Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Willem de Bruijn | 3416 | 82.59% | 3 | 37.50% |
Sowmini Varadhan | 719 | 17.38% | 4 | 50.00% |
Thomas Meyer | 1 | 0.02% | 1 | 12.50% |
Total | 4136 | 8 |
/* Evaluate MSG_ZEROCOPY * * Send traffic between two processes over one of the supported * protocols and modes: * * PF_INET/PF_INET6 * - SOCK_STREAM * - SOCK_DGRAM * - SOCK_DGRAM with UDP_CORK * - SOCK_RAW * - SOCK_RAW with IP_HDRINCL * * PF_PACKET * - SOCK_DGRAM * - SOCK_RAW * * PF_RDS * - SOCK_SEQPACKET * * Start this program on two connected hosts, one in send mode and * the other with option '-r' to put it in receiver mode. * * If zerocopy mode ('-z') is enabled, the sender will verify that * the kernel queues completions on the error queue for all zerocopy * transfers. */ #define _GNU_SOURCE #include <arpa/inet.h> #include <error.h> #include <errno.h> #include <limits.h> #include <linux/errqueue.h> #include <linux/if_packet.h> #include <linux/ipv6.h> #include <linux/socket.h> #include <linux/sockios.h> #include <net/ethernet.h> #include <net/if.h> #include <netinet/ip.h> #include <netinet/ip6.h> #include <netinet/tcp.h> #include <netinet/udp.h> #include <poll.h> #include <sched.h> #include <stdbool.h> #include <stdio.h> #include <stdint.h> #include <stdlib.h> #include <string.h> #include <sys/ioctl.h> #include <sys/socket.h> #include <sys/stat.h> #include <sys/time.h> #include <sys/types.h> #include <sys/wait.h> #include <unistd.h> #include <linux/rds.h> #ifndef SO_EE_ORIGIN_ZEROCOPY #define SO_EE_ORIGIN_ZEROCOPY 5 #endif #ifndef SO_ZEROCOPY #define SO_ZEROCOPY 60 #endif #ifndef SO_EE_CODE_ZEROCOPY_COPIED #define SO_EE_CODE_ZEROCOPY_COPIED 1 #endif #ifndef MSG_ZEROCOPY #define MSG_ZEROCOPY 0x4000000 #endif static int cfg_cork; static bool cfg_cork_mixed; static int cfg_cpu = -1; /* default: pin to last cpu */ static int cfg_family = PF_UNSPEC; static int cfg_ifindex = 1; static int cfg_payload_len; static int cfg_port = 8000; static bool cfg_rx; static int cfg_runtime_ms = 4200; static int cfg_verbose; static int cfg_waittime_ms = 500; static bool cfg_zerocopy; static socklen_t cfg_alen; static struct sockaddr_storage cfg_dst_addr; static struct sockaddr_storage cfg_src_addr; static char payload[IP_MAXPACKET]; static long packets, bytes, completions, expected_completions; static int zerocopied = -1; static uint32_t next_completion; static unsigned long gettimeofday_ms(void) { struct timeval tv; gettimeofday(&tv, NULL); return (tv.tv_sec * 1000) + (tv.tv_usec / 1000); } static uint16_t get_ip_csum(const uint16_t *start, int num_words) { unsigned long sum = 0; int i; for (i = 0; i < num_words; i++) sum += start[i]; while (sum >> 16) sum = (sum & 0xFFFF) + (sum >> 16); return ~sum; } static int do_setcpu(int cpu) { cpu_set_t mask; CPU_ZERO(&mask); CPU_SET(cpu, &mask); if (sched_setaffinity(0, sizeof(mask), &mask)) error(1, 0, "setaffinity %d", cpu); if (cfg_verbose) fprintf(stderr, "cpu: %u\n", cpu); return 0; } static void do_setsockopt(int fd, int level, int optname, int val) { if (setsockopt(fd, level, optname, &val, sizeof(val))) error(1, errno, "setsockopt %d.