449 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			449 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| #include <errno.h>
 | |
| #include <error.h>
 | |
| #include <getopt.h>
 | |
| #include <stdbool.h>
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <string.h>
 | |
| #include <unistd.h>
 | |
| 
 | |
| #include <sys/time.h>
 | |
| #include <sys/socket.h>
 | |
| #include <sys/select.h>
 | |
| #include <sys/ioctl.h>
 | |
| #include <arpa/inet.h>
 | |
| #include <net/if.h>
 | |
| 
 | |
| #include <asm/types.h>
 | |
| #include <linux/net_tstamp.h>
 | |
| #include <linux/errqueue.h>
 | |
| 
 | |
| #include "../kselftest.h"
 | |
| 
 | |
| struct options {
 | |
| 	int so_timestamp;
 | |
| 	int so_timestampns;
 | |
| 	int so_timestamping;
 | |
| };
 | |
| 
 | |
| struct tstamps {
 | |
| 	bool tstamp;
 | |
| 	bool tstampns;
 | |
| 	bool swtstamp;
 | |
| 	bool hwtstamp;
 | |
| };
 | |
| 
 | |
| struct socket_type {
 | |
| 	char *friendly_name;
 | |
| 	int type;
 | |
| 	int protocol;
 | |
| 	bool enabled;
 | |
| };
 | |
| 
 | |
| struct test_case {
 | |
| 	struct options sockopt;
 | |
| 	struct tstamps expected;
 | |
| 	bool enabled;
 | |
| 	bool warn_on_fail;
 | |
| };
 | |
| 
 | |
| struct sof_flag {
 | |
| 	int mask;
 | |
| 	char *name;
 | |
| };
 | |
| 
 | |
| static struct sof_flag sof_flags[] = {
 | |
| #define SOF_FLAG(f) { f, #f }
 | |
| 	SOF_FLAG(SOF_TIMESTAMPING_SOFTWARE),
 | |
| 	SOF_FLAG(SOF_TIMESTAMPING_RX_SOFTWARE),
 | |
| 	SOF_FLAG(SOF_TIMESTAMPING_RX_HARDWARE),
 | |
| 	SOF_FLAG(SOF_TIMESTAMPING_OPT_RX_FILTER),
 | |
| 	SOF_FLAG(SOF_TIMESTAMPING_RAW_HARDWARE),
 | |
| };
 | |
| 
 | |
| static struct socket_type socket_types[] = {
 | |
| 	{ "ip",		SOCK_RAW,	IPPROTO_EGP },
 | |
| 	{ "udp",	SOCK_DGRAM,	IPPROTO_UDP },
 | |
| 	{ "tcp",	SOCK_STREAM,	IPPROTO_TCP },
 | |
| };
 | |
| 
 | |
| static struct test_case test_cases[] = {
 | |
| 	{ {}, {} },
 | |
| 	{
 | |
| 		{ .so_timestamp = 1 },
 | |
| 		{ .tstamp = true }
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestampns = 1 },
 | |
| 		{ .tstampns = true }
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamp = 1, .so_timestampns = 1 },
 | |
| 		{ .tstampns = true }
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE },
 | |
| 		{}
 | |
| 	},
 | |
| 	{
 | |
| 		/* Loopback device does not support hw timestamps. */
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_RX_HARDWARE },
 | |
| 		{}
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE },
 | |
| 		.warn_on_fail = true
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE
 | |
| 			| SOF_TIMESTAMPING_RX_HARDWARE },
 | |
| 		{}
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_RAW_HARDWARE
 | |
