1fc44ef5aSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2a6f68034SDavid S. Miller /*
3a6f68034SDavid S. Miller * Copyright 2013 Google Inc.
4a6f68034SDavid S. Miller * Author: Willem de Bruijn (willemb@google.com)
5a6f68034SDavid S. Miller *
6a6f68034SDavid S. Miller * A basic test of packet socket fanout behavior.
7a6f68034SDavid S. Miller *
8a6f68034SDavid S. Miller * Control:
9a6f68034SDavid S. Miller * - create fanout fails as expected with illegal flag combinations
10a6f68034SDavid S. Miller * - join fanout fails as expected with diverging types or flags
11a6f68034SDavid S. Miller *
12a6f68034SDavid S. Miller * Datapath:
13a6f68034SDavid S. Miller * Open a pair of packet sockets and a pair of INET sockets, send a known
14a6f68034SDavid S. Miller * number of packets across the two INET sockets and count the number of
15a6f68034SDavid S. Miller * packets enqueued onto the two packet sockets.
16a6f68034SDavid S. Miller *
17a6f68034SDavid S. Miller * The test currently runs for
18a6f68034SDavid S. Miller * - PACKET_FANOUT_HASH
19a6f68034SDavid S. Miller * - PACKET_FANOUT_HASH with PACKET_FANOUT_FLAG_ROLLOVER
20a6f68034SDavid S. Miller * - PACKET_FANOUT_LB
21a6f68034SDavid S. Miller * - PACKET_FANOUT_CPU
22a6f68034SDavid S. Miller * - PACKET_FANOUT_ROLLOVER
2395e22792SWillem de Bruijn * - PACKET_FANOUT_CBPF
2430da679eSWillem de Bruijn * - PACKET_FANOUT_EBPF
25a6f68034SDavid S. Miller *
26a6f68034SDavid S. Miller * Todo:
27a6f68034SDavid S. Miller * - functionality: PACKET_FANOUT_FLAG_DEFRAG
28a6f68034SDavid S. Miller */
29a6f68034SDavid S. Miller
30a6f68034SDavid S. Miller #define _GNU_SOURCE /* for sched_setaffinity */
31a6f68034SDavid S. Miller
32a6f68034SDavid S. Miller #include <arpa/inet.h>
33a6f68034SDavid S. Miller #include <errno.h>
34a6f68034SDavid S. Miller #include <fcntl.h>
3530da679eSWillem de Bruijn #include <linux/unistd.h> /* for __NR_bpf */
36a6f68034SDavid S. Miller #include <linux/filter.h>
3730da679eSWillem de Bruijn #include <linux/bpf.h>
38a6f68034SDavid S. Miller #include <linux/if_packet.h>
39cc30c93fSWillem de Bruijn #include <net/if.h>
40a6f68034SDavid S. Miller #include <net/ethernet.h>
41a6f68034SDavid S. Miller #include <netinet/ip.h>
42a6f68034SDavid S. Miller #include <netinet/udp.h>
43a6f68034SDavid S. Miller #include <poll.h>
44a6f68034SDavid S. Miller #include <sched.h>
45a6f68034SDavid S. Miller #include <stdint.h>
46a6f68034SDavid S. Miller #include <stdio.h>
47a6f68034SDavid S. Miller #include <stdlib.h>
48a6f68034SDavid S. Miller #include <string.h>
49a6f68034SDavid S. Miller #include <sys/mman.h>
50a6f68034SDavid S. Miller #include <sys/socket.h>
51a6f68034SDavid S. Miller #include <sys/stat.h>
52a6f68034SDavid S. Miller #include <sys/types.h>
53a6f68034SDavid S. Miller #include <unistd.h>
54a6f68034SDavid S. Miller
5523a95442SDaniel Borkmann #include "psock_lib.h"
56*1abea24aSGuo Zhengkui #include "../kselftest.h"
5723a95442SDaniel Borkmann
58a6f68034SDavid S. Miller #define RING_NUM_FRAMES 20
59a6f68034SDavid S. Miller
601db32acfSTanner Love static uint32_t cfg_max_num_members;
611db32acfSTanner Love
62a6f68034SDavid S. Miller /* Open a socket in a given fanout mode.
