xref: /openbmc/linux/tools/testing/selftests/net/psock_fanout.c (revision 4f2c0a4acffbec01079c28f839422e64ddeff004)
1fc44ef5aSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2a6f68034SDavid S. Miller /*
3a6f68034SDavid S. Miller  * Copyright 2013 Google Inc.
4a6f68034SDavid S. Miller  * Author: Willem de Bruijn (willemb@google.com)
5a6f68034SDavid S. Miller  *
6a6f68034SDavid S. Miller  * A basic test of packet socket fanout behavior.
7a6f68034SDavid S. Miller  *
8a6f68034SDavid S. Miller  * Control:
9a6f68034SDavid S. Miller  * - create fanout fails as expected with illegal flag combinations
10a6f68034SDavid S. Miller  * - join   fanout fails as expected with diverging types or flags
11a6f68034SDavid S. Miller  *
12a6f68034SDavid S. Miller  * Datapath:
13a6f68034SDavid S. Miller  *   Open a pair of packet sockets and a pair of INET sockets, send a known
14a6f68034SDavid S. Miller  *   number of packets across the two INET sockets and count the number of
15a6f68034SDavid S. Miller  *   packets enqueued onto the two packet sockets.
16a6f68034SDavid S. Miller  *
17a6f68034SDavid S. Miller  *   The test currently runs for
18a6f68034SDavid S. Miller  *   - PACKET_FANOUT_HASH
19a6f68034SDavid S. Miller  *   - PACKET_FANOUT_HASH with PACKET_FANOUT_FLAG_ROLLOVER
20a6f68034SDavid S. Miller  *   - PACKET_FANOUT_LB
21a6f68034SDavid S. Miller  *   - PACKET_FANOUT_CPU
22a6f68034SDavid S. Miller  *   - PACKET_FANOUT_ROLLOVER
2395e22792SWillem de Bruijn  *   - PACKET_FANOUT_CBPF
2430da679eSWillem de Bruijn  *   - PACKET_FANOUT_EBPF
25a6f68034SDavid S. Miller  *
26a6f68034SDavid S. Miller  * Todo:
27a6f68034SDavid S. Miller  * - functionality: PACKET_FANOUT_FLAG_DEFRAG
28a6f68034SDavid S. Miller  */
29a6f68034SDavid S. Miller 
30a6f68034SDavid S. Miller #define _GNU_SOURCE		/* for sched_setaffinity */
31a6f68034SDavid S. Miller 
32a6f68034SDavid S. Miller #include <arpa/inet.h>
33a6f68034SDavid S. Miller #include <errno.h>
34a6f68034SDavid S. Miller #include <fcntl.h>
3530da679eSWillem de Bruijn #include <linux/unistd.h>	/* for __NR_bpf */
36a6f68034SDavid S. Miller #include <linux/filter.h>
3730da679eSWillem de Bruijn #include <linux/bpf.h>
38a6f68034SDavid S. Miller #include <linux/if_packet.h>
39cc30c93fSWillem de Bruijn #include <net/if.h>
40a6f68034SDavid S. Miller #include <net/ethernet.h>
41a6f68034SDavid S. Miller #include <netinet/ip.h>
42a6f68034SDavid S. Miller #include <netinet/udp.h>
43a6f68034SDavid S. Miller #include <poll.h>
44a6f68034SDavid S. Miller #include <sched.h>
45a6f68034SDavid S. Miller #include <stdint.h>
46a6f68034SDavid S. Miller #include <stdio.h>
47a6f68034SDavid S. Miller #include <stdlib.h>
48a6f68034SDavid S. Miller #include <string.h>
49a6f68034SDavid S. Miller #include <sys/mman.h>
50a6f68034SDavid S. Miller #include <sys/socket.h>
51a6f68034SDavid S. Miller #include <sys/stat.h>
52a6f68034SDavid S. Miller #include <sys/types.h>
53a6f68034SDavid S. Miller #include <unistd.h>
54a6f68034SDavid S. Miller 
5523a95442SDaniel Borkmann #include "psock_lib.h"
56*1abea24aSGuo Zhengkui #include "../kselftest.h"
5723a95442SDaniel Borkmann 
58a6f68034SDavid S. Miller #define RING_NUM_FRAMES			20
59a6f68034SDavid S. Miller 
601db32acfSTanner Love static uint32_t cfg_max_num_members;
611db32acfSTanner Love 
62a6f68034SDavid S. Miller /* Open a socket in a given fanout mode.
