^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0-only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * This program demonstrates how the various time stamping features in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) * the Linux kernel work. It emulates the behavior of a PTP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * implementation in stand-alone master mode by sending PTPv1 Sync
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) * multicasts once every second. It looks for similar packets, but
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * beyond that doesn't actually implement PTP.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) * Outgoing packets are time stamped with SO_TIMESTAMPING with or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) * without hardware support.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) * Incoming packets are time stamped with SO_TIMESTAMPING with or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) * without hardware support, SIOCGSTAMP[NS] (per-socket time stamp) and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) * SO_TIMESTAMP[NS].
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) * Copyright (C) 2009 Intel Corporation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) * Author: Patrick Ohly <patrick.ohly@intel.com>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) #include <stdio.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) #include <stdlib.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) #include <errno.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #include <string.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) #include <sys/time.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) #include <sys/socket.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) #include <sys/select.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) #include <sys/ioctl.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) #include <arpa/inet.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) #include <net/if.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) #include <asm/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) #include <linux/net_tstamp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) #include <linux/errqueue.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) #include <linux/sockios.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) #ifndef SO_TIMESTAMPING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) # define SO_TIMESTAMPING 37
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) # define SCM_TIMESTAMPING SO_TIMESTAMPING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) #ifndef SO_TIMESTAMPNS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) # define SO_TIMESTAMPNS 35
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) static void usage(const char *error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) if (error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) printf("invalid option: %s\n", error);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) printf("timestamping interface option*\n\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) "Options:\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) " IP_MULTICAST_LOOP - looping outgoing multicasts\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) " SO_TIMESTAMP - normal software time stamping, ms resolution\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) " SO_TIMESTAMPNS - more accurate software time stamping\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) " SOF_TIMESTAMPING_TX_HARDWARE - hardware time stamping of outgoing packets\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) " SOF_TIMESTAMPING_TX_SOFTWARE - software fallback for outgoing packets\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) " SOF_TIMESTAMPING_RX_HARDWARE - hardware time stamping of incoming packets\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) " SOF_TIMESTAMPING_RX_SOFTWARE - software fallback for incoming packets\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) " SOF_TIMESTAMPING_SOFTWARE - request reporting of software time stamps\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) " SOF_TIMESTAMPING_RAW_HARDWARE - request reporting of raw HW time stamps\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) " SIOCGSTAMP - check last socket time stamp\n"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) " SIOCGSTAMPNS - more accurate socket time stamp\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) exit(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) static void bail(const char *error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) printf("%s: %s\n", error, strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) exit(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) static const unsigned char sync[] = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) 0x00, 0x01, 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) 0x5f, 0x44, 0x46, 0x4c,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) 0x54, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) 0x01, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) /* fake uuid */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) 0x02, 0x03, 0x04, 0x05,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) 0x00, 0x01, 0x00, 0x37,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) 0x00, 0x00, 0x00, 0x08,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) 0x49, 0x05, 0xcd, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) 0x29, 0xb1, 0x8d, 0xb0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) /* fake uuid */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) 0x02, 0x03, 0x04, 0x05,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) 0x00, 0x00, 0x00, 0x37,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) 0x00, 0x00, 0x00, 0x04,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) 0x44, 0x46, 0x4c, 0x54,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) 0x00, 0x00, 0xf0, 0x60,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) 0x00, 0x01, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) 0x00, 0x00, 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) 0x00, 0x00, 0xf0, 0x60,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) 0x00, 0x00, 0x00, 0x04,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) 0x44, 0x46, 0x4c, 0x54,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) /* fake uuid */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) 0x00, 0x01,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) 0x02, 0x03, 0x04, 0x05,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) 0x00, 0x00, 0x00, 0x00,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) 0x00, 0x00, 0x00, 0x00
