xref: /freebsd/sys/tests/fib_lookup/fib_lookup.c (revision 924226fba12cc9a228c73b956e1b7fa24c60b055)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2020 Alexander V. Chernikov
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25  * SUCH DAMAGE.
26  */
27 
28 #include <sys/cdefs.h>
29 __FBSDID("$FreeBSD$");
30 #include "opt_inet.h"
31 #include "opt_inet6.h"
32 
33 #include <sys/param.h>
34 #include <sys/kernel.h>
35 #include <sys/lock.h>
36 #include <sys/rmlock.h>
37 #include <sys/malloc.h>
38 #include <sys/module.h>
39 #include <sys/kernel.h>
40 #include <sys/socket.h>
41 #include <sys/sysctl.h>
42 #include <net/vnet.h>
43 
44 #include <net/if.h>
45 #include <net/if_var.h>
46 
47 #include <netinet/in.h>
48 #include <netinet/in_fib.h>
49 #include <netinet/ip.h>
50 
51 #include <netinet6/in6_fib.h>
52 
53 #include <net/route.h>
54 #include <net/route/nhop.h>
55 #include <net/route/route_ctl.h>
56 #include <net/route/route_var.h>
57 #include <net/route/fib_algo.h>
58 
59 #define	CHUNK_SIZE	10000
60 
61 VNET_DEFINE_STATIC(struct in_addr *, inet_addr_list);
62 #define	V_inet_addr_list	VNET(inet_addr_list)
63 VNET_DEFINE_STATIC(int, inet_list_size);
64 #define	V_inet_list_size	VNET(inet_list_size)
65 
66 VNET_DEFINE_STATIC(struct in6_addr *, inet6_addr_list);
67 #define	V_inet6_addr_list	VNET(inet6_addr_list)
68 VNET_DEFINE_STATIC(int, inet6_list_size);
69 #define	V_inet6_list_size	VNET(inet6_list_size)
70 
71 SYSCTL_DECL(_net_route);
72 SYSCTL_NODE(_net_route, OID_AUTO, test, CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
73     "Route algorithm lookups");
74 
75 static int
76 add_addr(int family, char *addr_str)
77 {
78 
79 	if (family == AF_INET) {
80 		struct in_addr *paddr_old = V_inet_addr_list;
81 		int size_old = V_inet_list_size;
82 		struct in_addr addr;
83 
84 		if (inet_pton(AF_INET, addr_str, &addr) != 1)
85 			return (EINVAL);
86 
87 		struct in_addr *paddr = mallocarray(size_old + 1,
88 		    sizeof(struct in_addr), M_TEMP, M_ZERO | M_WAITOK);
89 
90 		if (paddr_old != NULL) {
91 			memcpy(paddr, paddr_old, size_old * sizeof(struct in_addr));
92 			free(paddr_old, M_TEMP);
93 		}
94 		paddr[size_old] = addr;
95 
96 		V_inet_addr_list = paddr;
97 		V_inet_list_size = size_old + 1;
98 		inet_ntop(AF_INET, &addr, addr_str, sizeof(addr_str));
99 	} else if (family == AF_INET6) {
100 		struct in6_addr *paddr_old = V_inet6_addr_list;
101 		int size_old = V_inet6_list_size;
102 		struct in6_addr addr6;
103 
104 		if (inet_pton(AF_INET6, addr_str, &addr6) != 1)
105 			return (EINVAL);
106 
107 		struct in6_addr *paddr = mallocarray(size_old + 1,
108 		    sizeof(struct in6_addr), M_TEMP, M_ZERO | M_WAITOK);
109 
110 		if (paddr_old != NULL) {
111 			memcpy(paddr, paddr_old, size_old * sizeof(struct in6_addr));
112 			free(paddr_old, M_TEMP);
113 		}
114 		paddr[size_old] = addr6;
115 
116 		V_inet6_addr_list = paddr;
117 		V_inet6_list_size = size_old + 1;
118 		inet_ntop(AF_INET6, &addr6, addr_str, sizeof(addr_str));
119 	}
120 
121 	return (0);
122 }
123 
124 static int
125 add_addr_sysctl_handler(struct sysctl_oid *oidp, struct sysctl_req *req, int family)
126 {
127 	char addr_str[INET6_ADDRSTRLEN];
128 	int error;
129 
130 	bzero(addr_str, sizeof(addr_str));
131 
132 	error = sysctl_handle_string(oidp, addr_str, sizeof(addr_str), req);
