2 * Copyright (c) 2017-2019 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
18 #include <sys/types.h>
19 #include <sys/socket.h>
24 #include <hs_apps/vcl/sock_test.h>
27 #include <sys/ioctl.h>
29 #define SOCK_SERVER_USE_EPOLL 1
30 #define VPPCOM_SESSION_ATTR_UNIT_TEST 0
32 #if SOCK_SERVER_USE_EPOLL
33 #include <sys/epoll.h>
34 #if !defined(VCL_TEST)
40 #if VPPCOM_SESSION_ATTR_UNIT_TEST
41 #define BUFLEN sizeof (uint64_t) * 16
43 uint32_t buflen = BUFLEN;
44 uint32_t *flags = (uint32_t *) buffer;
55 vcl_test_stats_t stats;
66 uint32_t transport_udp;
69 #define SOCK_SERVER_MAX_TEST_CONN 10
70 #define SOCK_SERVER_MAX_EPOLL_EVENTS 10
74 sock_server_cfg_t cfg;
75 #if SOCK_SERVER_USE_EPOLL
77 struct epoll_event listen_ev;
78 struct epoll_event wait_events[SOCK_SERVER_MAX_EPOLL_EVENTS];
79 #if !defined (VCL_TEST)
80 int af_unix_listen_fd;
82 struct epoll_event af_unix_listen_ev;
83 struct sockaddr_un serveraddr;
84 uint32_t af_unix_xacts;
88 size_t conn_pool_size;
89 sock_server_conn_t *conn_pool;
93 struct timeval timeout;
96 sock_server_main_t sock_server_main;
98 #if ! SOCK_SERVER_USE_EPOLL
102 sock_server_main_t *ssm = &sock_server_main;
105 for (nfds = i = 0; i < FD_SETSIZE; i++)
107 if (FD_ISSET (i, &ssm->rd_fdset) || FD_ISSET (i, &ssm->wr_fdset))
114 conn_fdset_set (sock_server_conn_t * conn, fd_set * fdset)
116 sock_server_main_t *ssm = &sock_server_main;
118 FD_SET (conn->fd, fdset);
119 ssm->nfds = get_nfds ();
123 conn_fdset_clr (sock_server_conn_t * conn, fd_set * fdset)
125 sock_server_main_t *ssm = &sock_server_main;
127 FD_CLR (conn->fd, fdset);
128 ssm->nfds = get_nfds ();
133 conn_pool_expand (size_t expand_size)
135 sock_server_main_t *ssm = &sock_server_main;
136 sock_server_conn_t *conn_pool;
137 size_t new_size = ssm->conn_pool_size + expand_size;
140 conn_pool = realloc (ssm->conn_pool, new_size * sizeof (*ssm->conn_pool));
143 for (i = ssm->conn_pool_size; i < new_size; i++)
145 sock_server_conn_t *conn = &conn_pool[i];
146 memset (conn, 0, sizeof (*conn));
147 vcl_test_cfg_init (&conn->cfg);
148 vcl_test_buf_alloc (&conn->cfg, 1 /* is_rxbuf */ ,
149 &conn->buf, &conn->buf_size);
150 conn->cfg.txbuf_size = conn->cfg.rxbuf_size;
153 ssm->conn_pool = conn_pool;
154 ssm->conn_pool_size = new_size;
158 int errno_val = errno;
159 perror ("ERROR in conn_pool_expand()");
160 fprintf (stderr, "SERVER: ERROR: Memory allocation "
161 "failed (errno = %d)!\n", errno_val);
165 static inline sock_server_conn_t *
166 conn_pool_alloc (void)
168 sock_server_main_t *ssm = &sock_server_main;
171 for (i = 0; i < ssm->conn_pool_size; i++)
173 if (!ssm->conn_pool[i].is_alloc)
176 ssm->conn_pool[i].endpt.ip = ssm->conn_pool[i].ip;
178 ssm->conn_pool[i].is_alloc = 1;