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) static void sendpacket(int sock, struct sockaddr *addr, socklen_t addr_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) struct timeval now;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) int res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) res = sendto(sock, sync, sizeof(sync), 0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) addr, addr_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) gettimeofday(&now, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) if (res < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) printf("%s: %s\n", "send", strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) printf("%ld.%06ld: sent %d bytes\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) (long)now.tv_sec, (long)now.tv_usec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) res);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) static void printpacket(struct msghdr *msg, int res,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) char *data,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) int sock, int recvmsg_flags,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) int siocgstamp, int siocgstampns)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) struct sockaddr_in *from_addr = (struct sockaddr_in *)msg->msg_name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) struct cmsghdr *cmsg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) struct timeval tv;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) struct timespec ts;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) struct timeval now;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) gettimeofday(&now, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) printf("%ld.%06ld: received %s data, %d bytes from %s, %zu bytes control messages\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) (long)now.tv_sec, (long)now.tv_usec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) (recvmsg_flags & MSG_ERRQUEUE) ? "error" : "regular",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) res,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) inet_ntoa(from_addr->sin_addr),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) msg->msg_controllen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) for (cmsg = CMSG_FIRSTHDR(msg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) cmsg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) cmsg = CMSG_NXTHDR(msg, cmsg)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) printf(" cmsg len %zu: ", cmsg->cmsg_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) switch (cmsg->cmsg_level) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) case SOL_SOCKET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) printf("SOL_SOCKET ");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) switch (cmsg->cmsg_type) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) case SO_TIMESTAMP: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) struct timeval *stamp =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) (struct timeval *)CMSG_DATA(cmsg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) printf("SO_TIMESTAMP %ld.%06ld",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) (long)stamp->tv_sec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) (long)stamp->tv_usec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) case SO_TIMESTAMPNS: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) struct timespec *stamp =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) (struct timespec *)CMSG_DATA(cmsg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) printf("SO_TIMESTAMPNS %ld.%09ld",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) (long)stamp->tv_sec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) (long)stamp->tv_nsec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) case SO_TIMESTAMPING: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) struct timespec *stamp =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) (struct timespec *)CMSG_DATA(cmsg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) printf("SO_TIMESTAMPING ");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) printf("SW %ld.%09ld ",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) (long)stamp->tv_sec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) (long)stamp->tv_nsec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) stamp++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) /* skip deprecated HW transformed */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) stamp++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) printf("HW raw %ld.%09ld",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) (long)stamp->tv_sec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) (long)stamp->tv_nsec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) printf("type %d", cmsg->cmsg_type);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) case IPPROTO_IP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) printf("IPPROTO_IP ");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) switch (cmsg->cmsg_type) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) case IP_RECVERR: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) struct sock_extended_err *err =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) (struct sock_extended_err *)CMSG_DATA(cmsg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) printf("IP_RECVERR ee_errno '%s' ee_origin %d => %s",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) strerror(err->ee_errno),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) err->ee_origin,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) #ifdef SO_EE_ORIGIN_TIMESTAMPING
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) err->ee_origin == SO_EE_ORIGIN_TIMESTAMPING ?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) "bounced packet" : "unexpected origin"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) "probably SO_EE_ORIGIN_TIMESTAMPING"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) );
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) if (res < sizeof(sync))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) printf(" => truncated data?!");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) else if (!memcmp(sync, data + res - sizeof(sync),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) sizeof(sync)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) printf(" => GOT OUR DATA BACK (HURRAY!)");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220) case IP_PKTINFO: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) struct in_pktinfo *pktinfo =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) (struct in_pktinfo *)CMSG_DATA(cmsg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) printf("IP_PKTINFO interface index %u",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) pktinfo->ipi_ifindex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228) printf("type %d", cmsg->cmsg_type);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233) printf("level %d type %d",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234) cmsg->cmsg_level,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) cmsg->cmsg_type);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238) printf("\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241) if (siocgstamp) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) if (ioctl(sock, SIOCGSTAMP, &tv))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) printf(" %s: %s\n", "SIOCGSTAMP", strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245) printf("SIOCGSTAMP %ld.