133 	if (error != 0 || req->newptr == NULL)
134 		return (error);
135 
136 	error = add_addr(family, addr_str);
137 
138 	return (0);
139 }
140 
141 static int
142 add_inet_addr_sysctl_handler(SYSCTL_HANDLER_ARGS)
143 {
144 
145 	return (add_addr_sysctl_handler(oidp, req, AF_INET));
146 }
147 SYSCTL_PROC(_net_route_test, OID_AUTO, add_inet_addr,
148     CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_MPSAFE, NULL, 0,
149     add_inet_addr_sysctl_handler, "A", "Set");
150 
151 static int
152 add_inet6_addr_sysctl_handler(SYSCTL_HANDLER_ARGS)
153 {
154 
155 	return (add_addr_sysctl_handler(oidp, req, AF_INET6));
156 }
157 SYSCTL_PROC(_net_route_test, OID_AUTO, add_inet6_addr,
158     CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_MPSAFE, NULL, 0,
159     add_inet6_addr_sysctl_handler, "A", "Set");
160 
161 static uint64_t
162 run_test_inet_one_pass(uint32_t fibnum)
163 {
164 	/* Assume epoch */
165 	int sz = V_inet_list_size;
166 	int tries = CHUNK_SIZE / sz;
167 	const struct in_addr *a = V_inet_addr_list;
168 	uint64_t count = 0;
169 
170 	for (int pass = 0; pass < tries; pass++) {
171 		for (int i = 0; i < sz; i++) {
172 			fib4_lookup(fibnum, a[i], 0, NHR_NONE, 0);
173 			count++;
174 		}
175 	}
176 	return (count);
177 }
178 
179 static int
180 run_test_inet(SYSCTL_HANDLER_ARGS)
181 {
182 	struct epoch_tracker et;
183 
184 	int count = 0;
185 	int error = sysctl_handle_int(oidp, &count, 0, req);
186 	if (error != 0)
187 		return (error);
188 
189 	if (count == 0)
190 		return (0);
191 
192 	if (V_inet_list_size <= 0)
193 		return (ENOENT);
194 
195 	printf("run: %d packets vnet %p\n", count, curvnet);
196 	if (count < CHUNK_SIZE)
197 		count = CHUNK_SIZE;
198 
199 	struct timespec ts_pre, ts_post;
200 	int64_t pass_diff, total_diff = 0;
201 	uint64_t pass_packets, total_packets = 0;
202 	uint32_t fibnum = curthread->td_proc->p_fibnum;
203 
204 	for (int pass = 0; pass < count / CHUNK_SIZE; pass++) {
205 		NET_EPOCH_ENTER(et);
206 		nanouptime(&ts_pre);
207 		pass_packets = run_test_inet_one_pass(fibnum);
208 		nanouptime(&ts_post);
209 		NET_EPOCH_EXIT(et);
210 
211 		pass_diff = (ts_post.tv_sec - ts_pre.tv_sec) * 1000000000 +
212 		    (ts_post.tv_nsec - ts_pre.tv_nsec);
213 		total_diff += pass_diff;
214 		total_packets += pass_packets;
215 	}
216 
217 	printf("%zu packets in %zu nanoseconds, %zu pps\n",
218 	    total_packets, total_diff, total_packets * 1000000000 / total_diff);
219 
220 	return (0);
221 }
222 SYSCTL_PROC(_net_route_test, OID_AUTO, run_inet,
223     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
224     0, 0, run_test_inet, "I", "Execute fib4_lookup test");
225 
226 static uint64_t
227 run_test_inet6_one_pass(uint32_t fibnum)
228 {
229 	/* Assume epoch */
230 	int sz = V_inet6_list_size;
231 	int tries = CHUNK_SIZE / sz;
232 	const struct in6_addr *a = V_inet6_addr_list;
233 	uint64_t count = 0;
234 
235 	for (int pass = 0; pass < tries; pass++) {
236 		for (int i = 0; i < sz; i++) {
237 			fib6_lookup(fibnum, &a[i], 0, NHR_NONE, 0);
238 			count++;
239 		}
240 	}
241 	return (count);
242 }
243 
244 static int
245 run_test_inet6(SYSCTL_HANDLER_ARGS)
246 {
247 	struct epoch_tracker et;
248 
249 	int count = 0;
250 	int error = sysctl_handle_int(oidp, &count, 0, req);
251 	if (error != 0)
252 		return (error);
253 
254 	if (count == 0)
255 		return (0);
