1 // SPDX-License-Identifier: GPL-2.0-or-later
11 #include <linux/errqueue.h>
12 #include <linux/icmp.h>
13 #include <linux/icmpv6.h>
14 #include <linux/net_tstamp.h>
15 #include <linux/types.h>
16 #include <linux/udp.h>
17 #include <sys/socket.h>
19 #include "../kselftest.h"
23 /* Well defined errors, callers may depend on these */
25 /* Informational, can reorder */
38 struct option_cmsg_u32 {
51 unsigned int dontfrag;
54 unsigned int priority;
61 struct option_cmsg_u32 mark;
70 struct option_cmsg_u32 dontfrag;
71 struct option_cmsg_u32 tclass;
72 struct option_cmsg_u32 hlimit;
73 struct option_cmsg_u32 exthdr;
85 static struct timespec time_start_real;
86 static struct timespec time_start_mono;
88 static void __attribute__((noreturn)) cs_usage(const char *bin)
90 printf("Usage: %s [opts] <dst host> <dst port / service>\n", bin);
92 "\t\t-s Silent send() failures\n"
93 "\t\t-S send() size\n"
94 "\t\t-4/-6 Force IPv4 / IPv6 only\n"
95 "\t\t-p prot Socket protocol\n"
96 "\t\t (u = UDP (default); i = ICMP; r = RAW)\n"
98 "\t\t-m val Set SO_MARK with given value\n"
99 "\t\t-M val Set SO_MARK via setsockopt\n"
100 "\t\t-d val Set SO_TXTIME with given delay (usec)\n"
101 "\t\t-t Enable time stamp reporting\n"
102 "\t\t-f val Set don't fragment via cmsg\n"
103 "\t\t-F val Set don't fragment via setsockopt\n"
104 "\t\t-c val Set TCLASS via cmsg\n"
105 "\t\t-C val Set TCLASS via setsockopt\n"
106 "\t\t-l val Set HOPLIMIT via cmsg\n"
107 "\t\t-L val Set HOPLIMIT via setsockopt\n"
108 "\t\t-H type Add an IPv6 header option\n"
109 "\t\t (h = HOP; d = DST; r = RTDST)"
114 static void cs_parse_args(int argc, char *argv[])
118 while ((o = getopt(argc, argv, "46sS:p:P:m:M:n:d:tf:F:c:C:l:L:H:")) != -1) {
121 opt.silent_send = true;
124 opt.size = atoi(optarg);
127 opt.sock.family = AF_INET;
130 opt.sock.family = AF_INET6;
133 if (*optarg == 'u' || *optarg == 'U') {
134 opt.sock.proto = IPPROTO_UDP;
135 } else if (*optarg == 'i' || *optarg == 'I') {
136 opt.sock.proto = IPPROTO_ICMP;
137 } else if (*optarg == 'r') {
138 opt.sock.type = SOCK_RAW;
140 printf("Error: unknown protocol: %s\n", optarg);
145 opt.sockopt.priority = atoi(optarg);
149 opt.mark.val = atoi(optarg);
152 opt.sockopt.mark = atoi(optarg);
155 opt.num_pkt = atoi(optarg);
158 opt.txtime.ena = true;
159 opt.txtime.delay = atoi(optarg);
165 opt.v6.dontfrag.ena = true;
166 opt.v6.dontfrag.val = atoi(optarg);
169 opt.sockopt.dontfrag = atoi(optarg);
172 opt.v6.tclass.ena = true;
173 opt.v6.tclass.val = atoi(optarg);
176 opt.sockopt.tclass = atoi(optarg);
