linux/tools/testing/selftests/net/udpgso_bench_rx.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2
   3#define _GNU_SOURCE
   4
   5#include <arpa/inet.h>
   6#include <error.h>
   7#include <errno.h>
   8#include <limits.h>
   9#include <linux/errqueue.h>
  10#include <linux/if_packet.h>
  11#include <linux/socket.h>
  12#include <linux/sockios.h>
  13#include <net/ethernet.h>
  14#include <net/if.h>
  15#include <netinet/ip.h>
  16#include <netinet/ip6.h>
  17#include <netinet/tcp.h>
  18#include <netinet/udp.h>
  19#include <poll.h>
  20#include <sched.h>
  21#include <stdbool.h>
  22#include <stdio.h>
  23#include <stdint.h>
  24#include <stdlib.h>
  25#include <string.h>
  26#include <sys/ioctl.h>
  27#include <sys/socket.h>
  28#include <sys/stat.h>
  29#include <sys/time.h>
  30#include <sys/types.h>
  31#include <sys/wait.h>
  32#include <unistd.h>
  33
  34#ifndef UDP_GRO
  35#define UDP_GRO         104
  36#endif
  37
  38static int  cfg_port            = 8000;
  39static bool cfg_tcp;
  40static bool cfg_verify;
  41static bool cfg_read_all;
  42static bool cfg_gro_segment;
  43static int  cfg_family          = PF_INET6;
  44static int  cfg_alen            = sizeof(struct sockaddr_in6);
  45static int  cfg_expected_pkt_nr;
  46static int  cfg_expected_pkt_len;
  47static int  cfg_expected_gso_size;
  48static int  cfg_connect_timeout_ms;
  49static int  cfg_rcv_timeout_ms;
  50static struct sockaddr_storage cfg_bind_addr;
  51
  52static bool interrupted;
  53static unsigned long packets, bytes;
  54
  55static void sigint_handler(int signum)
  56{
  57        if (signum == SIGINT)
  58                interrupted = true;
  59}
  60
  61static void setup_sockaddr(int domain, const char *str_addr, void *sockaddr)
  62{
  63        struct sockaddr_in6 *addr6 = (void *) sockaddr;
  64        struct sockaddr_in *addr4 = (void *) sockaddr;
  65
  66        switch (domain) {
  67        case PF_INET:
  68                addr4->sin_family = AF_INET;
  69                addr4->sin_port = htons(cfg_port);
  70                if (inet_pton(AF_INET, str_addr, &(addr4->sin_addr)) != 1)
  71                        error(1, 0, "ipv4 parse error: %s", str_addr);
  72                break;
  73        case PF_INET6:
  74                addr6->sin6_family = AF_INET6;
  75                addr6->sin6_port = htons(cfg_port);
  76                if (inet_pton(AF_INET6, str_addr, &(addr6->sin6_addr)) != 1)
  77                        error(1, 0, "ipv6 parse error: %s", str_addr);
  78                break;
  79        default:
  80                error(1, 0, "illegal domain");
  81        }
  82}
  83
  84static unsigned long gettimeofday_ms(void)
  85{
  86        struct timeval tv;
  87
  88        gettimeofday(&tv, NULL);
  89        return (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
  90}
  91
  92static void do_poll(int fd, int timeout_ms)
  93{
  94        struct pollfd pfd;
  95        int ret;
  96
  97        pfd.events = POLLIN;
  98        pfd.revents = 0;
  99        pfd.fd = fd;
 100
 101        do {
 102                ret = poll(&pfd, 1, 10);
 103                if (interrupted)
 104                        break;
 105                if (ret == -1)
 106                        error(1, errno, "poll");
 107                if (ret == 0) {
 108                        if (!timeout_ms)
 109                                continue;
 110
 111                        timeout_ms -= 10;
 112                        if (timeout_ms <= 0) {
 113                                interrupted = true;
 114                                break;
 115                        }
 116
 117                        /* no events and more time to wait, do poll again */
 118                        continue;
 119                }
 120                if (pfd.revents != POLLIN)
 121                        error(1, errno, "poll: 0x%x expected 0x%x\n",
 122                                        pfd.revents, POLLIN);
 123        } while (!ret);
 124}
 125
 126static int do_socket(bool do_tcp)
 127{
 128        int fd, val;
 129
 130        fd = socket(cfg_family, cfg_tcp ? SOCK_STREAM : SOCK_DGRAM, 0);
 131        if (fd == -1)
 132                error(1, errno, "socket");
 133
 134        val = 1 << 21;
 135        if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &val, sizeof(val)))
 136                error(1, errno, "setsockopt rcvbuf");
 137        val = 1;
 138        if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)))
 139                error(1, errno, "setsockopt reuseport");
 140
 141        if (bind(fd, (void *)&cfg_bind_addr, cfg_alen))
 142                error(1, errno, "bind");
 143
 144        if (do_tcp) {
 145                int accept_fd = fd;
 146
