txtimestamp.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright 2014 Google Inc.
  4. * Author: [email protected] (Willem de Bruijn)
  5. *
  6. * Test software tx timestamping, including
  7. *
  8. * - SCHED, SND and ACK timestamps
  9. * - RAW, UDP and TCP
  10. * - IPv4 and IPv6
  11. * - various packet sizes (to test GSO and TSO)
  12. *
  13. * Consult the command line arguments for help on running
  14. * the various testcases.
  15. *
  16. * This test requires a dummy TCP server.
  17. * A simple `nc6 [-u] -l -p $DESTPORT` will do
  18. */
  19. #define _GNU_SOURCE
  20. #include <arpa/inet.h>
  21. #include <asm/types.h>
  22. #include <error.h>
  23. #include <errno.h>
  24. #include <inttypes.h>
  25. #include <linux/errqueue.h>
  26. #include <linux/if_ether.h>
  27. #include <linux/if_packet.h>
  28. #include <linux/ipv6.h>
  29. #include <linux/net_tstamp.h>
  30. #include <netdb.h>
  31. #include <net/if.h>
  32. #include <netinet/in.h>
  33. #include <netinet/ip.h>
  34. #include <netinet/udp.h>
  35. #include <netinet/tcp.h>
  36. #include <poll.h>
  37. #include <stdarg.h>
  38. #include <stdbool.h>
  39. #include <stdio.h>
  40. #include <stdlib.h>
  41. #include <string.h>
  42. #include <sys/epoll.h>
  43. #include <sys/ioctl.h>
  44. #include <sys/select.h>
  45. #include <sys/socket.h>
  46. #include <sys/time.h>
  47. #include <sys/types.h>
  48. #include <time.h>
  49. #include <unistd.h>
  50. #define NSEC_PER_USEC 1000L
  51. #define USEC_PER_SEC 1000000L
  52. #define NSEC_PER_SEC 1000000000LL
  53. /* command line parameters */
  54. static int cfg_proto = SOCK_STREAM;
  55. static int cfg_ipproto = IPPROTO_TCP;
  56. static int cfg_num_pkts = 4;
  57. static int do_ipv4 = 1;
  58. static int do_ipv6 = 1;
  59. static int cfg_payload_len = 10;
  60. static int cfg_poll_timeout = 100;
  61. static int cfg_delay_snd;
  62. static int cfg_delay_ack;
  63. static int cfg_delay_tolerance_usec = 500;
  64. static bool cfg_show_payload;
  65. static bool cfg_do_pktinfo;
  66. static bool cfg_busy_poll;
  67. static int cfg_sleep_usec = 50 * 1000;
  68. static bool cfg_loop_nodata;
  69. static bool cfg_use_cmsg;
  70. static bool cfg_use_pf_packet;
  71. static bool cfg_use_epoll;
  72. static bool cfg_epollet;
  73. static bool cfg_do_listen;
  74. static uint16_t dest_port = 9000;
  75. static bool cfg_print_nsec;
  76. static struct sockaddr_in daddr;
  77. static struct sockaddr_in6 daddr6;
  78. static struct timespec ts_usr;
  79. static int saved_tskey = -1;
  80. static int saved_tskey_type = -1;
  81. struct timing_event {
  82. int64_t min;
  83. int64_t max;
  84. int64_t total;
  85. int count;
  86. };
  87. static struct timing_event usr_enq;
  88. static struct timing_event usr_snd;
  89. static struct timing_event usr_ack;
  90. static bool test_failed;
  91. static int64_t timespec_to_ns64(struct timespec *ts)
  92. {
  93. return ts->tv_sec * NSEC_PER_SEC + ts->tv_nsec;
  94. }
  95. static int64_t timespec_to_us64(struct timespec *ts)
  96. {
  97. return ts->tv_sec * USEC_PER_SEC + ts->tv_nsec / NSEC_PER_USEC;
  98. }
  99. static void init_timing_event(struct timing_event *te)
  100. {
  101. te->min = INT64_MAX;