63a6f68034SDavid S. Miller * @return -1 if mode is bad, a valid socket otherwise */
sock_fanout_open(uint16_t typeflags,uint16_t group_id)6428be04f5SMike Maloney static int sock_fanout_open(uint16_t typeflags, uint16_t group_id)
65a6f68034SDavid S. Miller {
66cc30c93fSWillem de Bruijn struct sockaddr_ll addr = {0};
671db32acfSTanner Love struct fanout_args args;
681db32acfSTanner Love int fd, val, err;
69a6f68034SDavid S. Miller
70cc30c93fSWillem de Bruijn fd = socket(PF_PACKET, SOCK_RAW, 0);
71a6f68034SDavid S. Miller if (fd < 0) {
72a6f68034SDavid S. Miller perror("socket packet");
73a6f68034SDavid S. Miller exit(1);
74a6f68034SDavid S. Miller }
75a6f68034SDavid S. Miller
76cc30c93fSWillem de Bruijn pair_udp_setfilter(fd);
77cc30c93fSWillem de Bruijn
78cc30c93fSWillem de Bruijn addr.sll_family = AF_PACKET;
79cc30c93fSWillem de Bruijn addr.sll_protocol = htons(ETH_P_IP);
80cc30c93fSWillem de Bruijn addr.sll_ifindex = if_nametoindex("lo");
81cc30c93fSWillem de Bruijn if (addr.sll_ifindex == 0) {
82cc30c93fSWillem de Bruijn perror("if_nametoindex");
83cc30c93fSWillem de Bruijn exit(1);
84cc30c93fSWillem de Bruijn }
85cc30c93fSWillem de Bruijn if (bind(fd, (void *) &addr, sizeof(addr))) {
86cc30c93fSWillem de Bruijn perror("bind packet");
87cc30c93fSWillem de Bruijn exit(1);
88cc30c93fSWillem de Bruijn }
89cc30c93fSWillem de Bruijn
901db32acfSTanner Love if (cfg_max_num_members) {
911db32acfSTanner Love args.id = group_id;
921db32acfSTanner Love args.type_flags = typeflags;
931db32acfSTanner Love args.max_num_members = cfg_max_num_members;
941db32acfSTanner Love err = setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &args,
951db32acfSTanner Love sizeof(args));
961db32acfSTanner Love } else {
9728be04f5SMike Maloney val = (((int) typeflags) << 16) | group_id;
981db32acfSTanner Love err = setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &val,
991db32acfSTanner Love sizeof(val));
1001db32acfSTanner Love }
1011db32acfSTanner Love if (err) {
102a6f68034SDavid S. Miller if (close(fd)) {
103a6f68034SDavid S. Miller perror("close packet");
104a6f68034SDavid S. Miller exit(1);
105a6f68034SDavid S. Miller }
106a6f68034SDavid S. Miller return -1;
107a6f68034SDavid S. Miller }
108a6f68034SDavid S. Miller
109a6f68034SDavid S. Miller return fd;
110a6f68034SDavid S. Miller }
111a6f68034SDavid S. Miller
sock_fanout_set_cbpf(int fd)112c1f8d0f9SMike Maloney static void sock_fanout_set_cbpf(int fd)
113c1f8d0f9SMike Maloney {
114c1f8d0f9SMike Maloney struct sock_filter bpf_filter[] = {
115fa16ee77Sjing yangyang BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 80), /* ldb [80] */
116fa16ee77Sjing yangyang BPF_STMT(BPF_RET | BPF_A, 0), /* ret A */
117c1f8d0f9SMike Maloney };
118c1f8d0f9SMike Maloney struct sock_fprog bpf_prog;
119c1f8d0f9SMike Maloney
120c1f8d0f9SMike Maloney bpf_prog.filter = bpf_filter;
121*1abea24aSGuo Zhengkui bpf_prog.len = ARRAY_SIZE(bpf_filter);
122c1f8d0f9SMike Maloney
123c1f8d0f9SMike Maloney if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT_DATA, &bpf_prog,
124c1f8d0f9SMike Maloney sizeof(bpf_prog))) {
125c1f8d0f9SMike Maloney perror("fanout data cbpf");
126c1f8d0f9SMike Maloney exit(1);
127c1f8d0f9SMike Maloney }
128c1f8d0f9SMike Maloney }
129c1f8d0f9SMike Maloney
sock_fanout_getopts(int fd,uint16_t * typeflags,uint16_t * group_id)13028be04f5SMike Maloney static void sock_fanout_getopts(int fd, uint16_t *typeflags, uint16_t *group_id)
13128be04f5SMike Maloney {
13228be04f5SMike Maloney int sockopt;
13328be04f5SMike Maloney socklen_t sockopt_len = sizeof(sockopt);
13428be04f5SMike Maloney
13528be04f5SMike Maloney if (getsockopt(fd, SOL_PACKET, PACKET_FANOUT,