179 opt.v6.hlimit.ena = true;
180 opt.v6.hlimit.val = atoi(optarg);
183 opt.sockopt.hlimit = atoi(optarg);
186 opt.v6.exthdr.ena = true;
189 opt.v6.exthdr.val = IPV6_HOPOPTS;
192 opt.v6.exthdr.val = IPV6_DSTOPTS;
195 opt.v6.exthdr.val = IPV6_RTHDRDSTOPTS;
198 printf("Error: hdr type: %s\n", optarg);
205 if (optind != argc - 2)
208 opt.host = argv[optind];
209 opt.service = argv[optind + 1];
212 static void memrnd(void *s, size_t n)
217 for (; n >= 4; n -= 4)
219 byte = (void *)dword;
225 ca_write_cmsg_u32(char *cbuf, size_t cbuf_sz, size_t *cmsg_len,
226 int level, int optname, struct option_cmsg_u32 *uopt)
228 struct cmsghdr *cmsg;
233 cmsg = (struct cmsghdr *)(cbuf + *cmsg_len);
234 *cmsg_len += CMSG_SPACE(sizeof(__u32));
235 if (cbuf_sz < *cmsg_len)
236 error(ERN_CMSG_WR, EFAULT, "cmsg buffer too small");
238 cmsg->cmsg_level = level;
239 cmsg->cmsg_type = optname;
240 cmsg->cmsg_len = CMSG_LEN(sizeof(__u32));
241 *(__u32 *)CMSG_DATA(cmsg) = uopt->val;
245 cs_write_cmsg(int fd, struct msghdr *msg, char *cbuf, size_t cbuf_sz)
247 struct cmsghdr *cmsg;
250 msg->msg_control = cbuf;
253 ca_write_cmsg_u32(cbuf, cbuf_sz, &cmsg_len,
254 SOL_SOCKET, SO_MARK, &opt.mark);
255 ca_write_cmsg_u32(cbuf, cbuf_sz, &cmsg_len,
256 SOL_IPV6, IPV6_DONTFRAG, &opt.v6.dontfrag);
257 ca_write_cmsg_u32(cbuf, cbuf_sz, &cmsg_len,
258 SOL_IPV6, IPV6_TCLASS, &opt.v6.tclass);
259 ca_write_cmsg_u32(cbuf, cbuf_sz, &cmsg_len,
260 SOL_IPV6, IPV6_HOPLIMIT, &opt.v6.hlimit);
262 if (opt.txtime.ena) {
265 txtime = time_start_mono.tv_sec * (1000ULL * 1000 * 1000) +
266 time_start_mono.tv_nsec +
267 opt.txtime.delay * 1000;
269 cmsg = (struct cmsghdr *)(cbuf + cmsg_len);
270 cmsg_len += CMSG_SPACE(sizeof(txtime));
271 if (cbuf_sz < cmsg_len)
272 error(ERN_CMSG_WR, EFAULT, "cmsg buffer too small");
274 cmsg->cmsg_level = SOL_SOCKET;
275 cmsg->cmsg_type = SCM_TXTIME;
276 cmsg->cmsg_len = CMSG_LEN(sizeof(txtime));
277 memcpy(CMSG_DATA(cmsg), &txtime, sizeof(txtime));
280 cmsg = (struct cmsghdr *)(cbuf + cmsg_len);
281 cmsg_len += CMSG_SPACE(sizeof(__u32));
282 if (cbuf_sz < cmsg_len)
283 error(ERN_CMSG_WR, EFAULT, "cmsg buffer too small");
285 cmsg->cmsg_level = SOL_SOCKET;
286 cmsg->cmsg_type = SO_TIMESTAMPING;
287 cmsg->cmsg_len = CMSG_LEN(sizeof(__u32));
288 *(__u32 *)CMSG_DATA(cmsg) = SOF_TIMESTAMPING_TX_SCHED |
289 SOF_TIMESTAMPING_TX_SOFTWARE;
291 if (opt.v6.exthdr.ena) {
292 cmsg = (struct cmsghdr *)(cbuf + cmsg_len);
293 cmsg_len += CMSG_SPACE(8);
294 if (cbuf_sz < cmsg_len)
295 error(ERN_CMSG_WR, EFAULT, "cmsg buffer too small");