  102. te->max = 0;
  103. te->total = 0;
  104. te->count = 0;
  105. }
  106. static void add_timing_event(struct timing_event *te,
  107. struct timespec *t_start, struct timespec *t_end)
  108. {
  109. int64_t ts_delta = timespec_to_ns64(t_end) - timespec_to_ns64(t_start);
  110. te->count++;
  111. if (ts_delta < te->min)
  112. te->min = ts_delta;
  113. if (ts_delta > te->max)
  114. te->max = ts_delta;
  115. te->total += ts_delta;
  116. }
  117. static void validate_key(int tskey, int tstype)
  118. {
  119. int stepsize;
  120. /* compare key for each subsequent request
  121. * must only test for one type, the first one requested
  122. */
  123. if (saved_tskey == -1)
  124. saved_tskey_type = tstype;
  125. else if (saved_tskey_type != tstype)
  126. return;
  127. stepsize = cfg_proto == SOCK_STREAM ? cfg_payload_len : 1;
  128. if (tskey != saved_tskey + stepsize) {
  129. fprintf(stderr, "ERROR: key %d, expected %d\n",
  130. tskey, saved_tskey + stepsize);
  131. test_failed = true;
  132. }
  133. saved_tskey = tskey;
  134. }
  135. static void validate_timestamp(struct timespec *cur, int min_delay)
  136. {
  137. int64_t cur64, start64;
  138. int max_delay;
  139. cur64 = timespec_to_us64(cur);
  140. start64 = timespec_to_us64(&ts_usr);
  141. max_delay = min_delay + cfg_delay_tolerance_usec;
  142. if (cur64 < start64 + min_delay || cur64 > start64 + max_delay) {
  143. fprintf(stderr, "ERROR: %" PRId64 " us expected between %d and %d\n",
  144. cur64 - start64, min_delay, max_delay);
  145. test_failed = true;
  146. }
  147. }
  148. static void __print_ts_delta_formatted(int64_t ts_delta)
  149. {
  150. if (cfg_print_nsec)
  151. fprintf(stderr, "%" PRId64 " ns", ts_delta);
  152. else
  153. fprintf(stderr, "%" PRId64 " us", ts_delta / NSEC_PER_USEC);
  154. }
  155. static void __print_timestamp(const char *name, struct timespec *cur,
  156. uint32_t key, int payload_len)
  157. {
  158. int64_t ts_delta;
  159. if (!(cur->tv_sec | cur->tv_nsec))
  160. return;
  161. if (cfg_print_nsec)
  162. fprintf(stderr, " %s: %lu s %lu ns (seq=%u, len=%u)",
  163. name, cur->tv_sec, cur->tv_nsec,
  164. key, payload_len);
  165. else
  166. fprintf(stderr, " %s: %lu s %lu us (seq=%u, len=%u)",
  167. name, cur->tv_sec, cur->tv_nsec / NSEC_PER_USEC,
  168. key, payload_len);
  169. if (cur != &ts_usr) {
  170. ts_delta = timespec_to_ns64(cur) - timespec_to_ns64(&ts_usr);
  171. fprintf(stderr, " (USR +");
  172. __print_ts_delta_formatted(ts_delta);
  173. fprintf(stderr, ")");
  174. }
  175. fprintf(stderr, "\n");
  176. }
  177. static void print_timestamp_usr(void)
  178. {
  179. if (clock_gettime(CLOCK_REALTIME, &ts_usr))
  180. error(1, errno, "clock_gettime");
  181. __print_timestamp(" USR", &ts_usr, 0, 0);
  182. }
  183. static void print_timestamp(struct scm_timestamping *tss, int tstype,
  184. int tskey, int payload_len)
  185. {
  186. const char *tsname;
  187. validate_key(tskey, tstype);
  188. switch (tstype) {
  189. case SCM_TSTAMP_SCHED:
  190. tsname = " ENQ";
  191. validate_timestamp(&tss->ts[0], 0);
  192. add_timing_event(&usr_enq, &ts_usr, &tss->ts[0]);
  193. break;
  194. case SCM_TSTAMP_SND:
  195. tsname = " SND";