13628be04f5SMike Maloney &sockopt, &sockopt_len)) {
13728be04f5SMike Maloney perror("failed to getsockopt");
13828be04f5SMike Maloney exit(1);
13928be04f5SMike Maloney }
14028be04f5SMike Maloney *typeflags = sockopt >> 16;
14128be04f5SMike Maloney *group_id = sockopt & 0xfffff;
14228be04f5SMike Maloney }
14328be04f5SMike Maloney
sock_fanout_set_ebpf(int fd)14430da679eSWillem de Bruijn static void sock_fanout_set_ebpf(int fd)
14530da679eSWillem de Bruijn {
146ddd00103SPrashant Bhole static char log_buf[65536];
147ddd00103SPrashant Bhole
14830da679eSWillem de Bruijn const int len_off = __builtin_offsetof(struct __sk_buff, len);
14930da679eSWillem de Bruijn struct bpf_insn prog[] = {
15030da679eSWillem de Bruijn { BPF_ALU64 | BPF_MOV | BPF_X, 6, 1, 0, 0 },
15130da679eSWillem de Bruijn { BPF_LDX | BPF_W | BPF_MEM, 0, 6, len_off, 0 },
15230da679eSWillem de Bruijn { BPF_JMP | BPF_JGE | BPF_K, 0, 0, 1, DATA_LEN },
15330da679eSWillem de Bruijn { BPF_JMP | BPF_JA | BPF_K, 0, 0, 4, 0 },
15430da679eSWillem de Bruijn { BPF_LD | BPF_B | BPF_ABS, 0, 0, 0, 0x50 },
15530da679eSWillem de Bruijn { BPF_JMP | BPF_JEQ | BPF_K, 0, 0, 2, DATA_CHAR },
15630da679eSWillem de Bruijn { BPF_JMP | BPF_JEQ | BPF_K, 0, 0, 1, DATA_CHAR_1 },
15730da679eSWillem de Bruijn { BPF_ALU | BPF_MOV | BPF_K, 0, 0, 0, 0 },
15830da679eSWillem de Bruijn { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 }
15930da679eSWillem de Bruijn };
16030da679eSWillem de Bruijn union bpf_attr attr;
16130da679eSWillem de Bruijn int pfd;
16230da679eSWillem de Bruijn
16330da679eSWillem de Bruijn memset(&attr, 0, sizeof(attr));
16430da679eSWillem de Bruijn attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
16530da679eSWillem de Bruijn attr.insns = (unsigned long) prog;
166*1abea24aSGuo Zhengkui attr.insn_cnt = ARRAY_SIZE(prog);
16730da679eSWillem de Bruijn attr.license = (unsigned long) "GPL";
16830da679eSWillem de Bruijn attr.log_buf = (unsigned long) log_buf,
16930da679eSWillem de Bruijn attr.log_size = sizeof(log_buf),
17030da679eSWillem de Bruijn attr.log_level = 1,
17130da679eSWillem de Bruijn
17230da679eSWillem de Bruijn pfd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
17330da679eSWillem de Bruijn if (pfd < 0) {
17430da679eSWillem de Bruijn perror("bpf");
17530da679eSWillem de Bruijn fprintf(stderr, "bpf verifier:\n%s\n", log_buf);
17630da679eSWillem de Bruijn exit(1);
17730da679eSWillem de Bruijn }
17830da679eSWillem de Bruijn
17930da679eSWillem de Bruijn if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT_DATA, &pfd, sizeof(pfd))) {
18030da679eSWillem de Bruijn perror("fanout data ebpf");
18130da679eSWillem de Bruijn exit(1);
18230da679eSWillem de Bruijn }
18330da679eSWillem de Bruijn
18430da679eSWillem de Bruijn if (close(pfd)) {
18530da679eSWillem de Bruijn perror("close ebpf");
18630da679eSWillem de Bruijn exit(1);
18730da679eSWillem de Bruijn }
18830da679eSWillem de Bruijn }
18930da679eSWillem de Bruijn
sock_fanout_open_ring(int fd)190a6f68034SDavid S. Miller static char *sock_fanout_open_ring(int fd)
191a6f68034SDavid S. Miller {
192a6f68034SDavid S. Miller struct tpacket_req req = {
193a6f68034SDavid S. Miller .tp_block_size = getpagesize(),
194a6f68034SDavid S. Miller .tp_frame_size = getpagesize(),
195a6f68034SDavid S. Miller .tp_block_nr = RING_NUM_FRAMES,
196a6f68034SDavid S. Miller .tp_frame_nr = RING_NUM_FRAMES,
197a6f68034SDavid S. Miller };
198a6f68034SDavid S. Miller char *ring;
19998e821a2SWillem de Bruijn int val = TPACKET_V2;
200a6f68034SDavid S. Miller
20198e821a2SWillem de Bruijn if (setsockopt(fd, SOL_PACKET, PACKET_VERSION, (void *) &val,
20298e821a2SWillem de Bruijn sizeof(val))) {
