#include <errno.h>
#include <error.h>
#include <getopt.h>
#include <stdbool.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <sys/select.h>
#include <sys/ioctl.h>
#include <arpa/inet.h>
#include <net/if .h>
#include <asm /types.h>
#include <linux/net_tstamp.h>
#include <linux/errqueue.h>
#include "../kselftest.h"
struct options {
int so_timestamp;
int so_timestampns;
int so_timestamping;
};
struct tstamps {
bool tstamp;
bool tstampns;
bool swtstamp;
bool hwtstamp;
};
struct socket_type {
char *friendly_name;
int type;
int protocol;
bool enabled;
};
struct test_case {
struct options sockopt;
struct tstamps expected;
bool enabled;
bool warn_on_fail;
};
struct sof_flag {
int mask;
char *name;
};
static struct sof_flag sof_flags[] = {
#define SOF_FLAG(f) { f, #f }
SOF_FLAG(SOF_TIMESTAMPING_SOFTWARE),
SOF_FLAG(SOF_TIMESTAMPING_RX_SOFTWARE),
SOF_FLAG(SOF_TIMESTAMPING_RX_HARDWARE),
SOF_FLAG(SOF_TIMESTAMPING_OPT_RX_FILTER),
SOF_FLAG(SOF_TIMESTAMPING_RAW_HARDWARE),
};
static struct socket_type socket_types[] = {
{ "ip" , SOCK_RAW, IPPROTO_EGP },
{ "udp" , SOCK_DGRAM, IPPROTO_UDP },
{ "tcp" , SOCK_STREAM, IPPROTO_TCP },
};
static struct test_case test_cases[] = {
{ {}, {} },
{
{ .so_timestamp = 1 },
{ .tstamp = true }
},
{
{ .so_timestampns = 1 },
{ .tstampns = true }
},
{
{ .so_timestamp = 1, .so_timestampns = 1 },
{ .tstampns = true }
},
{
{ .so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE },
{}
},
{
/* Loopback device does not support hw timestamps. */
{ .so_timestamping = SOF_TIMESTAMPING_RX_HARDWARE },
{}
},
{
{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE },
.warn_on_fail = true
},
{
{ .so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE
| SOF_TIMESTAMPING_RX_HARDWARE },
{}
},
{
{ .so_timestamping = SOF_TIMESTAMPING_RAW_HARDWARE
| SOF_TIMESTAMPING_OPT_RX_FILTER },
{}
},
{
{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
| SOF_TIMESTAMPING_OPT_RX_FILTER },
{}
},
{
{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
| SOF_TIMESTAMPING_RX_SOFTWARE
| SOF_TIMESTAMPING_OPT_RX_FILTER },
{ .swtstamp = true }
},
{
{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
| SOF_TIMESTAMPING_RX_SOFTWARE },
{ .swtstamp = true }
},
{
{ .so_timestamp = 1, .so_timestamping = SOF_TIMESTAMPING_SOFTWARE
| SOF_TIMESTAMPING_RX_SOFTWARE },
{ .tstamp = true , .swtstamp = true }
},
};
static struct option long_options[] = {
{ "list_tests" , no_argument, 0, 'l' },
{ "test_num" , required_argument, 0, 'n' },
{ "op_size" , required_argument, 0, 's' },
{ "tcp" , no_argument, 0, 't' },
{ "udp" , no_argument, 0, 'u' },
{ "ip" , no_argument, 0, 'i' },
{ "strict" , no_argument, 0, 'S' },
{ "ipv4" , no_argument, 0, '4' },
{ "ipv6" , no_argument, 0, '6' },
{ NULL, 0, NULL, 0 },
};
static int next_port = 19999;
static int op_size = 10 * 1024;
void print_test_case(struct test_case *t)
{
int f = 0;
printf("sockopts {" );
if (t->sockopt.so_timestamp)
printf(" SO_TIMESTAMP " );
if (t->sockopt.so_timestampns)
printf(" SO_TIMESTAMPNS " );
if (t->sockopt.so_timestamping) {
printf(" SO_TIMESTAMPING: {" );
for (f = 0; f < ARRAY_SIZE(sof_flags); f++)
if (t->sockopt.so_timestamping & sof_flags[f].mask)
printf(" %s |" , sof_flags[f].name);
printf("}" );
}
printf("} expected cmsgs: {" );
if (t->expected.tstamp)
printf(" SCM_TIMESTAMP " );