63a6f68034SDavid S. Miller  * @return -1 if mode is bad, a valid socket otherwise */
sock_fanout_open(uint16_t typeflags,uint16_t group_id)6428be04f5SMike Maloney static int sock_fanout_open(uint16_t typeflags, uint16_t group_id)
65a6f68034SDavid S. Miller {
66cc30c93fSWillem de Bruijn 	struct sockaddr_ll addr = {0};
671db32acfSTanner Love 	struct fanout_args args;
681db32acfSTanner Love 	int fd, val, err;
69a6f68034SDavid S. Miller 
70cc30c93fSWillem de Bruijn 	fd = socket(PF_PACKET, SOCK_RAW, 0);
71a6f68034SDavid S. Miller 	if (fd < 0) {
72a6f68034SDavid S. Miller 		perror("socket packet");
73a6f68034SDavid S. Miller 		exit(1);
74a6f68034SDavid S. Miller 	}
75a6f68034SDavid S. Miller 
76cc30c93fSWillem de Bruijn 	pair_udp_setfilter(fd);
77cc30c93fSWillem de Bruijn 
78cc30c93fSWillem de Bruijn 	addr.sll_family = AF_PACKET;
79cc30c93fSWillem de Bruijn 	addr.sll_protocol = htons(ETH_P_IP);
80cc30c93fSWillem de Bruijn 	addr.sll_ifindex = if_nametoindex("lo");
81cc30c93fSWillem de Bruijn 	if (addr.sll_ifindex == 0) {
82cc30c93fSWillem de Bruijn 		perror("if_nametoindex");
83cc30c93fSWillem de Bruijn 		exit(1);
84cc30c93fSWillem de Bruijn 	}
85cc30c93fSWillem de Bruijn 	if (bind(fd, (void *) &addr, sizeof(addr))) {
86cc30c93fSWillem de Bruijn 		perror("bind packet");
87cc30c93fSWillem de Bruijn 		exit(1);
88cc30c93fSWillem de Bruijn 	}
89cc30c93fSWillem de Bruijn 
901db32acfSTanner Love 	if (cfg_max_num_members) {
911db32acfSTanner Love 		args.id = group_id;
921db32acfSTanner Love 		args.type_flags = typeflags;
931db32acfSTanner Love 		args.max_num_members = cfg_max_num_members;
941db32acfSTanner Love 		err = setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &args,
951db32acfSTanner Love 				 sizeof(args));
961db32acfSTanner Love 	} else {
9728be04f5SMike Maloney 		val = (((int) typeflags) << 16) | group_id;
981db32acfSTanner Love 		err = setsockopt(fd, SOL_PACKET, PACKET_FANOUT, &val,
991db32acfSTanner Love 				 sizeof(val));
1001db32acfSTanner Love 	}
1011db32acfSTanner Love 	if (err) {
102a6f68034SDavid S. Miller 		if (close(fd)) {
103a6f68034SDavid S. Miller 			perror("close packet");
104a6f68034SDavid S. Miller 			exit(1);
105a6f68034SDavid S. Miller 		}
106a6f68034SDavid S. Miller 		return -1;
107a6f68034SDavid S. Miller 	}
108a6f68034SDavid S. Miller 
109a6f68034SDavid S. Miller 	return fd;
110a6f68034SDavid S. Miller }
111a6f68034SDavid S. Miller 
sock_fanout_set_cbpf(int fd)112c1f8d0f9SMike Maloney static void sock_fanout_set_cbpf(int fd)
113c1f8d0f9SMike Maloney {
114c1f8d0f9SMike Maloney 	struct sock_filter bpf_filter[] = {
115fa16ee77Sjing yangyang 		BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 80),	      /* ldb [80] */
116fa16ee77Sjing yangyang 		BPF_STMT(BPF_RET | BPF_A, 0),		      /* ret A */
117c1f8d0f9SMike Maloney 	};
118c1f8d0f9SMike Maloney 	struct sock_fprog bpf_prog;
119c1f8d0f9SMike Maloney 
120c1f8d0f9SMike Maloney 	bpf_prog.filter = bpf_filter;
121*1abea24aSGuo Zhengkui 	bpf_prog.len = ARRAY_SIZE(bpf_filter);
122c1f8d0f9SMike Maloney 
123c1f8d0f9SMike Maloney 	if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT_DATA, &bpf_prog,
124c1f8d0f9SMike Maloney 		       sizeof(bpf_prog))) {
125c1f8d0f9SMike Maloney 		perror("fanout data cbpf");
126c1f8d0f9SMike Maloney 		exit(1);
127c1f8d0f9SMike Maloney 	}
128c1f8d0f9SMike Maloney }
129c1f8d0f9SMike Maloney 
sock_fanout_getopts(int fd,uint16_t * typeflags,uint16_t * group_id)13028be04f5SMike Maloney static void sock_fanout_getopts(int fd, uint16_t *typeflags, uint16_t *group_id)
13128be04f5SMike Maloney {
13228be04f5SMike Maloney 	int sockopt;
13328be04f5SMike Maloney 	socklen_t sockopt_len = sizeof(sockopt);
13428be04f5SMike Maloney 
13528be04f5SMike Maloney 	if (getsockopt(fd, SOL_PACKET, PACKET_FANOUT,
