~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/net/reuseport_bpf_numa.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 /*
  3  * Test functionality of BPF filters with SO_REUSEPORT. Same test as
  4  * in reuseport_bpf_cpu, only as one socket per NUMA node.
  5  */
  6 
  7 #define _GNU_SOURCE
  8 
  9 #include <arpa/inet.h>
 10 #include <errno.h>
 11 #include <error.h>
 12 #include <linux/filter.h>
 13 #include <linux/bpf.h>
 14 #include <linux/in.h>
 15 #include <linux/unistd.h>
 16 #include <sched.h>
 17 #include <stdio.h>
 18 #include <stdlib.h>
 19 #include <string.h>
 20 #include <sys/epoll.h>
 21 #include <sys/types.h>
 22 #include <sys/socket.h>
 23 #include <unistd.h>
 24 #include <numa.h>
 25 
 26 #include "../kselftest.h"
 27 
 28 static const int PORT = 8888;
 29 
 30 static void build_rcv_group(int *rcv_fd, size_t len, int family, int proto)
 31 {
 32         struct sockaddr_storage addr;
 33         struct sockaddr_in  *addr4;
 34         struct sockaddr_in6 *addr6;
 35         size_t i;
 36         int opt;
 37 
 38         switch (family) {
 39         case AF_INET:
 40                 addr4 = (struct sockaddr_in *)&addr;
 41                 addr4->sin_family = AF_INET;
 42                 addr4->sin_addr.s_addr = htonl(INADDR_ANY);
 43                 addr4->sin_port = htons(PORT);
 44                 break;
 45         case AF_INET6:
 46                 addr6 = (struct sockaddr_in6 *)&addr;
 47                 addr6->sin6_family = AF_INET6;
 48                 addr6->sin6_addr = in6addr_any;
 49                 addr6->sin6_port = htons(PORT);
 50                 break;
 51         default:
 52                 error(1, 0, "Unsupported family %d", family);
 53         }
 54 
 55         for (i = 0; i < len; ++i) {
 56                 rcv_fd[i] = socket(family, proto, 0);
 57                 if (rcv_fd[i] < 0)
 58                         error(1, errno, "failed to create receive socket");
 59 
 60                 opt = 1;
 61                 if (setsockopt(rcv_fd[i], SOL_SOCKET, SO_REUSEPORT, &opt,
 62                                sizeof(opt)))
 63                         error(1, errno, "failed to set SO_REUSEPORT");
 64 
 65                 if (bind(rcv_fd[i], (struct sockaddr *)&addr, sizeof(addr)))
 66                         error(1, errno, "failed to bind receive socket");
 67 
 68                 if (proto == SOCK_STREAM && listen(rcv_fd[i], len * 10))
 69                         error(1, errno, "failed to listen on receive port");
 70         }
 71 }
 72 
 73 static void attach_bpf(int fd)
 74 {
 75         static char bpf_log_buf[65536];
 76         static const char bpf_license[] = "";
 77 
 78         int bpf_fd;
 79         const struct bpf_insn prog[] = {
 80                 /* R0 = bpf_get_numa_node_id() */
 81                 { BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_numa_node_id },
 82                 /* return R0 */
 83                 { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 }
 84         };
 85         union bpf_attr attr;
 86 
 87         memset(&attr, 0, sizeof(attr));
 88         attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
 89         attr.insn_cnt = ARRAY_SIZE(prog);
 90         attr.insns = (unsigned long) &prog;
 91         attr.license = (unsigned long) &bpf_license;
 92         attr.log_buf = (unsigned long) &bpf_log_buf;
 93         attr.log_size = sizeof(bpf_log_buf);
 94         attr.log_level = 1;
 95 
 96         bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
 97         if (bpf_fd < 0)
 98                 error(1, errno, "ebpf error. log:\n%s\n", bpf_log_buf);
 99 
100         if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd,
101                         sizeof(bpf_fd)))
102                 error(1, errno, "failed to set SO_ATTACH_REUSEPORT_EBPF");
103 
104         close(bpf_fd);
105 }
106 
107 static void send_from_node(int node_id, int family, int proto)
108 {
109         struct sockaddr_storage saddr, daddr;
110         struct sockaddr_in  *saddr4, *daddr4;
111         struct sockaddr_in6 *saddr6, *daddr6;
112         int fd;
113 
114         switch (family) {
115         case AF_INET:
116                 saddr4 = (struct sockaddr_in *)&saddr;
117                 saddr4->sin_family = AF_INET;
118                 saddr4->sin_addr.s_addr = htonl(INADDR_ANY);
119                 saddr4->sin_port = 0;
120 
121                 daddr4 = (struct sockaddr_in *)&daddr;
122                 daddr4->sin_family = AF_INET;
123                 daddr4->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
124                 daddr4->sin_port = htons(PORT);
125                 break;
126         case AF_INET6:
127                 saddr6 = (struct sockaddr_in6 *)&saddr;