179 return (&ssm->conn_pool[i]);
187 conn_pool_free (sock_server_conn_t * conn)
189 #if ! SOCK_SERVER_USE_EPOLL
190 sock_server_main_t *ssm = &sock_server_main;
192 conn_fdset_clr (conn, &ssm->rd_fdset);
193 conn_fdset_clr (conn, &ssm->wr_fdset);
200 sync_config_and_reply (sock_server_conn_t * conn, vcl_test_cfg_t * rx_cfg)
203 vcl_test_buf_alloc (&conn->cfg, 1 /* is_rxbuf */ ,
204 &conn->buf, &conn->buf_size);
205 conn->cfg.txbuf_size = conn->cfg.rxbuf_size;
207 if (conn->cfg.verbose)
209 printf ("\nSERVER (fd %d): Replying to cfg message!\n", conn->fd);
210 vcl_test_cfg_dump (&conn->cfg, 0 /* is_client */ );
212 (void) sock_test_write (conn->fd, (uint8_t *) & conn->cfg,
213 sizeof (conn->cfg), NULL, conn->cfg.verbose);
217 stream_test_server_start_stop (sock_server_conn_t * conn,
218 vcl_test_cfg_t * rx_cfg)
220 sock_server_main_t *ssm = &sock_server_main;
221 int client_fd = conn->fd;
222 vcl_test_t test = rx_cfg->test;
224 if (rx_cfg->ctrl_handle == conn->fd)
227 clock_gettime (CLOCK_REALTIME, &conn->stats.stop);
229 for (i = 0; i < ssm->conn_pool_size; i++)
231 sock_server_conn_t *tc = &ssm->conn_pool[i];
233 if (tc->cfg.ctrl_handle == conn->fd)
235 vcl_test_stats_accumulate (&conn->stats, &tc->stats);
237 if (conn->cfg.verbose)
241 snprintf (buf, sizeof (buf), "SERVER (fd %d) RESULTS",
243 vcl_test_stats_dump (buf, &tc->stats, 1 /* show_rx */ ,
244 test == VCL_TEST_TYPE_BI
251 vcl_test_stats_dump ("SERVER RESULTS", &conn->stats, 1 /* show_rx */ ,
252 (test == VCL_TEST_TYPE_BI) /* show_tx */ ,
254 vcl_test_cfg_dump (&conn->cfg, 0 /* is_client */ );
255 if (conn->cfg.verbose)
257 printf (" sock server main\n"
258 VCL_TEST_SEPARATOR_STRING
260 " buf size: %u (0x%08x)\n"
261 VCL_TEST_SEPARATOR_STRING,
262 conn->buf, conn->buf_size, conn->buf_size);
265 sync_config_and_reply (conn, rx_cfg);
266 printf ("\nSERVER (fd %d): %s-directional Stream Test Complete!\n"
267 SOCK_TEST_BANNER_STRING "\n", conn->fd,
268 test == VCL_TEST_TYPE_BI ? "Bi" : "Uni");
272 printf ("\n" SOCK_TEST_BANNER_STRING
273 "SERVER (fd %d): %s-directional Stream Test!\n"
274 " Sending client the test cfg to start streaming data...\n",
275 client_fd, test == VCL_TEST_TYPE_BI ? "Bi" : "Uni");
277 rx_cfg->ctrl_handle = (rx_cfg->ctrl_handle == ~0) ? conn->fd :
280 sync_config_and_reply (conn, rx_cfg);
282 /* read the 1st chunk, record start time */
283 memset (&conn->stats, 0, sizeof (conn->stats));
284 clock_gettime (CLOCK_REALTIME, &conn->stats.start);
290 stream_test_server (sock_server_conn_t * conn, int rx_bytes)
292 int client_fd = conn->fd;
293 vcl_test_t test = conn->cfg.test;
295 if (test == VCL_TEST_TYPE_BI)
296 (void) sock_test_write (client_fd, conn->buf, rx_bytes, &conn->stats,
299 if (conn->stats.rx_bytes >= conn->cfg.total_bytes)