13628be04f5SMike Maloney 		       &sockopt, &sockopt_len)) {
13728be04f5SMike Maloney 		perror("failed to getsockopt");
13828be04f5SMike Maloney 		exit(1);
13928be04f5SMike Maloney 	}
14028be04f5SMike Maloney 	*typeflags = sockopt >> 16;
14128be04f5SMike Maloney 	*group_id = sockopt & 0xfffff;
14228be04f5SMike Maloney }
14328be04f5SMike Maloney 
sock_fanout_set_ebpf(int fd)14430da679eSWillem de Bruijn static void sock_fanout_set_ebpf(int fd)
14530da679eSWillem de Bruijn {
146ddd00103SPrashant Bhole 	static char log_buf[65536];
147ddd00103SPrashant Bhole 
14830da679eSWillem de Bruijn 	const int len_off = __builtin_offsetof(struct __sk_buff, len);
14930da679eSWillem de Bruijn 	struct bpf_insn prog[] = {
15030da679eSWillem de Bruijn 		{ BPF_ALU64 | BPF_MOV | BPF_X,   6, 1, 0, 0 },
15130da679eSWillem de Bruijn 		{ BPF_LDX   | BPF_W   | BPF_MEM, 0, 6, len_off, 0 },
15230da679eSWillem de Bruijn 		{ BPF_JMP   | BPF_JGE | BPF_K,   0, 0, 1, DATA_LEN },
15330da679eSWillem de Bruijn 		{ BPF_JMP   | BPF_JA  | BPF_K,   0, 0, 4, 0 },
15430da679eSWillem de Bruijn 		{ BPF_LD    | BPF_B   | BPF_ABS, 0, 0, 0, 0x50 },
15530da679eSWillem de Bruijn 		{ BPF_JMP   | BPF_JEQ | BPF_K,   0, 0, 2, DATA_CHAR },
15630da679eSWillem de Bruijn 		{ BPF_JMP   | BPF_JEQ | BPF_K,   0, 0, 1, DATA_CHAR_1 },
15730da679eSWillem de Bruijn 		{ BPF_ALU   | BPF_MOV | BPF_K,   0, 0, 0, 0 },
15830da679eSWillem de Bruijn 		{ BPF_JMP   | BPF_EXIT,          0, 0, 0, 0 }
15930da679eSWillem de Bruijn 	};
16030da679eSWillem de Bruijn 	union bpf_attr attr;
16130da679eSWillem de Bruijn 	int pfd;
16230da679eSWillem de Bruijn 
16330da679eSWillem de Bruijn 	memset(&attr, 0, sizeof(attr));
16430da679eSWillem de Bruijn 	attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
16530da679eSWillem de Bruijn 	attr.insns = (unsigned long) prog;
166*1abea24aSGuo Zhengkui 	attr.insn_cnt = ARRAY_SIZE(prog);
16730da679eSWillem de Bruijn 	attr.license = (unsigned long) "GPL";
16830da679eSWillem de Bruijn 	attr.log_buf = (unsigned long) log_buf,
16930da679eSWillem de Bruijn 	attr.log_size = sizeof(log_buf),
17030da679eSWillem de Bruijn 	attr.log_level = 1,
17130da679eSWillem de Bruijn 
17230da679eSWillem de Bruijn 	pfd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
17330da679eSWillem de Bruijn 	if (pfd < 0) {
17430da679eSWillem de Bruijn 		perror("bpf");
17530da679eSWillem de Bruijn 		fprintf(stderr, "bpf verifier:\n%s\n", log_buf);
17630da679eSWillem de Bruijn 		exit(1);
17730da679eSWillem de Bruijn 	}
17830da679eSWillem de Bruijn 
17930da679eSWillem de Bruijn 	if (setsockopt(fd, SOL_PACKET, PACKET_FANOUT_DATA, &pfd, sizeof(pfd))) {
18030da679eSWillem de Bruijn 		perror("fanout data ebpf");
18130da679eSWillem de Bruijn 		exit(1);
18230da679eSWillem de Bruijn 	}
18330da679eSWillem de Bruijn 
18430da679eSWillem de Bruijn 	if (close(pfd)) {
18530da679eSWillem de Bruijn 		perror("close ebpf");
18630da679eSWillem de Bruijn 		exit(1);
18730da679eSWillem de Bruijn 	}
18830da679eSWillem de Bruijn }
18930da679eSWillem de Bruijn 
sock_fanout_open_ring(int fd)190a6f68034SDavid S. Miller static char *sock_fanout_open_ring(int fd)
191a6f68034SDavid S. Miller {
192a6f68034SDavid S. Miller 	struct tpacket_req req = {
193a6f68034SDavid S. Miller 		.tp_block_size = getpagesize(),
194a6f68034SDavid S. Miller 		.tp_frame_size = getpagesize(),
195a6f68034SDavid S. Miller 		.tp_block_nr   = RING_NUM_FRAMES,
196a6f68034SDavid S. Miller 		.tp_frame_nr   = RING_NUM_FRAMES,
197a6f68034SDavid S. Miller 	};
198a6f68034SDavid S. Miller 	char *ring;
19998e821a2SWillem de Bruijn 	int val = TPACKET_V2;
200a6f68034SDavid S. Miller 
20198e821a2SWillem de Bruijn 	if (setsockopt(fd, SOL_PACKET, PACKET_VERSION, (void *) &val,
20298e821a2SWillem de Bruijn 		       sizeof(val))) {