| 			| SOF_TIMESTAMPING_OPT_RX_FILTER },
 | |
| 		{}
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
 | |
| 			| SOF_TIMESTAMPING_OPT_RX_FILTER },
 | |
| 		{}
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
 | |
| 			| SOF_TIMESTAMPING_RX_SOFTWARE
 | |
| 			| SOF_TIMESTAMPING_OPT_RX_FILTER },
 | |
| 		{ .swtstamp = true }
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
 | |
| 			| SOF_TIMESTAMPING_RX_SOFTWARE },
 | |
| 		{ .swtstamp = true }
 | |
| 	},
 | |
| 	{
 | |
| 		{ .so_timestamp = 1, .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
 | |
| 			| SOF_TIMESTAMPING_RX_SOFTWARE },
 | |
| 		{ .tstamp = true, .swtstamp = true }
 | |
| 	},
 | |
| };
 | |
| 
 | |
| static struct option long_options[] = {
 | |
| 	{ "list_tests", no_argument, 0, 'l' },
 | |
| 	{ "test_num", required_argument, 0, 'n' },
 | |
| 	{ "op_size", required_argument, 0, 's' },
 | |
| 	{ "tcp", no_argument, 0, 't' },
 | |
| 	{ "udp", no_argument, 0, 'u' },
 | |
| 	{ "ip", no_argument, 0, 'i' },
 | |
| 	{ "strict", no_argument, 0, 'S' },
 | |
| 	{ "ipv4", no_argument, 0, '4' },
 | |
| 	{ "ipv6", no_argument, 0, '6' },
 | |
| 	{ NULL, 0, NULL, 0 },
 | |
| };
 | |
| 
 | |
| static int next_port = 19999;
 | |
| static int op_size = 10 * 1024;
 | |
| 
 | |
| void print_test_case(struct test_case *t)
 | |
| {
 | |
| 	int f = 0;
 | |
| 
 | |
| 	printf("sockopts {");
 | |
| 	if (t->sockopt.so_timestamp)
 | |
| 		printf(" SO_TIMESTAMP ");
 | |
| 	if (t->sockopt.so_timestampns)
 | |
| 		printf(" SO_TIMESTAMPNS ");
 | |
| 	if (t->sockopt.so_timestamping) {
 | |
| 		printf(" SO_TIMESTAMPING: {");
 | |
| 		for (f = 0; f < ARRAY_SIZE(sof_flags); f++)
 | |
| 			if (t->sockopt.so_timestamping & sof_flags[f].mask)
 | |
| 				printf(" %s |", sof_flags[f].name);
 | |
| 		printf("}");
 | |
| 	}
 | |
| 	printf("} expected cmsgs: {");
 | |
| 	if (t->expected.tstamp)
 | |
| 		printf(" SCM_TIMESTAMP ");
 | |
| 	if (t->expected.tstampns)
 | |
| 		printf(" SCM_TIMESTAMPNS ");
 | |
| 	if (t->expected.swtstamp || t->expected.hwtstamp) {
 | |
| 		printf(" SCM_TIMESTAMPING {");
 | |
| 		if (t->expected.swtstamp)
 | |
| 			printf("0");
 | |
| 		if (t->expected.swtstamp && t->expected.hwtstamp)
 | |
| 			printf(",");
 | |
| 		if (t->expected.hwtstamp)
 | |
| 			printf("2");
 | |
| 		printf("}");
 | |
| 	}
 | |
| 	printf("}\n");
 | |
| }
 | |
| 
 | |
| void do_send(int src)
 | |
| {
 | |
| 	int r;
 | |
| 	char *buf = malloc(op_size);
 | |
| 
 | |
| 	memset(buf, 'z', op_size);
 | |
| 	r = write(src, buf, op_size);
 | |
| 	if (r < 0)
 | |
| 		error(1, errno, "Failed to sendmsg");
 | |
| 
 | |
| 	free(buf);
 | |
| }
 | |
| 
 | |
| bool do_recv(int rcv, int read_size, struct tstamps expected)
 | |
| {
 | |
| 	const int CMSG_SIZE = 1024;