 147                if (listen(accept_fd, 1))
 148                        error(1, errno, "listen");
 149
 150                do_poll(accept_fd, cfg_connect_timeout_ms);
 151                if (interrupted)
 152                        exit(0);
 153
 154                fd = accept(accept_fd, NULL, NULL);
 155                if (fd == -1)
 156                        error(1, errno, "accept");
 157                if (close(accept_fd))
 158                        error(1, errno, "close accept fd");
 159        }
 160
 161        return fd;
 162}
 163
 164/* Flush all outstanding bytes for the tcp receive queue */
 165static void do_flush_tcp(int fd)
 166{
 167        int ret;
 168
 169        while (true) {
 170                /* MSG_TRUNC flushes up to len bytes */
 171                ret = recv(fd, NULL, 1 << 21, MSG_TRUNC | MSG_DONTWAIT);
 172                if (ret == -1 && errno == EAGAIN)
 173                        return;
 174                if (ret == -1)
 175                        error(1, errno, "flush");
 176                if (ret == 0) {
 177                        /* client detached */
 178                        exit(0);
 179                }
 180
 181                packets++;
 182                bytes += ret;
 183        }
 184
 185}
 186
 187static char sanitized_char(char val)
 188{
 189        return (val >= 'a' && val <= 'z') ? val : '.';
 190}
 191
 192static void do_verify_udp(const char *data, int len)
 193{
 194        char cur = data[0];
 195        int i;
 196
 197        /* verify contents */
 198        if (cur < 'a' || cur > 'z')
 199                error(1, 0, "data initial byte out of range");
 200
 201        for (i = 1; i < len; i++) {
 202                if (cur == 'z')
 203                        cur = 'a';
 204                else
 205                        cur++;
 206
 207                if (data[i] != cur)
 208                        error(1, 0, "data[%d]: len %d, %c(%hhu) != %c(%hhu)\n",
 209                              i, len,
 210                              sanitized_char(data[i]), data[i],
 211                              sanitized_char(cur), cur);
 212        }
 213}
 214
 215static int recv_msg(int fd, char *buf, int len, int *gso_size)
 216{
 217        char control[CMSG_SPACE(sizeof(uint16_t))] = {0};
 218        struct msghdr msg = {0};
 219        struct iovec iov = {0};
 220        struct cmsghdr *cmsg;
 221        uint16_t *gsosizeptr;
 222        int ret;
 223
 224        iov.iov_base = buf;
 225        iov.iov_len = len;
 226
 227        msg.msg_iov = &iov;
 228        msg.msg_iovlen = 1;
 229
 230        msg.msg_control = control;
 231        msg.msg_controllen = sizeof(control);
 232
 233        *gso_size = -1;
 234        ret = recvmsg(fd, &msg, MSG_TRUNC | MSG_DONTWAIT);
 235        if (ret != -1) {
 236                for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL;
 237                     cmsg = CMSG_NXTHDR(&msg, cmsg)) {
 238                        if (cmsg->cmsg_level == SOL_UDP
 239                            && cmsg->cmsg_type == UDP_GRO) {
 240                                gsosizeptr = (uint16_t *) CMSG_DATA(cmsg);
 241                                *gso_size = *gsosizeptr;
 242                                break;
 243                        }
 244                }
 245        }
 246        return ret;
 247}
 248
 249/* Flush all outstanding datagrams. Verify first few bytes of each. */
 250static void do_flush_udp(int fd)
 251{
 252        static char rbuf[ETH_MAX_MTU];
 253        int ret, len, gso_size, budget = 256;
 254
 255        len = cfg_read_all ? sizeof(rbuf) : 0;
 256        while (budget--) {
 257                /* MSG_TRUNC will make return value full datagram length */
 258                if (!cfg_expected_gso_size)
 259                        ret = recv(fd, rbuf, len, MSG_TRUNC | MSG_DONTWAIT);
 260                else
 261                        ret = recv_msg(fd, rbuf, len, &gso_size);
 262                if (ret == -1 && errno == EAGAIN)
 263                        break;
 264                if (ret == -1)
 265                        error(1, errno, "recv");
 266                if (cfg_expected_pkt_len && ret != cfg_expected_pkt_len)
 267                        error(1, 0, "recv: bad packet len, got %d,"
 268                              " expected %d\n", ret, cfg_expected_pkt_len);
 269                if (len && cfg_verify) {
 270                        if (ret == 0)
 271                                error(1, errno, "recv: 0 byte datagram\n");
 272
 273                        do_verify_udp(rbuf, ret);
 274                }
 275                if (cfg_expected_gso_size && cfg_expected_gso_size != gso_size)
 276                        error(1, 0, "recv: bad gso size, got %d, expected %d "