20398e821a2SWillem de Bruijn 		perror("packetsock ring setsockopt version");
20498e821a2SWillem de Bruijn 		exit(1);
20598e821a2SWillem de Bruijn 	}
206a6f68034SDavid S. Miller 	if (setsockopt(fd, SOL_PACKET, PACKET_RX_RING, (void *) &req,
207a6f68034SDavid S. Miller 		       sizeof(req))) {
208a6f68034SDavid S. Miller 		perror("packetsock ring setsockopt");
209a6f68034SDavid S. Miller 		exit(1);
210a6f68034SDavid S. Miller 	}
211a6f68034SDavid S. Miller 
212a6f68034SDavid S. Miller 	ring = mmap(0, req.tp_block_size * req.tp_block_nr,
213a6f68034SDavid S. Miller 		    PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
21495e22792SWillem de Bruijn 	if (ring == MAP_FAILED) {
21595e22792SWillem de Bruijn 		perror("packetsock ring mmap");
216a6f68034SDavid S. Miller 		exit(1);
217a6f68034SDavid S. Miller 	}
218a6f68034SDavid S. Miller 
219a6f68034SDavid S. Miller 	return ring;
220a6f68034SDavid S. Miller }
221a6f68034SDavid S. Miller 
sock_fanout_read_ring(int fd,void * ring)222a6f68034SDavid S. Miller static int sock_fanout_read_ring(int fd, void *ring)
223a6f68034SDavid S. Miller {
22498e821a2SWillem de Bruijn 	struct tpacket2_hdr *header = ring;
225a6f68034SDavid S. Miller 	int count = 0;
226a6f68034SDavid S. Miller 
227fbf8e721SShuah Khan 	while (count < RING_NUM_FRAMES && header->tp_status & TP_STATUS_USER) {
228a6f68034SDavid S. Miller 		count++;
229a6f68034SDavid S. Miller 		header = ring + (count * getpagesize());
230a6f68034SDavid S. Miller 	}
231a6f68034SDavid S. Miller 
232a6f68034SDavid S. Miller 	return count;
233a6f68034SDavid S. Miller }
234a6f68034SDavid S. Miller 
sock_fanout_read(int fds[],char * rings[],const int expect[])235a6f68034SDavid S. Miller static int sock_fanout_read(int fds[], char *rings[], const int expect[])
236a6f68034SDavid S. Miller {
237a6f68034SDavid S. Miller 	int ret[2];
238a6f68034SDavid S. Miller 
239a6f68034SDavid S. Miller 	ret[0] = sock_fanout_read_ring(fds[0], rings[0]);
240a6f68034SDavid S. Miller 	ret[1] = sock_fanout_read_ring(fds[1], rings[1]);
241a6f68034SDavid S. Miller 
242a6f68034SDavid S. Miller 	fprintf(stderr, "info: count=%d,%d, expect=%d,%d\n",
243a6f68034SDavid S. Miller 			ret[0], ret[1], expect[0], expect[1]);
244a6f68034SDavid S. Miller 
245a6f68034SDavid S. Miller 	if ((!(ret[0] == expect[0] && ret[1] == expect[1])) &&
246a6f68034SDavid S. Miller 	    (!(ret[0] == expect[1] && ret[1] == expect[0]))) {
247cc30c93fSWillem de Bruijn 		fprintf(stderr, "warning: incorrect queue lengths\n");
248a6f68034SDavid S. Miller 		return 1;
249a6f68034SDavid S. Miller 	}
250a6f68034SDavid S. Miller 
251a6f68034SDavid S. Miller 	return 0;
252a6f68034SDavid S. Miller }
253a6f68034SDavid S. Miller 
254a6f68034SDavid S. Miller /* Test illegal mode + flag combination */
test_control_single(void)255a6f68034SDavid S. Miller static void test_control_single(void)
256a6f68034SDavid S. Miller {
257a6f68034SDavid S. Miller 	fprintf(stderr, "test: control single socket\n");
258a6f68034SDavid S. Miller 
259a6f68034SDavid S. Miller 	if (sock_fanout_open(PACKET_FANOUT_ROLLOVER |
26028be04f5SMike Maloney 			       PACKET_FANOUT_FLAG_ROLLOVER, 0) != -1) {
261a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: opened socket with dual rollover\n");
262a6f68034SDavid S. Miller 		exit(1);
263a6f68034SDavid S. Miller 	}
264a6f68034SDavid S. Miller }
265a6f68034SDavid S. Miller 
266a6f68034SDavid S. Miller /* Test illegal group with different modes or flags */
test_control_group(void)267a6f68034SDavid S. Miller static void test_control_group(void)
268a6f68034SDavid S. Miller {
269a6f68034SDavid S. Miller 	int fds[2];
270a6f68034SDavid S. Miller 
271a6f68034SDavid S. Miller 	fprintf(stderr, "test: control multiple sockets\n");
272a6f68034SDavid S. Miller 