301 clock_gettime (CLOCK_REALTIME, &conn->stats.stop);
305 #if SOCK_SERVER_USE_EPOLL && !defined (VCL_TEST)
309 sock_server_main_t *ssm = &sock_server_main;
310 int af_unix_client_fd;
314 size_t nbytes = strlen (SOCK_TEST_MIXED_EPOLL_DATA) + 1;
317 af_unix_client_fd = accept4 (ssm->af_unix_listen_fd,
318 (struct sockaddr *) NULL, NULL, NULL);
320 af_unix_client_fd = accept (ssm->af_unix_listen_fd,
321 (struct sockaddr *) NULL, NULL);
323 if (af_unix_client_fd < 0)
326 perror ("ERROR in af_unix_accept()");
327 fprintf (stderr, "SERVER: ERROR: accept failed "
328 "(errno = %d)!\n", errno_val);
332 printf ("SERVER: Got an AF_UNIX connection -- fd = %d (0x%08x)!\n",
333 af_unix_client_fd, af_unix_client_fd);
335 memset (buffer, 0, sizeof (buffer));
337 rv = read (af_unix_client_fd, buffer, nbytes);
341 perror ("ERROR in af_unix_echo(): read() failed");
342 fprintf (stderr, "SERVER: ERROR: read(af_unix_client_fd %d (0x%x), "
343 "nbytes %lu) failed (errno = %d)!\n", af_unix_client_fd,
344 af_unix_client_fd, nbytes, errno_val);
347 /* Make the buffer is NULL-terminated. */
348 buffer[sizeof (buffer) - 1] = 0;
349 printf ("SERVER (AF_UNIX): RX (%d bytes) - '%s'\n", rv, buffer);
351 if (!strncmp (SOCK_TEST_MIXED_EPOLL_DATA, (const char *) buffer, nbytes))
353 rv = write (af_unix_client_fd, buffer, nbytes);
357 perror ("ERROR in af_unix_echo(): write() failed");
359 "SERVER: ERROR: write(af_unix_client_fd %d (0x%x), "
360 "\"%s\", nbytes %ld) failed (errno = %d)!\n",
361 af_unix_client_fd, af_unix_client_fd, buffer, nbytes,
365 printf ("SERVER (AF_UNIX): TX (%d bytes) - '%s'\n", rv, buffer);
366 ssm->af_unix_xacts++;
369 close (af_unix_client_fd);
377 sock_server_main_t *ssm = &sock_server_main;
379 sock_server_conn_t *conn;
381 if (ssm->conn_pool_size < (ssm->num_conn + SOCK_SERVER_MAX_TEST_CONN + 1))
382 conn_pool_expand (SOCK_SERVER_MAX_TEST_CONN + 1);
384 conn = conn_pool_alloc ();
387 fprintf (stderr, "\nSERVER: ERROR: No free connections!\n");
392 client_fd = vppcom_session_accept (ssm->listen_fd, &conn->endpt, 0);
396 client_fd = accept4 (ssm->listen_fd, (struct sockaddr *) NULL, NULL, NULL);
398 client_fd = accept (ssm->listen_fd, (struct sockaddr *) NULL, NULL);
404 perror ("ERROR in new_client()");
405 fprintf (stderr, "SERVER: ERROR: accept failed "
406 "(errno = %d)!\n", errno_val);
410 printf ("SERVER: Got a connection -- fd = %d (0x%08x)!\n",
411 client_fd, client_fd);
413 conn->fd = client_fd;
415 #if ! SOCK_SERVER_USE_EPOLL
416 conn_fdset_set (conn, &ssm->rd_fdset);
420 struct epoll_event ev;
424 ev.data.u64 = conn - ssm->conn_pool;
426 rv = vppcom_epoll_ctl (ssm->epfd, EPOLL_CTL_ADD, client_fd, &ev);
430 rv = epoll_ctl (ssm->epfd, EPOLL_CTL_ADD, client_fd, &ev);