 | |
| 
 | |
| 	struct scm_timestamping *ts;
 | |
| 	struct tstamps actual = {};
 | |
| 	char cmsg_buf[CMSG_SIZE];
 | |
| 	struct iovec recv_iov;
 | |
| 	struct cmsghdr *cmsg;
 | |
| 	bool failed = false;
 | |
| 	struct msghdr hdr;
 | |
| 	int flags = 0;
 | |
| 	int r;
 | |
| 
 | |
| 	memset(&hdr, 0, sizeof(hdr));
 | |
| 	hdr.msg_iov = &recv_iov;
 | |
| 	hdr.msg_iovlen = 1;
 | |
| 	recv_iov.iov_base = malloc(read_size);
 | |
| 	recv_iov.iov_len = read_size;
 | |
| 
 | |
| 	hdr.msg_control = cmsg_buf;
 | |
| 	hdr.msg_controllen = sizeof(cmsg_buf);
 | |
| 
 | |
| 	r = recvmsg(rcv, &hdr, flags);
 | |
| 	if (r < 0)
 | |
| 		error(1, errno, "Failed to recvmsg");
 | |
| 	if (r != read_size)
 | |
| 		error(1, 0, "Only received %d bytes of payload.", r);
 | |
| 
 | |
| 	if (hdr.msg_flags & (MSG_TRUNC | MSG_CTRUNC))
 | |
| 		error(1, 0, "Message was truncated.");
 | |
| 
 | |
| 	for (cmsg = CMSG_FIRSTHDR(&hdr); cmsg != NULL;
 | |
| 	     cmsg = CMSG_NXTHDR(&hdr, cmsg)) {
 | |
| 		if (cmsg->cmsg_level != SOL_SOCKET)
 | |
| 			error(1, 0, "Unexpected cmsg_level %d",
 | |
| 			      cmsg->cmsg_level);
 | |
| 		switch (cmsg->cmsg_type) {
 | |
| 		case SCM_TIMESTAMP:
 | |
| 			actual.tstamp = true;
 | |
| 			break;
 | |
| 		case SCM_TIMESTAMPNS:
 | |
| 			actual.tstampns = true;
 | |
| 			break;
 | |
| 		case SCM_TIMESTAMPING:
 | |
| 			ts = (struct scm_timestamping *)CMSG_DATA(cmsg);
 | |
| 			actual.swtstamp = !!ts->ts[0].tv_sec;
 | |
| 			if (ts->ts[1].tv_sec != 0)
 | |
| 				error(0, 0, "ts[1] should not be set.");
 | |
| 			actual.hwtstamp = !!ts->ts[2].tv_sec;
 | |
| 			break;
 | |
| 		default:
 | |
| 			error(1, 0, "Unexpected cmsg_type %d", cmsg->cmsg_type);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| #define VALIDATE(field) \
 | |
| 	do { \
 | |
| 		if (expected.field != actual.field) { \
 | |
| 			if (expected.field) \
 | |
| 				error(0, 0, "Expected " #field " to be set."); \
 | |
| 			else \
 | |
| 				error(0, 0, \
 | |
| 				      "Expected " #field " to not be set."); \
 | |
| 			failed = true; \
 | |
| 		} \
 | |
| 	} while (0)
 | |
| 
 | |
| 	VALIDATE(tstamp);
 | |
| 	VALIDATE(tstampns);
 | |
| 	VALIDATE(swtstamp);
 | |
| 	VALIDATE(hwtstamp);
 | |
| #undef VALIDATE
 | |
| 
 | |
| 	free(recv_iov.iov_base);
 | |
| 
 | |
| 	return failed;
 | |
| }
 | |
| 
 | |
| void config_so_flags(int rcv, struct options o)
 | |
| {
 | |
| 	int on = 1;
 | |
| 
 | |
| 	if (setsockopt(rcv, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0)
 | |
| 		error(1, errno, "Failed to enable SO_REUSEADDR");
 | |
| 
 | |
| 	if (o.so_timestamp &&
 | |
| 	    setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMP,
 | |
| 		       &o.so_timestamp, sizeof(o.so_timestamp)) < 0)