256 
257 	if (V_inet6_list_size <= 0)
258 		return (ENOENT);
259 
260 	printf("run: %d packets vnet %p\n", count, curvnet);
261 	if (count < CHUNK_SIZE)
262 		count = CHUNK_SIZE;
263 
264 	struct timespec ts_pre, ts_post;
265 	int64_t pass_diff, total_diff = 0;
266 	uint64_t pass_packets, total_packets = 0;
267 	uint32_t fibnum = curthread->td_proc->p_fibnum;
268 
269 	for (int pass = 0; pass < count / CHUNK_SIZE; pass++) {
270 		NET_EPOCH_ENTER(et);
271 		nanouptime(&ts_pre);
272 		pass_packets = run_test_inet6_one_pass(fibnum);
273 		nanouptime(&ts_post);
274 		NET_EPOCH_EXIT(et);
275 
276 		pass_diff = (ts_post.tv_sec - ts_pre.tv_sec) * 1000000000 +
277 		    (ts_post.tv_nsec - ts_pre.tv_nsec);
278 		total_diff += pass_diff;
279 		total_packets += pass_packets;
280 	}
281 
282 	printf("%zu packets in %zu nanoseconds, %zu pps\n",
283 	    total_packets, total_diff, total_packets * 1000000000 / total_diff);
284 
285 	return (0);
286 }
287 SYSCTL_PROC(_net_route_test, OID_AUTO, run_inet6,
288     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
289     0, 0, run_test_inet6, "I", "Execute fib6_lookup test");
290 
291 static bool
292 cmp_dst(uint32_t fibnum, struct in_addr a)
293 {
294 	struct nhop_object *nh_fib;
295 	struct rtentry *rt;
296 	struct route_nhop_data rnd = {};
297 
298 	nh_fib = fib4_lookup(fibnum, a, 0, NHR_NONE, 0);
299 	rt = fib4_lookup_rt(fibnum, a, 0, NHR_NONE, &rnd);
300 
301 	if (nh_fib == NULL && rt == NULL) {
302 		return (true);
303 	} else if (nh_fib == nhop_select(rnd.rnd_nhop, 0)) {
304 		return (true);
305 	}
306 
307 	struct in_addr dst;
308 	int plen;
309 	uint32_t scopeid;
310 	char key_str[INET_ADDRSTRLEN], dst_str[INET_ADDRSTRLEN];
311 
312 	inet_ntop(AF_INET, &a, key_str, sizeof(key_str));
313 	if (rnd.rnd_nhop == NULL) {
314 		printf("[RT BUG] lookup for %s: RIB: ENOENT FIB: nh=%u\n",
315 		    key_str, nhop_get_idx(nh_fib));
316 	} else {
317 		rt_get_inet_prefix_plen(rt, &dst, &plen, &scopeid);
318 		inet_ntop(AF_INET, &dst, dst_str, sizeof(dst_str));
319 		printf("[RT BUG] lookup for %s: RIB: %s/%d,nh=%u FIB: nh=%u\n",
320 		    key_str, dst_str, plen,
321 		    nhop_get_idx(nhop_select(rnd.rnd_nhop, 0)),
322 		    nh_fib ? nhop_get_idx(nh_fib) : 0);
323 	}
324 
325 	return (false);
326 }
327 
328 static bool
329 cmp_dst6(uint32_t fibnum, const struct in6_addr *a)
330 {
331 	struct nhop_object *nh_fib;
332 	struct rtentry *rt;
333 	struct route_nhop_data rnd = {};
334 
335 	nh_fib = fib6_lookup(fibnum, a, 0, NHR_NONE, 0);
336 	rt = fib6_lookup_rt(fibnum, a, 0, NHR_NONE, &rnd);
337 
338 	if (nh_fib == NULL && rt == NULL) {
339 		return (true);
340 	} else if (nh_fib == nhop_select(rnd.rnd_nhop, 0)) {
341 		return (true);
342 	}
343 
344 	struct in6_addr dst;
345 	int plen;
346 	uint32_t scopeid;
347 	char key_str[INET6_ADDRSTRLEN], dst_str[INET6_ADDRSTRLEN];
348 
349 	inet_ntop(AF_INET6, a, key_str, sizeof(key_str));
350 	if (rnd.rnd_nhop == NULL) {
351 		printf("[RT BUG] lookup for %s: RIB: ENOENT FIB: nh=%u\n",
352 		    key_str, nhop_get_idx(nh_fib));
353 	} else {
354 		rt_get_inet6_prefix_plen(rt, &dst, &plen, &scopeid);
355 		inet_ntop(AF_INET6, &dst, dst_str, sizeof(dst_str));
356 		printf("[RT BUG] lookup for %s: RIB: %s/%d,nh=%u FIB: nh=%u\n",
357 		    key_str, dst_str, plen,
358 		    nhop_get_idx(nhop_select(rnd.rnd_nhop, 0)),
