xref: /linux/tools/testing/selftests/net/reuseport_bpf_numa.c (revision 4f2c0a4acffbec01079c28f839422e64ddeff004)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
23c2c3c16SDaniel Borkmann /*
33c2c3c16SDaniel Borkmann  * Test functionality of BPF filters with SO_REUSEPORT. Same test as
43c2c3c16SDaniel Borkmann  * in reuseport_bpf_cpu, only as one socket per NUMA node.
53c2c3c16SDaniel Borkmann  */
63c2c3c16SDaniel Borkmann 
73c2c3c16SDaniel Borkmann #define _GNU_SOURCE
83c2c3c16SDaniel Borkmann 
93c2c3c16SDaniel Borkmann #include <arpa/inet.h>
103c2c3c16SDaniel Borkmann #include <errno.h>
113c2c3c16SDaniel Borkmann #include <error.h>
123c2c3c16SDaniel Borkmann #include <linux/filter.h>
133c2c3c16SDaniel Borkmann #include <linux/bpf.h>
143c2c3c16SDaniel Borkmann #include <linux/in.h>
153c2c3c16SDaniel Borkmann #include <linux/unistd.h>
163c2c3c16SDaniel Borkmann #include <sched.h>
173c2c3c16SDaniel Borkmann #include <stdio.h>
183c2c3c16SDaniel Borkmann #include <stdlib.h>
193c2c3c16SDaniel Borkmann #include <string.h>
203c2c3c16SDaniel Borkmann #include <sys/epoll.h>
213c2c3c16SDaniel Borkmann #include <sys/types.h>
223c2c3c16SDaniel Borkmann #include <sys/socket.h>
233c2c3c16SDaniel Borkmann #include <unistd.h>
243c2c3c16SDaniel Borkmann #include <numa.h>
253c2c3c16SDaniel Borkmann 
261a2b80ecSAnders Roxell #include "../kselftest.h"
271a2b80ecSAnders Roxell 
283c2c3c16SDaniel Borkmann static const int PORT = 8888;
293c2c3c16SDaniel Borkmann 
build_rcv_group(int * rcv_fd,size_t len,int family,int proto)303c2c3c16SDaniel Borkmann static void build_rcv_group(int *rcv_fd, size_t len, int family, int proto)
313c2c3c16SDaniel Borkmann {
323c2c3c16SDaniel Borkmann 	struct sockaddr_storage addr;
333c2c3c16SDaniel Borkmann 	struct sockaddr_in  *addr4;
343c2c3c16SDaniel Borkmann 	struct sockaddr_in6 *addr6;
353c2c3c16SDaniel Borkmann 	size_t i;
363c2c3c16SDaniel Borkmann 	int opt;
373c2c3c16SDaniel Borkmann 
383c2c3c16SDaniel Borkmann 	switch (family) {
393c2c3c16SDaniel Borkmann 	case AF_INET:
403c2c3c16SDaniel Borkmann 		addr4 = (struct sockaddr_in *)&addr;
413c2c3c16SDaniel Borkmann 		addr4->sin_family = AF_INET;
423c2c3c16SDaniel Borkmann 		addr4->sin_addr.s_addr = htonl(INADDR_ANY);
433c2c3c16SDaniel Borkmann 		addr4->sin_port = htons(PORT);
443c2c3c16SDaniel Borkmann 		break;
453c2c3c16SDaniel Borkmann 	case AF_INET6:
463c2c3c16SDaniel Borkmann 		addr6 = (struct sockaddr_in6 *)&addr;
473c2c3c16SDaniel Borkmann 		addr6->sin6_family = AF_INET6;
483c2c3c16SDaniel Borkmann 		addr6->sin6_addr = in6addr_any;
493c2c3c16SDaniel Borkmann 		addr6->sin6_port = htons(PORT);
503c2c3c16SDaniel Borkmann 		break;
513c2c3c16SDaniel Borkmann 	default:
523c2c3c16SDaniel Borkmann 		error(1, 0, "Unsupported family %d", family);
533c2c3c16SDaniel Borkmann 	}
