config root man

Current Path : /usr/src/tools/regression/netinet/ipmulticast/

FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64
Upload File :
Current File : //usr/src/tools/regression/netinet/ipmulticast/ipmulticast.c

/*-
 * Copyright (c) 2007 Bruce M. Simpson
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 */

/*
 * Regression test utility for RFC 3678 Advanced Multicast API in FreeBSD.
 *
 * TODO: Test the SSM paths.
 * TODO: Support INET6. The code has been written to facilitate this later.
 * TODO: Merge multicast socket option tests from ipsockopt.
 */

#include <sys/cdefs.h>
__FBSDID("$FreeBSD: release/9.1.0/tools/regression/netinet/ipmulticast/ipmulticast.c 170614 2007-06-12 16:29:22Z bms $");

#include <sys/param.h>
#include <sys/types.h>
#include <sys/ioctl.h>
#include <sys/socket.h>

#include <net/if.h>
#include <net/if_dl.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>

#include <assert.h>
#include <err.h>
#include <errno.h>
#include <getopt.h>
#include <libgen.h>
#include <pwd.h>
#include <setjmp.h>
#include <signal.h>
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sysexits.h>
#include <time.h>
#include <unistd.h>

#ifndef __SOCKUNION_DECLARED
union sockunion {
	struct sockaddr_storage	ss;
	struct sockaddr		sa;
	struct sockaddr_dl	sdl;
	struct sockaddr_in	sin;
#ifdef INET6
	struct sockaddr_in6	sin6;
#endif
};
typedef union sockunion sockunion_t;
#define __SOCKUNION_DECLARED
#endif /* __SOCKUNION_DECLARED */

#define ADDRBUF_LEN		16
#define DEFAULT_GROUP_STR	"238.1.1.0"
#define DEFAULT_IFNAME		"lo0"
#define DEFAULT_IFADDR_STR	"127.0.0.1"
#define DEFAULT_PORT		6698
#define DEFAULT_TIMEOUT		0		/* don't wait for traffic */
#define RXBUFSIZE		2048

static sockunion_t	 basegroup;
static const char	*basegroup_str = NULL;
static int		 dobindaddr = 0;
static int		 dodebug = 1;
static int		 doipv4 = 0;
static int		 domiscopts = 0;
static int		 dorandom = 0;
static int		 doreuseport = 0;
static int		 dossm = 0;
static int		 dossf = 0;
static int		 doverbose = 0;
static sockunion_t	 ifaddr;
static const char	*ifaddr_str = NULL;
static uint32_t		 ifindex = 0;
static const char	*ifname = NULL;
struct in_addr		*ipv4_sources = NULL;
static jmp_buf		 jmpbuf;
static size_t		 nmcastgroups = IP_MAX_MEMBERSHIPS;
static size_t		 nmcastsources = 0;
static uint16_t		 portno = DEFAULT_PORT;
static char		*progname = NULL;
struct sockaddr_storage	*ss_sources = NULL;
static uint32_t		 timeout = 0;

static int	do_asm_ipv4(void);
static int	do_asm_pim(void);
#ifdef notyet
static int	do_misc_opts(void);
#endif
static int	do_ssf_ipv4(void);
static int	do_ssf_pim(void);
static int	do_ssm_ipv4(void);
static int	do_ssm_pim(void);
static int	open_and_bind_socket(sockunion_t *);
static int	recv_loop_with_match(int, sockunion_t *, sockunion_t *);
static void	signal_handler(int);
static void	usage(void);

/*
 * Test the IPv4 set/getipv4sourcefilter() libc API functions.
 * Build a single socket.
 * Join a source group.
 * Repeatedly change the source filters via setipv4sourcefilter.
 * Read it back with getipv4sourcefilter up to IP_MAX_SOURCES
 * and check for inconsistency.
 */
static int
do_ssf_ipv4(void)
{

	fprintf(stderr, "not yet implemented\n");
	return (0);
}

/*
 * Test the protocol-independent set/getsourcefilter() functions.
 */
static int
do_ssf_pim(void)
{