128                 saddr6->sin6_family = AF_INET6;
129                 saddr6->sin6_addr = in6addr_any;
130                 saddr6->sin6_port = 0;
131 
132                 daddr6 = (struct sockaddr_in6 *)&daddr;
133                 daddr6->sin6_family = AF_INET6;
134                 daddr6->sin6_addr = in6addr_loopback;
135                 daddr6->sin6_port = htons(PORT);
136                 break;
137         default:
138                 error(1, 0, "Unsupported family %d", family);
139         }
140 
141         if (numa_run_on_node(node_id) < 0)
142                 error(1, errno, "failed to pin to node");
143 
144         fd = socket(family, proto, 0);
145         if (fd < 0)
146                 error(1, errno, "failed to create send socket");
147 
148         if (bind(fd, (struct sockaddr *)&saddr, sizeof(saddr)))
149                 error(1, errno, "failed to bind send socket");
150 
151         if (connect(fd, (struct sockaddr *)&daddr, sizeof(daddr)))
152                 error(1, errno, "failed to connect send socket");
153 
154         if (send(fd, "a", 1, 0) < 0)
155                 error(1, errno, "failed to send message");
156 
157         close(fd);
158 }
159 
160 static
161 void receive_on_node(int *rcv_fd, int len, int epfd, int node_id, int proto)
162 {
163         struct epoll_event ev;
164         int i, fd;
165         char buf[8];
166 
167         i = epoll_wait(epfd, &ev, 1, -1);
168         if (i < 0)
169                 error(1, errno, "epoll_wait failed");
170 
171         if (proto == SOCK_STREAM) {
172                 fd = accept(ev.data.fd, NULL, NULL);
173                 if (fd < 0)
174                         error(1, errno, "failed to accept");
175                 i = recv(fd, buf, sizeof(buf), 0);
176                 close(fd);
177         } else {
178                 i = recv(ev.data.fd, buf, sizeof(buf), 0);
179         }
180 
181         if (i < 0)
182                 error(1, errno, "failed to recv");
183 
184         for (i = 0; i < len; ++i)
185                 if (ev.data.fd == rcv_fd[i])
186                         break;
187         if (i == len)
188                 error(1, 0, "failed to find socket");
189         fprintf(stderr, "send node %d, receive socket %d\n", node_id, i);
190         if (node_id != i)
191                 error(1, 0, "node id/receive socket mismatch");
192 }
193 
194 static void test(int *rcv_fd, int len, int family, int proto)
195 {
196         struct epoll_event ev;
197         int epfd, node;
198 
199         build_rcv_group(rcv_fd, len, family, proto);
200         attach_bpf(rcv_fd[0]);
201 
202         epfd = epoll_create(1);
203         if (epfd < 0)
204                 error(1, errno, "failed to create epoll");
205         for (node = 0; node < len; ++node) {
206                 ev.events = EPOLLIN;
207                 ev.data.fd = rcv_fd[node];
208                 if (epoll_ctl(epfd, EPOLL_CTL_ADD, rcv_fd[node], &ev))
209                         error(1, errno, "failed to register sock epoll");
210         }
211 
212         /* Forward iterate */
213         for (node = 0; node < len; ++node) {
214                 if (!numa_bitmask_isbitset(numa_nodes_ptr, node))
215                         continue;
216                 send_from_node(node, family, proto);
217                 receive_on_node(rcv_fd, len, epfd, node, proto);
218         }
219 
220         /* Reverse iterate */
221         for (node = len - 1; node >= 0; --node) {
222                 if (!numa_bitmask_isbitset(numa_nodes_ptr, node))
223                         continue;
224                 send_from_node(node, family, proto);
225                 receive_on_node(rcv_fd, len, epfd, node, proto);
226         }
227 
228         close(epfd);
229         for (node = 0; node < len; ++node)
230                 close(rcv_fd[node]);
231 }
232 
233 int main(void)
234 {
235         int *rcv_fd, nodes;
236 
237         if (numa_available() < 0)
238                 ksft_exit_skip("no numa api support\n");
239 
240         nodes = numa_max_node() + 1;
241 
242         rcv_fd = calloc(nodes, sizeof(int));
243         if (!rcv_fd)
244                 error(1, 0, "failed to allocate array");
245 
246         fprintf(stderr, "---- IPv4 UDP ----\n");
247         test(rcv_fd, nodes, AF_INET, SOCK_DGRAM);
248 
249         fprintf(stderr, "---- IPv6 UDP ----\n");
250         test(rcv_fd, nodes, AF_INET6, SOCK_DGRAM);
251 
252         fprintf(stderr, "---- IPv4 TCP ----\n");
253         test(rcv_fd, nodes, AF_INET, SOCK_STREAM);
254 
255         fprintf(stderr, "---- IPv6 TCP ----\n");
256         test(rcv_fd, nodes, AF_INET6, SOCK_STREAM);
257 
258         free(rcv_fd);
259 
260         fprintf(stderr, "SUCCESS\n");
261         return 0;
262 }
263 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php