%06ld\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246) (long)tv.tv_sec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) (long)tv.tv_usec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) if (siocgstampns) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) if (ioctl(sock, SIOCGSTAMPNS, &ts))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251) printf(" %s: %s\n", "SIOCGSTAMPNS", strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253) printf("SIOCGSTAMPNS %ld.%09ld\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254) (long)ts.tv_sec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) (long)ts.tv_nsec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259) static void recvpacket(int sock, int recvmsg_flags,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260) int siocgstamp, int siocgstampns)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262) char data[256];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263) struct msghdr msg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264) struct iovec entry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265) struct sockaddr_in from_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) struct {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267) struct cmsghdr cm;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268) char control[512];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269) } control;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270) int res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272) memset(&msg, 0, sizeof(msg));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273) msg.msg_iov = &entry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274) msg.msg_iovlen = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) entry.iov_base = data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276) entry.iov_len = sizeof(data);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277) msg.msg_name = (caddr_t)&from_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) msg.msg_namelen = sizeof(from_addr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) msg.msg_control = &control;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280) msg.msg_controllen = sizeof(control);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282) res = recvmsg(sock, &msg, recvmsg_flags|MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) if (res < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 284) printf("%s %s: %s\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 285) "recvmsg",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 286) (recvmsg_flags & MSG_ERRQUEUE) ? "error" : "regular",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 287) strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 288) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 289) printpacket(&msg, res, data,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 290) sock, recvmsg_flags,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 291) siocgstamp, siocgstampns);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 292) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 293) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 294)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 295) int main(int argc, char **argv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 296) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 297) int so_timestamping_flags = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 298) int so_timestamp = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 299) int so_timestampns = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 300) int siocgstamp = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 301) int siocgstampns = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 302) int ip_multicast_loop = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 303) char *interface;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 304) int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 305) int enabled = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 306) int sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 307) struct ifreq device;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 308) struct ifreq hwtstamp;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 309) struct hwtstamp_config hwconfig, hwconfig_requested;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 310) struct sockaddr_in addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 311) struct ip_mreq imr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 312) struct in_addr iaddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 313) int val;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 314) socklen_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 315) struct timeval next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 316) size_t if_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 317)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 318) if (argc < 2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 319) usage(0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 320) interface = argv[1];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 321) if_len = strlen(interface);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 322) if (if_len >= IFNAMSIZ) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 323) printf("interface name exceeds IFNAMSIZ\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 324) exit(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 325) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 326)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 327) for (i = 2; i < argc; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 328) if (!strcasecmp(argv[i], "SO_TIMESTAMP"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 329) so_timestamp = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 330) else if (!strcasecmp(argv[i], "SO_TIMESTAMPNS"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 331) so_timestampns = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 332) else if (!strcasecmp(argv[i], "SIOCGSTAMP"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 333) siocgstamp = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 334) else if (!strcasecmp(argv[i], "SIOCGSTAMPNS"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 335) siocgstampns = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 336) else if (!strcasecmp(argv[i], "IP_MULTICAST_LOOP"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 337) ip_multicast_loop = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 338) else if (!strcasecmp(argv[i], "SOF_TIMESTAMPING_TX_HARDWARE"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 339) so_timestamping_flags |= SOF_TIMESTAMPING_TX_HARDWARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 340) else if (!strcasecmp(argv[i], "SOF_TIMESTAMPING_TX_SOFTWARE"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 341) so_timestamping_flags |= SOF_TIMESTAMPING_TX_SOFTWARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 342) else if (!strcasecmp(argv[i], "SOF_TIMESTAMPING_RX_HARDWARE"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 343) so_timestamping_flags |= SOF_TIMESTAMPING_RX_HARDWARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 