  196. validate_timestamp(&tss->ts[0], cfg_delay_snd);
  197. add_timing_event(&usr_snd, &ts_usr, &tss->ts[0]);
  198. break;
  199. case SCM_TSTAMP_ACK:
  200. tsname = " ACK";
  201. validate_timestamp(&tss->ts[0], cfg_delay_ack);
  202. add_timing_event(&usr_ack, &ts_usr, &tss->ts[0]);
  203. break;
  204. default:
  205. error(1, 0, "unknown timestamp type: %u",
  206. tstype);
  207. }
  208. __print_timestamp(tsname, &tss->ts[0], tskey, payload_len);
  209. }
  210. static void print_timing_event(char *name, struct timing_event *te)
  211. {
  212. if (!te->count)
  213. return;
  214. fprintf(stderr, " %s: count=%d", name, te->count);
  215. fprintf(stderr, ", avg=");
  216. __print_ts_delta_formatted((int64_t)(te->total / te->count));
  217. fprintf(stderr, ", min=");
  218. __print_ts_delta_formatted(te->min);
  219. fprintf(stderr, ", max=");
  220. __print_ts_delta_formatted(te->max);
  221. fprintf(stderr, "\n");
  222. }
  223. /* TODO: convert to check_and_print payload once API is stable */
  224. static void print_payload(char *data, int len)
  225. {
  226. int i;
  227. if (!len)
  228. return;
  229. if (len > 70)
  230. len = 70;
  231. fprintf(stderr, "payload: ");
  232. for (i = 0; i < len; i++)
  233. fprintf(stderr, "%02hhx ", data[i]);
  234. fprintf(stderr, "\n");
  235. }
  236. static void print_pktinfo(int family, int ifindex, void *saddr, void *daddr)
  237. {
  238. char sa[INET6_ADDRSTRLEN], da[INET6_ADDRSTRLEN];
  239. fprintf(stderr, " pktinfo: ifindex=%u src=%s dst=%s\n",
  240. ifindex,
  241. saddr ? inet_ntop(family, saddr, sa, sizeof(sa)) : "unknown",
  242. daddr ? inet_ntop(family, daddr, da, sizeof(da)) : "unknown");
  243. }
  244. static void __epoll(int epfd)
  245. {
  246. struct epoll_event events;
  247. int ret;
  248. memset(&events, 0, sizeof(events));
  249. ret = epoll_wait(epfd, &events, 1, cfg_poll_timeout);
  250. if (ret != 1)
  251. error(1, errno, "epoll_wait");
  252. }
  253. static void __poll(int fd)
  254. {
  255. struct pollfd pollfd;
  256. int ret;
  257. memset(&pollfd, 0, sizeof(pollfd));
  258. pollfd.fd = fd;
  259. ret = poll(&pollfd, 1, cfg_poll_timeout);
  260. if (ret != 1)
  261. error(1, errno, "poll");
  262. }
  263. static void __recv_errmsg_cmsg(struct msghdr *msg, int payload_len)
  264. {
  265. struct sock_extended_err *serr = NULL;
  266. struct scm_timestamping *tss = NULL;
  267. struct cmsghdr *cm;
  268. int batch = 0;
  269. for (cm = CMSG_FIRSTHDR(msg);
  270. cm && cm->cmsg_len;
  271. cm = CMSG_NXTHDR(msg, cm)) {
  272. if (cm->cmsg_level == SOL_SOCKET &&
  273. cm->cmsg_type == SCM_TIMESTAMPING) {
  274. tss = (void *) CMSG_DATA(cm);
  275. } else if ((cm->cmsg_level == SOL_IP &&
  276. cm->cmsg_type == IP_RECVERR) ||
  277. (cm->cmsg_level == SOL_IPV6 &&
  278. cm->cmsg_type == IPV6_RECVERR) ||
  279. (cm->cmsg_level == SOL_PACKET &&
  280. cm->cmsg_type == PACKET_TX_TIMESTAMP)) {
  281. serr = (void *) CMSG_DATA(cm);
  282. if (serr->ee_errno != ENOMSG ||
  283. serr->ee_origin != SO_EE_ORIGIN_TIMESTAMPING) {
  284. fprintf(stderr, "unknown ip error %d %d\n",
  285. serr->ee_errno,
  286. serr->ee_origin);
  287. serr = NULL;
  288. }
  289. } else if (cm->cmsg_level == SOL_IP &&
