udpgso_bench_rx.c (8843B)
1// SPDX-License-Identifier: GPL-2.0 2 3#define _GNU_SOURCE 4 5#include <arpa/inet.h> 6#include <error.h> 7#include <errno.h> 8#include <limits.h> 9#include <linux/errqueue.h> 10#include <linux/if_packet.h> 11#include <linux/socket.h> 12#include <linux/sockios.h> 13#include <net/ethernet.h> 14#include <net/if.h> 15#include <netinet/ip.h> 16#include <netinet/ip6.h> 17#include <netinet/tcp.h> 18#include <netinet/udp.h> 19#include <poll.h> 20#include <sched.h> 21#include <stdbool.h> 22#include <stdio.h> 23#include <stdint.h> 24#include <stdlib.h> 25#include <string.h> 26#include <sys/ioctl.h> 27#include <sys/socket.h> 28#include <sys/stat.h> 29#include <sys/time.h> 30#include <sys/types.h> 31#include <sys/wait.h> 32#include <unistd.h> 33 34#ifndef UDP_GRO 35#define UDP_GRO 104 36#endif 37 38static int cfg_port = 8000; 39static bool cfg_tcp; 40static bool cfg_verify; 41static bool cfg_read_all; 42static bool cfg_gro_segment; 43static int cfg_family = PF_INET6; 44static int cfg_alen = sizeof(struct sockaddr_in6); 45static int cfg_expected_pkt_nr; 46static int cfg_expected_pkt_len; 47static int cfg_expected_gso_size; 48static int cfg_connect_timeout_ms; 49static int cfg_rcv_timeout_ms; 50static struct sockaddr_storage cfg_bind_addr; 51 52static bool interrupted; 53static unsigned long packets, bytes; 54 55static void sigint_handler(int signum) 56{ 57 if (signum == SIGINT) 58 interrupted = true; 59} 60 61static void setup_sockaddr(int domain, const char *str_addr, void *sockaddr) 62{ 63 struct sockaddr_in6 *addr6 = (void *) sockaddr; 64 struct sockaddr_in *addr4 = (void *) sockaddr; 65 66 switch (domain) { 67 case PF_INET: 68 addr4->sin_family = AF_INET; 69 addr4->sin_port = htons(cfg_port); 70 if (inet_pton(AF_INET, str_addr, &(addr4->sin_addr)) != 1) 71 error(1, 0, "ipv4 parse error: %s", str_addr); 72 break; 73 case PF_INET6: 74 addr6->sin6_family = AF_INET6; 75 addr6->sin6_port = htons(cfg_port); 76 if (inet_pton(AF_INET6, str_addr, &(addr6->sin6_addr)) != 1) 77 error(1, 0, "ipv6 parse error: %s", str_addr); 78 break; 79 default: 80 error(1, 0, "illegal domain"); 81 } 82} 83 84static unsigned long gettimeofday_ms(void) 85{ 86 struct timeval tv; 87 88 gettimeofday(&tv, NULL); 89 return (tv.tv_sec * 1000) + (tv.tv_usec / 1000); 90} 91 92static void do_poll(int fd, int timeout_ms) 93{ 94 struct pollfd pfd; 95 int ret; 96 97 pfd.events = POLLIN; 98 pfd.revents = 0; 99 pfd.fd = fd; 100 101 do { 102 ret = poll(&pfd, 1, 10); 103 if (interrupted) 104 break; 105 if (ret == -1) 106 error(1, errno, "poll"); 107 if (ret == 0) { 108 if (!timeout_ms) 109 continue; 110 111 timeout_ms -= 10; 112 if (timeout_ms <= 0) { 113 interrupted = true; 114 break; 115 } 116 117 /* no events and more time to wait, do poll again */ 118 continue; 119 } 120 if (pfd.revents != POLLIN) 121 error(1, errno, "poll: 0x%x expected 0x%x\n", 122 pfd.revents, POLLIN); 123 } while (!ret); 124} 125 126static int do_socket(bool do_tcp) 127{ 128 int fd, val; 129 130 fd = socket(cfg_family, cfg_tcp ? SOCK_STREAM : SOCK_DGRAM, 0); 131 if (fd == -1) 132 error(1, errno, "socket"); 133 134 val = 1 << 21; 135 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &val, sizeof(val))) 136 