	fprintf(stderr, "not yet implemented\n");
	return (0);
}

/*
 * Test the IPv4 ASM API.
 * Repeatedly join, block sources, unblock and leave groups.
 */
static int
do_asm_ipv4(void)
{
	int			 error;
	char			 gaddrbuf[ADDRBUF_LEN];
	int			 i;
	sockunion_t		 laddr;
	struct ip_mreq		 mreq;
	struct ip_mreq_source	 mreqs;
	in_addr_t		 ngroupbase;
	char			 saddrbuf[ADDRBUF_LEN];
	int			 sock;
	sockunion_t		 tmpgroup;
	sockunion_t		 tmpsource;

	memset(&mreq, 0, sizeof(struct ip_mreq));
	memset(&mreqs, 0, sizeof(struct ip_mreq_source));
	memset(&laddr, 0, sizeof(sockunion_t));

	if (dobindaddr) {
		laddr = ifaddr;
	} else {
		laddr.sin.sin_family = AF_INET;
		laddr.sin.sin_len = sizeof(struct sockaddr_in);
		laddr.sin.sin_addr.s_addr = INADDR_ANY;
	}
	laddr.sin.sin_port = htons(portno);

	tmpgroup = basegroup;
	ngroupbase = ntohl(basegroup.sin.sin_addr.s_addr) + 1;	/* XXX */
	tmpgroup.sin.sin_addr.s_addr = htonl(ngroupbase);

	sock = open_and_bind_socket(&laddr);
	if (sock == -1)
		return (EX_OSERR);

	for (i = 0; i < (signed)nmcastgroups; i++) {
		mreq.imr_multiaddr.s_addr = htonl((ngroupbase + i));
		mreq.imr_interface = ifaddr.sin.sin_addr;
		if (doverbose) {
			inet_ntop(AF_INET, &mreq.imr_multiaddr, gaddrbuf,
			    sizeof(gaddrbuf));
			fprintf(stderr, "IP_ADD_MEMBERSHIP %s %s\n",
			    gaddrbuf, inet_ntoa(mreq.imr_interface));
		}
		error = setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP,
		    &mreq, sizeof(struct ip_mreq));
		if (error < 0) {
			warn("setsockopt IP_ADD_MEMBERSHIP");
			close(sock);
			return (EX_OSERR);
		}
	}

	/*
	 * If no test sources auto-generated or specified on command line,
	 * skip source filter portion of ASM test.
	*/
	if (nmcastsources == 0)
		goto skipsources;

	/*
	 * Begin blocking sources on the first group chosen.
	 */
	for (i = 0; i < (signed)nmcastsources; i++) {
		mreqs.imr_multiaddr = tmpgroup.sin.sin_addr;
		mreqs.imr_interface = ifaddr.sin.sin_addr;
		mreqs.imr_sourceaddr = ipv4_sources[i];
		if (doverbose) {
			inet_ntop(AF_INET, &mreqs.imr_multiaddr, gaddrbuf,
			    sizeof(gaddrbuf));
			inet_ntop(AF_INET, &mreqs.imr_sourceaddr, saddrbuf,
			    sizeof(saddrbuf));
			fprintf(stderr, "IP_BLOCK_SOURCE %s %s %s\n",
			    gaddrbuf, inet_ntoa(mreqs.imr_interface),
			    saddrbuf);
		}
		error = setsockopt(sock, IPPROTO_IP, IP_BLOCK_SOURCE, &mreqs,
		    sizeof(struct ip_mreq_source));
		if (error < 0) {
			warn("setsockopt IP_BLOCK_SOURCE");
			close(sock);
			return (EX_OSERR);
		}
	}

	/*
	 * Choose the first group and source for a match.
	 * Enter the I/O loop.
	 */
	memset(&tmpsource, 0, sizeof(sockunion_t));
	tmpsource.sin.sin_family = AF_INET;
	tmpsource.sin.sin_len = sizeof(struct sockaddr_in);
	tmpsource.sin.sin_addr = ipv4_sources[0];

	error = recv_loop_with_match(sock, &tmpgroup, &tmpsource);

