| #include <errno.h> | 
 | #include <error.h> | 
 | #include <getopt.h> | 
 | #include <stdbool.h> | 
 | #include <stdio.h> | 
 | #include <stdlib.h> | 
 | #include <string.h> | 
 | #include <unistd.h> | 
 |  | 
 | #include <sys/time.h> | 
 | #include <sys/socket.h> | 
 | #include <sys/select.h> | 
 | #include <sys/ioctl.h> | 
 | #include <arpa/inet.h> | 
 | #include <net/if.h> | 
 |  | 
 | #include <asm/types.h> | 
 | #include <linux/net_tstamp.h> | 
 | #include <linux/errqueue.h> | 
 |  | 
 | #include "../kselftest.h" | 
 |  | 
 | struct options { | 
 | 	int so_timestamp; | 
 | 	int so_timestampns; | 
 | 	int so_timestamping; | 
 | }; | 
 |  | 
 | struct tstamps { | 
 | 	bool tstamp; | 
 | 	bool tstampns; | 
 | 	bool swtstamp; | 
 | 	bool hwtstamp; | 
 | }; | 
 |  | 
 | struct socket_type { | 
 | 	char *friendly_name; | 
 | 	int type; | 
 | 	int protocol; | 
 | 	bool enabled; | 
 | }; | 
 |  | 
 | struct test_case { | 
 | 	struct options sockopt; | 
 | 	struct tstamps expected; | 
 | 	bool enabled; | 
 | 	bool warn_on_fail; | 
 | }; | 
 |  | 
 | struct sof_flag { | 
 | 	int mask; | 
 | 	char *name; | 
 | }; | 
 |  | 
 | static struct sof_flag sof_flags[] = { | 
 | #define SOF_FLAG(f) { f, #f } | 
 | 	SOF_FLAG(SOF_TIMESTAMPING_SOFTWARE), | 
 | 	SOF_FLAG(SOF_TIMESTAMPING_RX_SOFTWARE), | 
 | 	SOF_FLAG(SOF_TIMESTAMPING_RX_HARDWARE), | 
 | }; | 
 |  | 
 | static struct socket_type socket_types[] = { | 
 | 	{ "ip",		SOCK_RAW,	IPPROTO_EGP }, | 
 | 	{ "udp",	SOCK_DGRAM,	IPPROTO_UDP }, | 
 | 	{ "tcp",	SOCK_STREAM,	IPPROTO_TCP }, | 
 | }; | 
 |  | 
 | static struct test_case test_cases[] = { | 
 | 	{ {}, {} }, | 
 | 	{ | 
 | 		{ .so_timestamp = 1 }, | 
 | 		{ .tstamp = true } | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestampns = 1 }, | 
 | 		{ .tstampns = true } | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestamp = 1, .so_timestampns = 1 }, | 
 | 		{ .tstampns = true } | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE }, | 
 | 		{} | 
 | 	}, | 
 | 	{ | 
 | 		/* Loopback device does not support hw timestamps. */ | 
 | 		{ .so_timestamping = SOF_TIMESTAMPING_RX_HARDWARE }, | 
 | 		{} | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE }, | 
 | 		.warn_on_fail = true | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestamping = SOF_TIMESTAMPING_RX_SOFTWARE | 
 | 			| SOF_TIMESTAMPING_RX_HARDWARE }, | 
 | 		{} | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestamping = SOF_TIMESTAMPING_SOFTWARE | 
 | 			| SOF_TIMESTAMPING_RX_SOFTWARE }, | 
 | 		{ .swtstamp = true } | 
 | 	}, | 
 | 	{ | 
 | 		{ .so_timestamp = 1, .so_timestamping = SOF_TIMESTAMPING_SOFTWARE | 
 | 			| SOF_TIMESTAMPING_RX_SOFTWARE }, | 
 | 		{ .tstamp = true, .swtstamp = true } | 
 | 	}, | 
 | }; | 
 |  | 
 | static struct option long_options[] = { | 
 | 	{ "list_tests", no_argument, 0, 'l' }, | 
 | 	{ "test_num", required_argument, 0, 'n' }, | 
 | 	{ "op_size", required_argument, 0, 's' }, | 
 | 	{ "tcp", no_argument, 0, 't' }, | 
 | 	{ "udp", no_argument, 0, 'u' }, | 
 | 	{ "ip", no_argument, 0, 'i' }, | 
 | 	{ "strict", no_argument, 0, 'S' }, | 
 | 	{ "ipv4", no_argument, 0, '4' }, | 