if (t->expected.tstampns)
printf(" SCM_TIMESTAMPNS " );
if (t->expected.swtstamp || t->expected.hwtstamp) {
printf(" SCM_TIMESTAMPING {" );
if (t->expected.swtstamp)
printf("0" );
if (t->expected.swtstamp && t->expected.hwtstamp)
printf("," );
if (t->expected.hwtstamp)
printf("2" );
printf("}" );
}
printf("}\n" );
}
void do_send(int src)
{
int r;
char *buf = malloc(op_size);
memset(buf, 'z' , op_size);
r = write(src, buf, op_size);
if (r < 0)
error(1, errno, "Failed to sendmsg" );
free(buf);
}
bool do_recv(int rcv, int read_size, struct tstamps expected)
{
const int CMSG_SIZE = 1024;
struct scm_timestamping *ts;
struct tstamps actual = {};
char cmsg_buf[CMSG_SIZE];
struct iovec recv_iov;
struct cmsghdr *cmsg;
bool failed = false ;
struct msghdr hdr;
int flags = 0;
int r;
memset(&hdr, 0, sizeof (hdr));
hdr.msg_iov = &recv_iov;
hdr.msg_iovlen = 1;
recv_iov.iov_base = malloc(read_size);
recv_iov.iov_len = read_size;
hdr.msg_control = cmsg_buf;
hdr.msg_controllen = sizeof (cmsg_buf);
r = recvmsg(rcv, &hdr, flags);
if (r < 0)
error(1, errno, "Failed to recvmsg" );
if (r != read_size)
error(1, 0, "Only received %d bytes of payload." , r);
if (hdr.msg_flags & (MSG_TRUNC | MSG_CTRUNC))
error(1, 0, "Message was truncated." );
for (cmsg = CMSG_FIRSTHDR(&hdr); cmsg != NULL;
cmsg = CMSG_NXTHDR(&hdr, cmsg)) {
if (cmsg->cmsg_level != SOL_SOCKET)
error(1, 0, "Unexpected cmsg_level %d" ,
cmsg->cmsg_level);
switch (cmsg->cmsg_type) {
case SCM_TIMESTAMP:
actual.tstamp = true ;
break ;
case SCM_TIMESTAMPNS:
actual.tstampns = true ;
break ;
case SCM_TIMESTAMPING:
ts = (struct scm_timestamping *)CMSG_DATA(cmsg);
actual.swtstamp = !!ts->ts[0].tv_sec;
if (ts->ts[1].tv_sec != 0)
error(0, 0, "ts[1] should not be set." );
actual.hwtstamp = !!ts->ts[2].tv_sec;
break ;
default :
error(1, 0, "Unexpected cmsg_type %d" , cmsg->cmsg_type);
}
}
#define VALIDATE(field) \
do { \
if (expected.field != actual.field) { \
if (expected.field) \
error(0, 0, "Expected " #field " to be set." ); \
else \
error(0, 0, \
"Expected " #field " to not be set." ); \
failed = true ; \
} \
} while (0)
VALIDATE(tstamp);
VALIDATE(tstampns);
VALIDATE(swtstamp);
VALIDATE(hwtstamp);
#undef VALIDATE
free(recv_iov.iov_base);
return failed;
}
void config_so_flags(int rcv, struct options o)
{
int on = 1;
if (setsockopt(rcv, SOL_SOCKET, SO_REUSEADDR, &on, sizeof (on)) < 0)
error(1, errno, "Failed to enable SO_REUSEADDR" );
if (o.so_timestamp &&
setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMP,
&o.so_timestamp, sizeof (o.so_timestamp)) < 0)
error(1, errno, "Failed to enable SO_TIMESTAMP" );
if (o.so_timestampns &&
setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMPNS,
&o.so_timestampns, sizeof (o.so_timestampns)) < 0)
error(1, errno, "Failed to enable SO_TIMESTAMPNS" );
if (o.so_timestamping &&
setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMPING,
&o.so_timestamping, sizeof (o.so_timestamping)) < 0)
error(1, errno, "Failed to set SO_TIMESTAMPING" );
}
bool run_test_case(struct socket_type *s, int test_num, char ip_version,
bool strict)
{
union {
struct sockaddr_in6 addr6;
struct sockaddr_in addr4;
struct sockaddr addr_un;
} addr;
int read_size = op_size;
int src, dst, rcv, port;
socklen_t addr_size;
bool failed = false ;
port = (s->type == SOCK_RAW) ? 0 : next_port++;
