"\n"
1980 	"    -L len        send random message of given length\n"
1981 	"    -n num        number of times to send message\n"
1982 	"\n"
1983 	"    -M password   use MD5 sum protection\n"
1984 	"    -X password   MD5 password for client mode\n"
1985 	"    -m prefix/len prefix and length to use for MD5 key\n"
1986 	"    --no-bind-key-ifindex: Force TCP_MD5SIG_FLAG_IFINDEX off\n"
1987 	"    --force-bind-key-ifindex: Force TCP_MD5SIG_FLAG_IFINDEX on\n"
1988 	"        (default: only if -I is passed)\n"
1989 	"    --client-dontroute: don't use gateways for client socket: send\n"
1990 	"                        packets only if destination is on link (see\n"
1991 	"                        SO_DONTROUTE in socket(7))\n"
1992 	"    --server-dontroute: don't use gateways for server socket: send\n"
1993 	"                        packets only if destination is on link (see\n"
1994 	"                        SO_DONTROUTE in socket(7))\n"
1995 	"\n"
1996 	"    -g grp        multicast group (e.g., 239.1.1.1)\n"
1997 	"    -i            interactive mode (default is echo and terminate)\n"
1998 	"\n"
1999 	"    -0 addr       Expected local address\n"
2000 	"    -1 addr       Expected remote address\n"
2001 	"    -2 dev        Expected device name (or index) to receive packet\n"
2002 	"    -3 dev        Expected device name (or index) to receive packets - server mode\n"
2003 	"\n"
2004 	"    -b            Bind test only.\n"
2005 	"    -q            Be quiet. Run test without printing anything.\n"
2006 	, prog, DEFAULT_PORT);
2007 }
2008 
2009 int main(int argc, char *argv[])
2010 {
2011 	struct sock_args args = {
2012 		.version = AF_INET,
2013 		.type    = SOCK_STREAM,
2014 		.port    = DEFAULT_PORT,
2015 	};
2016 	struct protoent *pe;
2017 	int both_mode = 0;
2018 	unsigned int tmp;
2019 	int forever = 0;
2020 	int fd[2];
2021 	int cpid;
2022 
2023 	/* process inputs */
2024 	extern char *optarg;
2025 	int rc = 0;
2026 
2027 	/*
2028 	 * process input args
2029 	 */
2030 
2031 	while ((rc = getopt_long(argc, argv, GETOPT_STR, long_opts, NULL)) != -1) {
2032 		switch (rc) {
2033 		case 'B':
2034 			both_mode = 1;
2035 			break;
2036 		case 's':
2037 			server_mode = 1;
2038 			break;
2039 		case 'F':
2040 			forever = 1;
2041 			break;
2042 		case 'l':
2043 			args.has_local_ip = 1;
2044 			args.local_addr_str = optarg;
2045 			break;
2046 		case 'r':
2047 			args.has_remote_ip = 1;
2048 			args.remote_addr_str = optarg;
2049 			break;
2050 		case 'c':
2051 			args.has_local_ip = 1;
2052 			args.client_local_addr_str = optarg;
2053 			break;
2054 		case 'Q':
2055 			if (str_to_uint(optarg, 0, 255, &tmp) != 0) {
2056 				fprintf(stderr, "Invalid DS Field\n");
2057 				return 1;
2058 			}
2059 			args.dsfield = tmp;
2060 			break;
2061 		case 'p':
2062 			if (str_to_uint(optarg, 1, 65535, &tmp) != 0) {
2063 				fprintf(stderr, "Invalid port\n");
2064 				return 1;
2065 			}
2066 			args.port = (unsigned short) tmp;
2067 			break;
2068 		case 't':
2069 			if (str_to_uint(optarg, 0, INT_MAX,
2070 					&prog_timeout) != 0) {
2071 				fprintf(stderr, "Invalid timeout\n");
2072 				return 1;
2073 			}
2074 			break;
2075 		case 'D':
2076 			args.type = SOCK_DGRAM;
2077 			break;
2078 		case 'R':
2079 			args.type = SOCK_RAW;
2080 			args.port = 0;
2081 			if (!args.protocol)
2082 				args.protocol = IPPROTO_RAW;
2083 			break;
2084 		case 'P':
2085 			pe = getprotobyname(optarg);
2086 			if (pe) {
2087 				args.protocol = pe->p_proto;
2088 			} else {
2089 				if (str_to_uint(optarg, 0, 0xffff, &tmp) != 0) {
2090 					fprintf(stderr, "Invalid protocol\n");
2091 					return 1;
2092 				}
2093 				args.protocol = tmp;
2094 			}
2095 			break;
2096 		case 'n':
2097 			iter = atoi(optarg);