  290. cm->cmsg_type == IP_PKTINFO) {
  291. struct in_pktinfo *info = (void *) CMSG_DATA(cm);
  292. print_pktinfo(AF_INET, info->ipi_ifindex,
  293. &info->ipi_spec_dst, &info->ipi_addr);
  294. } else if (cm->cmsg_level == SOL_IPV6 &&
  295. cm->cmsg_type == IPV6_PKTINFO) {
  296. struct in6_pktinfo *info6 = (void *) CMSG_DATA(cm);
  297. print_pktinfo(AF_INET6, info6->ipi6_ifindex,
  298. NULL, &info6->ipi6_addr);
  299. } else
  300. fprintf(stderr, "unknown cmsg %d,%d\n",
  301. cm->cmsg_level, cm->cmsg_type);
  302. if (serr && tss) {
  303. print_timestamp(tss, serr->ee_info, serr->ee_data,
  304. payload_len);
  305. serr = NULL;
  306. tss = NULL;
  307. batch++;
  308. }
  309. }
  310. if (batch > 1)
  311. fprintf(stderr, "batched %d timestamps\n", batch);
  312. }
  313. static int recv_errmsg(int fd)
  314. {
  315. static char ctrl[1024 /* overprovision*/];
  316. static struct msghdr msg;
  317. struct iovec entry;
  318. static char *data;
  319. int ret = 0;
  320. data = malloc(cfg_payload_len);
  321. if (!data)
  322. error(1, 0, "malloc");
  323. memset(&msg, 0, sizeof(msg));
  324. memset(&entry, 0, sizeof(entry));
  325. memset(ctrl, 0, sizeof(ctrl));
  326. entry.iov_base = data;
  327. entry.iov_len = cfg_payload_len;
  328. msg.msg_iov = &entry;
  329. msg.msg_iovlen = 1;
  330. msg.msg_name = NULL;
  331. msg.msg_namelen = 0;
  332. msg.msg_control = ctrl;
  333. msg.msg_controllen = sizeof(ctrl);
  334. ret = recvmsg(fd, &msg, MSG_ERRQUEUE);
  335. if (ret == -1 && errno != EAGAIN)
  336. error(1, errno, "recvmsg");
  337. if (ret >= 0) {
  338. __recv_errmsg_cmsg(&msg, ret);
  339. if (cfg_show_payload)
  340. print_payload(data, cfg_payload_len);
  341. }
  342. free(data);
  343. return ret == -1;
  344. }
  345. static uint16_t get_ip_csum(const uint16_t *start, int num_words,
  346. unsigned long sum)
  347. {
  348. int i;
  349. for (i = 0; i < num_words; i++)
  350. sum += start[i];
  351. while (sum >> 16)
  352. sum = (sum & 0xFFFF) + (sum >> 16);
  353. return ~sum;
  354. }
  355. static uint16_t get_udp_csum(const struct udphdr *udph, int alen)
  356. {
  357. unsigned long pseudo_sum, csum_len;
  358. const void *csum_start = udph;
  359. pseudo_sum = htons(IPPROTO_UDP);
  360. pseudo_sum += udph->len;
  361. /* checksum ip(v6) addresses + udp header + payload */
  362. csum_start -= alen * 2;
  363. csum_len = ntohs(udph->len) + alen * 2;
  364. return get_ip_csum(csum_start, csum_len >> 1, pseudo_sum);
  365. }
  366. static int fill_header_ipv4(void *p)
  367. {
  368. struct iphdr *iph = p;
  369. memset(iph, 0, sizeof(*iph));
  370. iph->ihl = 5;
  371. iph->version = 4;
  372. iph->ttl = 2;
  373. iph->saddr = daddr.sin_addr.s_addr; /* set for udp csum calc */
  374. iph->daddr = daddr.sin_addr.s_addr;
  375. iph->protocol = IPPROTO_UDP;
  376. /* kernel writes saddr, csum, len */
  377. return sizeof(*iph);
  378. }
  379. static int fill_header_ipv6(void *p)
  380. {
  381. struct ipv6hdr *ip6h = p;
  382. memset(ip6h, 0, sizeof(*ip6h));
  383. ip6h->version = 6;
  384. ip6h->payload_len = htons(sizeof(struct udphdr) + cfg_payload_len);
  385. ip6h->nexthdr = IPPROTO_UDP;
  386. ip6h->hop_limit = 64;
