/*	$NetBSD: t_canfilter.c,v 1.2 2017/05/27 21:02:56 bouyer Exp $	*/

/*-
 * Copyright (c) 2017 The NetBSD Foundation, Inc.
 * All rights reserved.
 *
 * This code is derived from software contributed to The NetBSD Foundation
 * by Manuel Bouyer
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
 * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
 * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
 * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
 * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <sys/cdefs.h>
#ifndef lint
__RCSID("$NetBSD: t_canfilter.c,v 1.2 2017/05/27 21:02:56 bouyer Exp $");
#endif /* not lint */

#include <sys/types.h>
#include <sys/resource.h>
#include <sys/wait.h>
#include <sys/sockio.h>
#include <sys/param.h>

#include <atf-c.h>
#include <assert.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

#include <net/if.h>
#include <netcan/can.h>

#include <rump/rump.h>
#include <rump/rump_syscalls.h>

#include "h_macros.h"
#include "h_canutils.h"

ATF_TC(canfilter_basic);
ATF_TC_HEAD(canfilter_basic, tc)
{

	atf_tc_set_md_var(tc, "descr", "check a simple CAN filter");
	atf_tc_set_md_var(tc, "timeout", "5");
}

ATF_TC_BODY(canfilter_basic, tc)
{
	const char ifname[] = "canlo0";
	int s, rv;
	struct can_frame cf_send, cf_receive;
	struct can_filter cfi;

	rump_init();
	cancfg_rump_createif(ifname);

	s = can_socket_with_own();

	can_bind(s, ifname);

	/* set filter */
#define MY_ID	1
	cfi.can_id = MY_ID;
	cfi.can_mask = CAN_SFF_MASK | CAN_EFF_FLAG;
	if (rump_sys_setsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    &cfi, sizeof(cfi)) < 0) {
		atf_tc_fail_errno("setsockopt(CAN_RAW_FILTER)");
	}

	/*
	 * send a single byte message, but make sure remaining payload is
	 * not 0.
	 */

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");

	/* now send a packet with CAN_RTR_FLAG. Should pass too */

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID | CAN_RTR_FLAG;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID | CAN_RTR_FLAG;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");

	/* now send a packet for a different id. Should not pass */

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID + 1;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		if (errno == EWOULDBLOCK)
			return; /* expected timeout */
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID + 1;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");
	atf_tc_fail("we got our own message");
#undef MY_ID
}

ATF_TC(canfilter_null);
ATF_TC_HEAD(canfilter_null, tc)
{

	atf_tc_set_md_var(tc, "descr", "check a NULL CAN filter");
	atf_tc_set_md_var(tc, "timeout", "5");
}

ATF_TC_BODY(canfilter_null, tc)
{
	const char ifname[] = "canlo0";
	int s, rv;
	struct can_frame cf_send, cf_receive;
	struct can_filter cfi[2];
	socklen_t cfilen;

	rump_init();
	cancfg_rump_createif(ifname);

	s = can_socket_with_own();
	can_bind(s, ifname);

	if (rump_sys_setsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    NULL,  0) < 0) {
		atf_tc_fail_errno("setsockopt(CAN_RAW_FILTER)");
	}

	/* get filter: should be NULL */
	cfilen = sizeof(cfi);
	if (rump_sys_getsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    &cfi, &cfilen) < 0) {
		atf_tc_fail_errno("getsockopt(CAN_RAW_FILTER)");
	}
	ATF_CHECK_MSG(cfilen == 0,
	    "CAN_RAW_FILTER returns wrong len (%d)", cfilen);
	/*
	 * send a single byte message, but make sure remaining payload is
	 * not 0.
	 */
#define MY_ID	1

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		if (errno == EWOULDBLOCK)
			return; /* expected timeout */
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");
	atf_tc_fail("we got our own message");
#undef MY_ID
}

ATF_TC(canfilter_multiple);
ATF_TC_HEAD(canfilter_multiple, tc)
{

	atf_tc_set_md_var(tc, "descr", "check multiple CAN filters");
	atf_tc_set_md_var(tc, "timeout", "5");
}

ATF_TC_BODY(canfilter_multiple, tc)
{
	const char ifname[] = "canlo0";
	int s, rv;
	struct can_frame cf_send, cf_receive;
	struct can_filter cfi[2];

	rump_init();
	cancfg_rump_createif(ifname);

	s = can_socket_with_own();

	can_bind(s, ifname);

	/* set filter: accept MY_ID and MY_ID+1 */
#define MY_ID	1
	cfi[0].can_id = MY_ID;
	cfi[0].can_mask = CAN_SFF_MASK | CAN_EFF_FLAG;
	cfi[1].can_id = MY_ID + 1;
	cfi[1].can_mask = CAN_SFF_MASK | CAN_EFF_FLAG;
	if (rump_sys_setsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    &cfi, sizeof(cfi)) < 0) {
		atf_tc_fail_errno("setsockopt(CAN_RAW_FILTER)");
	}