436 perror ("ERROR in new_client()");
437 fprintf (stderr, "SERVER: ERROR: epoll_ctl failed (errno = %d)!\n",
447 print_usage_and_exit (void)
450 "sock_test_server [OPTIONS] <port>\n"
452 " -h Print this message and exit.\n"
454 " -u Use UDP transport layer\n");
459 main (int argc, char **argv)
461 sock_server_main_t *ssm = &sock_server_main;
462 int client_fd, rv, main_rv = 0;
463 int tx_bytes, rx_bytes, nbytes;
464 sock_server_conn_t *conn;
465 vcl_test_cfg_t *rx_cfg;
467 uint64_t xtra_bytes = 0;
468 struct sockaddr_storage servaddr;
471 uint16_t port = VCL_TEST_SERVER_PORT;
472 #if ! SOCK_SERVER_USE_EPOLL
473 fd_set _rfdset, *rfdset = &_rfdset;
476 vppcom_endpt_t endpt;
478 uint32_t servaddr_size;
479 #if ! SOCK_SERVER_USE_EPOLL
480 fd_set _wfdset, *wfdset = &_wfdset;
485 while ((c = getopt (argc, argv, "6D")) != -1)
489 ssm->cfg.address_ip6 = 1;
493 ssm->cfg.transport_udp = 1;
500 if (isprint (optopt))
501 fprintf (stderr, "SERVER: ERROR: Unknown "
502 "option `-%c'.\n", optopt);
504 fprintf (stderr, "SERVER: ERROR: Unknown "
505 "option character `\\x%x'.\n", optopt);
510 print_usage_and_exit ();
513 if (argc < (optind + 1))
515 fprintf (stderr, "SERVER: ERROR: Insufficient number of arguments!\n");
516 print_usage_and_exit ();
519 if (sscanf (argv[optind], "%d", &v) == 1)
523 fprintf (stderr, "SERVER: ERROR: Invalid port (%s)!\n", argv[optind]);
524 print_usage_and_exit ();
527 conn_pool_expand (SOCK_SERVER_MAX_TEST_CONN + 1);
530 rv = vppcom_app_create ("vcl_test_server");
538 ssm->listen_fd = vppcom_session_create (ssm->cfg.transport_udp ?
541 0 /* is_nonblocking */ );
544 ssm->listen_fd = socket (ssm->cfg.address_ip6 ? AF_INET6 : AF_INET,
545 ssm->cfg.transport_udp ? SOCK_DGRAM : SOCK_STREAM,
547 #if SOCK_SERVER_USE_EPOLL && !defined (VCL_TEST)
548 unlink ((const char *) SOCK_TEST_AF_UNIX_FILENAME);
549 ssm->af_unix_listen_fd = socket (AF_UNIX, SOCK_STREAM, 0);
550 if (ssm->af_unix_listen_fd < 0)
553 perror ("ERROR in main(): socket(AF_UNIX) failed");
555 "SERVER: ERROR: socket(AF_UNIX, SOCK_STREAM, 0) failed "
556 "(errno = %d)!\n", errno_val);
557 return ssm->af_unix_listen_fd;
560 memset (&ssm->serveraddr, 0, sizeof (ssm->serveraddr));
561 ssm->serveraddr.sun_family = AF_UNIX;
562 strcpy (ssm->serveraddr.sun_path, SOCK_TEST_AF_UNIX_FILENAME);
564 rv = bind (ssm->af_unix_listen_fd, (struct sockaddr *) &ssm->serveraddr,
565 SUN_LEN (&ssm->serveraddr));
569 perror ("ERROR in main(): bind(SOCK_TEST_AF_UNIX_FILENAME) failed");
570 fprintf (stderr, "SERVER: ERROR: bind() fd %d, \"%s\": "
571 "failed (errno = %d)!\n", ssm->af_unix_listen_fd,
572 SOCK_TEST_AF_UNIX_FILENAME, errno_val);
573 close (ssm->af_unix_listen_fd);
574 unlink ((const char *) SOCK_TEST_AF_UNIX_FILENAME);