27328be04f5SMike Maloney 	fds[0] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
274a6f68034SDavid S. Miller 	if (fds[0] == -1) {
275a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: failed to open HASH socket\n");
276a6f68034SDavid S. Miller 		exit(1);
277a6f68034SDavid S. Miller 	}
278a6f68034SDavid S. Miller 	if (sock_fanout_open(PACKET_FANOUT_HASH |
27928be04f5SMike Maloney 			       PACKET_FANOUT_FLAG_DEFRAG, 0) != -1) {
280a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: joined group with wrong flag defrag\n");
281a6f68034SDavid S. Miller 		exit(1);
282a6f68034SDavid S. Miller 	}
283a6f68034SDavid S. Miller 	if (sock_fanout_open(PACKET_FANOUT_HASH |
28428be04f5SMike Maloney 			       PACKET_FANOUT_FLAG_ROLLOVER, 0) != -1) {
285a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: joined group with wrong flag ro\n");
286a6f68034SDavid S. Miller 		exit(1);
287a6f68034SDavid S. Miller 	}
28828be04f5SMike Maloney 	if (sock_fanout_open(PACKET_FANOUT_CPU, 0) != -1) {
289a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: joined group with wrong mode\n");
290a6f68034SDavid S. Miller 		exit(1);
291a6f68034SDavid S. Miller 	}
29228be04f5SMike Maloney 	fds[1] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
293a6f68034SDavid S. Miller 	if (fds[1] == -1) {
294a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: failed to join group\n");
295a6f68034SDavid S. Miller 		exit(1);
296a6f68034SDavid S. Miller 	}
297a6f68034SDavid S. Miller 	if (close(fds[1]) || close(fds[0])) {
298a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: closing sockets\n");
299a6f68034SDavid S. Miller 		exit(1);
300a6f68034SDavid S. Miller 	}
301a6f68034SDavid S. Miller }
302a6f68034SDavid S. Miller 
3031db32acfSTanner Love /* Test illegal max_num_members values */
test_control_group_max_num_members(void)3041db32acfSTanner Love static void test_control_group_max_num_members(void)
3051db32acfSTanner Love {
3061db32acfSTanner Love 	int fds[3];
3071db32acfSTanner Love 
3081db32acfSTanner Love 	fprintf(stderr, "test: control multiple sockets, max_num_members\n");
3091db32acfSTanner Love 
3101db32acfSTanner Love 	/* expected failure on greater than PACKET_FANOUT_MAX */
3111db32acfSTanner Love 	cfg_max_num_members = (1 << 16) + 1;
3121db32acfSTanner Love 	if (sock_fanout_open(PACKET_FANOUT_HASH, 0) != -1) {
3131db32acfSTanner Love 		fprintf(stderr, "ERROR: max_num_members > PACKET_FANOUT_MAX\n");
3141db32acfSTanner Love 		exit(1);
3151db32acfSTanner Love 	}
3161db32acfSTanner Love 
3171db32acfSTanner Love 	cfg_max_num_members = 256;
3181db32acfSTanner Love 	fds[0] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
3191db32acfSTanner Love 	if (fds[0] == -1) {
3201db32acfSTanner Love 		fprintf(stderr, "ERROR: failed open\n");
3211db32acfSTanner Love 		exit(1);
3221db32acfSTanner Love 	}
3231db32acfSTanner Love 
3241db32acfSTanner Love 	/* expected failure on joining group with different max_num_members */
3251db32acfSTanner Love 	cfg_max_num_members = 257;
3261db32acfSTanner Love 	if (sock_fanout_open(PACKET_FANOUT_HASH, 0) != -1) {
3271db32acfSTanner Love 		fprintf(stderr, "ERROR: set different max_num_members\n");
3281db32acfSTanner Love 		exit(1);
3291db32acfSTanner Love 	}
3301db32acfSTanner Love 
3311db32acfSTanner Love 	/* success on joining group with same max_num_members */
3321db32acfSTanner Love 	cfg_max_num_members = 256;
3331db32acfSTanner Love 	fds[1] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
3341db32acfSTanner Love 	if (fds[1] == -1) {
3351db32acfSTanner Love 		fprintf(stderr, "ERROR: failed to join group\n");
3361db32acfSTanner Love 		exit(1);
3371db32acfSTanner Love 	}
3381db32acfSTanner Love 
3391db32acfSTanner Love 	/* success on joining group with max_num_members unspecified */