20398e821a2SWillem de Bruijn perror("packetsock ring setsockopt version");
20498e821a2SWillem de Bruijn exit(1);
20598e821a2SWillem de Bruijn }
206a6f68034SDavid S. Miller if (setsockopt(fd, SOL_PACKET, PACKET_RX_RING, (void *) &req,
207a6f68034SDavid S. Miller sizeof(req))) {
208a6f68034SDavid S. Miller perror("packetsock ring setsockopt");
209a6f68034SDavid S. Miller exit(1);
210a6f68034SDavid S. Miller }
211a6f68034SDavid S. Miller
212a6f68034SDavid S. Miller ring = mmap(0, req.tp_block_size * req.tp_block_nr,
213a6f68034SDavid S. Miller PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
21495e22792SWillem de Bruijn if (ring == MAP_FAILED) {
21595e22792SWillem de Bruijn perror("packetsock ring mmap");
216a6f68034SDavid S. Miller exit(1);
217a6f68034SDavid S. Miller }
218a6f68034SDavid S. Miller
219a6f68034SDavid S. Miller return ring;
220a6f68034SDavid S. Miller }
221a6f68034SDavid S. Miller
sock_fanout_read_ring(int fd,void * ring)222a6f68034SDavid S. Miller static int sock_fanout_read_ring(int fd, void *ring)
223a6f68034SDavid S. Miller {
22498e821a2SWillem de Bruijn struct tpacket2_hdr *header = ring;
225a6f68034SDavid S. Miller int count = 0;
226a6f68034SDavid S. Miller
227fbf8e721SShuah Khan while (count < RING_NUM_FRAMES && header->tp_status & TP_STATUS_USER) {
228a6f68034SDavid S. Miller count++;
229a6f68034SDavid S. Miller header = ring + (count * getpagesize());
230a6f68034SDavid S. Miller }
231a6f68034SDavid S. Miller
232a6f68034SDavid S. Miller return count;
233a6f68034SDavid S. Miller }
234a6f68034SDavid S. Miller
sock_fanout_read(int fds[],char * rings[],const int expect[])235a6f68034SDavid S. Miller static int sock_fanout_read(int fds[], char *rings[], const int expect[])
236a6f68034SDavid S. Miller {
237a6f68034SDavid S. Miller int ret[2];
238a6f68034SDavid S. Miller
239a6f68034SDavid S. Miller ret[0] = sock_fanout_read_ring(fds[0], rings[0]);
240a6f68034SDavid S. Miller ret[1] = sock_fanout_read_ring(fds[1], rings[1]);
241a6f68034SDavid S. Miller
242a6f68034SDavid S. Miller fprintf(stderr, "info: count=%d,%d, expect=%d,%d\n",
243a6f68034SDavid S. Miller ret[0], ret[1], expect[0], expect[1]);
244a6f68034SDavid S. Miller
245a6f68034SDavid S. Miller if ((!(ret[0] == expect[0] && ret[1] == expect[1])) &&
246a6f68034SDavid S. Miller (!(ret[0] == expect[1] && ret[1] == expect[0]))) {
247cc30c93fSWillem de Bruijn fprintf(stderr, "warning: incorrect queue lengths\n");
248a6f68034SDavid S. Miller return 1;
249a6f68034SDavid S. Miller }
250a6f68034SDavid S. Miller
251a6f68034SDavid S. Miller return 0;
252a6f68034SDavid S. Miller }
253a6f68034SDavid S. Miller
254a6f68034SDavid S. Miller /* Test illegal mode + flag combination */
test_control_single(void)255a6f68034SDavid S. Miller static void test_control_single(void)
256a6f68034SDavid S. Miller {
257a6f68034SDavid S. Miller fprintf(stderr, "test: control single socket\n");
258a6f68034SDavid S. Miller
259a6f68034SDavid S. Miller if (sock_fanout_open(PACKET_FANOUT_ROLLOVER |
26028be04f5SMike Maloney PACKET_FANOUT_FLAG_ROLLOVER, 0) != -1) {
261a6f68034SDavid S. Miller fprintf(stderr, "ERROR: opened socket with dual rollover\n");
262a6f68034SDavid S. Miller exit(1);
263a6f68034SDavid S. Miller }
264a6f68034SDavid S. Miller }
265a6f68034SDavid S. Miller
266a6f68034SDavid S. Miller /* Test illegal group with different modes or flags */
test_control_group(void)267a6f68034SDavid S. Miller static void test_control_group(void)
268a6f68034SDavid S. Miller {
269a6f68034SDavid S. Miller int fds[2];
270a6f68034SDavid S. Miller
271a6f68034SDavid S. Miller fprintf(stderr, "test: control multiple sockets\n");
272a6f68034SDavid S. Miller