	/*
	 * Unblock sources.
	 */
	for (i = nmcastsources-1; i >= 0; i--) {
		mreqs.imr_multiaddr = tmpgroup.sin.sin_addr;
		mreqs.imr_interface = ifaddr.sin.sin_addr;
		mreqs.imr_sourceaddr = ipv4_sources[i];
		if (doverbose) {
			inet_ntop(AF_INET, &mreqs.imr_multiaddr, gaddrbuf,
			    sizeof(gaddrbuf));
			inet_ntop(AF_INET, &mreqs.imr_sourceaddr, saddrbuf,
			    sizeof(saddrbuf));
			fprintf(stderr, "IP_UNBLOCK_SOURCE %s %s %s\n",
			    gaddrbuf, inet_ntoa(mreqs.imr_interface),
			    saddrbuf);
		}
		error = setsockopt(sock, IPPROTO_IP, IP_UNBLOCK_SOURCE, &mreqs,
		    sizeof(struct ip_mreq_source));
		if (error < 0) {
			warn("setsockopt IP_UNBLOCK_SOURCE");
			close(sock);
			return (EX_OSERR);
		}
	}

skipsources:
	/*
	 * Leave groups.
	 */
	for (i = nmcastgroups-1; i >= 0; i--) {
		mreq.imr_multiaddr.s_addr = htonl((ngroupbase + i));
		mreq.imr_interface = ifaddr.sin.sin_addr;
		if (doverbose) {
			inet_ntop(AF_INET, &mreq.imr_multiaddr, gaddrbuf,
			    sizeof(gaddrbuf));
			fprintf(stderr, "IP_DROP_MEMBERSHIP %s %s\n",
			    gaddrbuf, inet_ntoa(mreq.imr_interface));
		}
		error = setsockopt(sock, IPPROTO_IP, IP_DROP_MEMBERSHIP,
		    &mreq, sizeof(struct ip_mreq));
		if (error < 0) {
			warn("setsockopt IP_DROP_MEMBERSHIP");
			close(sock);
			return (EX_OSERR);
		}
	}

	return (0);
}

static int
do_asm_pim(void)
{

	fprintf(stderr, "not yet implemented\n");
	return (0);
}

#ifdef notyet
/*
 * Test misceallaneous IPv4 options.
 */
static int
do_misc_opts(void)
{
	int sock;

	sock = open_and_bind_socket(NULL);
	if (sock == -1)
		return (EX_OSERR);
	test_ip_uchar(sock, socktypename, IP_MULTICAST_TTL,
	    "IP_MULTICAST_TTL", 1);
	close(sock);

	sock = open_and_bind_socket(NULL);
	if (sock == -1)
		return (EX_OSERR);
	test_ip_boolean(sock, socktypename, IP_MULTICAST_LOOP,
	    "IP_MULTICAST_LOOP", 1, BOOLEAN_ANYONE);
	close(sock);

	return (0);
}
#endif

/*
 * Test the IPv4 SSM API.
 */
static int
do_ssm_ipv4(void)
{

	fprintf(stderr, "not yet implemented\n");
	return (0);
}

/*
 * Test the protocol-independent SSM API with IPv4 addresses.
 */
static int
do_ssm_pim(void)
{

	fprintf(stderr, "not yet implemented\n");
	return (0);
}

int
main(int argc, char *argv[])
{
	struct addrinfo		 aih;
	struct addrinfo		*aip;
	int			 ch;
	int			 error;
	int			 exitval;
	size_t			 i;
	struct in_addr		*pina;
	struct sockaddr_storage	*pbss;

	ifname = DEFAULT_IFNAME;
	ifaddr_str = DEFAULT_IFADDR_STR;
	basegroup_str = DEFAULT_GROUP_STR;
	ifname = DEFAULT_IFNAME;
	portno = DEFAULT_PORT;
	basegroup.ss.ss_family = AF_UNSPEC;
	ifaddr.ss.ss_family = AF_UNSPEC;