297 cmsg->cmsg_level = SOL_IPV6;
298 cmsg->cmsg_type = opt.v6.exthdr.val;
299 cmsg->cmsg_len = CMSG_LEN(8);
300 *(__u64 *)CMSG_DATA(cmsg) = 0;
304 msg->msg_controllen = cmsg_len;
306 msg->msg_control = NULL;
309 static const char *cs_ts_info2str(unsigned int info)
311 static const char *names[] = {
312 [SCM_TSTAMP_SND] = "SND",
313 [SCM_TSTAMP_SCHED] = "SCHED",
314 [SCM_TSTAMP_ACK] = "ACK",
317 if (info < ARRAY_SIZE(names))
323 cs_read_cmsg(int fd, struct msghdr *msg, char *cbuf, size_t cbuf_sz)
325 struct sock_extended_err *see;
326 struct scm_timestamping *ts;
327 unsigned long ts_seen = 0;
328 struct cmsghdr *cmsg;
333 msg->msg_control = cbuf;
334 msg->msg_controllen = cbuf_sz;
339 memset(cbuf, 0, cbuf_sz);
341 err = recvmsg(fd, msg, MSG_ERRQUEUE);
345 error(ERN_RECVERR, errno, "recvmsg ERRQ");
348 for (cmsg = CMSG_FIRSTHDR(msg); cmsg != NULL;
349 cmsg = CMSG_NXTHDR(msg, cmsg)) {
350 if (cmsg->cmsg_level == SOL_SOCKET &&
351 cmsg->cmsg_type == SO_TIMESTAMPING_OLD) {
352 if (cmsg->cmsg_len < sizeof(*ts))
353 error(ERN_CMSG_RD, EINVAL, "TS cmsg");
355 ts = (void *)CMSG_DATA(cmsg);
357 if ((cmsg->cmsg_level == SOL_IP &&
358 cmsg->cmsg_type == IP_RECVERR) ||
359 (cmsg->cmsg_level == SOL_IPV6 &&
360 cmsg->cmsg_type == IPV6_RECVERR)) {
361 if (cmsg->cmsg_len < sizeof(*see))
362 error(ERN_CMSG_RD, EINVAL, "sock_err cmsg");
364 see = (void *)CMSG_DATA(cmsg);
369 error(ERN_CMSG_RCV, ENOENT, "TS cmsg not found");
371 error(ERN_CMSG_RCV, ENOENT, "sock_err cmsg not found");
373 for (i = 0; i < 3; i++) {
374 unsigned long long rel_time;
376 if (!ts->ts[i].tv_sec && !ts->ts[i].tv_nsec)
379 rel_time = (ts->ts[i].tv_sec - time_start_real.tv_sec) *
381 (ts->ts[i].tv_nsec - time_start_real.tv_nsec) /
383 printf(" %5s ts%d %lluus\n",
384 cs_ts_info2str(see->ee_info),
386 ts_seen |= 1 << see->ee_info;
393 static void ca_set_sockopts(int fd)
395 if (opt.sockopt.mark &&
396 setsockopt(fd, SOL_SOCKET, SO_MARK,
397 &opt.sockopt.mark, sizeof(opt.sockopt.mark)))
398 error(ERN_SOCKOPT, errno, "setsockopt SO_MARK");
399 if (opt.sockopt.dontfrag &&
400 setsockopt(fd, SOL_IPV6, IPV6_DONTFRAG,
401 &opt.sockopt.dontfrag, sizeof(opt.sockopt.dontfrag)))
402 error(ERN_SOCKOPT, errno, "setsockopt IPV6_DONTFRAG");
403 if (opt.sockopt.tclass &&
404 setsockopt(fd, SOL_IPV6, IPV6_TCLASS,
405 &opt.sockopt.tclass, sizeof(opt.sockopt.tclass)))
406 error(ERN_SOCKOPT, errno, "setsockopt IPV6_TCLASS");
407 if (opt.sockopt.hlimit &&
408 setsockopt(fd, SOL_IPV6, IPV6_UNICAST_HOPS,
409 &opt.sockopt.hlimit, sizeof(opt.sockopt.hlimit)))