27328be04f5SMike Maloney fds[0] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
274a6f68034SDavid S. Miller if (fds[0] == -1) {
275a6f68034SDavid S. Miller fprintf(stderr, "ERROR: failed to open HASH socket\n");
276a6f68034SDavid S. Miller exit(1);
277a6f68034SDavid S. Miller }
278a6f68034SDavid S. Miller if (sock_fanout_open(PACKET_FANOUT_HASH |
27928be04f5SMike Maloney PACKET_FANOUT_FLAG_DEFRAG, 0) != -1) {
280a6f68034SDavid S. Miller fprintf(stderr, "ERROR: joined group with wrong flag defrag\n");
281a6f68034SDavid S. Miller exit(1);
282a6f68034SDavid S. Miller }
283a6f68034SDavid S. Miller if (sock_fanout_open(PACKET_FANOUT_HASH |
28428be04f5SMike Maloney PACKET_FANOUT_FLAG_ROLLOVER, 0) != -1) {
285a6f68034SDavid S. Miller fprintf(stderr, "ERROR: joined group with wrong flag ro\n");
286a6f68034SDavid S. Miller exit(1);
287a6f68034SDavid S. Miller }
28828be04f5SMike Maloney if (sock_fanout_open(PACKET_FANOUT_CPU, 0) != -1) {
289a6f68034SDavid S. Miller fprintf(stderr, "ERROR: joined group with wrong mode\n");
290a6f68034SDavid S. Miller exit(1);
291a6f68034SDavid S. Miller }
29228be04f5SMike Maloney fds[1] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
293a6f68034SDavid S. Miller if (fds[1] == -1) {
294a6f68034SDavid S. Miller fprintf(stderr, "ERROR: failed to join group\n");
295a6f68034SDavid S. Miller exit(1);
296a6f68034SDavid S. Miller }
297a6f68034SDavid S. Miller if (close(fds[1]) || close(fds[0])) {
298a6f68034SDavid S. Miller fprintf(stderr, "ERROR: closing sockets\n");
299a6f68034SDavid S. Miller exit(1);
300a6f68034SDavid S. Miller }
301a6f68034SDavid S. Miller }
302a6f68034SDavid S. Miller
3031db32acfSTanner Love /* Test illegal max_num_members values */
test_control_group_max_num_members(void)3041db32acfSTanner Love static void test_control_group_max_num_members(void)
3051db32acfSTanner Love {
3061db32acfSTanner Love int fds[3];
3071db32acfSTanner Love
3081db32acfSTanner Love fprintf(stderr, "test: control multiple sockets, max_num_members\n");
3091db32acfSTanner Love
3101db32acfSTanner Love /* expected failure on greater than PACKET_FANOUT_MAX */
3111db32acfSTanner Love cfg_max_num_members = (1 << 16) + 1;
3121db32acfSTanner Love if (sock_fanout_open(PACKET_FANOUT_HASH, 0) != -1) {
3131db32acfSTanner Love fprintf(stderr, "ERROR: max_num_members > PACKET_FANOUT_MAX\n");
3141db32acfSTanner Love exit(1);
3151db32acfSTanner Love }
3161db32acfSTanner Love
3171db32acfSTanner Love cfg_max_num_members = 256;
3181db32acfSTanner Love fds[0] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
3191db32acfSTanner Love if (fds[0] == -1) {
3201db32acfSTanner Love fprintf(stderr, "ERROR: failed open\n");
3211db32acfSTanner Love exit(1);
3221db32acfSTanner Love }
3231db32acfSTanner Love
3241db32acfSTanner Love /* expected failure on joining group with different max_num_members */
3251db32acfSTanner Love cfg_max_num_members = 257;
3261db32acfSTanner Love if (sock_fanout_open(PACKET_FANOUT_HASH, 0) != -1) {
3271db32acfSTanner Love fprintf(stderr, "ERROR: set different max_num_members\n");
3281db32acfSTanner Love exit(1);
3291db32acfSTanner Love }
3301db32acfSTanner Love
3311db32acfSTanner Love /* success on joining group with same max_num_members */
3321db32acfSTanner Love cfg_max_num_members = 256;
3331db32acfSTanner Love fds[1] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
3341db32acfSTanner Love if (fds[1] == -1) {
3351db32acfSTanner Love fprintf(stderr, "ERROR: failed to join group\n");
3361db32acfSTanner Love exit(1);
3371db32acfSTanner Love }
3381db32acfSTanner Love
3391db32acfSTanner Love /* success on joining group with max_num_members unspecified */