memset(&addr, 0, sizeof (addr));
if (ip_version == '4' ) {
addr.addr4.sin_family = AF_INET;
addr.addr4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
addr.addr4.sin_port = htons(port);
addr_size = sizeof (addr.addr4);
if (s->type == SOCK_RAW)
read_size += 20; /* for IPv4 header */
} else {
addr.addr6.sin6_family = AF_INET6;
addr.addr6.sin6_addr = in6addr_loopback;
addr.addr6.sin6_port = htons(port);
addr_size = sizeof (addr.addr6);
}
printf("Starting testcase %d over ipv%c...\n" , test_num, ip_version);
src = socket(addr.addr_un.sa_family, s->type,
s->protocol);
if (src < 0)
error(1, errno, "Failed to open src socket" );
dst = socket(addr.addr_un.sa_family, s->type,
s->protocol);
if (dst < 0)
error(1, errno, "Failed to open dst socket" );
if (bind(dst, &addr.addr_un, addr_size) < 0)
error(1, errno, "Failed to bind to port %d" , port);
if (s->type == SOCK_STREAM && (listen(dst, 1) < 0))
error(1, errno, "Failed to listen" );
if (connect(src, &addr.addr_un, addr_size) < 0)
error(1, errno, "Failed to connect" );
if (s->type == SOCK_STREAM) {
rcv = accept(dst, NULL, NULL);
if (rcv < 0)
error(1, errno, "Failed to accept" );
close(dst);
} else {
rcv = dst;
}
config_so_flags(rcv, test_cases[test_num].sockopt);
usleep(20000); /* setsockopt for SO_TIMESTAMPING is asynchronous */
do_send(src);
failed = do_recv(rcv, read_size, test_cases[test_num].expected);
close(rcv);
close(src);
if (failed) {
printf("FAILURE in testcase %d over ipv%c " , test_num,
ip_version);
print_test_case(&test_cases[test_num]);
if (!strict && test_cases[test_num].warn_on_fail)
failed = false ;
}
return failed;
}
int main(int argc, char **argv)
{
bool all_protocols = true ;
bool all_tests = true ;
bool cfg_ipv4 = false ;
bool cfg_ipv6 = false ;
bool strict = false ;
int arg_index = 0;
int failures = 0;
int s, t, opt;
while ((opt = getopt_long(argc, argv, "" , long_options,
&arg_index)) != -1) {
switch (opt) {
case 'l' :
for (t = 0; t < ARRAY_SIZE(test_cases); t++) {
printf("%d\t" , t);
print_test_case(&test_cases[t]);
}
return 0;
case 'n' :
t = atoi(optarg);
if (t >= ARRAY_SIZE(test_cases))
error(1, 0, "Invalid test case: %d" , t);
all_tests = false ;
test_cases[t].enabled = true ;
break ;
case 's' :
op_size = atoi(optarg);
break ;
case 't' :
all_protocols = false ;
socket_types[2].enabled = true ;
break ;
case 'u' :
all_protocols = false ;
socket_types[1].enabled = true ;
break ;
case 'i' :
all_protocols = false ;
socket_types[0].enabled = true ;
break ;
case 'S' :
strict = true ;
break ;
case '4' :
cfg_ipv4 = true ;
break ;
case '6' :
cfg_ipv6 = true ;
break ;
default :
error(1, 0, "Failed to parse parameters." );
}
}
for (s = 0; s < ARRAY_SIZE(socket_types); s++) {
if (!all_protocols && !socket_types[s].enabled)
continue ;
printf("Testing %s...\n" , socket_types[s].friendly_name);
for (t = 0; t < ARRAY_SIZE(test_cases); t++) {
if (!all_tests && !test_cases[t].enabled)
continue ;
if (cfg_ipv4 || !cfg_ipv6)
if (run_test_case(&socket_types[s], t, '4' ,
strict))
failures++;
if (cfg_ipv6 || !cfg_ipv4)
if (run_test_case(&socket_types[s], t, '6' ,
strict))
failures++;
}
}
if (!failures)
printf("PASSED.\n" );
return failures;
}
Messung V0.5 C=100 H=92 G=95
¤ Dauer der Verarbeitung: 0.10 Sekunden
(vorverarbeitet)
¤
*© Formatika GbR, Deutschland