344) else if (!strcasecmp(argv[i], "SOF_TIMESTAMPING_RX_SOFTWARE"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 345) so_timestamping_flags |= SOF_TIMESTAMPING_RX_SOFTWARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 346) else if (!strcasecmp(argv[i], "SOF_TIMESTAMPING_SOFTWARE"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 347) so_timestamping_flags |= SOF_TIMESTAMPING_SOFTWARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 348) else if (!strcasecmp(argv[i], "SOF_TIMESTAMPING_RAW_HARDWARE"))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 349) so_timestamping_flags |= SOF_TIMESTAMPING_RAW_HARDWARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 350) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 351) usage(argv[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 352) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 353)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 354) sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 355) if (sock < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 356) bail("socket");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 357)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 358) memset(&device, 0, sizeof(device));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 359) memcpy(device.ifr_name, interface, if_len + 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 360) if (ioctl(sock, SIOCGIFADDR, &device) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 361) bail("getting interface IP address");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 362)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 363) memset(&hwtstamp, 0, sizeof(hwtstamp));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 364) memcpy(hwtstamp.ifr_name, interface, if_len + 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 365) hwtstamp.ifr_data = (void *)&hwconfig;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 366) memset(&hwconfig, 0, sizeof(hwconfig));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 367) hwconfig.tx_type =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 368) (so_timestamping_flags & SOF_TIMESTAMPING_TX_HARDWARE) ?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 369) HWTSTAMP_TX_ON : HWTSTAMP_TX_OFF;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 370) hwconfig.rx_filter =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 371) (so_timestamping_flags & SOF_TIMESTAMPING_RX_HARDWARE) ?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 372) HWTSTAMP_FILTER_PTP_V1_L4_SYNC : HWTSTAMP_FILTER_NONE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 373) hwconfig_requested = hwconfig;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 374) if (ioctl(sock, SIOCSHWTSTAMP, &hwtstamp) < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 375) if ((errno == EINVAL || errno == ENOTSUP) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 376) hwconfig_requested.tx_type == HWTSTAMP_TX_OFF &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 377) hwconfig_requested.rx_filter == HWTSTAMP_FILTER_NONE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 378) printf("SIOCSHWTSTAMP: disabling hardware time stamping not possible\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 379) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 380) bail("SIOCSHWTSTAMP");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 381) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 382) printf("SIOCSHWTSTAMP: tx_type %d requested, got %d; rx_filter %d requested, got %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 383) hwconfig_requested.tx_type, hwconfig.tx_type,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 384) hwconfig_requested.rx_filter, hwconfig.rx_filter);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 385)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 386) /* bind to PTP port */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 387) addr.sin_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 388) addr.sin_addr.s_addr = htonl(INADDR_ANY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 389) addr.sin_port = htons(319 /* PTP event port */);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 390) if (bind(sock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 391) (struct sockaddr *)&addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 392) sizeof(struct sockaddr_in)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 393) bail("bind");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 394)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 395) /* set multicast group for outgoing packets */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 396) inet_aton("224.0.1.130", &iaddr); /* alternate PTP domain 1 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 397) addr.sin_addr = iaddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 398) imr.imr_multiaddr.s_addr = iaddr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 399) imr.imr_interface.s_addr =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 400) ((struct sockaddr_in *)&device.ifr_addr)->sin_addr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 401) if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_IF,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 402) &imr.imr_interface.s_addr, sizeof(struct in_addr)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 403) bail("set multicast");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 404)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 405) /* join multicast group, loop our own packet */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 406) if (setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 407) &imr, sizeof(struct ip_mreq)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 408) bail("join multicast group");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 409)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 410) if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_LOOP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 411) &ip_multicast_loop, sizeof(enabled)) < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 412) bail("loop multicast");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 413) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 414)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 415) /* set socket options for time stamping */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 416) if (so_timestamp &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 417) setsockopt(sock, SOL_SOCKET, SO_TIMESTAMP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 418) &enabled, sizeof(enabled)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 419) bail("setsockopt SO_TIMESTAMP");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 420)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 421) if (so_timestampns &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 422) setsockopt(sock, SOL_SOCKET, SO_TIMESTAMPNS,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 423) &enabled, sizeof(enabled)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 424) bail("setsockopt SO_TIMESTAMPNS");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 