3401db32acfSTanner Love cfg_max_num_members = 0;
3411db32acfSTanner Love fds[2] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
3421db32acfSTanner Love if (fds[2] == -1) {
3431db32acfSTanner Love fprintf(stderr, "ERROR: failed to join group\n");
3441db32acfSTanner Love exit(1);
3451db32acfSTanner Love }
3461db32acfSTanner Love
3471db32acfSTanner Love if (close(fds[2]) || close(fds[1]) || close(fds[0])) {
3481db32acfSTanner Love fprintf(stderr, "ERROR: closing sockets\n");
3491db32acfSTanner Love exit(1);
3501db32acfSTanner Love }
3511db32acfSTanner Love }
3521db32acfSTanner Love
35328be04f5SMike Maloney /* Test creating a unique fanout group ids */
test_unique_fanout_group_ids(void)35428be04f5SMike Maloney static void test_unique_fanout_group_ids(void)
35528be04f5SMike Maloney {
35628be04f5SMike Maloney int fds[3];
35728be04f5SMike Maloney uint16_t typeflags, first_group_id, second_group_id;
35828be04f5SMike Maloney
35928be04f5SMike Maloney fprintf(stderr, "test: unique ids\n");
36028be04f5SMike Maloney
36128be04f5SMike Maloney fds[0] = sock_fanout_open(PACKET_FANOUT_HASH |
36228be04f5SMike Maloney PACKET_FANOUT_FLAG_UNIQUEID, 0);
36328be04f5SMike Maloney if (fds[0] == -1) {
36428be04f5SMike Maloney fprintf(stderr, "ERROR: failed to create a unique id group.\n");
36528be04f5SMike Maloney exit(1);
36628be04f5SMike Maloney }
36728be04f5SMike Maloney
36828be04f5SMike Maloney sock_fanout_getopts(fds[0], &typeflags, &first_group_id);
36928be04f5SMike Maloney if (typeflags != PACKET_FANOUT_HASH) {
37028be04f5SMike Maloney fprintf(stderr, "ERROR: unexpected typeflags %x\n", typeflags);
37128be04f5SMike Maloney exit(1);
37228be04f5SMike Maloney }
37328be04f5SMike Maloney
374472ecf08SMike Maloney if (sock_fanout_open(PACKET_FANOUT_CPU, first_group_id) != -1) {
37528be04f5SMike Maloney fprintf(stderr, "ERROR: joined group with wrong type.\n");
37628be04f5SMike Maloney exit(1);
37728be04f5SMike Maloney }
37828be04f5SMike Maloney
37928be04f5SMike Maloney fds[1] = sock_fanout_open(PACKET_FANOUT_HASH, first_group_id);
38028be04f5SMike Maloney if (fds[1] == -1) {
38128be04f5SMike Maloney fprintf(stderr,
38228be04f5SMike Maloney "ERROR: failed to join previously created group.\n");
38328be04f5SMike Maloney exit(1);
38428be04f5SMike Maloney }
38528be04f5SMike Maloney
38628be04f5SMike Maloney fds[2] = sock_fanout_open(PACKET_FANOUT_HASH |
38728be04f5SMike Maloney PACKET_FANOUT_FLAG_UNIQUEID, 0);
38828be04f5SMike Maloney if (fds[2] == -1) {
38928be04f5SMike Maloney fprintf(stderr,
39028be04f5SMike Maloney "ERROR: failed to create a second unique id group.\n");
39128be04f5SMike Maloney exit(1);
39228be04f5SMike Maloney }
39328be04f5SMike Maloney
39428be04f5SMike Maloney sock_fanout_getopts(fds[2], &typeflags, &second_group_id);
39528be04f5SMike Maloney if (sock_fanout_open(PACKET_FANOUT_HASH | PACKET_FANOUT_FLAG_UNIQUEID,
39628be04f5SMike Maloney second_group_id) != -1) {
39728be04f5SMike Maloney fprintf(stderr,
39828be04f5SMike Maloney "ERROR: specified a group id when requesting unique id\n");
39928be04f5SMike Maloney exit(1);
40028be04f5SMike Maloney }
40128be04f5SMike Maloney
40228be04f5SMike Maloney if (close(fds[0]) || close(fds[1]) || close(fds[2])) {
40328be04f5SMike Maloney fprintf(stderr, "ERROR: closing sockets\n");
40428be04f5SMike Maloney exit(1);
40528be04f5SMike Maloney }
40628be04f5SMike Maloney }
40728be04f5SMike Maloney
test_datapath(uint16_t typeflags,int port_off,const int expect1[],const int expect2[])408a6f68034SDavid S. Miller static int test_datapath(uint16_t typeflags, int port_off,
409a6f68034SDavid S. Miller const int expect1[], const int expect2[])
410a6f68034SDavid S. Miller {