 | |
| 		error(1, errno, "Failed to enable SO_TIMESTAMP");
 | |
| 
 | |
| 	if (o.so_timestampns &&
 | |
| 	    setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMPNS,
 | |
| 		       &o.so_timestampns, sizeof(o.so_timestampns)) < 0)
 | |
| 		error(1, errno, "Failed to enable SO_TIMESTAMPNS");
 | |
| 
 | |
| 	if (o.so_timestamping &&
 | |
| 	    setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMPING,
 | |
| 		       &o.so_timestamping, sizeof(o.so_timestamping)) < 0)
 | |
| 		error(1, errno, "Failed to set SO_TIMESTAMPING");
 | |
| }
 | |
| 
 | |
| bool run_test_case(struct socket_type *s, int test_num, char ip_version,
 | |
| 		   bool strict)
 | |
| {
 | |
| 	union {
 | |
| 		struct sockaddr_in6 addr6;
 | |
| 		struct sockaddr_in addr4;
 | |
| 		struct sockaddr addr_un;
 | |
| 	} addr;
 | |
| 	int read_size = op_size;
 | |
| 	int src, dst, rcv, port;
 | |
| 	socklen_t addr_size;
 | |
| 	bool failed = false;
 | |
| 
 | |
| 	port = (s->type == SOCK_RAW) ? 0 : next_port++;
 | |
| 	memset(&addr, 0, sizeof(addr));
 | |
| 	if (ip_version == '4') {
 | |
| 		addr.addr4.sin_family = AF_INET;
 | |
| 		addr.addr4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
 | |
| 		addr.addr4.sin_port = htons(port);
 | |
| 		addr_size = sizeof(addr.addr4);
 | |
| 		if (s->type == SOCK_RAW)
 | |
| 			read_size += 20;  /* for IPv4 header */
 | |
| 	} else {
 | |
| 		addr.addr6.sin6_family = AF_INET6;
 | |
| 		addr.addr6.sin6_addr = in6addr_loopback;
 | |
| 		addr.addr6.sin6_port = htons(port);
 | |
| 		addr_size = sizeof(addr.addr6);
 | |
| 	}
 | |
| 	printf("Starting testcase %d over ipv%c...\n", test_num, ip_version);
 | |
| 	src = socket(addr.addr_un.sa_family, s->type,
 | |
| 		     s->protocol);
 | |
| 	if (src < 0)
 | |
| 		error(1, errno, "Failed to open src socket");
 | |
| 
 | |
| 	dst = socket(addr.addr_un.sa_family, s->type,
 | |
| 		     s->protocol);
 | |
| 	if (dst < 0)
 | |
| 		error(1, errno, "Failed to open dst socket");
 | |
| 
 | |
| 	if (bind(dst, &addr.addr_un, addr_size) < 0)
 | |
| 		error(1, errno, "Failed to bind to port %d", port);
 | |
| 
 | |
| 	if (s->type == SOCK_STREAM && (listen(dst, 1) < 0))
 | |
| 		error(1, errno, "Failed to listen");
 | |
| 
 | |
| 	if (connect(src, &addr.addr_un, addr_size) < 0)
 | |
| 		error(1, errno, "Failed to connect");
 | |
| 
 | |
| 	if (s->type == SOCK_STREAM) {
 | |
| 		rcv = accept(dst, NULL, NULL);
 | |
| 		if (rcv < 0)
 | |
| 			error(1, errno, "Failed to accept");
 | |
| 		close(dst);
 | |
| 	} else {
 | |
| 		rcv = dst;
 | |
| 	}
 | |
| 
 | |
| 	config_so_flags(rcv, test_cases[test_num].sockopt);
 | |
| 	usleep(20000); /* setsockopt for SO_TIMESTAMPING is asynchronous */
 | |