%d: %d", level, optname, val); } static int do_poll(int fd, int events) { struct pollfd pfd; int ret; pfd.events = events; pfd.revents = 0; pfd.fd = fd; ret = poll(&pfd, 1, cfg_waittime_ms); if (ret == -1) error(1, errno, "poll"); return ret && (pfd.revents & events); } static int do_accept(int fd) { int fda = fd; fd = accept(fda, NULL, NULL); if (fd == -1) error(1, errno, "accept"); if (close(fda)) error(1, errno, "close listen sock"); return fd; } static void add_zcopy_cookie(struct msghdr *msg, uint32_t cookie) { struct cmsghdr *cm; if (!msg->msg_control) error(1, errno, "NULL cookie"); cm = (void *)msg->msg_control; cm->cmsg_len = CMSG_LEN(sizeof(cookie)); cm->cmsg_level = SOL_RDS; cm->cmsg_type = RDS_CMSG_ZCOPY_COOKIE; memcpy(CMSG_DATA(cm), &cookie, sizeof(cookie)); } static bool do_sendmsg(int fd, struct msghdr *msg, bool do_zerocopy, int domain) { int ret, len, i, flags; static uint32_t cookie; char ckbuf[CMSG_SPACE(sizeof(cookie))]; len = 0; for (i = 0; i < msg->msg_iovlen; i++) len += msg->msg_iov[i].iov_len; flags = MSG_DONTWAIT; if (do_zerocopy) { flags |= MSG_ZEROCOPY; if (domain == PF_RDS) { memset(&msg->msg_control, 0, sizeof(msg->msg_control)); msg->msg_controllen = CMSG_SPACE(sizeof(cookie)); msg->msg_control = (struct cmsghdr *)ckbuf; add_zcopy_cookie(msg, ++cookie); } } ret = sendmsg(fd, msg, flags); if (ret == -1 && errno == EAGAIN) return false; if (ret == -1) error(1, errno, "send"); if (cfg_verbose && ret != len) fprintf(stderr, "send: ret=%u != %u\n", ret, len); if (len) { packets++; bytes += ret; if (do_zerocopy && ret) expected_completions++; } if (do_zerocopy && domain == PF_RDS) { msg->msg_control = NULL; msg->msg_controllen = 0; } return true; } static void do_sendmsg_corked(int fd, struct msghdr *msg) { bool do_zerocopy = cfg_zerocopy; int i, payload_len, extra_len; /* split up the packet. for non-multiple, make first buffer longer */ payload_len = cfg_payload_len / cfg_cork; extra_len = cfg_payload_len - (cfg_cork * payload_len); do_setsockopt(fd, IPPROTO_UDP, UDP_CORK, 1); for (i = 0; i < cfg_cork; i++) { /* in mixed-frags mode, alternate zerocopy and copy frags * start with non-zerocopy, to ensure attach later works */ if (cfg_cork_mixed) do_zerocopy = (i & 1); msg->msg_iov[0].iov_len = payload_len + extra_len; extra_len = 0; do_sendmsg(fd, msg, do_zerocopy, (cfg_dst_addr.ss_family == AF_INET ? PF_INET : PF_INET6)); } do_setsockopt(fd, IPPROTO_UDP, UDP_CORK, 0); } static int setup_iph(struct iphdr *iph, uint16_t payload_len) { struct sockaddr_in *daddr = (void *) &cfg_dst_addr; struct sockaddr_in *saddr = (void *) &cfg_src_addr; memset(iph, 0, sizeof(*iph)); iph->version = 4; iph->tos = 0; iph->ihl = 5; iph->ttl = 2; iph->saddr = saddr->sin_addr.s_addr; iph->daddr = daddr->sin_addr.s_addr; iph->protocol = IPPROTO_EGP; iph->tot_len = htons(sizeof(*iph) + payload_len); iph->check = get_ip_csum((void *) iph, iph->ihl << 1); return sizeof(*iph); } static int setup_ip6h(struct ipv6hdr *ip6h, uint16_t payload_len) { struct sockaddr_in6 *daddr = (void *) &cfg_dst_addr; struct sockaddr_in6 *saddr = (void *) &cfg_src_addr; memset(ip6h, 0, sizeof(*ip6h)); ip6h->version = 6; ip6h->payload_len = htons(payload_len); ip6h->nexthdr = IPPROTO_EGP; ip6h->hop_limit = 2; ip6h->saddr = saddr->sin6_addr; ip6h->daddr = daddr->sin6_addr; return sizeof(*ip6h); } static void setup_sockaddr(int domain, const char *str_addr, struct sockaddr_storage *sockaddr) { struct sockaddr_in6 *addr6 = (void *) sockaddr; struct sockaddr_in *addr4 = (void *) sockaddr; switch (domain) { case PF_INET: memset(addr4, 0, sizeof(*addr4)); addr4->sin_family = AF_INET; addr4->sin_port = htons(cfg_port); if (str_addr && inet_pton(AF_INET, str_addr, &(addr4->sin_addr)) != 1) error(1, 0, "ipv4 parse error: %s", str_addr); break; case PF_INET6: memset(addr6, 0, sizeof(*addr6)); addr6->sin6_family = AF_INET6; addr6->sin6_port = htons(cfg_port); if (str_addr && inet_pton(AF_INET6, str_addr, &(addr6->sin6_addr)) != 1) error(1, 0, "ipv6 parse error: %s", str_addr); break; default: error(1, 0, "illegal domain"); } } static int do_setup_tx(int domain, int type, int protocol) { int fd; fd = socket(domain, type, protocol); if (fd == -1) error(1, errno, "socket t"); do_setsockopt(fd, SOL_SOCKET, SO_SNDBUF, 1 << 21); if (cfg_zerocopy) do_setsockopt(fd, SOL_SOCKET, SO_ZEROCOPY, 1); if (domain != PF_PACKET && domain != PF_RDS) if (connect(fd, (void *) &cfg_dst_addr, cfg_alen)) error(1, errno, "connect"); if (domain == PF_RDS) { if (bind(fd, (void *) &cfg_src_addr, cfg_alen)) error(1, errno, "bind"); } return fd; } static uint32_t do_process_zerocopy_cookies(struct rds_zcopy_cookies *ck) { int i; if (ck->num > RDS_MAX_ZCOOKIES) error(1, 0, "Returned %d cookies, max expected %d\n", ck->num, RDS_MAX_ZCOOKIES); for (i = 0; i < ck->num; i++) if (cfg_verbose >= 2) fprintf(stderr, "%d\n", ck->cookies[i]); return ck->num; } static bool do_recvmsg_completion(int fd) { char cmsgbuf[CMSG_SPACE(sizeof(struct rds_zcopy_cookies))]; struct rds_zcopy_cookies *ck; struct cmsghdr *cmsg; struct msghdr msg; bool ret = false; memset(&msg, 0, sizeof(msg)); msg.msg_control = cmsgbuf; msg.msg_controllen = sizeof(cmsgbuf); if (recvmsg(fd, &msg, MSG_DONTWAIT)) return ret; if (msg.msg_flags & MSG_CTRUNC) error(1, errno, "recvmsg notification: truncated"); for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { if (cmsg->cmsg_level == SOL_RDS && cmsg->cmsg_type == RDS_CMSG_ZCOPY_COMPLETION) { ck = (struct rds_zcopy_cookies *)CMSG_DATA(cmsg); completions += do_process_zerocopy_cookies(ck); ret = true; break; } error(0, 0, "ignoring cmsg at level %d type %d\n", cmsg->cmsg_level, cmsg->cmsg_type); } return ret; } static bool do_recv_completion(int fd, int domain) { struct sock_extended_err *serr; struct msghdr msg = {}; struct cmsghdr *cm; uint32_t hi, lo, range; int ret, zerocopy; char control[100]; if (domain == PF_RDS) return do_recvmsg_completion(fd); msg.msg_control = control; msg.msg_controllen = sizeof(control); ret = recvmsg(fd, &msg, MSG_ERRQUEUE); if (ret == -1 && errno == EAGAIN) return false; if (ret == -1) error(1, errno, "recvmsg notification"); if (msg.msg_flags & MSG_CTRUNC) error(1, errno, "recvmsg notification: truncated"); cm = CMSG_FIRSTHDR(&msg); if (!cm) error(1, 0, "cmsg: no cmsg"); if (!