411a6f68034SDavid S. Miller const int expect0[] = { 0, 0 };
412a6f68034SDavid S. Miller char *rings[2];
41395e22792SWillem de Bruijn uint8_t type = typeflags & 0xFF;
414a6f68034SDavid S. Miller int fds[2], fds_udp[2][2], ret;
415a6f68034SDavid S. Miller
416cc30c93fSWillem de Bruijn fprintf(stderr, "\ntest: datapath 0x%hx ports %hu,%hu\n",
41764f9ede2STanner Love typeflags, (uint16_t)PORT_BASE,
41864f9ede2STanner Love (uint16_t)(PORT_BASE + port_off));
419a6f68034SDavid S. Miller
42028be04f5SMike Maloney fds[0] = sock_fanout_open(typeflags, 0);
42128be04f5SMike Maloney fds[1] = sock_fanout_open(typeflags, 0);
422a6f68034SDavid S. Miller if (fds[0] == -1 || fds[1] == -1) {
423a6f68034SDavid S. Miller fprintf(stderr, "ERROR: failed open\n");
424a6f68034SDavid S. Miller exit(1);
425a6f68034SDavid S. Miller }
42695e22792SWillem de Bruijn if (type == PACKET_FANOUT_CBPF)
427c1f8d0f9SMike Maloney sock_fanout_set_cbpf(fds[0]);
42830da679eSWillem de Bruijn else if (type == PACKET_FANOUT_EBPF)
42930da679eSWillem de Bruijn sock_fanout_set_ebpf(fds[0]);
43095e22792SWillem de Bruijn
431a6f68034SDavid S. Miller rings[0] = sock_fanout_open_ring(fds[0]);
432a6f68034SDavid S. Miller rings[1] = sock_fanout_open_ring(fds[1]);
433a6f68034SDavid S. Miller pair_udp_open(fds_udp[0], PORT_BASE);
434a6f68034SDavid S. Miller pair_udp_open(fds_udp[1], PORT_BASE + port_off);
435a6f68034SDavid S. Miller sock_fanout_read(fds, rings, expect0);
436a6f68034SDavid S. Miller
437a6f68034SDavid S. Miller /* Send data, but not enough to overflow a queue */
438a6f68034SDavid S. Miller pair_udp_send(fds_udp[0], 15);
43995e22792SWillem de Bruijn pair_udp_send_char(fds_udp[1], 5, DATA_CHAR_1);
440a6f68034SDavid S. Miller ret = sock_fanout_read(fds, rings, expect1);
441a6f68034SDavid S. Miller
442a6f68034SDavid S. Miller /* Send more data, overflow the queue */
44395e22792SWillem de Bruijn pair_udp_send_char(fds_udp[0], 15, DATA_CHAR_1);
444a6f68034SDavid S. Miller /* TODO: ensure consistent order between expect1 and expect2 */
445a6f68034SDavid S. Miller ret |= sock_fanout_read(fds, rings, expect2);
446a6f68034SDavid S. Miller
447a6f68034SDavid S. Miller if (munmap(rings[1], RING_NUM_FRAMES * getpagesize()) ||
448a6f68034SDavid S. Miller munmap(rings[0], RING_NUM_FRAMES * getpagesize())) {
449a6f68034SDavid S. Miller fprintf(stderr, "close rings\n");
450a6f68034SDavid S. Miller exit(1);
451a6f68034SDavid S. Miller }
452a6f68034SDavid S. Miller if (close(fds_udp[1][1]) || close(fds_udp[1][0]) ||
453a6f68034SDavid S. Miller close(fds_udp[0][1]) || close(fds_udp[0][0]) ||
454a6f68034SDavid S. Miller close(fds[1]) || close(fds[0])) {
455a6f68034SDavid S. Miller fprintf(stderr, "close datapath\n");
456a6f68034SDavid S. Miller exit(1);
457a6f68034SDavid S. Miller }
458a6f68034SDavid S. Miller
459a6f68034SDavid S. Miller return ret;
460a6f68034SDavid S. Miller }
461a6f68034SDavid S. Miller
set_cpuaffinity(int cpuid)462a6f68034SDavid S. Miller static int set_cpuaffinity(int cpuid)
463a6f68034SDavid S. Miller {
464a6f68034SDavid S. Miller cpu_set_t mask;
465a6f68034SDavid S. Miller
466a6f68034SDavid S. Miller CPU_ZERO(&mask);
467a6f68034SDavid S. Miller CPU_SET(cpuid, &mask);
468a6f68034SDavid S. Miller if (sched_setaffinity(0, sizeof(mask), &mask)) {
469a6f68034SDavid S. Miller if (errno != EINVAL) {
470a6f68034SDavid S. Miller fprintf(stderr, "setaffinity %d\n", cpuid);
471a6f68034SDavid S. Miller exit(1);
472a6f68034SDavid S. Miller }
473a6f68034SDavid S. Miller return 1;
474a6f68034SDavid S. Miller }
475a6f68034SDavid S. Miller
476a6f68034SDavid S. Miller return 0;
477a6f68034SDavid S. Miller }
478a6f68034SDavid S. Miller