  387. ip6h->saddr = daddr6.sin6_addr;
  388. ip6h->daddr = daddr6.sin6_addr;
  389. /* kernel does not write saddr in case of ipv6 */
  390. return sizeof(*ip6h);
  391. }
  392. static void fill_header_udp(void *p, bool is_ipv4)
  393. {
  394. struct udphdr *udph = p;
  395. udph->source = ntohs(dest_port + 1); /* spoof */
  396. udph->dest = ntohs(dest_port);
  397. udph->len = ntohs(sizeof(*udph) + cfg_payload_len);
  398. udph->check = 0;
  399. udph->check = get_udp_csum(udph, is_ipv4 ? sizeof(struct in_addr) :
  400. sizeof(struct in6_addr));
  401. }
  402. static void do_test(int family, unsigned int report_opt)
  403. {
  404. char control[CMSG_SPACE(sizeof(uint32_t))];
  405. struct sockaddr_ll laddr;
  406. unsigned int sock_opt;
  407. struct cmsghdr *cmsg;
  408. struct msghdr msg;
  409. struct iovec iov;
  410. char *buf;
  411. int fd, i, val = 1, total_len, epfd = 0;
  412. init_timing_event(&usr_enq);
  413. init_timing_event(&usr_snd);
  414. init_timing_event(&usr_ack);
  415. total_len = cfg_payload_len;
  416. if (cfg_use_pf_packet || cfg_proto == SOCK_RAW) {
  417. total_len += sizeof(struct udphdr);
  418. if (cfg_use_pf_packet || cfg_ipproto == IPPROTO_RAW) {
  419. if (family == PF_INET)
  420. total_len += sizeof(struct iphdr);
  421. else
  422. total_len += sizeof(struct ipv6hdr);
  423. }
  424. /* special case, only rawv6_sendmsg:
  425. * pass proto in sin6_port if not connected
  426. * also see ANK comment in net/ipv4/raw.c
  427. */
  428. daddr6.sin6_port = htons(cfg_ipproto);
  429. }
  430. buf = malloc(total_len);
  431. if (!buf)
  432. error(1, 0, "malloc");
  433. fd = socket(cfg_use_pf_packet ? PF_PACKET : family,
  434. cfg_proto, cfg_ipproto);
  435. if (fd < 0)
  436. error(1, errno, "socket");
  437. if (cfg_use_epoll) {
  438. struct epoll_event ev;
  439. memset(&ev, 0, sizeof(ev));
  440. ev.data.fd = fd;
  441. if (cfg_epollet)
  442. ev.events |= EPOLLET;
  443. epfd = epoll_create(1);
  444. if (epfd <= 0)
  445. error(1, errno, "epoll_create");
  446. if (epoll_ctl(epfd, EPOLL_CTL_ADD, fd, &ev))
  447. error(1, errno, "epoll_ctl");
  448. }
  449. /* reset expected key on each new socket */
  450. saved_tskey = -1;
  451. if (cfg_proto == SOCK_STREAM) {
  452. if (setsockopt(fd, IPPROTO_TCP, TCP_NODELAY,
  453. (char*) &val, sizeof(val)))
  454. error(1, 0, "setsockopt no nagle");
  455. if (family == PF_INET) {
  456. if (connect(fd, (void *) &daddr, sizeof(daddr)))
  457. error(1, errno, "connect ipv4");
  458. } else {
  459. if (connect(fd, (void *) &daddr6, sizeof(daddr6)))
  460. error(1, errno, "connect ipv6");
  461. }
  462. }
  463. if (cfg_do_pktinfo) {
  464. if (family == AF_INET6) {
  465. if (setsockopt(fd, SOL_IPV6, IPV6_RECVPKTINFO,
  466. &val, sizeof(val)))
  467. error(1, errno, "setsockopt pktinfo ipv6");
  468. } else {
  469. if (setsockopt(fd, SOL_IP, IP_PKTINFO,
  470. &val, sizeof(val)))
  471. error(1, errno, "setsockopt pktinfo ipv4");
  472. }
  473. }
  474. sock_opt = SOF_TIMESTAMPING_SOFTWARE |
  475. SOF_TIMESTAMPING_OPT_CMSG |
  476. SOF_TIMESTAMPING_OPT_ID;
  477. if (!cfg_use_cmsg)
  478. sock_opt |= report_opt;
  479. if (cfg_loop_nodata)
  480. sock_opt |= SOF_TIMESTAMPING_OPT_TSONLY;