3401db32acfSTanner Love 	cfg_max_num_members = 0;
3411db32acfSTanner Love 	fds[2] = sock_fanout_open(PACKET_FANOUT_HASH, 0);
3421db32acfSTanner Love 	if (fds[2] == -1) {
3431db32acfSTanner Love 		fprintf(stderr, "ERROR: failed to join group\n");
3441db32acfSTanner Love 		exit(1);
3451db32acfSTanner Love 	}
3461db32acfSTanner Love 
3471db32acfSTanner Love 	if (close(fds[2]) || close(fds[1]) || close(fds[0])) {
3481db32acfSTanner Love 		fprintf(stderr, "ERROR: closing sockets\n");
3491db32acfSTanner Love 		exit(1);
3501db32acfSTanner Love 	}
3511db32acfSTanner Love }
3521db32acfSTanner Love 
35328be04f5SMike Maloney /* Test creating a unique fanout group ids */
test_unique_fanout_group_ids(void)35428be04f5SMike Maloney static void test_unique_fanout_group_ids(void)
35528be04f5SMike Maloney {
35628be04f5SMike Maloney 	int fds[3];
35728be04f5SMike Maloney 	uint16_t typeflags, first_group_id, second_group_id;
35828be04f5SMike Maloney 
35928be04f5SMike Maloney 	fprintf(stderr, "test: unique ids\n");
36028be04f5SMike Maloney 
36128be04f5SMike Maloney 	fds[0] = sock_fanout_open(PACKET_FANOUT_HASH |
36228be04f5SMike Maloney 				  PACKET_FANOUT_FLAG_UNIQUEID, 0);
36328be04f5SMike Maloney 	if (fds[0] == -1) {
36428be04f5SMike Maloney 		fprintf(stderr, "ERROR: failed to create a unique id group.\n");
36528be04f5SMike Maloney 		exit(1);
36628be04f5SMike Maloney 	}
36728be04f5SMike Maloney 
36828be04f5SMike Maloney 	sock_fanout_getopts(fds[0], &typeflags, &first_group_id);
36928be04f5SMike Maloney 	if (typeflags != PACKET_FANOUT_HASH) {
37028be04f5SMike Maloney 		fprintf(stderr, "ERROR: unexpected typeflags %x\n", typeflags);
37128be04f5SMike Maloney 		exit(1);
37228be04f5SMike Maloney 	}
37328be04f5SMike Maloney 
374472ecf08SMike Maloney 	if (sock_fanout_open(PACKET_FANOUT_CPU, first_group_id) != -1) {
37528be04f5SMike Maloney 		fprintf(stderr, "ERROR: joined group with wrong type.\n");
37628be04f5SMike Maloney 		exit(1);
37728be04f5SMike Maloney 	}
37828be04f5SMike Maloney 
37928be04f5SMike Maloney 	fds[1] = sock_fanout_open(PACKET_FANOUT_HASH, first_group_id);
38028be04f5SMike Maloney 	if (fds[1] == -1) {
38128be04f5SMike Maloney 		fprintf(stderr,
38228be04f5SMike Maloney 			"ERROR: failed to join previously created group.\n");
38328be04f5SMike Maloney 		exit(1);
38428be04f5SMike Maloney 	}
38528be04f5SMike Maloney 
38628be04f5SMike Maloney 	fds[2] = sock_fanout_open(PACKET_FANOUT_HASH |
38728be04f5SMike Maloney 				  PACKET_FANOUT_FLAG_UNIQUEID, 0);
38828be04f5SMike Maloney 	if (fds[2] == -1) {
38928be04f5SMike Maloney 		fprintf(stderr,
39028be04f5SMike Maloney 			"ERROR: failed to create a second unique id group.\n");
39128be04f5SMike Maloney 		exit(1);
39228be04f5SMike Maloney 	}
39328be04f5SMike Maloney 
39428be04f5SMike Maloney 	sock_fanout_getopts(fds[2], &typeflags, &second_group_id);
39528be04f5SMike Maloney 	if (sock_fanout_open(PACKET_FANOUT_HASH | PACKET_FANOUT_FLAG_UNIQUEID,
39628be04f5SMike Maloney 			     second_group_id) != -1) {
39728be04f5SMike Maloney 		fprintf(stderr,
39828be04f5SMike Maloney 			"ERROR: specified a group id when requesting unique id\n");
39928be04f5SMike Maloney 		exit(1);
40028be04f5SMike Maloney 	}
40128be04f5SMike Maloney 
40228be04f5SMike Maloney 	if (close(fds[0]) || close(fds[1]) || close(fds[2])) {
40328be04f5SMike Maloney 		fprintf(stderr, "ERROR: closing sockets\n");
40428be04f5SMike Maloney 		exit(1);
40528be04f5SMike Maloney 	}
40628be04f5SMike Maloney }
40728be04f5SMike Maloney 
test_datapath(uint16_t typeflags,int port_off,const int expect1[],const int expect2[])408a6f68034SDavid S. Miller static int test_datapath(uint16_t typeflags, int port_off,
409a6f68034SDavid S. Miller 			 const int expect1[], const int expect2[])
410a6f68034SDavid S. Miller {
411a6f68034SDavid S. Miller 	const int expect0[] = { 0, 0 };