410 error(ERN_SOCKOPT, errno, "setsockopt IPV6_HOPLIMIT");
411 if (opt.sockopt.priority &&
412 setsockopt(fd, SOL_SOCKET, SO_PRIORITY,
413 &opt.sockopt.priority, sizeof(opt.sockopt.priority)))
414 error(ERN_SOCKOPT, errno, "setsockopt SO_PRIORITY");
416 if (opt.txtime.ena) {
417 struct sock_txtime so_txtime = {
418 .clockid = CLOCK_MONOTONIC,
421 if (setsockopt(fd, SOL_SOCKET, SO_TXTIME,
422 &so_txtime, sizeof(so_txtime)))
423 error(ERN_SOCKOPT, errno, "setsockopt TXTIME");
426 __u32 val = SOF_TIMESTAMPING_SOFTWARE |
427 SOF_TIMESTAMPING_OPT_TSONLY;
429 if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMPING,
431 error(ERN_SOCKOPT, errno, "setsockopt TIMESTAMPING");
435 int main(int argc, char *argv[])
437 struct addrinfo hints, *ai;
446 cs_parse_args(argc, argv);
448 buf = malloc(opt.size);
449 memrnd(buf, opt.size);
451 memset(&hints, 0, sizeof(hints));
452 hints.ai_family = opt.sock.family;
455 err = getaddrinfo(opt.host, opt.service, &hints, &ai);
457 fprintf(stderr, "Can't resolve address [%s]:%s\n",
458 opt.host, opt.service);
459 return ERN_SOCK_CREATE;
462 if (ai->ai_family == AF_INET6 && opt.sock.proto == IPPROTO_ICMP)
463 opt.sock.proto = IPPROTO_ICMPV6;
465 fd = socket(ai->ai_family, opt.sock.type, opt.sock.proto);
467 fprintf(stderr, "Can't open socket: %s\n", strerror(errno));
472 if (opt.sock.proto == IPPROTO_ICMP) {
475 } else if (opt.sock.proto == IPPROTO_ICMPV6) {
476 buf[0] = ICMPV6_ECHO_REQUEST;
478 } else if (opt.sock.type == SOCK_RAW) {
479 struct udphdr hdr = { 1, 2, htons(opt.size), 0 };
480 struct sockaddr_in6 *sin6 = (void *)ai->ai_addr;
482 memcpy(buf, &hdr, sizeof(hdr));
483 sin6->sin6_port = htons(opt.sock.proto);
488 if (clock_gettime(CLOCK_REALTIME, &time_start_real))
489 error(ERN_GETTIME, errno, "gettime REALTIME");
490 if (clock_gettime(CLOCK_MONOTONIC, &time_start_mono))
491 error(ERN_GETTIME, errno, "gettime MONOTONIC");
493 iov[0].iov_base = buf;
494 iov[0].iov_len = opt.size;
496 memset(&msg, 0, sizeof(msg));
497 msg.msg_name = ai->ai_addr;
498 msg.msg_namelen = ai->ai_addrlen;
502 cs_write_cmsg(fd, &msg, cbuf, sizeof(cbuf));
504 for (i = 0; i < opt.num_pkt; i++) {
505 err = sendmsg(fd, &msg, 0);
507 if (!opt.silent_send)
508 fprintf(stderr, "send failed: %s\n", strerror(errno));
511 } else if (err != (int)opt.size) {
512 fprintf(stderr, "short send\n");
513 err = ERN_SEND_SHORT;
523 /* Make sure all timestamps have time to loop back */
524 for (i = 0; i < 40; i++) {
525 seen = cs_read_cmsg(fd, &msg, cbuf, sizeof(cbuf));
526 if (seen & (1 << SCM_TSTAMP_SND))
528 usleep(opt.txtime.delay / 20);