2012-03-18 02:12:20 +08:00
|
|
|
/**
|
|
|
|
* @file raw.c
|
|
|
|
* @note Copyright (C) 2012 Richard Cochran <richardcochran@gmail.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
*/
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <linux/filter.h>
|
|
|
|
#include <linux/if_ether.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netpacket/packet.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <linux/errqueue.h>
|
|
|
|
#include <linux/net_tstamp.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
|
2014-04-22 22:00:59 +08:00
|
|
|
#include "address.h"
|
2015-08-22 04:44:29 +08:00
|
|
|
#include "config.h"
|
2012-03-18 02:12:20 +08:00
|
|
|
#include "contain.h"
|
|
|
|
#include "ether.h"
|
|
|
|
#include "print.h"
|
|
|
|
#include "raw.h"
|
|
|
|
#include "sk.h"
|
|
|
|
#include "transport_private.h"
|
2015-08-22 04:44:29 +08:00
|
|
|
#include "util.h"
|
2012-03-18 02:12:20 +08:00
|
|
|
|
|
|
|
struct raw {
|
|
|
|
struct transport t;
|
2014-04-22 22:00:59 +08:00
|
|
|
struct address src_addr;
|
|
|
|
struct address ptp_addr;
|
|
|
|
struct address p2p_addr;
|
2012-08-15 03:17:10 +08:00
|
|
|
int vlan;
|
2012-03-18 02:12:20 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#define OP_AND (BPF_ALU | BPF_AND | BPF_K)
|
|
|
|
#define OP_JEQ (BPF_JMP | BPF_JEQ | BPF_K)
|
2012-08-15 03:17:10 +08:00
|
|
|
#define OP_JUN (BPF_JMP | BPF_JA)
|
2012-03-18 02:12:20 +08:00
|
|
|
#define OP_LDB (BPF_LD | BPF_B | BPF_ABS)
|
|
|
|
#define OP_LDH (BPF_LD | BPF_H | BPF_ABS)
|
|
|
|
#define OP_RETK (BPF_RET | BPF_K)
|
|
|
|
|
|
|
|
#define PTP_GEN_BIT 0x08 /* indicates general message, if set in message type */
|
|
|
|
|
2012-08-15 03:17:10 +08:00
|
|
|
#define N_RAW_FILTER 12
|
|
|
|
#define RAW_FILTER_TEST 9
|
2012-03-18 02:12:20 +08:00
|
|
|
|
|
|
|
static struct sock_filter raw_filter[N_RAW_FILTER] = {
|
|
|
|
{OP_LDH, 0, 0, OFF_ETYPE },
|
2012-08-15 03:17:10 +08:00
|
|
|
{OP_JEQ, 0, 4, ETH_P_8021Q }, /*f goto non-vlan block*/
|
|
|
|
{OP_LDH, 0, 0, OFF_ETYPE + 4 },
|
|
|
|
{OP_JEQ, 0, 7, ETH_P_1588 }, /*f goto reject*/
|
|
|
|
{OP_LDB, 0, 0, ETH_HLEN + VLAN_HLEN },
|
|
|
|
{OP_JUN, 0, 0, 2 }, /*goto test general bit*/
|
2012-03-29 11:51:18 +08:00
|
|
|
{OP_JEQ, 0, 4, ETH_P_1588 }, /*f goto reject*/
|
2012-03-18 02:12:20 +08:00
|
|
|
{OP_LDB, 0, 0, ETH_HLEN },
|
|
|
|
{OP_AND, 0, 0, PTP_GEN_BIT }, /*test general bit*/
|
|
|
|
{OP_JEQ, 0, 1, 0 }, /*0,1=accept event; 1,0=accept general*/
|
|
|
|
{OP_RETK, 0, 0, 1500 }, /*accept*/
|
|
|
|
{OP_RETK, 0, 0, 0 }, /*reject*/
|
|
|
|
};
|
|
|
|
|
|
|
|
static int raw_configure(int fd, int event, int index,
|
2012-04-05 23:20:54 +08:00
|
|
|
unsigned char *addr1, unsigned char *addr2, int enable)
|
2012-03-18 02:12:20 +08:00
|
|
|
{
|
2012-04-05 23:20:54 +08:00
|
|
|
int err1, err2, filter_test, option;
|
2012-03-18 02:12:20 +08:00
|
|
|
struct packet_mreq mreq;
|
|
|
|
struct sock_fprog prg = { N_RAW_FILTER, raw_filter };
|
|
|
|
|
|
|
|
filter_test = RAW_FILTER_TEST;
|
|
|
|
if (event) {
|
|
|
|
raw_filter[filter_test].jt = 0;
|
|
|
|
raw_filter[filter_test].jf = 1;
|
|
|
|
} else {
|
|
|
|