	/*
	 * send a single byte message, but make sure remaining payload is
	 * not 0.
	 */

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");

	/* now send a packet with MY_ID+1. Should pass too */

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID + 1;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID  + 1;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");

	/* now send a packet with MY_ID + 2. Should not pass */

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID + 2;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	cf_send.data[1] = 0xad;
	cf_send.data[2] = 0xbe;
	cf_send.data[3] = 0xef;

	if (rump_sys_write(s, &cf_send, sizeof(cf_send) - 7) < 0) {
		atf_tc_fail_errno("write");
	}

	if (can_read(s, &cf_receive, &rv) < 0) {
		if (errno == EWOULDBLOCK)
			return; /* expected timeout */
		atf_tc_fail_errno("read");
	}

	ATF_CHECK_MSG(rv > 0, "short read on socket");

	memset(&cf_send, 0, sizeof(cf_send));
	cf_send.can_id = MY_ID + 2;
	cf_send.can_dlc = 1;
	cf_send.data[0] = 0xde;
	/* other data[] are expected to be 0 */

	ATF_CHECK_MSG(memcmp(&cf_send, &cf_receive, sizeof(cf_send)) == 0,
	    "received packet is not what we sent");
	atf_tc_fail("we got our own message");
#undef MY_ID
}

ATF_TC(canfilter_get);
ATF_TC_HEAD(canfilter_get, tc)
{

	atf_tc_set_md_var(tc, "descr", "check reading CAN filters");
	atf_tc_set_md_var(tc, "timeout", "5");
}

ATF_TC_BODY(canfilter_get, tc)
{
	const char ifname[] = "canlo0";
	int s;
	struct can_filter cfi[2];
	socklen_t cfilen;

	rump_init();
	cancfg_rump_createif(ifname);

	s = -1;
	if ((s = rump_sys_socket(AF_CAN, SOCK_RAW, CAN_RAW)) < 0) {
		atf_tc_fail_errno("CAN socket");
	}

	cfilen = sizeof(cfi);
	/* get filter: should be default filter */
	if (rump_sys_getsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    &cfi, &cfilen) < 0) {
		atf_tc_fail_errno("getsockopt(CAN_RAW_FILTER)");
	}
	ATF_CHECK_MSG(cfilen == sizeof(struct can_filter),
	    "CAN_RAW_FILTER returns wrong len (%d)", cfilen);
	ATF_CHECK_MSG(cfi[0].can_id == 0 && cfi[0].can_mask == 0,
	    "CAN_RAW_FILTER returns wrong filter (%d, %d)",
	    cfi[0].can_id, cfi[0].can_mask);

	/* set filter: accept MY_ID and MY_ID+1 */
#define MY_ID	1
	cfi[0].can_id = MY_ID;
	cfi[0].can_mask = CAN_SFF_MASK | CAN_EFF_FLAG;
	cfi[1].can_id = MY_ID + 1;
	cfi[1].can_mask = CAN_SFF_MASK;
	if (rump_sys_setsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    &cfi, sizeof(cfi)) < 0) {
		atf_tc_fail_errno("setsockopt(CAN_RAW_FILTER)");
	}

	/* and read back */
	cfilen = sizeof(cfi);
	memset(cfi, 0, cfilen);
	if (rump_sys_getsockopt(s, SOL_CAN_RAW, CAN_RAW_FILTER,
	    &cfi, &cfilen) < 0) {
		atf_tc_fail_errno("getsockopt(CAN_RAW_FILTER)");
	}
	ATF_CHECK_MSG(cfilen == sizeof(struct can_filter) * 2,
	    "CAN_RAW_FILTER returns wrong len (%d)", cfilen);
	ATF_CHECK_MSG(cfi[0].can_id == MY_ID &&
	    cfi[0].can_mask == (CAN_SFF_MASK | CAN_EFF_FLAG),
	    "CAN_RAW_FILTER returns wrong filter 0 (%d, %d)",
	    cfi[0].can_id, cfi[0].can_mask);
	ATF_CHECK_MSG(cfi[1].can_id == MY_ID + 1 &&
	    cfi[1].can_mask == CAN_SFF_MASK,
	    "CAN_RAW_FILTER returns wrong filter 1 (%d, %d)",
	    cfi[1].can_id, cfi[1].can_mask);

#undef MY_ID
}

ATF_TP_ADD_TCS(tp)
{

        ATF_TP_ADD_TC(tp, canfilter_basic);
        ATF_TP_ADD_TC(tp, canfilter_null);
        ATF_TP_ADD_TC(tp, canfilter_multiple);
        ATF_TP_ADD_TC(tp, canfilter_get);
	return atf_no_error();
}