 | 	{ "ipv6", no_argument, 0, '6' }, | 
 | 	{ NULL, 0, NULL, 0 }, | 
 | }; | 
 |  | 
 | static int next_port = 19999; | 
 | static int op_size = 10 * 1024; | 
 |  | 
 | void print_test_case(struct test_case *t) | 
 | { | 
 | 	int f = 0; | 
 |  | 
 | 	printf("sockopts {"); | 
 | 	if (t->sockopt.so_timestamp) | 
 | 		printf(" SO_TIMESTAMP "); | 
 | 	if (t->sockopt.so_timestampns) | 
 | 		printf(" SO_TIMESTAMPNS "); | 
 | 	if (t->sockopt.so_timestamping) { | 
 | 		printf(" SO_TIMESTAMPING: {"); | 
 | 		for (f = 0; f < ARRAY_SIZE(sof_flags); f++) | 
 | 			if (t->sockopt.so_timestamping & sof_flags[f].mask) | 
 | 				printf(" %s |", sof_flags[f].name); | 
 | 		printf("}"); | 
 | 	} | 
 | 	printf("} expected cmsgs: {"); | 
 | 	if (t->expected.tstamp) | 
 | 		printf(" SCM_TIMESTAMP "); | 
 | 	if (t->expected.tstampns) | 
 | 		printf(" SCM_TIMESTAMPNS "); | 
 | 	if (t->expected.swtstamp || t->expected.hwtstamp) { | 
 | 		printf(" SCM_TIMESTAMPING {"); | 
 | 		if (t->expected.swtstamp) | 
 | 			printf("0"); | 
 | 		if (t->expected.swtstamp && t->expected.hwtstamp) | 
 | 			printf(","); | 
 | 		if (t->expected.hwtstamp) | 
 | 			printf("2"); | 
 | 		printf("}"); | 
 | 	} | 
 | 	printf("}\n"); | 
 | } | 
 |  | 
 | void do_send(int src) | 
 | { | 
 | 	int r; | 
 | 	char *buf = malloc(op_size); | 
 |  | 
 | 	memset(buf, 'z', op_size); | 
 | 	r = write(src, buf, op_size); | 
 | 	if (r < 0) | 
 | 		error(1, errno, "Failed to sendmsg"); | 
 |  | 
 | 	free(buf); | 
 | } | 
 |  | 
 | bool do_recv(int rcv, int read_size, struct tstamps expected) | 
 | { | 
 | 	const int CMSG_SIZE = 1024; | 
 |  | 
 | 	struct scm_timestamping *ts; | 
 | 	struct tstamps actual = {}; | 
 | 	char cmsg_buf[CMSG_SIZE]; | 
 | 	struct iovec recv_iov; | 
 | 	struct cmsghdr *cmsg; | 
 | 	bool failed = false; | 
 | 	struct msghdr hdr; | 
 | 	int flags = 0; | 
 | 	int r; | 
 |  | 
 | 	memset(&hdr, 0, sizeof(hdr)); | 
 | 	hdr.msg_iov = &recv_iov; | 
 | 	hdr.msg_iovlen = 1; | 
 | 	recv_iov.iov_base = malloc(read_size); | 
 | 	recv_iov.iov_len = read_size; | 
 |  | 
 | 	hdr.msg_control = cmsg_buf; | 
 | 	hdr.msg_controllen = sizeof(cmsg_buf); | 
 |  | 
 | 	r = recvmsg(rcv, &hdr, flags); | 
 | 	if (r < 0) | 
 | 		error(1, errno, "Failed to recvmsg"); | 
 | 	if (r != read_size) | 
 | 		error(1, 0, "Only received %d bytes of payload.", r); | 
 |  | 
 | 	if (hdr.msg_flags & (MSG_TRUNC | MSG_CTRUNC)) | 
 | 		error(1, 0, "Message was truncated."); | 
 |  | 
 | 	for (cmsg = CMSG_FIRSTHDR(&hdr); cmsg != NULL; | 
 | 	     cmsg = CMSG_NXTHDR(&hdr, cmsg)) { | 
 | 		if (cmsg->cmsg_level != SOL_SOCKET) | 
 | 			error(1, 0, "Unexpected cmsg_level %d", | 
 | 			      cmsg->cmsg_level); | 
 | 		switch (cmsg->cmsg_type) { | 
 | 		case SCM_TIMESTAMP: | 
 | 			actual.tstamp = true; | 
 | 			break; | 
 | 		case SCM_TIMESTAMPNS: | 
 | 			actual.tstampns = true; | 
 | 			break; | 
 | 		case SCM_TIMESTAMPING: | 
 | 			ts = (struct scm_timestamping *)CMSG_DATA(cmsg); | 
 | 			actual.swtstamp = !!ts->ts[0].tv_sec; | 
 | 			if (ts->ts[1].tv_sec != 0) | 
 | 				error(0, 0, "ts[1] should not be set."); | 
 | 			actual.hwtstamp = !!ts->ts[2].tv_sec; | 