578 rv = listen (ssm->af_unix_listen_fd, 10);
582 perror ("ERROR in main(): listen(AF_UNIX) failed");
583 fprintf (stderr, "SERVER: ERROR: listen() fd %d, \"%s\": "
584 "failed (errno = %d)!\n", ssm->af_unix_listen_fd,
585 SOCK_TEST_AF_UNIX_FILENAME, errno_val);
586 close (ssm->af_unix_listen_fd);
587 unlink ((const char *) SOCK_TEST_AF_UNIX_FILENAME);
590 #endif /* SOCK_SERVER_USE_EPOLL */
592 if (ssm->listen_fd < 0)
595 perror ("ERROR in main()");
596 fprintf (stderr, "SERVER: ERROR: socket() failed "
597 "(errno = %d)!\n", errno_val);
598 return ssm->listen_fd;
601 memset (&servaddr, 0, sizeof (servaddr));
603 if (ssm->cfg.address_ip6)
605 struct sockaddr_in6 *server_addr = (struct sockaddr_in6 *) &servaddr;
607 servaddr_size = sizeof (*server_addr);
609 server_addr->sin6_family = AF_INET6;
610 server_addr->sin6_addr = in6addr_any;
611 server_addr->sin6_port = htons (port);
615 struct sockaddr_in *server_addr = (struct sockaddr_in *) &servaddr;
617 servaddr_size = sizeof (*server_addr);
619 server_addr->sin_family = AF_INET;
620 server_addr->sin_addr.s_addr = htonl (INADDR_ANY);
621 server_addr->sin_port = htons (port);
625 if (ssm->cfg.address_ip6)
627 struct sockaddr_in6 *server_addr = (struct sockaddr_in6 *) &servaddr;
629 endpt.ip = (uint8_t *) & server_addr->sin6_addr;
630 endpt.port = (uint16_t) server_addr->sin6_port;
634 struct sockaddr_in *server_addr = (struct sockaddr_in *) &servaddr;
636 endpt.ip = (uint8_t *) & server_addr->sin_addr;
637 endpt.port = (uint16_t) server_addr->sin_port;
640 rv = vppcom_session_bind (ssm->listen_fd, &endpt);
647 rv = bind (ssm->listen_fd, (struct sockaddr *) &servaddr, servaddr_size);
652 perror ("ERROR in main()");
653 fprintf (stderr, "SERVER: ERROR: bind failed (errno = %d)!\n",
657 if (fcntl (ssm->listen_fd, F_SETFL, O_NONBLOCK) < 0)
660 perror ("ERROR in main()");
661 fprintf (stderr, "SERVER: ERROR: fcntl failed (errno = %d)!\n",
667 rv = vppcom_session_listen (ssm->listen_fd, 10);
674 rv = listen (ssm->listen_fd, 10);
679 perror ("ERROR in main()");
680 fprintf (stderr, "SERVER: ERROR: listen failed "
681 "(errno = %d)!\n", errno_val);
685 #if ! SOCK_SERVER_USE_EPOLL
687 FD_ZERO (&ssm->wr_fdset);
688 FD_ZERO (&ssm->rd_fdset);
690 FD_SET (ssm->listen_fd, &ssm->rd_fdset);
691 ssm->nfds = ssm->listen_fd + 1;
695 ssm->epfd = vppcom_epoll_create ();
699 ssm->epfd = epoll_create (1);
704 perror ("ERROR in main()");
705 fprintf (stderr, "SERVER: ERROR: epoll_create failed (errno = %d)!\n",
710 ssm->listen_ev.events = EPOLLIN;
711 ssm->listen_ev.data.u32 = ~0;
713 rv = vppcom_epoll_ctl (ssm->epfd, EPOLL_CTL_ADD, ssm->listen_fd,
718 ssm->af_unix_listen_ev.events = EPOLLIN;
719 ssm->af_unix_listen_ev.data.u32 = SOCK_TEST_AF_UNIX_ACCEPT_DATA;