raw_filter[filter_test].jt = 1;
|
|
|
|
raw_filter[filter_test].jf = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &prg, sizeof(prg))) {
|
|
|
|
pr_err("setsockopt SO_ATTACH_FILTER failed: %m");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
option = enable ? PACKET_ADD_MEMBERSHIP : PACKET_DROP_MEMBERSHIP;
|
|
|
|
|
2018-03-01 15:37:47 +08:00
|
|
|
memset(&mreq, 0, sizeof(mreq));
|
2012-03-18 02:12:20 +08:00
|
|
|
mreq.mr_ifindex = index;
|
|
|
|
mreq.mr_type = PACKET_MR_MULTICAST;
|
2014-04-11 18:25:51 +08:00
|
|
|
mreq.mr_alen = MAC_LEN;
|
|
|
|
memcpy(mreq.mr_address, addr1, MAC_LEN);
|
2012-04-05 23:20:54 +08:00
|
|
|
|
|
|
|
err1 = setsockopt(fd, SOL_PACKET, option, &mreq, sizeof(mreq));
|
|
|
|
if (err1)
|
|
|
|
pr_warning("setsockopt PACKET_MR_MULTICAST failed: %m");
|
|
|
|
|
2014-04-11 18:25:51 +08:00
|
|
|
memcpy(mreq.mr_address, addr2, MAC_LEN);
|
2012-04-05 23:20:54 +08:00
|
|
|
|
|
|
|
err2 = setsockopt(fd, SOL_PACKET, option, &mreq, sizeof(mreq));
|
|
|
|
if (err2)
|
|
|
|
pr_warning("setsockopt PACKET_MR_MULTICAST failed: %m");
|
|
|
|
|
|
|
|
if (!err1 && !err2)
|
2012-03-18 02:12:20 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
mreq.mr_ifindex = index;
|
|
|
|
mreq.mr_type = PACKET_MR_ALLMULTI;
|
|
|
|
mreq.mr_alen = 0;
|
|
|
|
if (!setsockopt(fd, SOL_PACKET, option, &mreq, sizeof(mreq))) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
pr_warning("setsockopt PACKET_MR_ALLMULTI failed: %m");
|
|
|
|
|
|
|
|
mreq.mr_ifindex = index;
|
|
|
|
mreq.mr_type = PACKET_MR_PROMISC;
|
|
|
|
mreq.mr_alen = 0;
|
|
|
|
if (!setsockopt(fd, SOL_PACKET, option, &mreq, sizeof(mreq))) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
pr_warning("setsockopt PACKET_MR_PROMISC failed: %m");
|
|
|
|
|
|
|
|
pr_err("all socket options failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int raw_close(struct transport *t, struct fdarray *fda)
|
|
|
|
{
|
|
|
|
close(fda->fd[0]);
|
|
|
|
close(fda->fd[1]);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-08-22 04:59:28 +08:00
|
|
|
static int open_socket(const char *name, int event, unsigned char *ptp_dst_mac,
|
2019-08-07 11:31:18 +08:00
|
|
|
unsigned char *p2p_dst_mac, int socket_priority)
|
2012-03-18 02:12:20 +08:00
|
|
|
{
|
|
|
|
struct sockaddr_ll addr;
|
|
|
|
int fd, index;
|
|
|
|
|
|
|
|
fd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
|
|
|
|
if (fd < 0) {
|
|
|
|
pr_err("socket failed: %m");
|
|
|
|
goto no_socket;
|
|
|
|
}
|
|
|
|
index = sk_interface_index(fd, name);
|
|
|
|
if (index < 0)
|
|
|
|
goto no_option;
|
|
|
|
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sll_ifindex = index;
|
|
|
|
addr.sll_family = AF_PACKET;
|
|
|
|
addr.sll_protocol = htons(ETH_P_ALL);
|
|
|
|
if (bind(fd, (struct sockaddr *) &addr, sizeof(addr))) {
|
|
|
|
pr_err("bind failed: %m");
|
|
|
|
goto no_option;
|
|
|
|
}
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name))) {
|
|
|
|
pr_err("setsockopt SO_BINDTODEVICE failed: %m");
|
|
|
|
goto no_option;
|
|
|
|
}
|
2019-08-07 11:31:18 +08:00
|
|
|
|
|
|
|
if (socket_priority > 0 &&
|
|
|
|
setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &socket_priority,
|
|
|
|
sizeof(socket_priority))) {
|
|
|
|
pr_err("setsockopt SO_PRIORITY failed: %m");
|
|
|
|
goto no_option;
|
|
|
|
}
|
2012-04-05 23:20:54 +08:00
|
|
|
if (raw_configure(fd, event, index, ptp_dst_mac, p2p_dst_mac, 1))
|
2012-03-18 02:12:20 +08:00
|
|
|
goto no_option;
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
no_option:
|
|
|
|
close(fd);
|
|
|
|
no_socket:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-04-22 22:00:59 +08:00
|
|
|
static void mac_to_addr(struct address *addr, void *mac)
|
|
|
|
{
|
2015-08-29 16:28:51 +08:00
|
|
|
addr->sll.sll_family = AF_PACKET;
|
|
|
|
addr->sll.sll_halen = MAC_LEN;
|
|
|
|
memcpy(addr->sll.sll_addr, mac, MAC_LEN);
|
|
|
|
addr->len = sizeof(addr->sll);
|
2014-04-22 22:00:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void addr_to_mac(void *mac, struct address *addr)
|
|
|
|
{
|
2015-08-29 16:28:51 +08:00
|
|
|
memcpy(mac, &addr->sll.sll_addr, MAC_LEN);
|
2014-04-22 22:00:59 +08:00
|
|
|
}
|
|
|
|
|
2017-10-09 22:31:47 +08:00
|
|
|
static int raw_open(struct transport *t, struct interface *iface,
|
2012-03-18 02:12:20 +08:00
|
|
|
struct fdarray *fda, enum timestamp_type ts_type)
|
|
|
|
{
|
|
|
|
struct raw *raw = container_of(t, struct raw, t);
|
2015-08-22 04:44:29 +08:00
|
|
|
unsigned char ptp_dst_mac[MAC_LEN];
|
2015-08-22 04:59:28 +08:00
|
|
|
unsigned char p2p_dst_mac[MAC_LEN];
|
2019-08-07 11:31:18 +08:00
|
|
|
int efd, gfd, socket_priority;
|
2020-02-10 05:47:18 +08:00
|
|
|
const char *name;
|
|
|
|
char *str;
|
2012-03-18 02:12:20 +08:00
|
|
|
|
2020-02-10 05:47:18 +08:00
|
|
|
name = interface_label(iface);
|
2015-08-22 04:44:29 +08:00
|
|
|
str = config_get_string(t->cfg, name, "ptp_dst_mac");
|
|
|
|
if (str2mac(str, ptp_dst_mac)) {
|
|
|
|
pr_err("invalid ptp_dst_mac %s", str);
|
|
|
|
return -1;
|
|
|
|
}
|
2015-08-22 04:59:28 +08:00
|
|
|
str = config_get_string(t->cfg, name, "p2p_dst_mac");
|
|
|
|
if (str2mac(str, p2p_dst_mac)) {
|
|
|
|
pr_err("invalid p2p_dst_mac %s", str);
|
|
|
|
return -1;
|
|
|
|
}
|
2014-04-22 22:00:59 +08:00
|
|
|
mac_to_addr(&raw->ptp_addr, ptp_dst_mac);
|
|
|
|
mac_to_addr(&raw->p2p_addr, p2p_dst_mac);
|
2012-03-18 02:12:20 +08:00
|
|
|
|
2014-04-22 22:00:59 +08:00
|
|
|
if (sk_interface_macaddr(name, &raw->src_addr))
|
2012-03-18 02:12:20 +08:00
|
|
|
goto no_mac;
|
|
|
|
|
2019-08-07 11:31:18 +08:00
|
|
|
socket_priority = config_get_int(t->cfg, "global", "socket_priority");
|
|
|
|
|
|
|
|
efd = open_socket(name, 1, ptp_dst_mac, p2p_dst_mac, socket_priority);
|
2012-03-18 02:12:20 +08:00
|
|
|
if (efd < 0)
|
|
|
|
goto no_event;
|
|
|
|
|
2019-08-07 11:31:18 +08:00
|
|
|
gfd = open_socket(name, 0, ptp_dst_mac, p2p_dst_mac, socket_priority);
|
2012-03-18 02:12:20 +08:00
|
|
|
if (gfd < 0)
|
|
|
|
goto no_general;
|
|
|
|
|
2012-10-25 21:19:31 +08:00
|
|
|
if (sk_timestamping_init(efd, name, ts_type, TRANS_IEEE_802_3))
|
2012-03-18 02:12:20 +08:00
|
|
|
goto no_timestamping;
|
|
|
|
|
2013-08-29 16:54:55 +08:00
|
|
|
if (sk_general_init(gfd))
|
|
|
|
goto no_timestamping;
|
|
|
|
|
2012-03-18 02:12:20 +08:00