error(1, errno, "setsockopt rcvbuf"); 137 val = 1; 138 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val))) 139 error(1, errno, "setsockopt reuseport"); 140 141 if (bind(fd, (void *)&cfg_bind_addr, cfg_alen)) 142 error(1, errno, "bind"); 143 144 if (do_tcp) { 145 int accept_fd = fd; 146 147 if (listen(accept_fd, 1)) 148 error(1, errno, "listen"); 149 150 do_poll(accept_fd, cfg_connect_timeout_ms); 151 if (interrupted) 152 exit(0); 153 154 fd = accept(accept_fd, NULL, NULL); 155 if (fd == -1) 156 error(1, errno, "accept"); 157 if (close(accept_fd)) 158 error(1, errno, "close accept fd"); 159 } 160 161 return fd; 162} 163 164/* Flush all outstanding bytes for the tcp receive queue */ 165static void do_flush_tcp(int fd) 166{ 167 int ret; 168 169 while (true) { 170 /* MSG_TRUNC flushes up to len bytes */ 171 ret = recv(fd, NULL, 1 << 21, MSG_TRUNC | MSG_DONTWAIT); 172 if (ret == -1 && errno == EAGAIN) 173 return; 174 if (ret == -1) 175 error(1, errno, "flush"); 176 if (ret == 0) { 177 /* client detached */ 178 exit(0); 179 } 180 181 packets++; 182 bytes += ret; 183 } 184 185} 186 187static char sanitized_char(char val) 188{ 189 return (val >= 'a' && val <= 'z') ? val : '.'; 190} 191 192static void do_verify_udp(const char *data, int len) 193{ 194 char cur = data[0]; 195 int i; 196 197 /* verify contents */ 198 if (cur < 'a' || cur > 'z') 199 error(1, 0, "data initial byte out of range"); 200 201 for (i = 1; i < len; i++) { 202 if (cur == 'z') 203 cur = 'a'; 204 else 205 cur++; 206 207 if (data[i] != cur) 208 error(1, 0, "data[%d]: len %d, %c(%hhu) != %c(%hhu)\n", 209 i, len, 210 sanitized_char(data[i]), data[i], 211 sanitized_char(cur), cur); 212 } 213} 214 215static int recv_msg(int fd, char *buf, int len, int *gso_size) 216{ 217 char control[CMSG_SPACE(sizeof(uint16_t))] = {0}; 218 struct msghdr msg = {0}; 219 struct iovec iov = {0}; 220 struct cmsghdr *cmsg; 221 uint16_t *gsosizeptr; 222 int ret; 223 224 iov.iov_base = buf; 225 iov.iov_len = len; 226 227 msg.msg_iov = &iov; 228 msg.msg_iovlen = 1; 229 230 msg.msg_control = control; 231 msg.msg_controllen = sizeof(control); 232 233 *gso_size = -1; 234 ret = recvmsg(fd, &msg, MSG_TRUNC | MSG_DONTWAIT); 235 if (ret != -1) { 236 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; 237 cmsg = CMSG_NXTHDR(&msg, cmsg)) { 238 if (cmsg->cmsg_level == SOL_UDP 239 && cmsg->cmsg_type == UDP_GRO) { 240 gsosizeptr = (uint16_t *) CMSG_DATA(cmsg); 241 *gso_size = *gsosizeptr; 242 break; 243 } 244 } 245 } 246 return ret; 247} 248 249/* Flush all outstanding datagrams. Verify first few bytes of each. */ 250static void do_flush_udp(int fd) 251{ 252 static char rbuf[ETH_MAX_MTU]; 253 int ret, len, gso_size, budget = 256; 254 255 len = cfg_read_all ? sizeof(rbuf) : 0; 256 while (budget--) { 257 /* MSG_TRUNC will make return value full datagram length */ 258 if (!cfg_expected_gso_size) 259 ret = recv(fd, rbuf, len, MSG_TRUNC | MSG_DONTWAIT); 260 else 261 ret = recv_msg(fd, rbuf, len, &gso_size); 262 if (ret == -1 && errno == EAGAIN) 263 break; 264 if (ret == -1) 265 error(1, errno, "recv"); 266 if (cfg_expected_pkt_len && ret != cfg_expected_pkt_len) 267 error(1, 0, "recv: bad packet len, got %d," 268 " expected %d\n", ret, cfg_expected_pkt_len); 269 if (len && cfg_verify) { 270 if (ret == 0) 271 error(1, errno, "recv: 0 byte datagram\n"); 272 273 do_verify_udp(rbuf, ret); 274 } 275 if (cfg_expected_gso_size && cfg_expected_gso_size != gso_size) 276 error(1, 0, "recv: bad gso size, got %d, expected %d " 277 "(-1 == no gso cmsg))\n", gso_size, 278 cfg_expected_gso_size); 279 280 packets++; 281 bytes += ret; 282 if (cfg_expected_pkt_nr && packets >= cfg_expected_pkt_nr) 283 break; 284 } 285} 286 287static void usage(const char *filepath) 288{ 289 error(1, 0, "Usage: %s [-C connect_timeout] [-Grtv] [-b addr] [-p port]" 290 " [-l pktlen] [-n packetnr] [-R rcv_timeout] [-S gsosize]", 291 filepath); 292} 293 294static void parse_opts(int argc, char **argv) 295{ 296 const char *bind_addr = NULL; 297 int c; 298 299 while ((c = getopt(argc, argv, "4b:C:Gl:n:p:rR:S:tv")) != -1) { 300 switch (c) { 301 case '4': 302 cfg_family = PF_INET; 303 cfg_alen = sizeof(struct sockaddr_in); 304 break; 305 case 'b': 306 bind_addr = optarg; 307 break; 308 case 'C': 309 cfg_connect_timeout_ms = strtoul(optarg, NULL, 0); 310 break; 311 case 'G': 312 cfg_gro_segment = true; 313 break; 314 case 'l': 315 cfg_expected_pkt_len = strtoul(optarg, NULL, 0); 316 break; 317 case 'n': 318 cfg_expected_pkt_nr = strtoul(optarg, NULL, 0); 319 break; 320 case 'p': 321 cfg_port = strtoul(optarg, NULL, 0); 322 break; 323 case 'r': 324 cfg_read_all = true; 325 break; 326 case 'R': 327 cfg_rcv_timeout_ms = strtoul(optarg, NULL, 0); 328 break; 329 case 'S': 330 cfg_expected_gso_size = strtol(optarg, NULL, 0); 331 break; 332 case 't': 333 cfg_tcp = true; 334 break; 335 case 'v': 336 cfg_verify = true; 337 cfg_read_all = true; 338 break; 339 } 340 } 341 342 if (!bind_addr) 343 bind_addr = cfg_family == PF_INET6 ? "::" : "0.0.0.0"; 344 345 setup_sockaddr(cfg_family, bind_addr, &cfg_bind_addr); 346 347 if (optind != argc) 348 usage(argv[0]); 349 350 if (cfg_tcp && cfg_verify) 351 error(1, 0, "TODO: implement verify mode for tcp"); 352} 353 354static void do_recv(void) 355{ 356 int timeout_ms = cfg_tcp ? cfg_rcv_timeout_ms : cfg_connect_timeout_ms; 357 unsigned long tnow, treport; 358 int fd; 359 360 fd = do_socket(cfg_tcp); 361 362 if (cfg_gro_segment && !cfg_tcp) { 363 int val = 1; 364 if (setsockopt(fd, IPPROTO_UDP, UDP_GRO, &val, sizeof(val))) 365 error(1, errno, "setsockopt UDP_GRO"); 366 } 367 368 treport = gettimeofday_ms() + 1000; 369 do { 370 do_poll(fd, timeout_ms); 371 372 if (cfg_tcp) 373 do_flush_tcp(fd); 374 else 375 do_flush_udp(fd); 376 377 tnow = gettimeofday_ms(); 378 if (tnow > treport) { 379 if (packets) 380 fprintf(stderr, 381 "%s rx: %6lu MB/s %8lu calls/s\n", 382 cfg_tcp ? "tcp" : "udp", 383 bytes >> 20, packets); 384 bytes = packets = 0; 385 treport = tnow + 1000; 386 } 387 388 timeout_ms = cfg_rcv_timeout_ms; 389 390 } while (!interrupted); 391 392 if (cfg_expected_pkt_nr && (packets != cfg_expected_pkt_nr)) 393 error(1, 0, "wrong packet number! got %ld, expected %d\n", 394 packets, cfg_expected_pkt_nr); 395 396 if (close(fd)) 397 error(1, errno, "close"); 398} 399 400int main(int argc, char **argv) 401{ 402 parse_opts(argc, argv); 403 404 signal(SIGINT, sigint_handler); 405 406 do_recv(); 407 408 return 0; 409}