 277                              "(-1 == no gso cmsg))\n", gso_size,
 278                              cfg_expected_gso_size);
 279
 280                packets++;
 281                bytes += ret;
 282                if (cfg_expected_pkt_nr && packets >= cfg_expected_pkt_nr)
 283                        break;
 284        }
 285}
 286
 287static void usage(const char *filepath)
 288{
 289        error(1, 0, "Usage: %s [-C connect_timeout] [-Grtv] [-b addr] [-p port]"
 290              " [-l pktlen] [-n packetnr] [-R rcv_timeout] [-S gsosize]",
 291              filepath);
 292}
 293
 294static void parse_opts(int argc, char **argv)
 295{
 296        const char *bind_addr = NULL;
 297        int c;
 298
 299        while ((c = getopt(argc, argv, "4b:C:Gl:n:p:rR:S:tv")) != -1) {
 300                switch (c) {
 301                case '4':
 302                        cfg_family = PF_INET;
 303                        cfg_alen = sizeof(struct sockaddr_in);
 304                        break;
 305                case 'b':
 306                        bind_addr = optarg;
 307                        break;
 308                case 'C':
 309                        cfg_connect_timeout_ms = strtoul(optarg, NULL, 0);
 310                        break;
 311                case 'G':
 312                        cfg_gro_segment = true;
 313                        break;
 314                case 'l':
 315                        cfg_expected_pkt_len = strtoul(optarg, NULL, 0);
 316                        break;
 317                case 'n':
 318                        cfg_expected_pkt_nr = strtoul(optarg, NULL, 0);
 319                        break;
 320                case 'p':
 321                        cfg_port = strtoul(optarg, NULL, 0);
 322                        break;
 323                case 'r':
 324                        cfg_read_all = true;
 325                        break;
 326                case 'R':
 327                        cfg_rcv_timeout_ms = strtoul(optarg, NULL, 0);
 328                        break;
 329                case 'S':
 330                        cfg_expected_gso_size = strtol(optarg, NULL, 0);
 331                        break;
 332                case 't':
 333                        cfg_tcp = true;
 334                        break;
 335                case 'v':
 336                        cfg_verify = true;
 337                        cfg_read_all = true;
 338                        break;
 339                }
 340        }
 341
 342        if (!bind_addr)
 343                bind_addr = cfg_family == PF_INET6 ? "::" : "0.0.0.0";
 344
 345        setup_sockaddr(cfg_family, bind_addr, &cfg_bind_addr);
 346
 347        if (optind != argc)
 348                usage(argv[0]);
 349
 350        if (cfg_tcp && cfg_verify)
 351                error(1, 0, "TODO: implement verify mode for tcp");
 352}
 353
 354static void do_recv(void)
 355{
 356        int timeout_ms = cfg_tcp ? cfg_rcv_timeout_ms : cfg_connect_timeout_ms;
 357        unsigned long tnow, treport;
 358        int fd;
 359
 360        fd = do_socket(cfg_tcp);
 361
 362        if (cfg_gro_segment && !cfg_tcp) {
 363                int val = 1;
 364                if (setsockopt(fd, IPPROTO_UDP, UDP_GRO, &val, sizeof(val)))
 365                        error(1, errno, "setsockopt UDP_GRO");
 366        }
 367
 368        treport = gettimeofday_ms() + 1000;
 369        do {
 370                do_poll(fd, timeout_ms);
 371
 372                if (cfg_tcp)
 373                        do_flush_tcp(fd);
 374                else
 375                        do_flush_udp(fd);
 376
 377                tnow = gettimeofday_ms();
 378                if (tnow > treport) {
 379                        if (packets)
 380                                fprintf(stderr,
 381                                        "%s rx: %6lu MB/s %8lu calls/s\n",
 382                                        cfg_tcp ? "tcp" : "udp",
 383                                        bytes >> 20, packets);
 384                        bytes = packets = 0;
 385                        treport = tnow + 1000;
 386                }
 387
 388                timeout_ms = cfg_rcv_timeout_ms;
 389
 390        } while (!interrupted);
 391
 392        if (cfg_expected_pkt_nr && (packets != cfg_expected_pkt_nr))
 393                error(1, 0, "wrong packet number! got %ld, expected %d\n",
 394                      packets, cfg_expected_pkt_nr);
 395
 396        if (close(fd))
 397                error(1, errno, "close");
 398}
 399
 400int main(int argc, char **argv)
 401{
 402        parse_opts(argc, argv);
 403
 404        signal(SIGINT, sigint_handler);
 405
 406        do_recv();
 407
 408        return 0;
 409}
 410