	progname = basename(argv[0]);
	while ((ch = getopt(argc, argv, "4bg:i:I:mM:p:rsS:tT:v")) != -1) {
		switch (ch) {
		case '4':
			doipv4 = 1;
			break;
		case 'b':
			dobindaddr = 1;
			break;
		case 'g':
			basegroup_str = optarg;
			break;
		case 'i':
			ifname = optarg;
			break;
		case 'I':
			ifaddr_str = optarg;
			break;
		case 'm':
			usage();	/* notyet */
			/*NOTREACHED*/
			domiscopts = 1;
			break;
		case 'M':
			nmcastgroups = atoi(optarg);
			break;
		case 'p':
			portno = atoi(optarg);
			break;
		case 'r':
			doreuseport = 1;
			break;
		case 'S':
			nmcastsources = atoi(optarg);
			break;
		case 's':
			dossm = 1;
			break;
		case 't':
			dossf = 1;
			break;
		case 'T':
			timeout = atoi(optarg);
			break;
		case 'v':
			doverbose = 1;
			break;
		default:
			usage();
			break;
			/*NOTREACHED*/
		}
	}
	argc -= optind;
	argv += optind;

	memset(&aih, 0, sizeof(struct addrinfo));
	aih.ai_flags = AI_NUMERICHOST | AI_PASSIVE;
	aih.ai_family = PF_INET;
	aih.ai_socktype = SOCK_DGRAM;
	aih.ai_protocol = IPPROTO_UDP;

	/*
	 * Fill out base group.
	 */
	aip = NULL;
	error = getaddrinfo(basegroup_str, NULL, &aih, &aip);
	if (error != 0) {
		fprintf(stderr, "%s: getaddrinfo: %s\n", progname,
		    gai_strerror(error));
		exit(EX_USAGE);
	}
	memcpy(&basegroup, aip->ai_addr, aip->ai_addrlen);
	if (dodebug) {
		fprintf(stderr, "debug: gai thinks %s is %s\n",
		    basegroup_str, inet_ntoa(basegroup.sin.sin_addr));
	}
	freeaddrinfo(aip);

	assert(basegroup.ss.ss_family == AF_INET);

	/*
	 * If user specified interface as an address, and protocol
	 * specific APIs were selected, parse it.
	 * Otherwise, parse interface index from name if protocol
	 * independent APIs were selected (the default).
	 */
	if (doipv4) {
		if (ifaddr_str == NULL) {
			warnx("required argument missing: ifaddr");
			usage();
			/* NOTREACHED */
		}
		aip = NULL;
		error = getaddrinfo(ifaddr_str, NULL, &aih, &aip);
		if (error != 0) {
			fprintf(stderr, "%s: getaddrinfo: %s\n", progname,
			    gai_strerror(error));
			exit(EX_USAGE);
		}
		memcpy(&ifaddr, aip->ai_addr, aip->ai_addrlen);
		if (dodebug) {
			fprintf(stderr, "debug: gai thinks %s is %s\n",
			    ifaddr_str, inet_ntoa(ifaddr.sin.sin_addr));
		}
		freeaddrinfo(aip);
	}

	if (!doipv4) {
		if (ifname == NULL) {
			warnx("required argument missing: ifname");
			usage();
			/* NOTREACHED */
		}
		ifindex = if_nametoindex(ifname);
		if (ifindex == 0)
			err(EX_USAGE, "if_nametoindex");
	}

	/*
	 * Introduce randomness into group base if specified.
	 */
	if (dorandom) {
		in_addr_t ngroupbase;

		srandomdev();
		ngroupbase = ntohl(basegroup.sin.sin_addr.s_addr);
		ngroupbase |= ((random() % ((1 << 11) - 1)) << 16);
		basegroup.sin.sin_addr.s_addr = htonl(ngroupbase);
	}

	if (argc > 0) {
		nmcastsources = argc;
		if (doipv4) {
			ipv4_sources = calloc(nmcastsources,
			    sizeof(struct in_addr));
			if (ipv4_sources == NULL) {
				exitval = EX_OSERR;
				goto out;
			}
		} else {
			ss_sources = calloc(nmcastsources,
			    sizeof(struct sockaddr_storage));
			if (ss_sources == NULL) {
				exitval = EX_OSERR;
				goto out;
			}
		}
	}