359 		    nh_fib ? nhop_get_idx(nh_fib) : 0);
360 	}
361 
362 	return (false);
363 }
364 
365 /* Random lookups: correctness verification */
366 static uint64_t
367 run_test_inet_one_pass_random(uint32_t fibnum)
368 {
369 	/* Assume epoch */
370 	struct in_addr a[64];
371 	int sz = 64;
372 	uint64_t count = 0;
373 
374 	for (int pass = 0; pass < CHUNK_SIZE / sz; pass++) {
375 		arc4random_buf(a, sizeof(a));
376 		for (int i = 0; i < sz; i++) {
377 			if (!cmp_dst(fibnum, a[i]))
378 				return (0);
379 			count++;
380 		}
381 	}
382 	return (count);
383 }
384 
385 static int
386 run_test_inet_random(SYSCTL_HANDLER_ARGS)
387 {
388 	struct epoch_tracker et;
389 
390 	int count = 0;
391 	int error = sysctl_handle_int(oidp, &count, 0, req);
392 	if (error != 0)
393 		return (error);
394 
395 	if (count == 0)
396 		return (0);
397 
398 	if (count < CHUNK_SIZE)
399 		count = CHUNK_SIZE;
400 
401 	struct timespec ts_pre, ts_post;
402 	int64_t pass_diff, total_diff = 1;
403 	uint64_t pass_packets, total_packets = 0;
404 	uint32_t fibnum = curthread->td_proc->p_fibnum;
405 
406 	for (int pass = 0; pass < count / CHUNK_SIZE; pass++) {
407 		NET_EPOCH_ENTER(et);
408 		nanouptime(&ts_pre);
409 		pass_packets = run_test_inet_one_pass_random(fibnum);
410 		nanouptime(&ts_post);
411 		NET_EPOCH_EXIT(et);
412 
413 		pass_diff = (ts_post.tv_sec - ts_pre.tv_sec) * 1000000000 +
414 		    (ts_post.tv_nsec - ts_pre.tv_nsec);
415 		total_diff += pass_diff;
416 		total_packets += pass_packets;
417 
418 		if (pass_packets == 0)
419 			break;
420 	}
421 
422 	/* Signal error to userland */
423 	if (pass_packets == 0)
424 		return (EINVAL);
425 
426 	printf("%zu packets in %zu nanoseconds, %zu pps\n",
427 	    total_packets, total_diff, total_packets * 1000000000 / total_diff);
428 
429 	return (0);
430 }
431 SYSCTL_PROC(_net_route_test, OID_AUTO, run_inet_random,
432     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
433     0, 0, run_test_inet_random, "I", "Execute fib4_lookup random check tests");
434 
435 
436 struct inet_array {
437 	uint32_t alloc_items;
438 	uint32_t num_items;
439 	uint32_t rnh_prefixes;
440 	int error;
441 	struct in_addr *arr;
442 };
443 
444 /*
445  * For each prefix, add the following records to the lookup array:
446  * * prefix-1, prefix, prefix + 1, prefix_end, prefix_end + 1
447  */
448 static int
449 add_prefix(struct rtentry *rt, void *_data)
450 {
451 	struct inet_array *pa = (struct inet_array *)_data;
452 	struct in_addr addr;
453 	int plen;
454 	uint32_t scopeid, haddr;
455 
456 	pa->rnh_prefixes++;
457 
458 	if (pa->num_items + 5 >= pa->alloc_items) {
459 		if (pa->error == 0)
460 			pa->error = ENOSPC;
461 		return (0);
462 	}
463 
464 	rt_get_inet_prefix_plen(rt, &addr, &plen, &scopeid);
465 
466 	pa->arr[pa->num_items++] = addr;
467 	haddr = ntohl(addr.s_addr);
468 	if (haddr > 0) {
469 		pa->arr[pa->num_items++].s_addr = htonl(haddr - 1);
470 		pa->arr[pa->num_items++].s_addr = htonl(haddr + 1);
471 		/* assume mask != 0 */
472 		uint32_t mlen = (1 << (32 - plen)) - 1;
473 		pa->arr[pa->num_items++].s_addr = htonl(haddr + mlen);
474 		/* can overflow, but who cares */
475 		pa->arr[pa->num_items++].s_addr = htonl(haddr + mlen + 1);
476 	}
477 
478 	return (0);
479 }
480 
481 static bool
482 prepare_list(uint32_t fibnum, struct inet_array *pa)
483 {