main(int argc,char ** argv)479a6f68034SDavid S. Miller int main(int argc, char **argv)
480a6f68034SDavid S. Miller {
481a6f68034SDavid S. Miller const int expect_hash[2][2] = { { 15, 5 }, { 20, 5 } };
482a6f68034SDavid S. Miller const int expect_hash_rb[2][2] = { { 15, 5 }, { 20, 15 } };
483a6f68034SDavid S. Miller const int expect_lb[2][2] = { { 10, 10 }, { 18, 17 } };
484a2ad5d2aSWillem de Bruijn const int expect_rb[2][2] = { { 15, 5 }, { 20, 15 } };
485a6f68034SDavid S. Miller const int expect_cpu0[2][2] = { { 20, 0 }, { 20, 0 } };
486a6f68034SDavid S. Miller const int expect_cpu1[2][2] = { { 0, 20 }, { 0, 20 } };
48795e22792SWillem de Bruijn const int expect_bpf[2][2] = { { 15, 5 }, { 15, 20 } };
48828be04f5SMike Maloney const int expect_uniqueid[2][2] = { { 20, 20}, { 20, 20 } };
489cc30c93fSWillem de Bruijn int port_off = 2, tries = 20, ret;
490a6f68034SDavid S. Miller
491a6f68034SDavid S. Miller test_control_single();
492a6f68034SDavid S. Miller test_control_group();
4931db32acfSTanner Love test_control_group_max_num_members();
49428be04f5SMike Maloney test_unique_fanout_group_ids();
495a6f68034SDavid S. Miller
4961db32acfSTanner Love /* PACKET_FANOUT_MAX */
4971db32acfSTanner Love cfg_max_num_members = 1 << 16;
498a6f68034SDavid S. Miller /* find a set of ports that do not collide onto the same socket */
499a6f68034SDavid S. Miller ret = test_datapath(PACKET_FANOUT_HASH, port_off,
500a6f68034SDavid S. Miller expect_hash[0], expect_hash[1]);
501cc30c93fSWillem de Bruijn while (ret) {
502a6f68034SDavid S. Miller fprintf(stderr, "info: trying alternate ports (%d)\n", tries);
503a6f68034SDavid S. Miller ret = test_datapath(PACKET_FANOUT_HASH, ++port_off,
504a6f68034SDavid S. Miller expect_hash[0], expect_hash[1]);
505cc30c93fSWillem de Bruijn if (!--tries) {
506cc30c93fSWillem de Bruijn fprintf(stderr, "too many collisions\n");
507cc30c93fSWillem de Bruijn return 1;
508cc30c93fSWillem de Bruijn }
509a6f68034SDavid S. Miller }
510a6f68034SDavid S. Miller
511a6f68034SDavid S. Miller ret |= test_datapath(PACKET_FANOUT_HASH | PACKET_FANOUT_FLAG_ROLLOVER,
512a6f68034SDavid S. Miller port_off, expect_hash_rb[0], expect_hash_rb[1]);
513a6f68034SDavid S. Miller ret |= test_datapath(PACKET_FANOUT_LB,
514a6f68034SDavid S. Miller port_off, expect_lb[0], expect_lb[1]);
515a6f68034SDavid S. Miller ret |= test_datapath(PACKET_FANOUT_ROLLOVER,
516a6f68034SDavid S. Miller port_off, expect_rb[0], expect_rb[1]);
51730da679eSWillem de Bruijn
51895e22792SWillem de Bruijn ret |= test_datapath(PACKET_FANOUT_CBPF,
51995e22792SWillem de Bruijn port_off, expect_bpf[0], expect_bpf[1]);
52030da679eSWillem de Bruijn ret |= test_datapath(PACKET_FANOUT_EBPF,
52130da679eSWillem de Bruijn port_off, expect_bpf[0], expect_bpf[1]);
522a6f68034SDavid S. Miller
523a6f68034SDavid S. Miller set_cpuaffinity(0);
524a6f68034SDavid S. Miller ret |= test_datapath(PACKET_FANOUT_CPU, port_off,
525a6f68034SDavid S. Miller expect_cpu0[0], expect_cpu0[1]);
526a6f68034SDavid S. Miller if (!set_cpuaffinity(1))
527a6f68034SDavid S. Miller /* TODO: test that choice alternates with previous */
528a6f68034SDavid S. Miller ret |= test_datapath(PACKET_FANOUT_CPU, port_off,
529a6f68034SDavid S. Miller expect_cpu1[0], expect_cpu1[1]);
530a6f68034SDavid S. Miller
53128be04f5SMike Maloney ret |= test_datapath(PACKET_FANOUT_FLAG_UNIQUEID, port_off,
53228be04f5SMike Maloney expect_uniqueid[0], expect_uniqueid[1]);
53328be04f5SMike Maloney
534a6f68034SDavid S. Miller if (ret)
535a6f68034SDavid S. Miller return 1;
536a6f68034SDavid S. Miller
537a6f68034SDavid S. Miller printf("OK. All tests passed\n");
538a6f68034SDavid S. Miller return 0;
539a6f68034SDavid S. Miller }
540