 | 			break; | 
 | 		default: | 
 | 			error(1, 0, "Unexpected cmsg_type %d", cmsg->cmsg_type); | 
 | 		} | 
 | 	} | 
 |  | 
 | #define VALIDATE(field) \ | 
 | 	do { \ | 
 | 		if (expected.field != actual.field) { \ | 
 | 			if (expected.field) \ | 
 | 				error(0, 0, "Expected " #field " to be set."); \ | 
 | 			else \ | 
 | 				error(0, 0, \ | 
 | 				      "Expected " #field " to not be set."); \ | 
 | 			failed = true; \ | 
 | 		} \ | 
 | 	} while (0) | 
 |  | 
 | 	VALIDATE(tstamp); | 
 | 	VALIDATE(tstampns); | 
 | 	VALIDATE(swtstamp); | 
 | 	VALIDATE(hwtstamp); | 
 | #undef VALIDATE | 
 |  | 
 | 	free(recv_iov.iov_base); | 
 |  | 
 | 	return failed; | 
 | } | 
 |  | 
 | void config_so_flags(int rcv, struct options o) | 
 | { | 
 | 	int on = 1; | 
 |  | 
 | 	if (setsockopt(rcv, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) | 
 | 		error(1, errno, "Failed to enable SO_REUSEADDR"); | 
 |  | 
 | 	if (o.so_timestamp && | 
 | 	    setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMP, | 
 | 		       &o.so_timestamp, sizeof(o.so_timestamp)) < 0) | 
 | 		error(1, errno, "Failed to enable SO_TIMESTAMP"); | 
 |  | 
 | 	if (o.so_timestampns && | 
 | 	    setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMPNS, | 
 | 		       &o.so_timestampns, sizeof(o.so_timestampns)) < 0) | 
 | 		error(1, errno, "Failed to enable SO_TIMESTAMPNS"); | 
 |  | 
 | 	if (o.so_timestamping && | 
 | 	    setsockopt(rcv, SOL_SOCKET, SO_TIMESTAMPING, | 
 | 		       &o.so_timestamping, sizeof(o.so_timestamping)) < 0) | 
 | 		error(1, errno, "Failed to set SO_TIMESTAMPING"); | 
 | } | 
 |  | 
 | bool run_test_case(struct socket_type *s, int test_num, char ip_version, | 
 | 		   bool strict) | 
 | { | 
 | 	union { | 
 | 		struct sockaddr_in6 addr6; | 
 | 		struct sockaddr_in addr4; | 
 | 		struct sockaddr addr_un; | 
 | 	} addr; | 
 | 	int read_size = op_size; | 
 | 	int src, dst, rcv, port; | 
 | 	socklen_t addr_size; | 
 | 	bool failed = false; | 
 |  | 
 | 	port = (s->type == SOCK_RAW) ? 0 : next_port++; | 
 | 	memset(&addr, 0, sizeof(addr)); | 
 | 	if (ip_version == '4') { | 
 | 		addr.addr4.sin_family = AF_INET; | 
 | 		addr.addr4.sin_addr.s_addr = htonl(INADDR_LOOPBACK); | 
 | 		addr.addr4.sin_port = htons(port); | 
 | 		addr_size = sizeof(addr.addr4); | 
 | 		if (s->type == SOCK_RAW) | 
 | 			read_size += 20;  /* for IPv4 header */ | 
 | 	} else { | 
 | 		addr.addr6.sin6_family = AF_INET6; | 
 | 		addr.addr6.sin6_addr = in6addr_loopback; | 
 | 		addr.addr6.sin6_port = htons(port); | 
 | 		addr_size = sizeof(addr.addr6); | 
 | 	} | 
 | 	printf("Starting testcase %d over ipv%c...\n", test_num, ip_version); | 
 | 	src = socket(addr.addr_un.sa_family, s->type, | 
 | 		     s->protocol); | 
 | 	if (src < 0) | 
 | 		error(1, errno, "Failed to open src socket"); | 
 |  | 
 | 	dst = socket(addr.addr_un.sa_family, s->type, | 
 | 		     s->protocol); | 
 | 	if (dst < 0) | 
 | 		error(1, errno, "Failed to open dst socket"); | 
 |  | 
 | 	if (bind(dst, &addr.addr_un, addr_size) < 0) | 
 | 		error(1, errno, "Failed to bind to port %d", port); | 
 |  | 
 | 	if (s->type == SOCK_STREAM && (listen(dst, 1) < 0)) | 