  481. if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMPING,
  482. (char *) &sock_opt, sizeof(sock_opt)))
  483. error(1, 0, "setsockopt timestamping");
  484. for (i = 0; i < cfg_num_pkts; i++) {
  485. memset(&msg, 0, sizeof(msg));
  486. memset(buf, 'a' + i, total_len);
  487. if (cfg_use_pf_packet || cfg_proto == SOCK_RAW) {
  488. int off = 0;
  489. if (cfg_use_pf_packet || cfg_ipproto == IPPROTO_RAW) {
  490. if (family == PF_INET)
  491. off = fill_header_ipv4(buf);
  492. else
  493. off = fill_header_ipv6(buf);
  494. }
  495. fill_header_udp(buf + off, family == PF_INET);
  496. }
  497. print_timestamp_usr();
  498. iov.iov_base = buf;
  499. iov.iov_len = total_len;
  500. if (cfg_proto != SOCK_STREAM) {
  501. if (cfg_use_pf_packet) {
  502. memset(&laddr, 0, sizeof(laddr));
  503. laddr.sll_family = AF_PACKET;
  504. laddr.sll_ifindex = 1;
  505. laddr.sll_protocol = htons(family == AF_INET ? ETH_P_IP : ETH_P_IPV6);
  506. laddr.sll_halen = ETH_ALEN;
  507. msg.msg_name = (void *)&laddr;
  508. msg.msg_namelen = sizeof(laddr);
  509. } else if (family == PF_INET) {
  510. msg.msg_name = (void *)&daddr;
  511. msg.msg_namelen = sizeof(daddr);
  512. } else {
  513. msg.msg_name = (void *)&daddr6;
  514. msg.msg_namelen = sizeof(daddr6);
  515. }
  516. }
  517. msg.msg_iov = &iov;
  518. msg.msg_iovlen = 1;
  519. if (cfg_use_cmsg) {
  520. memset(control, 0, sizeof(control));
  521. msg.msg_control = control;
  522. msg.msg_controllen = sizeof(control);
  523. cmsg = CMSG_FIRSTHDR(&msg);
  524. cmsg->cmsg_level = SOL_SOCKET;
  525. cmsg->cmsg_type = SO_TIMESTAMPING;
  526. cmsg->cmsg_len = CMSG_LEN(sizeof(uint32_t));
  527. *((uint32_t *) CMSG_DATA(cmsg)) = report_opt;
  528. }
  529. val = sendmsg(fd, &msg, 0);
  530. if (val != total_len)
  531. error(1, errno, "send");
  532. /* wait for all errors to be queued, else ACKs arrive OOO */
  533. if (cfg_sleep_usec)
  534. usleep(cfg_sleep_usec);
  535. if (!cfg_busy_poll) {
  536. if (cfg_use_epoll)
  537. __epoll(epfd);
  538. else
  539. __poll(fd);
  540. }
  541. while (!recv_errmsg(fd)) {}
  542. }
  543. print_timing_event("USR-ENQ", &usr_enq);
  544. print_timing_event("USR-SND", &usr_snd);
  545. print_timing_event("USR-ACK", &usr_ack);
  546. if (close(fd))
  547. error(1, errno, "close");
  548. free(buf);
  549. usleep(100 * NSEC_PER_USEC);
  550. }
  551. static void __attribute__((noreturn)) usage(const char *filepath)
  552. {
  553. fprintf(stderr, "\nUsage: %s [options] hostname\n"
  554. "\nwhere options are:\n"
  555. " -4: only IPv4\n"
  556. " -6: only IPv6\n"
  557. " -h: show this message\n"
  558. " -b: busy poll to read from error queue\n"
  559. " -c N: number of packets for each test\n"
  560. " -C: use cmsg to set tstamp recording options\n"
  561. " -e: use level-triggered epoll() instead of poll()\n"
  562. " -E: use event-triggered epoll() instead of poll()\n"
  563. " -F: poll()/epoll() waits forever for an event\n"
  564. " -I: request PKTINFO\n"
  565. " -l N: send N bytes at a time\n"
  566. " -L listen on hostname and port\n"
  567. " -n: set no-payload option\n"
  568. " -N: print timestamps and durations in nsec (instead of usec)\n"
  569. " -p N: connect to port N\n"