	/*
	 * Parse source list, if any were specified on the command line.
	 */
	assert(aih.ai_family == PF_INET);
	pbss = ss_sources;
	pina = ipv4_sources;
	for (i = 0; i < (size_t)argc; i++) {
		aip = NULL;
		error = getaddrinfo(argv[i], NULL, &aih, &aip);
		if (error != 0) {
			fprintf(stderr, "getaddrinfo: %s\n",
			    gai_strerror(error));
			exitval = EX_USAGE;
			goto out;
		}
		if (doipv4) {
			struct sockaddr_in *sin =
			    (struct sockaddr_in *)aip->ai_addr;
			*pina++ = sin->sin_addr;
		} else {
			memcpy(pbss++, aip->ai_addr, aip->ai_addrlen);
		}
		freeaddrinfo(aip);
	}

	/*
	 * Perform the regression tests which the user requested.
	 */
#ifdef notyet
	if (domiscopts) {
		exitval = do_misc_opts();
		if (exitval)
			goto out;
	}
#endif
	if (doipv4) {
		/* IPv4 protocol specific API tests */
		if (dossm) {
			/* Source-specific multicast */
			exitval = do_ssm_ipv4();
			if (exitval)
				goto out;
			if (dossf) {
				/* Do setipvsourcefilter() too */
				exitval = do_ssf_ipv4();
			}
		} else {
			/* Any-source multicast */
			exitval = do_asm_ipv4();
		}
	} else {
		/* Protocol independent API tests */
		if (dossm) {
			/* Source-specific multicast */
			exitval = do_ssm_pim();
			if (exitval)
				goto out;
			if (dossf) {
				/* Do setsourcefilter() too */
				exitval = do_ssf_pim();
			}
		} else {
			/* Any-source multicast */
			exitval = do_asm_pim();
		}
	}

out:
	if (ipv4_sources != NULL)
		free(ipv4_sources);

	if (ss_sources != NULL)
		free(ss_sources);

	exit(exitval);
}

static int
open_and_bind_socket(sockunion_t *bsu)
{
	int	 error, optval, sock;

	sock = -1;

	sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
	if (sock == -1) {
		warn("socket");
		return (-1);
	}

	if (doreuseport) {
		optval = 1;
		if (setsockopt(sock, SOL_SOCKET, SO_REUSEPORT, &optval,
		    sizeof(optval)) < 0) {
			warn("setsockopt SO_REUSEPORT");
			close(sock);
			return (-1);
		}
	}

	if (bsu != NULL) {
		error = bind(sock, &bsu->sa, bsu->sa.sa_len);
		if (error == -1) {
			warn("bind");
			close(sock);
			return (-1);
		}
	}

	return (sock);
}

/*
 * Protocol-agnostic multicast I/O loop.
 *
 * Wait for 'timeout' seconds looking for traffic on group, so that manual
 * or automated regression tests (possibly running on another host) have an
 * opportunity to transmit within the group to test source filters.
 *
 * If the filter failed, this loop will report if we received traffic
 * from the source we elected to monitor.
 */
static int
recv_loop_with_match(int sock, sockunion_t *group, sockunion_t *source)
{
	int		 error;
	sockunion_t	 from;
	char		 groupname[NI_MAXHOST];
	ssize_t		 len;
	size_t		 npackets;
	int		 jmpretval;
	char		 rxbuf[RXBUFSIZE];
	char		 sourcename[NI_MAXHOST];

	assert(source->sa.sa_family == AF_INET);

	/*
	 * Return immediately if we don't need to wait for traffic.
	 */
	if (timeout == 0)
		return (0);

	error = getnameinfo(&group->sa, group->sa.sa_len, groupname,
	    NI_MAXHOST, NULL, 0, NI_NUMERICHOST);
	if (error) {
		fprintf(stderr, "getnameinfo: %s\n", gai_strerror(error));
		return (error);
	}

	error = getnameinfo(&source->sa, source->sa.sa_len, sourcename,
	    NI_MAXHOST, NULL, 0, NI_NUMERICHOST);
	if (error) {
		fprintf(stderr, "getnameinfo: %s\n", gai_strerror(error));
		return (error);
	}