| 	do_send(src);
 | |
| 
 | |
| 	failed = do_recv(rcv, read_size, test_cases[test_num].expected);
 | |
| 
 | |
| 	close(rcv);
 | |
| 	close(src);
 | |
| 
 | |
| 	if (failed) {
 | |
| 		printf("FAILURE in testcase %d over ipv%c ", test_num,
 | |
| 		       ip_version);
 | |
| 		print_test_case(&test_cases[test_num]);
 | |
| 		if (!strict && test_cases[test_num].warn_on_fail)
 | |
| 			failed = false;
 | |
| 	}
 | |
| 	return failed;
 | |
| }
 | |
| 
 | |
| int main(int argc, char **argv)
 | |
| {
 | |
| 	bool all_protocols = true;
 | |
| 	bool all_tests = true;
 | |
| 	bool cfg_ipv4 = false;
 | |
| 	bool cfg_ipv6 = false;
 | |
| 	bool strict = false;
 | |
| 	int arg_index = 0;
 | |
| 	int failures = 0;
 | |
| 	int s, t, opt;
 | |
| 
 | |
| 	while ((opt = getopt_long(argc, argv, "", long_options,
 | |
| 				  &arg_index)) != -1) {
 | |
| 		switch (opt) {
 | |
| 		case 'l':
 | |
| 			for (t = 0; t < ARRAY_SIZE(test_cases); t++) {
 | |
| 				printf("%d\t", t);
 | |
| 				print_test_case(&test_cases[t]);
 | |
| 			}
 | |
| 			return 0;
 | |
| 		case 'n':
 | |
| 			t = atoi(optarg);
 | |
| 			if (t >= ARRAY_SIZE(test_cases))
 | |
| 				error(1, 0, "Invalid test case: %d", t);
 | |
| 			all_tests = false;
 | |
| 			test_cases[t].enabled = true;
 | |
| 			break;
 | |
| 		case 's':
 | |
| 			op_size = atoi(optarg);
 | |
| 			break;
 | |
| 		case 't':
 | |
| 			all_protocols = false;
 | |
| 			socket_types[2].enabled = true;
 | |
| 			break;
 | |
| 		case 'u':
 | |
| 			all_protocols = false;
 | |
| 			socket_types[1].enabled = true;
 | |
| 			break;
 | |
| 		case 'i':
 | |
| 			all_protocols = false;
 | |
| 			socket_types[0].enabled = true;
 | |
| 			break;
 | |
| 		case 'S':
 | |
| 			strict = true;
 | |
| 			break;
 | |
| 		case '4':
 | |
| 			cfg_ipv4 = true;
 | |
| 			break;
 | |
| 		case '6':
 | |
| 			cfg_ipv6 = true;
 | |
| 			break;
 | |
| 		default:
 | |
| 			error(1, 0, "Failed to parse parameters.");
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	for (s = 0; s < ARRAY_SIZE(socket_types); s++) {
 | |
| 		if (!all_protocols && !socket_types[s].enabled)
 | |
| 			continue;
 | |
| 
 | |
| 		printf("Testing %s...\n", socket_types[s].friendly_name);
 | |
| 		for (t = 0; t < ARRAY_SIZE(test_cases); t++) {
 | |
| 			if (!all_tests && !test_cases[t].enabled)
 | |
| 				continue;
 | |
| 			if (cfg_ipv4 || !cfg_ipv6)
 | |
| 				if (run_test_case(&socket_types[s], t, '4',
 | |
| 						  strict))
 | |
| 					failures++;
 | |
| 			if (cfg_ipv6 || !cfg_ipv4)
 | |
| 				if (run_test_case(&socket_types[s], t, '6',
 | |
| 						  strict))
 | |
| 					failures++;
 | |
| 		}
 | |
| 	}
 | |
| 	if (!failures)
 | |
| 		printf("PASSED.\n");
 | |
| 	return failures;
 | |
| }
 |