  570. " -P: use PF_PACKET\n"
  571. " -r: use raw\n"
  572. " -R: use raw (IP_HDRINCL)\n"
  573. " -S N: usec to sleep before reading error queue\n"
  574. " -t N: tolerance (usec) for timestamp validation\n"
  575. " -u: use udp\n"
  576. " -v: validate SND delay (usec)\n"
  577. " -V: validate ACK delay (usec)\n"
  578. " -x: show payload (up to 70 bytes)\n",
  579. filepath);
  580. exit(1);
  581. }
  582. static void parse_opt(int argc, char **argv)
  583. {
  584. int proto_count = 0;
  585. int c;
  586. while ((c = getopt(argc, argv,
  587. "46bc:CeEFhIl:LnNp:PrRS:t:uv:V:x")) != -1) {
  588. switch (c) {
  589. case '4':
  590. do_ipv6 = 0;
  591. break;
  592. case '6':
  593. do_ipv4 = 0;
  594. break;
  595. case 'b':
  596. cfg_busy_poll = true;
  597. break;
  598. case 'c':
  599. cfg_num_pkts = strtoul(optarg, NULL, 10);
  600. break;
  601. case 'C':
  602. cfg_use_cmsg = true;
  603. break;
  604. case 'e':
  605. cfg_use_epoll = true;
  606. break;
  607. case 'E':
  608. cfg_use_epoll = true;
  609. cfg_epollet = true;
  610. case 'F':
  611. cfg_poll_timeout = -1;
  612. break;
  613. case 'I':
  614. cfg_do_pktinfo = true;
  615. break;
  616. case 'l':
  617. cfg_payload_len = strtoul(optarg, NULL, 10);
  618. break;
  619. case 'L':
  620. cfg_do_listen = true;
  621. break;
  622. case 'n':
  623. cfg_loop_nodata = true;
  624. break;
  625. case 'N':
  626. cfg_print_nsec = true;
  627. break;
  628. case 'p':
  629. dest_port = strtoul(optarg, NULL, 10);
  630. break;
  631. case 'P':
  632. proto_count++;
  633. cfg_use_pf_packet = true;
  634. cfg_proto = SOCK_DGRAM;
  635. cfg_ipproto = 0;
  636. break;
  637. case 'r':
  638. proto_count++;
  639. cfg_proto = SOCK_RAW;
  640. cfg_ipproto = IPPROTO_UDP;
  641. break;
  642. case 'R':
  643. proto_count++;
  644. cfg_proto = SOCK_RAW;
  645. cfg_ipproto = IPPROTO_RAW;
  646. break;
  647. case 'S':
  648. cfg_sleep_usec = strtoul(optarg, NULL, 10);
  649. break;
  650. case 't':
  651. cfg_delay_tolerance_usec = strtoul(optarg, NULL, 10);
  652. break;
  653. case 'u':
  654. proto_count++;
  655. cfg_proto = SOCK_DGRAM;
  656. cfg_ipproto = IPPROTO_UDP;
  657. break;
  658. case 'v':
  659. cfg_delay_snd = strtoul(optarg, NULL, 10);
  660. break;
  661. case 'V':
  662. cfg_delay_ack = strtoul(optarg, NULL, 10);
  663. break;
  664. case 'x':
  665. cfg_show_payload = true;
  666. break;
  667. case 'h':
  668. default:
  669. usage(argv[0]);
  670. }
  671. }
  672. if (!cfg_payload_len)
  673. error(1, 0, "payload may not be nonzero");
  674. if (cfg_proto != SOCK_STREAM && cfg_payload_len > 1472)
  675. error(1, 0, "udp packet might exceed expected MTU");
  676. if (!do_ipv4 && !do_ipv6)
  677. error(1, 0, "pass -4 or -6, not both");
  678. if (proto_count > 1)
  679. error(1, 0, "pass -P, -r, -R or -u, not multiple");
  680. if (cfg_do_pktinfo && cfg_use_pf_packet)
  681. error(1, 0, "cannot ask for pktinfo over pf_packet");
  682. if (cfg_busy_poll && cfg_use_epoll)
  683. error(1, 0, "pass epoll or busy_poll, not both");
  684. if (optind != argc - 1)
  685. error(1, 0, "missing required hostname argument");
  686. }
  687. static void resolve_hostname(const char *hostname)