484 	struct rib_head *rh;
485 
486 	rh = rt_tables_get_rnh(fibnum, AF_INET);
487 
488 	uint32_t num_prefixes = rh->rnh_prefixes;
489 	bzero(pa, sizeof(struct inet_array));
490 	pa->alloc_items = (num_prefixes + 10) * 5;
491 	pa->arr = mallocarray(pa->alloc_items, sizeof(struct in_addr),
492 	    M_TEMP, M_ZERO | M_WAITOK);
493 
494 	rib_walk(fibnum, AF_INET, false, add_prefix, pa);
495 
496 	if (pa->error != 0) {
497 		printf("prefixes: old: %u, current: %u, walked: %u, allocated: %u\n",
498 		    num_prefixes, rh->rnh_prefixes, pa->rnh_prefixes, pa->alloc_items);
499 	}
500 
501 	return (pa->error == 0);
502 }
503 
504 static int
505 run_test_inet_scan(SYSCTL_HANDLER_ARGS)
506 {
507 	struct epoch_tracker et;
508 
509 	int count = 0;
510 	int error = sysctl_handle_int(oidp, &count, 0, req);
511 	if (error != 0)
512 		return (error);
513 
514 	if (count == 0)
515 		return (0);
516 
517 	struct inet_array pa = {};
518 	uint32_t fibnum = curthread->td_proc->p_fibnum;
519 
520 	if (!prepare_list(fibnum, &pa))
521 		return (pa.error);
522 
523 	struct timespec ts_pre, ts_post;
524 	int64_t total_diff = 1;
525 	uint64_t total_packets = 0;
526 	int failure_count = 0;
527 
528 	NET_EPOCH_ENTER(et);
529 	nanouptime(&ts_pre);
530 	for (int i = 0; i < pa.num_items; i++) {
531 		if (!cmp_dst(fibnum, pa.arr[i])) {
532 			failure_count++;
533 		}
534 		total_packets++;
535 	}
536 	nanouptime(&ts_post);
537 	NET_EPOCH_EXIT(et);
538 
539 	if (pa.arr != NULL)
540 		free(pa.arr, M_TEMP);
541 
542 	/* Signal error to userland */
543 	if (failure_count > 0) {
544 		printf("[RT ERROR] total failures: %d\n", failure_count);
545 		return (EINVAL);
546 	}
547 
548 	total_diff = (ts_post.tv_sec - ts_pre.tv_sec) * 1000000000 +
549 	    (ts_post.tv_nsec - ts_pre.tv_nsec);
550 	printf("%zu packets in %zu nanoseconds, %zu pps\n",
551 	    total_packets, total_diff, total_packets * 1000000000 / total_diff);
552 
553 	return (0);
554 }
555 SYSCTL_PROC(_net_route_test, OID_AUTO, run_inet_scan,
556     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
557     0, 0, run_test_inet_scan, "I", "Execute fib4_lookup scan tests");
558 
559 struct inet6_array {
560 	uint32_t alloc_items;
561 	uint32_t num_items;
562 	uint32_t rnh_prefixes;
563 	int error;
564 	struct in6_addr *arr;
565 };
566 
567 static bool
568 safe_add(uint32_t *v, uint32_t inc)
569 {
570 	if (*v < (UINT32_MAX - inc)) {
571 		*v += inc;
572 		return (true);
573 	} else {
574 		*v -= (UINT32_MAX - inc + 1);
575 		return (false);
576 	}
577 }
578 
579 static bool
580 safe_dec(uint32_t *v, uint32_t inc)
581 {
582 	if (*v >= inc) {
583 		*v -= inc;
584 		return (true);
585 	} else {
586 		*v += (UINT32_MAX - inc + 1);
587 		return (false);
588 	}
589 }
590 
591 static void
592 inc_prefix6(struct in6_addr *addr, int inc)
593 {
594 	for (int i = 0; i < 4; i++) {
595 		uint32_t v = ntohl(addr->s6_addr32[3 - i]);
596 		bool ret = safe_add(&v, inc);
597 		addr->s6_addr32[3 - i] = htonl(v);
598 		if (ret)
599 			return;
600 		inc = 1;
601 	}
602 }
603 
604 static void
605 dec_prefix6(struct in6_addr *addr, int dec)
606 {
607 	for (int i = 0; i < 4; i++) {
608 		uint32_t v = ntohl(addr->s6_addr32[3 - i]);
609 		bool ret = safe_dec(&v, dec);
610 		addr->s6_addr32[3 - i] = htonl(v);
611 		if (ret)
612 			return;
613 		dec = 1;
614 	}
615 }
616 
617 static void