	fprintf(stdout,
	    "Waiting %d seconds for inbound traffic on group %s\n"
	    "Expecting no traffic from blocked source: %s\n",
	    (int)timeout, groupname, sourcename);

	signal(SIGINT, signal_handler);
	signal(SIGALRM, signal_handler);

	error = 0;
	npackets = 0;
	alarm(timeout);
	while (0 == (jmpretval = setjmp(jmpbuf))) {
		len = recvfrom(sock, rxbuf, RXBUFSIZE, 0, &from.sa,
		    (socklen_t *)&from.sa.sa_len);
		if (dodebug) {
			fprintf(stderr, "debug: packet received from %s\n",
			    inet_ntoa(from.sin.sin_addr));
		}
		if (source &&
		    source->sin.sin_addr.s_addr == from.sin.sin_addr.s_addr)
			break;
		npackets++;
	}

	if (doverbose) {
		fprintf(stderr, "Number of datagrams received from "
		    "non-blocked sources: %d\n", (int)npackets);
	}

	switch (jmpretval) {
	case SIGALRM:	/* ok */
		break;
	case SIGINT:	/* go bye bye */
		fprintf(stderr, "interrupted\n");
		error = 20;
		break;
	case 0:		/* Broke out of loop; saw a bad source. */
		fprintf(stderr, "FAIL: got packet from blocked source\n");
		error = EX_IOERR;
		break;
	default:
		warnx("recvfrom");
		error = EX_OSERR;
		break;
	}

	signal(SIGINT, SIG_DFL);
	signal(SIGALRM, SIG_DFL);

	return (error);
}

static void
signal_handler(int signo)
{

	longjmp(jmpbuf, signo);
}

static void
usage(void)
{

	fprintf(stderr, "\nIP multicast regression test utility\n");
	fprintf(stderr,
"usage: %s [-4] [-b] [-g groupaddr] [-i ifname] [-I ifaddr] [-m]\n"
"       [-M ngroups] [-p portno] [-r] [-R] [-s] [-S nsources] [-t] [-T timeout]\n"
"       [-v] [blockaddr ...]\n\n", progname);
	fprintf(stderr, "-4: Use IPv4 API "
	                "(default: Use protocol-independent API)\n");
	fprintf(stderr, "-b: bind listening socket to ifaddr "
	    "(default: INADDR_ANY)\n");
	fprintf(stderr, "-g: Base IPv4 multicast group to join (default: %s)\n",
	    DEFAULT_GROUP_STR);
	fprintf(stderr, "-i: interface for multicast joins (default: %s)\n",
	    DEFAULT_IFNAME);
	fprintf(stderr, "-I: IPv4 address to join groups on, if using IPv4 "
	    "API\n    (default: %s)\n", DEFAULT_IFADDR_STR);
#ifdef notyet
	fprintf(stderr, "-m: Test misc IPv4 multicast socket options "
	    "(default: off)\n");
#endif
	fprintf(stderr, "-M: Number of multicast groups to join "
	    "(default: %d)\n", (int)nmcastgroups);
	fprintf(stderr, "-p: Set local and remote port (default: %d)\n",
	    DEFAULT_PORT);
	fprintf(stderr, "-r: Set SO_REUSEPORT on (default: off)\n");
	fprintf(stderr, "-R: Randomize groups/sources (default: off)\n");
	fprintf(stderr, "-s: Test source-specific API "
	    "(default: test any-source API)\n");
	fprintf(stderr, "-S: Number of multicast sources to generate if\n"
	    "    none specified on command line (default: %d)\n",
	    (int)nmcastsources);
	fprintf(stderr, "-t: Test get/setNsourcefilter() (default: off)\n");
	fprintf(stderr, "-T: Timeout to wait for blocked traffic on first "
	    "group (default: %d)\n", DEFAULT_TIMEOUT);
	fprintf(stderr, "-v: Be verbose (default: off)\n");
	fprintf(stderr, "\nRemaining arguments are treated as a list of IPv4 "
	    "sources to filter.\n\n");

	exit(EX_USAGE);
}

Man Man