  688. {
  689. struct addrinfo hints = { .ai_family = do_ipv4 ? AF_INET : AF_INET6 };
  690. struct addrinfo *addrs, *cur;
  691. int have_ipv4 = 0, have_ipv6 = 0;
  692. retry:
  693. if (getaddrinfo(hostname, NULL, &hints, &addrs))
  694. error(1, errno, "getaddrinfo");
  695. cur = addrs;
  696. while (cur && !have_ipv4 && !have_ipv6) {
  697. if (!have_ipv4 && cur->ai_family == AF_INET) {
  698. memcpy(&daddr, cur->ai_addr, sizeof(daddr));
  699. daddr.sin_port = htons(dest_port);
  700. have_ipv4 = 1;
  701. }
  702. else if (!have_ipv6 && cur->ai_family == AF_INET6) {
  703. memcpy(&daddr6, cur->ai_addr, sizeof(daddr6));
  704. daddr6.sin6_port = htons(dest_port);
  705. have_ipv6 = 1;
  706. }
  707. cur = cur->ai_next;
  708. }
  709. if (addrs)
  710. freeaddrinfo(addrs);
  711. if (do_ipv6 && hints.ai_family != AF_INET6) {
  712. hints.ai_family = AF_INET6;
  713. goto retry;
  714. }
  715. do_ipv4 &= have_ipv4;
  716. do_ipv6 &= have_ipv6;
  717. }
  718. static void do_listen(int family, void *addr, int alen)
  719. {
  720. int fd, type;
  721. type = cfg_proto == SOCK_RAW ? SOCK_DGRAM : cfg_proto;
  722. fd = socket(family, type, 0);
  723. if (fd == -1)
  724. error(1, errno, "socket rx");
  725. if (bind(fd, addr, alen))
  726. error(1, errno, "bind rx");
  727. if (type == SOCK_STREAM && listen(fd, 10))
  728. error(1, errno, "listen rx");
  729. /* leave fd open, will be closed on process exit.
  730. * this enables connect() to succeed and avoids icmp replies
  731. */
  732. }
  733. static void do_main(int family)
  734. {
  735. fprintf(stderr, "family: %s %s\n",
  736. family == PF_INET ? "INET" : "INET6",
  737. cfg_use_pf_packet ? "(PF_PACKET)" : "");
  738. fprintf(stderr, "test SND\n");
  739. do_test(family, SOF_TIMESTAMPING_TX_SOFTWARE);
  740. fprintf(stderr, "test ENQ\n");
  741. do_test(family, SOF_TIMESTAMPING_TX_SCHED);
  742. fprintf(stderr, "test ENQ + SND\n");
  743. do_test(family, SOF_TIMESTAMPING_TX_SCHED |
  744. SOF_TIMESTAMPING_TX_SOFTWARE);
  745. if (cfg_proto == SOCK_STREAM) {
  746. fprintf(stderr, "\ntest ACK\n");
  747. do_test(family, SOF_TIMESTAMPING_TX_ACK);
  748. fprintf(stderr, "\ntest SND + ACK\n");
  749. do_test(family, SOF_TIMESTAMPING_TX_SOFTWARE |
  750. SOF_TIMESTAMPING_TX_ACK);
  751. fprintf(stderr, "\ntest ENQ + SND + ACK\n");
  752. do_test(family, SOF_TIMESTAMPING_TX_SCHED |
  753. SOF_TIMESTAMPING_TX_SOFTWARE |
  754. SOF_TIMESTAMPING_TX_ACK);
  755. }
  756. }
  757. const char *sock_names[] = { NULL, "TCP", "UDP", "RAW" };
  758. int main(int argc, char **argv)
  759. {
  760. if (argc == 1)
  761. usage(argv[0]);
  762. parse_opt(argc, argv);
  763. resolve_hostname(argv[argc - 1]);
  764. fprintf(stderr, "protocol: %s\n", sock_names[cfg_proto]);
  765. fprintf(stderr, "payload: %u\n", cfg_payload_len);
  766. fprintf(stderr, "server port: %u\n", dest_port);
  767. fprintf(stderr, "\n");
  768. if (do_ipv4) {
  769. if (cfg_do_listen)
  770. do_listen(PF_INET, &daddr, sizeof(daddr));
  771. do_main(PF_INET);
  772. }
  773. if (do_ipv6) {
  774. if (cfg_do_listen)
  775. do_listen(PF_INET6, &daddr6, sizeof(daddr6));
  776. do_main(PF_INET6);
  777. }
  778. return test_failed;
  779. }