|
|
|
fda->fd[FD_EVENT] = efd;
|
|
|
|
fda->fd[FD_GENERAL] = gfd;
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
no_timestamping:
|
|
|
|
close(gfd);
|
|
|
|
no_general:
|
|
|
|
close(efd);
|
|
|
|
no_event:
|
|
|
|
no_mac:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int raw_recv(struct transport *t, int fd, void *buf, int buflen,
|
2014-04-22 22:00:59 +08:00
|
|
|
struct address *addr, struct hw_timestamp *hwts)
|
2012-03-18 02:12:20 +08:00
|
|
|
{
|
2012-08-15 03:17:10 +08:00
|
|
|
int cnt, hlen;
|
2012-03-18 02:12:20 +08:00
|
|
|
unsigned char *ptr = buf;
|
2012-08-15 03:17:10 +08:00
|
|
|
struct eth_hdr *hdr;
|
|
|
|
struct raw *raw = container_of(t, struct raw, t);
|
|
|
|
|
|
|
|
if (raw->vlan) {
|
|
|
|
hlen = sizeof(struct vlan_hdr);
|
|
|
|
} else {
|
|
|
|
hlen = sizeof(struct eth_hdr);
|
|
|
|
}
|
|
|
|
ptr -= hlen;
|
|
|
|
buflen += hlen;
|
|
|
|
hdr = (struct eth_hdr *) ptr;
|
|
|
|
|
ptp4l: call recvmsg() with the MSG_DONTWAIT flag
The application's main event loop (clock_poll) is woken up by poll() and
dispatches the socket receive queue events to the corresponding ports as
needed.
So it is a bug if poll() wakes up the process for data availability on a
socket's receive queue, and then recvmsg(), called immediately
afterwards, goes to sleep trying to retrieve it. This patch will
generate an error that will be propagated to the user if this condition
happens.
Can it happen?
As of this patch, ptp4l uses the SO_SELECT_ERR_QUEUE socket option,
which means that poll() will wake the process up, with revents ==
(POLLIN | POLLERR), if data is available in the error queue. But
clock_poll() does not check POLLERR, just POLLIN, and draws the wrong
conclusion that there is data available in the receive queue (when it is
in fact available in the error queue).
When the above condition happens, recvmsg() will sleep typically for a
whole sync interval waiting for data on the event socket, and will be
woken up when the new real frame arrives. It will not dequeue follow-up
messages during this time (which are sent to the general message socket)
and when it does, it will already be late for them (their seqid will be
out of order). So it will drop them and everything that comes after. The
synchronization process will fail.
The above condition shouldn't typically happen, but exceptional kernel
events will trigger it. It helps to be strict in ptp4l in order for
those events to not blow up in even stranger symptoms unrelated to the
root cause of the problem.
Signed-off-by: Vladimir Oltean <olteanv@gmail.com>
2020-06-15 23:23:19 +08:00
|
|
|
cnt = sk_receive(fd, ptr, buflen, addr, hwts, MSG_DONTWAIT);
|
2012-08-15 03:17:10 +08:00
|
|
|
|
2014-04-10 17:37:22 +08:00
|
|
|
if (cnt >= 0)
|
|
|
|
cnt -= hlen;
|
|
|
|
if (cnt < 0)
|
|
|
|
return cnt;
|
|
|
|
|
2012-08-15 03:17:10 +08:00
|
|
|
if (raw->vlan) {
|
|
|
|
if (ETH_P_1588 == ntohs(hdr->type)) {
|
|
|
|
pr_notice("raw: disabling VLAN mode");
|
|
|
|
raw->vlan = 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (ETH_P_8021Q == ntohs(hdr->type)) {
|
|
|
|
pr_notice("raw: switching to VLAN mode");