618 ipv6_writemask(struct in6_addr *addr6, uint8_t mask)
619 {
620 	uint32_t *cp;
621 
622 	for (cp = (uint32_t *)addr6; mask >= 32; mask -= 32)
623 		*cp++ = 0xFFFFFFFF;
624 	if (mask > 0)
625 		*cp = htonl(mask ? ~((1 << (32 - mask)) - 1) : 0);
626 }
627 
628 /*
629  * For each prefix, add the following records to the lookup array:
630  * * prefix-1, prefix, prefix + 1, prefix_end, prefix_end + 1
631  */
632 static int
633 add_prefix6(struct rtentry *rt, void *_data)
634 {
635 	struct inet6_array *pa = (struct inet6_array *)_data;
636 	struct in6_addr addr, naddr;
637 	int plen;
638 	uint32_t scopeid;
639 
640 	pa->rnh_prefixes++;
641 
642 	if (pa->num_items + 5 >= pa->alloc_items) {
643 		if (pa->error == 0)
644 			pa->error = ENOSPC;
645 		return (0);
646 	}
647 
648 	rt_get_inet6_prefix_plen(rt, &addr, &plen, &scopeid);
649 
650 	pa->arr[pa->num_items++] = addr;
651 	if (!IN6_ARE_ADDR_EQUAL(&addr, &in6addr_any)) {
652 		naddr = addr;
653 		dec_prefix6(&naddr, 1);
654 		pa->arr[pa->num_items++] = naddr;
655 		naddr = addr;
656 		inc_prefix6(&naddr, 1);
657 		pa->arr[pa->num_items++] = naddr;
658 
659 		/* assume mask != 0 */
660 		struct in6_addr mask6;
661 		ipv6_writemask(&mask6, plen);
662 		naddr = addr;
663 		for (int i = 0; i < 3; i++)
664 			naddr.s6_addr32[i] = htonl(ntohl(naddr.s6_addr32[i]) | ~ntohl(mask6.s6_addr32[i]));
665 
666 		pa->arr[pa->num_items++] = naddr;
667 		inc_prefix6(&naddr, 1);
668 		pa->arr[pa->num_items++] = naddr;
669 	}
670 
671 	return (0);
672 }
673 
674 static bool
675 prepare_list6(uint32_t fibnum, struct inet6_array *pa)
676 {
677 	struct rib_head *rh;
678 
679 	rh = rt_tables_get_rnh(fibnum, AF_INET6);
680 
681 	uint32_t num_prefixes = rh->rnh_prefixes;
682 	bzero(pa, sizeof(struct inet6_array));
683 	pa->alloc_items = (num_prefixes + 10) * 5;
684 	pa->arr = mallocarray(pa->alloc_items, sizeof(struct in6_addr),
685 	    M_TEMP, M_ZERO | M_WAITOK);
686 
687 	rib_walk(fibnum, AF_INET6, false, add_prefix6, pa);
688 
689 	if (pa->error != 0) {
690 		printf("prefixes: old: %u, current: %u, walked: %u, allocated: %u\n",
691 		    num_prefixes, rh->rnh_prefixes, pa->rnh_prefixes, pa->alloc_items);
692 	}
693 
694 	return (pa->error == 0);
695 }
696 
697 static int
698 run_test_inet6_scan(SYSCTL_HANDLER_ARGS)
699 {
700 	struct epoch_tracker et;
701 
702 	int count = 0;
703 	int error = sysctl_handle_int(oidp, &count, 0, req);
704 	if (error != 0)
705 		return (error);
706 
707 	if (count == 0)
708 		return (0);
709 
710 	struct inet6_array pa = {};
711 	uint32_t fibnum = curthread->td_proc->p_fibnum;
712 
713 	if (!prepare_list6(fibnum, &pa))
714 		return (pa.error);
715 
716 	struct timespec ts_pre, ts_post;
717 	int64_t total_diff = 1;
718 	uint64_t total_packets = 0;
719 	int failure_count = 0;
720 
721 	NET_EPOCH_ENTER(et);
722 	nanouptime(&ts_pre);
723 	for (int i = 0; i < pa.num_items; i++) {
724 		if (!cmp_dst6(fibnum, &pa.arr[i])) {
725 			failure_count++;
726 		}
727 		total_packets++;
728 	}
729 	nanouptime(&ts_post);
730 	NET_EPOCH_EXIT(et);
731 
732 	if (pa.arr != NULL)
733 		free(pa.arr, M_TEMP);
734 
735 	/* Signal error to userland */
736 	if (failure_count > 0) {
737 		printf("[RT ERROR] total failures: %d\n", failure_count);
738 		return (EINVAL);
739 	}
740 
741 	total_diff = (ts_post.tv_sec - ts_pre.tv_sec) * 1000000000 +