720 rv = epoll_ctl (ssm->epfd, EPOLL_CTL_ADD, ssm->af_unix_listen_fd,
721 &ssm->af_unix_listen_ev);
725 perror ("ERROR in main(): mixed epoll_ctl(EPOLL_CTL_ADD)");
726 fprintf (stderr, "SERVER: ERROR: mixed epoll_ctl(epfd %d (0x%x), "
727 "EPOLL_CTL_ADD, af_unix_listen_fd %d (0x%x), EPOLLIN) failed "
728 "(errno = %d)!\n", ssm->epfd, ssm->epfd,
729 ssm->af_unix_listen_fd, ssm->af_unix_listen_fd, errno_val);
730 close (ssm->af_unix_listen_fd);
731 unlink ((const char *) SOCK_TEST_AF_UNIX_FILENAME);
735 rv = epoll_ctl (ssm->epfd, EPOLL_CTL_ADD, ssm->listen_fd, &ssm->listen_ev);
740 perror ("ERROR in main()");
741 fprintf (stderr, "SERVER: ERROR: epoll_ctl failed "
742 "(errno = %d)!\n", errno_val);
747 printf ("\nSERVER: Waiting for a client to connect on port %d...\n", port);
751 #if ! SOCK_SERVER_USE_EPOLL
752 _rfdset = ssm->rd_fdset;
755 rv = vppcom_select (ssm->nfds, (unsigned long *) rfdset, NULL, NULL, 0);
758 struct timeval timeout;
759 timeout = ssm->timeout;
760 _wfdset = ssm->wr_fdset;
761 rv = select (ssm->nfds, rfdset, wfdset, NULL, &timeout);
767 fprintf (stderr, "\nSERVER: ERROR: select() failed -- aborting!\n");
774 if (FD_ISSET (ssm->listen_fd, rfdset))
777 for (i = 0; i < ssm->conn_pool_size; i++)
779 if (!ssm->conn_pool[i].is_alloc)
782 conn = &ssm->conn_pool[i];
786 num_ev = vppcom_epoll_wait (ssm->epfd, ssm->wait_events,
787 SOCK_SERVER_MAX_EPOLL_EVENTS, 60.0);
791 num_ev = epoll_wait (ssm->epfd, ssm->wait_events,
792 SOCK_SERVER_MAX_EPOLL_EVENTS, 60000);
796 perror ("epoll_wait()");
797 fprintf (stderr, "\nSERVER: ERROR: epoll_wait() "
798 "failed -- aborting!\n");
804 fprintf (stderr, "\nSERVER: epoll_wait() timeout!\n");
807 for (i = 0; i < num_ev; i++)
809 conn = &ssm->conn_pool[ssm->wait_events[i].data.u32];
810 if (ssm->wait_events[i].events & (EPOLLHUP | EPOLLRDHUP))
813 vppcom_session_close (conn->fd);
819 if (ssm->wait_events[i].data.u32 == ~0)
824 #if !defined (VCL_TEST)
825 else if (ssm->wait_events[i].data.u32 ==
826 SOCK_TEST_AF_UNIX_ACCEPT_DATA)
833 client_fd = conn->fd;
835 #if ! SOCK_SERVER_USE_EPOLL
836 if (FD_ISSET (client_fd, rfdset))
838 if (EPOLLIN & ssm->wait_events[i].events)
842 rx_bytes = sock_test_read (client_fd, conn->buf,
843 conn->buf_size, &conn->stats);
846 rx_cfg = (vcl_test_cfg_t *) conn->buf;
847 if (rx_cfg->magic == VCL_TEST_CFG_CTRL_MAGIC)
851 printf ("SERVER (fd %d): Received a cfg message!\n",
853 vcl_test_cfg_dump (rx_cfg, 0 /* is_client */ );
856 if (rx_bytes != sizeof (*rx_cfg))
858 printf ("SERVER (fd %d): Invalid cfg message "
859 "size (%d)!\n Should be %lu bytes.\n",
860 client_fd, rx_bytes, sizeof (*rx_cfg));
861 conn->cfg.rxbuf_size = 0;
862 conn->cfg.num_writes = 0;
863 if (conn->cfg.verbose)