 | 		error(1, errno, "Failed to listen"); | 
 |  | 
 | 	if (connect(src, &addr.addr_un, addr_size) < 0) | 
 | 		error(1, errno, "Failed to connect"); | 
 |  | 
 | 	if (s->type == SOCK_STREAM) { | 
 | 		rcv = accept(dst, NULL, NULL); | 
 | 		if (rcv < 0) | 
 | 			error(1, errno, "Failed to accept"); | 
 | 		close(dst); | 
 | 	} else { | 
 | 		rcv = dst; | 
 | 	} | 
 |  | 
 | 	config_so_flags(rcv, test_cases[test_num].sockopt); | 
 | 	usleep(20000); /* setsockopt for SO_TIMESTAMPING is asynchronous */ | 
 | 	do_send(src); | 
 |  | 
 | 	failed = do_recv(rcv, read_size, test_cases[test_num].expected); | 
 |  | 
 | 	close(rcv); | 
 | 	close(src); | 
 |  | 
 | 	if (failed) { | 
 | 		printf("FAILURE in testcase %d over ipv%c ", test_num, | 
 | 		       ip_version); | 
 | 		print_test_case(&test_cases[test_num]); | 
 | 		if (!strict && test_cases[test_num].warn_on_fail) | 
 | 			failed = false; | 
 | 	} | 
 | 	return failed; | 
 | } | 
 |  | 
 | int main(int argc, char **argv) | 
 | { | 
 | 	bool all_protocols = true; | 
 | 	bool all_tests = true; | 
 | 	bool cfg_ipv4 = false; | 
 | 	bool cfg_ipv6 = false; | 
 | 	bool strict = false; | 
 | 	int arg_index = 0; | 
 | 	int failures = 0; | 
 | 	int s, t, opt; | 
 |  | 
 | 	while ((opt = getopt_long(argc, argv, "", long_options, | 
 | 				  &arg_index)) != -1) { | 
 | 		switch (opt) { | 
 | 		case 'l': | 
 | 			for (t = 0; t < ARRAY_SIZE(test_cases); t++) { | 
 | 				printf("%d\t", t); | 
 | 				print_test_case(&test_cases[t]); | 
 | 			} | 
 | 			return 0; | 
 | 		case 'n': | 
 | 			t = atoi(optarg); | 
 | 			if (t >= ARRAY_SIZE(test_cases)) | 
 | 				error(1, 0, "Invalid test case: %d", t); | 
 | 			all_tests = false; | 
 | 			test_cases[t].enabled = true; | 
 | 			break; | 
 | 		case 's': | 
 | 			op_size = atoi(optarg); | 
 | 			break; | 
 | 		case 't': | 
 | 			all_protocols = false; | 
 | 			socket_types[2].enabled = true; | 
 | 			break; | 
 | 		case 'u': | 
 | 			all_protocols = false; | 
 | 			socket_types[1].enabled = true; | 
 | 			break; | 
 | 		case 'i': | 
 | 			all_protocols = false; | 
 | 			socket_types[0].enabled = true; | 
 | 			break; | 
 | 		case 'S': | 
 | 			strict = true; | 
 | 			break; | 
 | 		case '4': | 
 | 			cfg_ipv4 = true; | 
 | 			break; | 
 | 		case '6': | 
 | 			cfg_ipv6 = true; | 
 | 			break; | 
 | 		default: | 
 | 			error(1, 0, "Failed to parse parameters."); | 
 | 		} | 
 | 	} | 
 |  | 
 | 	for (s = 0; s < ARRAY_SIZE(socket_types); s++) { | 
 | 		if (!all_protocols && !socket_types[s].enabled) | 
 | 			continue; | 
 |  | 
 | 		printf("Testing %s...\n", socket_types[s].friendly_name); | 
 | 		for (t = 0; t < ARRAY_SIZE(test_cases); t++) { | 
 | 			if (!all_tests && !test_cases[t].enabled) | 
 | 				continue; | 
 | 			if (cfg_ipv4 || !cfg_ipv6) | 
 | 				if (run_test_case(&socket_types[s], t, '4', | 
 | 						  strict)) | 
 | 					failures++; | 
 | 			if (cfg_ipv6 || !cfg_ipv4) | 
 | 				if (run_test_case(&socket_types[s], t, '6', | 
 | 						  strict)) | 
 | 					failures++; | 
 | 		} | 
 | 	} | 
 | 	if (!failures) | 
 | 		printf("PASSED.\n"); | 
 | 	return failures; | 
 | } |