742 	    (ts_post.tv_nsec - ts_pre.tv_nsec);
743 	printf("%zu packets in %zu nanoseconds, %zu pps\n",
744 	    total_packets, total_diff, total_packets * 1000000000 / total_diff);
745 
746 	return (0);
747 }
748 SYSCTL_PROC(_net_route_test, OID_AUTO, run_inet6_scan,
749     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
750     0, 0, run_test_inet6_scan, "I", "Execute fib6_lookup scan tests");
751 
752 #define	LPS_SEQ		0x1
753 #define	LPS_ANN		0x2
754 #define	LPS_REP		0x4
755 
756 struct lps_walk_state {
757 	uint32_t *keys;
758 	int pos;
759 	int lim;
760 };
761 
762 static int
763 reduce_keys(struct rtentry *rt, void *_data)
764 {
765         struct lps_walk_state *wa = (struct lps_walk_state *) _data;
766 	struct in_addr addr;
767 	uint32_t scopeid;
768 	int plen;
769 
770 	rt_get_inet_prefix_plen(rt, &addr, &plen, &scopeid);
771 	wa->keys[wa->pos] = ntohl(addr.s_addr) |
772 	    (wa->keys[wa->pos] & ~(0xffffffffU << (32 - plen)));
773 
774 	wa->pos++;
775 	return (wa->pos == wa->lim);
776 }
777 
778 static int
779 rnd_lps(SYSCTL_HANDLER_ARGS)
780 {
781 	struct epoch_tracker et;
782 	struct in_addr key;
783 	struct lps_walk_state wa;
784 	struct timespec ts_pre, ts_post;
785 	struct nhop_object *nh_fib;
786 	uint64_t total_diff, lps;
787 	uint32_t *keys, fibnum;
788 	uint32_t t, p;
789 	uintptr_t acc = 0;
790 	int i, pos, count = 0;
791 	int seq = 0, rep = 0;
792 	int error;
793 
794 	error = sysctl_handle_int(oidp, &count, 0, req);
795 	if (error != 0)
796 		return (error);
797 	if (count <= 0)
798 		return (0);
799 	fibnum = curthread->td_proc->p_fibnum;
800 
801 	keys = malloc(sizeof(*keys) * count, M_TEMP, M_NOWAIT);
802 	if (keys == NULL)
803 		return (ENOMEM);
804 	printf("Preparing %d random keys...\n", count);
805 	arc4random_buf(keys, sizeof(*keys) * count);
806 	if (arg2 & LPS_ANN) {
807 		wa.keys = keys;
808 		wa.pos = 0;
809 		wa.lim = count;
810 		printf("Reducing keys to announced address space...\n");
811 		do {
812 			rib_walk(fibnum, AF_INET, false, reduce_keys,
813 			    &wa);
814 		} while (wa.pos < wa.lim);
815 		printf("Reshuffling keys...\n");
816 		for (int i = 0; i < count; i++) {
817 			p = random() % count;
818 			t = keys[p];
819 			keys[p] = keys[i];
820 			keys[i] = t;
821 		}
822 	}
823 
824 	if (arg2 & LPS_REP) {
825 		rep = 1;
826 		printf("REP ");
827 	}
828 	if (arg2 & LPS_SEQ) {
829 		seq = 1;
830 		printf("SEQ");
831 	} else if (arg2 & LPS_ANN)
832 		printf("ANN");
833 	else
834 		printf("RND");
835 	printf(" LPS test starting...\n");
836 
837 	NET_EPOCH_ENTER(et);
838 	nanouptime(&ts_pre);
839 	for (i = 0, pos = 0; i < count; i++) {
840 		key.s_addr = keys[pos++] ^ ((acc >> 10) & 0xff);
841 		nh_fib = fib4_lookup(fibnum, key, 0, NHR_NONE, 0);
842 		if (seq) {
843 			if (nh_fib != NULL) {
844 				acc += (uintptr_t) nh_fib + 123;
845 				if (acc & 0x1000)
846 					acc += (uintptr_t) nh_fib->nh_ifp;
847 				else
848 					acc -= (uintptr_t) nh_fib->nh_ifp;
849 			} else
850 				acc ^= (acc >> 3) + (acc << 2) + i;
851 			if (acc & 0x800)
852 				pos++;
853 			if (pos >= count)
854 				pos = 0;
855 		}
856 		if (rep && ((i & 0xf) == 0xf)) {
857 			pos -= 0xf;
858 			if (pos < 0)
859 				pos += 0xf;
860 		}
861 	}
862 	nanouptime(&ts_post);
863 	NET_EPOCH_EXIT(et);
864 
865 	free(keys, M_TEMP);
866 
867 	total_diff = (ts_post.tv_sec - ts_pre.tv_sec) * 1000000000 +