425)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 426) if (so_timestamping_flags &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 427) setsockopt(sock, SOL_SOCKET, SO_TIMESTAMPING,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 428) &so_timestamping_flags,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 429) sizeof(so_timestamping_flags)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 430) bail("setsockopt SO_TIMESTAMPING");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 431)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 432) /* request IP_PKTINFO for debugging purposes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 433) if (setsockopt(sock, SOL_IP, IP_PKTINFO,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 434) &enabled, sizeof(enabled)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 435) printf("%s: %s\n", "setsockopt IP_PKTINFO", strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 436)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 437) /* verify socket options */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 438) len = sizeof(val);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 439) if (getsockopt(sock, SOL_SOCKET, SO_TIMESTAMP, &val, &len) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 440) printf("%s: %s\n", "getsockopt SO_TIMESTAMP", strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 441) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 442) printf("SO_TIMESTAMP %d\n", val);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 443)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 444) if (getsockopt(sock, SOL_SOCKET, SO_TIMESTAMPNS, &val, &len) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 445) printf("%s: %s\n", "getsockopt SO_TIMESTAMPNS",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 446) strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 447) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 448) printf("SO_TIMESTAMPNS %d\n", val);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 449)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 450) if (getsockopt(sock, SOL_SOCKET, SO_TIMESTAMPING, &val, &len) < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 451) printf("%s: %s\n", "getsockopt SO_TIMESTAMPING",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 452) strerror(errno));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 453) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 454) printf("SO_TIMESTAMPING %d\n", val);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 455) if (val != so_timestamping_flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 456) printf(" not the expected value %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 457) so_timestamping_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 458) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 459)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 460) /* send packets forever every five seconds */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 461) gettimeofday(&next, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 462) next.tv_sec = (next.tv_sec + 1) / 5 * 5;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 463) next.tv_usec = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 464) while (1) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 465) struct timeval now;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 466) struct timeval delta;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 467) long delta_us;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 468) int res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 469) fd_set readfs, errorfs;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 470)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 471) gettimeofday(&now, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 472) delta_us = (long)(next.tv_sec - now.tv_sec) * 1000000 +
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 473) (long)(next.tv_usec - now.tv_usec);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 474) if (delta_us > 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 475) /* continue waiting for timeout or data */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 476) delta.tv_sec = delta_us / 1000000;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 477) delta.tv_usec = delta_us % 1000000;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 478)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 479) FD_ZERO(&readfs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 480) FD_ZERO(&errorfs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 481) FD_SET(sock, &readfs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 482) FD_SET(sock, &errorfs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 483) printf("%ld.%06ld: select %ldus\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 484) (long)now.tv_sec, (long)now.tv_usec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 485) delta_us);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 486) res = select(sock + 1, &readfs, 0, &errorfs, &delta);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 487) gettimeofday(&now, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 488) printf("%ld.%06ld: select returned: %d, %s\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 489) (long)now.tv_sec, (long)now.tv_usec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 490) res,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 491) res < 0 ? strerror(errno) : "success");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 492) if (res > 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 493) if (FD_ISSET(sock, &readfs))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 494) printf("ready for reading\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 495) if (FD_ISSET(sock, &errorfs))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 496) printf("has error\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 497) recvpacket(sock, 0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 498) siocgstamp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 499) siocgstampns);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 500) recvpacket(sock, MSG_ERRQUEUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 501) siocgstamp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 502) siocgstampns);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 503) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 504) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 505) /* write one packet */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 506) sendpacket(sock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 507) (struct sockaddr *)&addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 508) sizeof(addr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 509) next.tv_sec += 5;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 510) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 511) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 512) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 513)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 514) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 515) }