412a6f68034SDavid S. Miller 	char *rings[2];
41395e22792SWillem de Bruijn 	uint8_t type = typeflags & 0xFF;
414a6f68034SDavid S. Miller 	int fds[2], fds_udp[2][2], ret;
415a6f68034SDavid S. Miller 
416cc30c93fSWillem de Bruijn 	fprintf(stderr, "\ntest: datapath 0x%hx ports %hu,%hu\n",
41764f9ede2STanner Love 		typeflags, (uint16_t)PORT_BASE,
41864f9ede2STanner Love 		(uint16_t)(PORT_BASE + port_off));
419a6f68034SDavid S. Miller 
42028be04f5SMike Maloney 	fds[0] = sock_fanout_open(typeflags, 0);
42128be04f5SMike Maloney 	fds[1] = sock_fanout_open(typeflags, 0);
422a6f68034SDavid S. Miller 	if (fds[0] == -1 || fds[1] == -1) {
423a6f68034SDavid S. Miller 		fprintf(stderr, "ERROR: failed open\n");
424a6f68034SDavid S. Miller 		exit(1);
425a6f68034SDavid S. Miller 	}
42695e22792SWillem de Bruijn 	if (type == PACKET_FANOUT_CBPF)
427c1f8d0f9SMike Maloney 		sock_fanout_set_cbpf(fds[0]);
42830da679eSWillem de Bruijn 	else if (type == PACKET_FANOUT_EBPF)
42930da679eSWillem de Bruijn 		sock_fanout_set_ebpf(fds[0]);
43095e22792SWillem de Bruijn 
431a6f68034SDavid S. Miller 	rings[0] = sock_fanout_open_ring(fds[0]);
432a6f68034SDavid S. Miller 	rings[1] = sock_fanout_open_ring(fds[1]);
433a6f68034SDavid S. Miller 	pair_udp_open(fds_udp[0], PORT_BASE);
434a6f68034SDavid S. Miller 	pair_udp_open(fds_udp[1], PORT_BASE + port_off);
435a6f68034SDavid S. Miller 	sock_fanout_read(fds, rings, expect0);
436a6f68034SDavid S. Miller 
437a6f68034SDavid S. Miller 	/* Send data, but not enough to overflow a queue */
438a6f68034SDavid S. Miller 	pair_udp_send(fds_udp[0], 15);
43995e22792SWillem de Bruijn 	pair_udp_send_char(fds_udp[1], 5, DATA_CHAR_1);
440a6f68034SDavid S. Miller 	ret = sock_fanout_read(fds, rings, expect1);
441a6f68034SDavid S. Miller 
442a6f68034SDavid S. Miller 	/* Send more data, overflow the queue */
44395e22792SWillem de Bruijn 	pair_udp_send_char(fds_udp[0], 15, DATA_CHAR_1);
444a6f68034SDavid S. Miller 	/* TODO: ensure consistent order between expect1 and expect2 */
445a6f68034SDavid S. Miller 	ret |= sock_fanout_read(fds, rings, expect2);
446a6f68034SDavid S. Miller 
447a6f68034SDavid S. Miller 	if (munmap(rings[1], RING_NUM_FRAMES * getpagesize()) ||
448a6f68034SDavid S. Miller 	    munmap(rings[0], RING_NUM_FRAMES * getpagesize())) {
449a6f68034SDavid S. Miller 		fprintf(stderr, "close rings\n");
450a6f68034SDavid S. Miller 		exit(1);
451a6f68034SDavid S. Miller 	}
452a6f68034SDavid S. Miller 	if (close(fds_udp[1][1]) || close(fds_udp[1][0]) ||
453a6f68034SDavid S. Miller 	    close(fds_udp[0][1]) || close(fds_udp[0][0]) ||
454a6f68034SDavid S. Miller 	    close(fds[1]) || close(fds[0])) {
455a6f68034SDavid S. Miller 		fprintf(stderr, "close datapath\n");
456a6f68034SDavid S. Miller 		exit(1);
457a6f68034SDavid S. Miller 	}
458a6f68034SDavid S. Miller 
459a6f68034SDavid S. Miller 	return ret;
460a6f68034SDavid S. Miller }
461a6f68034SDavid S. Miller 
set_cpuaffinity(int cpuid)462a6f68034SDavid S. Miller static int set_cpuaffinity(int cpuid)
463a6f68034SDavid S. Miller {
464a6f68034SDavid S. Miller 	cpu_set_t mask;
465a6f68034SDavid S. Miller 
466a6f68034SDavid S. Miller 	CPU_ZERO(&mask);
467a6f68034SDavid S. Miller 	CPU_SET(cpuid, &mask);
468a6f68034SDavid S. Miller 	if (sched_setaffinity(0, sizeof(mask), &mask)) {
469a6f68034SDavid S. Miller 		if (errno != EINVAL) {
470a6f68034SDavid S. Miller 			fprintf(stderr, "setaffinity %d\n", cpuid);
471a6f68034SDavid S. Miller 			exit(1);
472a6f68034SDavid S. Miller 		}
473a6f68034SDavid S. Miller 		return 1;
474a6f68034SDavid S. Miller 	}
475a6f68034SDavid S. Miller 
476a6f68034SDavid S. Miller 	return 0;
477a6f68034SDavid S. Miller }
478a6f68034SDavid S. Miller 
main(int argc,char ** argv)479a6f68034SDavid S. Miller int main(int argc, char **argv)