868 	    (ts_post.tv_nsec - ts_pre.tv_nsec);
869 	lps = 1000000000ULL * count / total_diff;
870 	printf("%d lookups in %zu.%06zu milliseconds, %lu.%06lu MLPS\n",
871 	    count, total_diff / 1000000, total_diff % 1000000,
872 	    lps / 1000000, lps % 1000000);
873 
874 	return (0);
875 }
876 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_rnd,
877     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
878     0, 0, rnd_lps, "I",
879     "Measure lookups per second, uniformly random keys, independent lookups");
880 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_rnd_ann,
881     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
882     0, LPS_ANN, rnd_lps, "I",
883     "Measure lookups per second, random keys from announced address space, "
884     "independent lookups");
885 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_seq,
886     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
887     0, LPS_SEQ, rnd_lps, "I",
888     "Measure lookups per second, uniformly random keys, "
889     "artificial dependencies between lookups");
890 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_seq_ann,
891     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
892     0, LPS_SEQ | LPS_ANN, rnd_lps, "I",
893     "Measure lookups per second, random keys from announced address space, "
894     "artificial dependencies between lookups");
895 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_rnd_rep,
896     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
897     0, LPS_REP, rnd_lps, "I",
898     "Measure lookups per second, uniformly random keys, independent lookups, "
899     "repeated keys");
900 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_rnd_ann_rep,
901     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
902     0, LPS_ANN | LPS_REP, rnd_lps, "I",
903     "Measure lookups per second, random keys from announced address space, "
904     "independent lookups, repeated keys");
905 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_seq_rep,
906     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
907     0, LPS_SEQ | LPS_REP, rnd_lps, "I",
908     "Measure lookups per second, uniformly random keys, "
909     "artificial dependencies between lookups, repeated keys");
910 SYSCTL_PROC(_net_route_test, OID_AUTO, run_lps_seq_ann_rep,
911     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
912     0, LPS_SEQ | LPS_ANN | LPS_REP, rnd_lps, "I",
913     "Measure lookups per second, random keys from announced address space, "
914     "artificial dependencies between lookups, repeated keys");
915 
916 static int
917 test_fib_lookup_modevent(module_t mod, int type, void *unused)
918 {
919 	int error = 0;
920 
921 	switch (type) {
922 	case MOD_LOAD:
923 		break;
924 	case MOD_UNLOAD:
925 		if (V_inet_addr_list != NULL)
926 			free(V_inet_addr_list, M_TEMP);
927 		if (V_inet6_addr_list != NULL)
928 			free(V_inet6_addr_list, M_TEMP);
929 		break;
930 	default:
931 		error = EOPNOTSUPP;
932 		break;
933 	}
934 	return (error);
935 }
936 
937 static moduledata_t testfiblookupmod = {
938         "test_fib_lookup",
939         test_fib_lookup_modevent,
940         0
941 };
942 
943 DECLARE_MODULE(testfiblookupmod, testfiblookupmod, SI_SUB_PSEUDO, SI_ORDER_ANY);
944 MODULE_VERSION(testfiblookup, 1);
945