865 printf ("SERVER (fd %d): Replying to "
866 "cfg message!\n", client_fd);
867 vcl_test_cfg_dump (rx_cfg, 0 /* is_client */ );
869 sock_test_write (client_fd, (uint8_t *) & conn->cfg,
870 sizeof (conn->cfg), NULL,
875 switch (rx_cfg->test)
877 case VCL_TEST_TYPE_NONE:
878 case VCL_TEST_TYPE_ECHO:
879 sync_config_and_reply (conn, rx_cfg);
882 case VCL_TEST_TYPE_BI:
883 case VCL_TEST_TYPE_UNI:
884 stream_test_server_start_stop (conn, rx_cfg);
887 case VCL_TEST_TYPE_EXIT:
888 printf ("SERVER: Have a great day, "
889 "connection %d!\n", client_fd);
891 vppcom_session_close (client_fd);
895 conn_pool_free (conn);
896 printf ("SERVER: Closed client fd %d\n", client_fd);
897 #if ! SOCK_SERVER_USE_EPOLL
898 if (ssm->nfds == (ssm->listen_fd + 1))
904 printf ("SERVER: All client connections "
905 "closed.\n\nSERVER: "
906 "May the force be with you!\n\n");
913 "SERVER: ERROR: Unknown test type!\n");
914 vcl_test_cfg_dump (rx_cfg, 0 /* is_client */ );
920 else if ((conn->cfg.test == VCL_TEST_TYPE_UNI) ||
921 (conn->cfg.test == VCL_TEST_TYPE_BI))
923 stream_test_server (conn, rx_bytes);
924 if (ioctl (conn->fd, FIONREAD))
929 else if (isascii (conn->buf[0]))
931 // If it looks vaguely like a string, make sure it's terminated
932 ((char *) conn->buf)[rx_bytes <
933 conn->buf_size ? rx_bytes :
934 conn->buf_size - 1] = 0;
935 printf ("SERVER (fd %d): RX (%d bytes) - '%s'\n",
936 conn->fd, rx_bytes, conn->buf);
941 if (errno == ECONNRESET)
943 printf ("\nSERVER: Connection reset by remote peer.\n"
944 " Y'all have a great day now!\n\n");
951 if (isascii (conn->buf[0]))
953 /* If it looks vaguely like a string,
954 * make sure it's terminated
956 ((char *) conn->buf)[rx_bytes <
957 conn->buf_size ? rx_bytes :
958 conn->buf_size - 1] = 0;
960 fprintf (stderr, "SERVER: ERROR: "
961 "FIFO not drained in previous test!\n"
962 " extra chunks %u (0x%x)\n"
963 " extra bytes %lu (0x%lx)\n",
964 xtra, xtra, xtra_bytes, xtra_bytes);
969 if (conn->cfg.verbose)
970 printf ("SERVER (fd %d): Echoing back\n", client_fd);
972 nbytes = strlen ((const char *) conn->buf) + 1;
974 tx_bytes = sock_test_write (client_fd, conn->buf,
975 nbytes, &conn->stats,
978 printf ("SERVER (fd %d): TX (%d bytes) - '%s'\n",
979 conn->fd, tx_bytes, conn->buf);
982 else // Extraneous read data from non-echo tests???
985 xtra_bytes += rx_bytes;
993 vppcom_session_close (ssm->listen_fd);
994 vppcom_app_destroy ();
996 close (ssm->listen_fd);
998 #if SOCK_SERVER_USE_EPOLL && !defined (VCL_TEST)
999 close (ssm->af_unix_listen_fd);
1000 unlink ((const char *) SOCK_TEST_AF_UNIX_FILENAME);
1001 #endif /* SOCK_SERVER_USE_EPOLL */
1005 free (ssm->conn_pool);
1011 * fd.io coding-style-patch-verification: ON
1014 * eval: (c-set-style "gnu")