2098 			break;
2099 		case 'N':
2100 			args.clientns = optarg;
2101 			break;
2102 		case 'O':
2103 			args.serverns = optarg;
2104 			break;
2105 		case 'L':
2106 			msg = random_msg(atoi(optarg));
2107 			break;
2108 		case 'M':
2109 			args.password = optarg;
2110 			break;
2111 		case OPT_FORCE_BIND_KEY_IFINDEX:
2112 			args.bind_key_ifindex = 1;
2113 			break;
2114 		case OPT_NO_BIND_KEY_IFINDEX:
2115 			args.bind_key_ifindex = -1;
2116 			break;
2117 		case OPT_CLIENT_DONTROUTE:
2118 			args.client_dontroute = 1;
2119 			break;
2120 		case OPT_SERVER_DONTROUTE:
2121 			args.server_dontroute = 1;
2122 			break;
2123 		case 'X':
2124 			args.client_pw = optarg;
2125 			break;
2126 		case 'm':
2127 			args.md5_prefix_str = optarg;
2128 			break;
2129 		case 'S':
2130 			args.use_setsockopt = 1;
2131 			break;
2132 		case 'f':
2133 			args.use_freebind = 1;
2134 			break;
2135 		case 'C':
2136 			args.use_cmsg = 1;
2137 			break;
2138 		case 'd':
2139 			args.dev = optarg;
2140 			break;
2141 		case 'I':
2142 			args.server_dev = optarg;
2143 			break;
2144 		case 'i':
2145 			interactive = 1;
2146 			break;
2147 		case 'g':
2148 			args.has_grp = 1;
2149 			if (convert_addr(&args, optarg, ADDR_TYPE_MCAST) < 0)
2150 				return 1;
2151 			args.type = SOCK_DGRAM;
2152 			break;
2153 		case '6':
2154 			args.version = AF_INET6;
2155 			break;
2156 		case 'b':
2157 			args.bind_test_only = 1;
2158 			break;
2159 		case '0':
2160 			args.has_expected_laddr = 1;
2161 			args.expected_laddr_str = optarg;
2162 			break;
2163 		case '1':
2164 			args.has_expected_raddr = 1;
2165 			args.expected_raddr_str = optarg;
2166 			break;
2167 		case '2':
2168 			args.expected_dev = optarg;
2169 			break;
2170 		case '3':
2171 			args.expected_server_dev = optarg;
2172 			break;
2173 		case 'q':
2174 			quiet = 1;
2175 			break;
2176 		case 'x':
2177 			args.use_xfrm = 1;
2178 			break;
2179 		case 'U':
2180 			args.datagram_connect = 1;
2181 			break;
2182 		default:
2183 			print_usage(argv[0]);
2184 			return 1;
2185 		}
2186 	}
2187 
2188 	if (args.password &&
2189 	    ((!args.has_remote_ip && !args.md5_prefix_str) ||
2190 	      args.type != SOCK_STREAM)) {
2191 		log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n");
2192 		return 1;
2193 	}
2194 
2195 	if (args.md5_prefix_str && !args.password) {
2196 		log_error("Prefix range for MD5 protection specified without a password\n");
2197 		return 1;
2198 	}
2199 
2200 	if (iter == 0) {
2201 		fprintf(stderr, "Invalid number of messages to send\n");
2202 		return 1;
2203 	}
2204 
2205 	if (args.type == SOCK_STREAM && !args.protocol)
2206 		args.protocol = IPPROTO_TCP;
2207 	if (args.type == SOCK_DGRAM && !args.protocol)
2208 		args.protocol = IPPROTO_UDP;
2209 
2210 	if ((args.type == SOCK_STREAM || args.type == SOCK_DGRAM) &&
2211 	     args.port == 0) {
2212 		fprintf(stderr, "Invalid port number\n");
2213 		return 1;
2214 	}
2215 
2216 	if ((both_mode || !server_mode) && !args.has_grp &&
2217 	    !args.has_remote_ip && !args.has_local_ip) {
2218 		fprintf(stderr,
2219 			"Local (server mode) or remote IP (client IP) required\n");
2220 		return 1;
2221 	}
2222 
2223 	if (interactive) {
2224 		prog_timeout = 0;
2225 		msg = NULL;
2226 	}
2227 
2228 	if (both_mode) {
2229 		if (pipe(fd) < 0) {
2230 			perror("pipe");
2231 			exit(1);
2232 		}
2233 
2234 		cpid = fork();
2235 		if (cpid < 0) {
2236 			perror("fork");
2237 			exit(1);
2238 		}
2239 		if (cpid)
2240 			return ipc_parent(cpid, fd[0], &args);
2241 
2242 		return ipc_child(fd[1], &args);
2243 	}
2244 
2245 	if (server_mode) {
2246 		do {
2247 			rc = do_server(&args, -1);
2248 		} while (forever);
2249 
2250 		return rc;
2251 	}
2252 	return do_client(&args);
2253 }
2254