480a6f68034SDavid S. Miller {
481a6f68034SDavid S. Miller 	const int expect_hash[2][2]	= { { 15, 5 },  { 20, 5 } };
482a6f68034SDavid S. Miller 	const int expect_hash_rb[2][2]	= { { 15, 5 },  { 20, 15 } };
483a6f68034SDavid S. Miller 	const int expect_lb[2][2]	= { { 10, 10 }, { 18, 17 } };
484a2ad5d2aSWillem de Bruijn 	const int expect_rb[2][2]	= { { 15, 5 },  { 20, 15 } };
485a6f68034SDavid S. Miller 	const int expect_cpu0[2][2]	= { { 20, 0 },  { 20, 0 } };
486a6f68034SDavid S. Miller 	const int expect_cpu1[2][2]	= { { 0, 20 },  { 0, 20 } };
48795e22792SWillem de Bruijn 	const int expect_bpf[2][2]	= { { 15, 5 },  { 15, 20 } };
48828be04f5SMike Maloney 	const int expect_uniqueid[2][2] = { { 20, 20},  { 20, 20 } };
489cc30c93fSWillem de Bruijn 	int port_off = 2, tries = 20, ret;
490a6f68034SDavid S. Miller 
491a6f68034SDavid S. Miller 	test_control_single();
492a6f68034SDavid S. Miller 	test_control_group();
4931db32acfSTanner Love 	test_control_group_max_num_members();
49428be04f5SMike Maloney 	test_unique_fanout_group_ids();
495a6f68034SDavid S. Miller 
4961db32acfSTanner Love 	/* PACKET_FANOUT_MAX */
4971db32acfSTanner Love 	cfg_max_num_members = 1 << 16;
498a6f68034SDavid S. Miller 	/* find a set of ports that do not collide onto the same socket */
499a6f68034SDavid S. Miller 	ret = test_datapath(PACKET_FANOUT_HASH, port_off,
500a6f68034SDavid S. Miller 			    expect_hash[0], expect_hash[1]);
501cc30c93fSWillem de Bruijn 	while (ret) {
502a6f68034SDavid S. Miller 		fprintf(stderr, "info: trying alternate ports (%d)\n", tries);
503a6f68034SDavid S. Miller 		ret = test_datapath(PACKET_FANOUT_HASH, ++port_off,
504a6f68034SDavid S. Miller 				    expect_hash[0], expect_hash[1]);
505cc30c93fSWillem de Bruijn 		if (!--tries) {
506cc30c93fSWillem de Bruijn 			fprintf(stderr, "too many collisions\n");
507cc30c93fSWillem de Bruijn 			return 1;
508cc30c93fSWillem de Bruijn 		}
509a6f68034SDavid S. Miller 	}
510a6f68034SDavid S. Miller 
511a6f68034SDavid S. Miller 	ret |= test_datapath(PACKET_FANOUT_HASH | PACKET_FANOUT_FLAG_ROLLOVER,
512a6f68034SDavid S. Miller 			     port_off, expect_hash_rb[0], expect_hash_rb[1]);
513a6f68034SDavid S. Miller 	ret |= test_datapath(PACKET_FANOUT_LB,
514a6f68034SDavid S. Miller 			     port_off, expect_lb[0], expect_lb[1]);
515a6f68034SDavid S. Miller 	ret |= test_datapath(PACKET_FANOUT_ROLLOVER,
516a6f68034SDavid S. Miller 			     port_off, expect_rb[0], expect_rb[1]);
51730da679eSWillem de Bruijn 
51895e22792SWillem de Bruijn 	ret |= test_datapath(PACKET_FANOUT_CBPF,
51995e22792SWillem de Bruijn 			     port_off, expect_bpf[0], expect_bpf[1]);
52030da679eSWillem de Bruijn 	ret |= test_datapath(PACKET_FANOUT_EBPF,
52130da679eSWillem de Bruijn 			     port_off, expect_bpf[0], expect_bpf[1]);
522a6f68034SDavid S. Miller 
523a6f68034SDavid S. Miller 	set_cpuaffinity(0);
524a6f68034SDavid S. Miller 	ret |= test_datapath(PACKET_FANOUT_CPU, port_off,
525a6f68034SDavid S. Miller 			     expect_cpu0[0], expect_cpu0[1]);
526a6f68034SDavid S. Miller 	if (!set_cpuaffinity(1))
527a6f68034SDavid S. Miller 		/* TODO: test that choice alternates with previous */
528a6f68034SDavid S. Miller 		ret |= test_datapath(PACKET_FANOUT_CPU, port_off,
529a6f68034SDavid S. Miller 				     expect_cpu1[0], expect_cpu1[1]);
530a6f68034SDavid S. Miller 
53128be04f5SMike Maloney 	ret |= test_datapath(PACKET_FANOUT_FLAG_UNIQUEID, port_off,
53228be04f5SMike Maloney 			     expect_uniqueid[0], expect_uniqueid[1]);
53328be04f5SMike Maloney 
534a6f68034SDavid S. Miller 	if (ret)
535a6f68034SDavid S. Miller 		return 1;
536a6f68034SDavid S. Miller 
537a6f68034SDavid S. Miller 	printf("OK. All tests passed\n");
538a6f68034SDavid S. Miller 	return 0;
539a6f68034SDavid S. Miller }
540