((cm->cmsg_level == SOL_IP && cm->cmsg_type == IP_RECVERR) || (cm->cmsg_level == SOL_IPV6 && cm->cmsg_type == IPV6_RECVERR) || (cm->cmsg_level == SOL_PACKET && cm->cmsg_type == PACKET_TX_TIMESTAMP))) error(1, 0, "serr: wrong type: %d.%d", cm->cmsg_level, cm->cmsg_type); serr = (void *) CMSG_DATA(cm); if (serr->ee_origin != SO_EE_ORIGIN_ZEROCOPY) error(1, 0, "serr: wrong origin: %u", serr->ee_origin); if (serr->ee_errno != 0) error(1, 0, "serr: wrong error code: %u", serr->ee_errno); hi = serr->ee_data; lo = serr->ee_info; range = hi - lo + 1; /* Detect notification gaps. These should not happen often, if at all. * Gaps can occur due to drops, reordering and retransmissions. */ if (lo != next_completion) fprintf(stderr, "gap: %u..%u does not append to %u\n", lo, hi, next_completion); next_completion = hi + 1; zerocopy = !(serr->ee_code & SO_EE_CODE_ZEROCOPY_COPIED); if (zerocopied == -1) zerocopied = zerocopy; else if (zerocopied != zerocopy) { fprintf(stderr, "serr: inconsistent\n"); zerocopied = zerocopy; } if (cfg_verbose >= 2) fprintf(stderr, "completed: %u (h=%u l=%u)\n", range, hi, lo); completions += range; return true; } /* Read all outstanding messages on the errqueue */ static void do_recv_completions(int fd, int domain) { while (do_recv_completion(fd, domain)) {} } /* Wait for all remaining completions on the errqueue */ static void do_recv_remaining_completions(int fd, int domain) { int64_t tstop = gettimeofday_ms() + cfg_waittime_ms; while (completions < expected_completions && gettimeofday_ms() < tstop) { if (do_poll(fd, domain == PF_RDS ? POLLIN : POLLERR)) do_recv_completions(fd, domain); } if (completions < expected_completions) fprintf(stderr, "missing notifications: %lu < %lu\n", completions, expected_completions); } static void do_tx(int domain, int type, int protocol) { struct iovec iov[3] = { {0} }; struct sockaddr_ll laddr; struct msghdr msg = {0}; struct ethhdr eth; union { struct ipv6hdr ip6h; struct iphdr iph; } nh; uint64_t tstop; int fd; fd = do_setup_tx(domain, type, protocol); if (domain == PF_PACKET) { uint16_t proto = cfg_family == PF_INET ? ETH_P_IP : ETH_P_IPV6; /* sock_raw passes ll header as data */ if (type == SOCK_RAW) { memset(eth.h_dest, 0x06, ETH_ALEN); memset(eth.h_source, 0x02, ETH_ALEN); eth.h_proto = htons(proto); iov[0].iov_base = ð iov[0].iov_len = sizeof(eth); msg.msg_iovlen++; } /* both sock_raw and sock_dgram expect name */ memset(&laddr, 0, sizeof(laddr)); laddr.sll_family = AF_PACKET; laddr.sll_ifindex = cfg_ifindex; laddr.sll_protocol = htons(proto); laddr.sll_halen = ETH_ALEN; memset(laddr.sll_addr, 0x06, ETH_ALEN); msg.msg_name = &laddr; msg.msg_namelen = sizeof(laddr); } /* packet and raw sockets with hdrincl must pass network header */ if (domain == PF_PACKET || protocol == IPPROTO_RAW) { if (cfg_family == PF_INET) iov[1].iov_len = setup_iph(&nh.iph, cfg_payload_len); else iov[1].iov_len = setup_ip6h(&nh.ip6h, cfg_payload_len); iov[1].iov_base = (void *) &nh; msg.msg_iovlen++; } if (domain == PF_RDS) { msg.msg_name = &cfg_dst_addr; msg.msg_namelen = (cfg_dst_addr.ss_family == AF_INET ? sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6)); } iov[2].iov_base = payload; iov[2].iov_len = cfg_payload_len; msg.msg_iovlen++; msg.msg_iov = &iov[3 - msg.msg_iovlen]; tstop = gettimeofday_ms() + cfg_runtime_ms; do { if (cfg_cork) do_sendmsg_corked(fd, &msg); else do_sendmsg(fd, &msg, cfg_zerocopy, domain); while (!do_poll(fd, POLLOUT)) { if (cfg_zerocopy) do_recv_completions(fd, domain); } } while (gettimeofday_ms() < tstop); if (cfg_zerocopy) do_recv_remaining_completions(fd, domain); if (close(fd)) error(1, errno, "close"); fprintf(stderr, "tx=%lu (%lu MB) txc=%lu zc=%c\n", packets, bytes >> 20, completions, zerocopied == 1 ? 'y' : 'n'); } static int do_setup_rx(int domain, int type, int protocol) { int fd; /* If tx over PF_PACKET, rx over PF_INET(6)/SOCK_RAW, * to recv the only copy of the packet, not a clone */ if (domain == PF_PACKET) error(1, 0, "Use PF_INET/SOCK_RAW to read"); if (type == SOCK_RAW && protocol == IPPROTO_RAW) error(1, 0, "IPPROTO_RAW: not supported on Rx"); fd = socket(domain, type, protocol); if (fd == -1) error(1, errno, "socket r"); do_setsockopt(fd, SOL_SOCKET, SO_RCVBUF, 1 << 21); do_setsockopt(fd, SOL_SOCKET, SO_RCVLOWAT, 1 << 16); do_setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, 1); if (bind(fd, (void *) &cfg_dst_addr, cfg_alen)) error(1, errno, "bind"); if (type == SOCK_STREAM) { if (listen(fd, 1)) error(1, errno, "listen"); fd = do_accept(fd); } return fd; } /* Flush all outstanding bytes for the tcp receive queue */ static void do_flush_tcp(int fd) { int ret; /* MSG_TRUNC flushes up to len bytes */ ret = recv(fd, NULL, 1 << 21, MSG_TRUNC | MSG_DONTWAIT); if (ret == -1 && errno == EAGAIN) return; if (ret == -1) error(1, errno, "flush"); if (!ret) return; packets++; bytes += ret; } /* Flush all outstanding datagrams. Verify first few bytes of each. */ static void do_flush_datagram(int fd, int type) { int ret, off = 0; char buf[64]; /* MSG_TRUNC will return full datagram length */ ret = recv(fd, buf, sizeof(buf), MSG_DONTWAIT | MSG_TRUNC); if (ret == -1 && errno == EAGAIN) return; /* raw ipv4 return with header, raw ipv6 without */ if (cfg_family == PF_INET && type == SOCK_RAW) { off += sizeof(struct iphdr); ret -= sizeof(struct iphdr); } if (ret == -1) error(1, errno, "recv"); if (ret != cfg_payload_len) error(1, 0, "recv: ret=%u != %u", ret, cfg_payload_len); if (ret > sizeof(buf) - off) ret = sizeof(buf) - off; if (memcmp(buf + off, payload, ret)) error(1, 0, "recv: data mismatch"); packets++; bytes += cfg_payload_len; } static void do_rx(int domain, int type, int protocol) { const int cfg_receiver_wait_ms = 400; uint64_t tstop; int fd; fd = do_setup_rx(domain, type, protocol); tstop = gettimeofday_ms() + cfg_runtime_ms + cfg_receiver_wait_ms; do { if (type == SOCK_STREAM) do_flush_tcp(fd); else do_flush_datagram(fd, type); do_poll(fd, POLLIN); } while (gettimeofday_ms() < tstop); if (close(fd)) error(1, errno, "close"); fprintf(stderr, "rx=%lu (%lu MB)\n", packets, bytes >> 20); } static void do_test(int domain, int type, int protocol) { int i; if (cfg_cork && (domain == PF_PACKET || type != SOCK_DGRAM)) error(1, 0, "can only cork udp sockets"); do_setcpu(cfg_cpu); for (i = 0; i < IP_MAXPACKET; i++) payload[i] = 'a' + (i % 26); if (cfg_rx) do_rx(domain, type, protocol); else do_tx(domain, type, protocol); } static void usage(const char *filepath) { error(1, 0, "Usage: %s [options] <test>", filepath); } static void parse_opts(int argc, char **argv) { const int max_payload_len = sizeof(payload) - sizeof(struct ipv6hdr) - sizeof(struct tcphdr) - 40 /* max tcp options */; int c; char *daddr = NULL, *saddr = NULL; char *cfg_test; cfg_payload_len = max_payload_len; while ((c = getopt(argc, argv, "46c:C:D:i:mp:rs:S:t:vz")) != -1) { switch (c) { case '4': if (cfg_family != PF_UNSPEC) error(1, 0, "Pass one of -4 or -6"); cfg_family = PF_INET; cfg_alen = sizeof(struct sockaddr_in); break; case '6': if (cfg_family != PF_UNSPEC) error(1, 0, "Pass one of -4 or -6"); cfg_family = PF_INET6; cfg_alen = sizeof(struct sockaddr_in6); break; case 'c': cfg_cork = strtol(optarg, NULL, 0); break; case 'C': cfg_cpu = strtol(optarg, NULL, 0); break; case 'D': daddr = optarg; break; case 'i': cfg_ifindex = if_nametoindex(optarg); if (cfg_ifindex == 0) error(1, errno, "invalid iface: %s", optarg); break; case 'm': cfg_cork_mixed = true; break; case 'p': cfg_port = strtoul(optarg, NULL, 0); break; case 'r': cfg_rx = true; break; case 's': cfg_payload_len = strtoul(optarg, NULL, 0); break; case 'S': saddr = optarg; break; case 't': cfg_runtime_ms = 200 + strtoul(optarg, NULL, 10) * 1000; break; case 'v': cfg_verbose++; break; case 'z': cfg_zerocopy = true; break; } } cfg_test = argv[argc - 1]; if (strcmp(cfg_test, "rds") == 0) { if (!daddr) error(1, 0, "-D <server addr> required for PF_RDS\n"); if (!cfg_rx && !saddr) error(1, 0, "-S <client addr> required for PF_RDS\n"); } setup_sockaddr(cfg_family, daddr, &cfg_dst_addr); setup_sockaddr(cfg_family, saddr, &cfg_src_addr); if (cfg_payload_len > max_payload_len) error(1, 0, "-s: payload exceeds max (%d)", max_payload_len); if (cfg_cork_mixed && (!cfg_zerocopy || !cfg_cork)) error(1, 0, "-m: cork_mixed requires corking and zerocopy"); if (optind != argc - 1) usage(argv[0]); } int main(int argc, char **argv) { const char *cfg_test; parse_opts(argc, argv); cfg_test = argv[argc - 1]; if (!strcmp(cfg_test, "packet")) do_test(PF_PACKET, SOCK_RAW, 0); else if (!strcmp(cfg_test, "packet_dgram")) do_test(PF_PACKET, SOCK_DGRAM, 0); else if (!strcmp(cfg_test, "raw")) do_test(cfg_family, SOCK_RAW, IPPROTO_EGP); else if (!strcmp(cfg_test, "raw_hdrincl")) do_test(cfg_family, SOCK_RAW, IPPROTO_RAW); else if (!strcmp(cfg_test, "tcp")) do_test(cfg_family, SOCK_STREAM, 0); else if (!strcmp(cfg_test, "udp")) do_test(cfg_family, SOCK_DGRAM, 0); else if (!strcmp(cfg_test, "rds")) do_test(PF_RDS, SOCK_SEQPACKET, 0); else error(1, 0, "unknown cfg_test %s", cfg_test); return 0; }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1