|
|
|
|
raw->vlan = 1;
|
|
|
|
}
|
|
|
|
}
|
2012-08-10 12:39:06 +08:00
|
|
|
return cnt;
|
2012-03-18 02:12:20 +08:00
|
|
|
}
|
|
|
|
|
2018-03-17 14:22:35 +08:00
|
|
|
static int raw_send(struct transport *t, struct fdarray *fda,
|
|
|
|
enum transport_event event, int peer, void *buf, int len,
|
|
|
|
struct address *addr, struct hw_timestamp *hwts)
|
2012-03-18 02:12:20 +08:00
|
|
|
{
|
|
|
|
struct raw *raw = container_of(t, struct raw, t);
|
|
|
|
ssize_t cnt;
|
|
|
|
unsigned char pkt[1600], *ptr = buf;
|
|
|
|
struct eth_hdr *hdr;
|
2018-03-18 00:30:04 +08:00
|
|
|
int fd = -1;
|
|
|
|
|
|
|
|
switch (event) {
|
|
|
|
case TRANS_GENERAL:
|
|
|
|
fd = fda->fd[FD_GENERAL];
|
|
|
|
break;
|
|
|
|
case TRANS_EVENT:
|
|
|
|
case TRANS_ONESTEP:
|
|
|
|
case TRANS_P2P1STEP:
|
|
|
|
case TRANS_DEFER_EVENT:
|
|
|
|
fd = fda->fd[FD_EVENT];
|
|
|
|
break;
|
|
|
|
}
|
2012-03-18 02:12:20 +08:00
|
|
|
|
|
|
|
ptr -= sizeof(*hdr);
|
|
|
|
len += sizeof(*hdr);
|
|
|
|
|
2014-04-22 22:00:59 +08:00
|
|
|
if (!addr)
|
|
|
|
addr = peer ? &raw->p2p_addr : &raw->ptp_addr;
|
|
|
|
|
2012-03-18 02:12:20 +08:00
|
|
|
hdr = (struct eth_hdr *) ptr;
|
2014-04-22 22:00:59 +08:00
|
|
|
addr_to_mac(&hdr->dst, addr);
|
|
|
|
addr_to_mac(&hdr->src, &raw->src_addr);
|
2012-04-05 23:20:54 +08:00
|
|
|
|
2012-03-18 02:12:20 +08:00
|
|
|
hdr->type = htons(ETH_P_1588);
|
|
|
|
|
|
|
|
cnt = send(fd, ptr, len, 0);
|
|
|
|
if (cnt < 1) {
|
2020-04-30 21:15:54 +08:00
|
|
|
return -errno;
|
2012-03-18 02:12:20 +08:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Get the time stamp right away.
|
|
|
|
*/
|
2014-04-22 22:00:59 +08:00
|
|
|
return event == TRANS_EVENT ? sk_receive(fd, pkt, len, NULL, hwts, MSG_ERRQUEUE) : cnt;
|
2012-03-18 02:12:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void raw_release(struct transport *t)
|
|
|
|
{
|
|
|
|
struct raw *raw = container_of(t, struct raw, t);
|
|
|
|
free(raw);
|
|
|
|
}
|
|
|
|
|
2013-01-09 08:21:25 +08:00
|
|
|
static int raw_physical_addr(struct transport *t, uint8_t *addr)
|
|
|
|
{
|
|
|
|
struct raw *raw = container_of(t, struct raw, t);
|
2014-04-22 22:00:59 +08:00
|
|
|
addr_to_mac(addr, &raw->src_addr);
|
2013-01-09 08:21:25 +08:00
|
|
|
return MAC_LEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int raw_protocol_addr(struct transport *t, uint8_t *addr)
|
|
|
|
{
|
|
|
|
struct raw *raw = container_of(t, struct raw, t);
|
2014-04-22 22:00:59 +08:00
|
|
|
addr_to_mac(addr, &raw->src_addr);
|
2013-01-09 08:21:25 +08:00
|
|
|
return MAC_LEN;
|
|
|
|
}
|
|
|
|
|
2012-03-18 02:12:20 +08:00
|
|
|
struct transport *raw_transport_create(void)
|
|
|
|
{
|
|
|
|
struct raw *raw;
|
|
|
|
raw = calloc(1, sizeof(*raw));
|
|
|
|
if (!raw)
|
|
|
|
return NULL;
|
|
|
|
raw->t.close = raw_close;
|
|
|
|
raw->t.open = raw_open;
|
|
|
|
raw->t.recv = raw_recv;
|
|
|
|
raw->t.send = raw_send;
|
|
|
|
raw->t.release = raw_release;
|
2013-01-09 08:21:25 +08:00
|
|
|
raw->t.physical_addr = raw_physical_addr;
|
|
|
|
raw->t.protocol_addr = raw_protocol_addr;
|
2012-03-18 02:12:20 +08:00
|
|
|
return &raw->t;
|
|
|
|
}
|