543c2c3c16SDaniel Borkmann 
553c2c3c16SDaniel Borkmann 	for (i = 0; i < len; ++i) {
563c2c3c16SDaniel Borkmann 		rcv_fd[i] = socket(family, proto, 0);
573c2c3c16SDaniel Borkmann 		if (rcv_fd[i] < 0)
583c2c3c16SDaniel Borkmann 			error(1, errno, "failed to create receive socket");
593c2c3c16SDaniel Borkmann 
603c2c3c16SDaniel Borkmann 		opt = 1;
613c2c3c16SDaniel Borkmann 		if (setsockopt(rcv_fd[i], SOL_SOCKET, SO_REUSEPORT, &opt,
623c2c3c16SDaniel Borkmann 			       sizeof(opt)))
633c2c3c16SDaniel Borkmann 			error(1, errno, "failed to set SO_REUSEPORT");
643c2c3c16SDaniel Borkmann 
653c2c3c16SDaniel Borkmann 		if (bind(rcv_fd[i], (struct sockaddr *)&addr, sizeof(addr)))
663c2c3c16SDaniel Borkmann 			error(1, errno, "failed to bind receive socket");
673c2c3c16SDaniel Borkmann 
683c2c3c16SDaniel Borkmann 		if (proto == SOCK_STREAM && listen(rcv_fd[i], len * 10))
693c2c3c16SDaniel Borkmann 			error(1, errno, "failed to listen on receive port");
703c2c3c16SDaniel Borkmann 	}
713c2c3c16SDaniel Borkmann }
723c2c3c16SDaniel Borkmann 
attach_bpf(int fd)733c2c3c16SDaniel Borkmann static void attach_bpf(int fd)
743c2c3c16SDaniel Borkmann {
753c2c3c16SDaniel Borkmann 	static char bpf_log_buf[65536];
763c2c3c16SDaniel Borkmann 	static const char bpf_license[] = "";
773c2c3c16SDaniel Borkmann 
783c2c3c16SDaniel Borkmann 	int bpf_fd;
793c2c3c16SDaniel Borkmann 	const struct bpf_insn prog[] = {
803c2c3c16SDaniel Borkmann 		/* R0 = bpf_get_numa_node_id() */
813c2c3c16SDaniel Borkmann 		{ BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_numa_node_id },
823c2c3c16SDaniel Borkmann 		/* return R0 */
833c2c3c16SDaniel Borkmann 		{ BPF_JMP | BPF_EXIT, 0, 0, 0, 0 }
843c2c3c16SDaniel Borkmann 	};
853c2c3c16SDaniel Borkmann 	union bpf_attr attr;
863c2c3c16SDaniel Borkmann 
873c2c3c16SDaniel Borkmann 	memset(&attr, 0, sizeof(attr));
883c2c3c16SDaniel Borkmann 	attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
89*0273d101SGuo Zhengkui 	attr.insn_cnt = ARRAY_SIZE(prog);
903c2c3c16SDaniel Borkmann 	attr.insns = (unsigned long) &prog;
913c2c3c16SDaniel Borkmann 	attr.license = (unsigned long) &bpf_license;
923c2c3c16SDaniel Borkmann 	attr.log_buf = (unsigned long) &bpf_log_buf;
933c2c3c16SDaniel Borkmann 	attr.log_size = sizeof(bpf_log_buf);
943c2c3c16SDaniel Borkmann 	attr.log_level = 1;
953c2c3c16SDaniel Borkmann 
963c2c3c16SDaniel Borkmann 	bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
973c2c3c16SDaniel Borkmann 	if (bpf_fd < 0)
983c2c3c16SDaniel Borkmann 		error(1, errno, "ebpf error. log:\n%s\n", bpf_log_buf);
993c2c3c16SDaniel Borkmann 
1003c2c3c16SDaniel Borkmann 	if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd,
1013c2c3c16SDaniel Borkmann 			sizeof(bpf_fd)))
1023c2c3c16SDaniel Borkmann 		error(1, errno, "failed to set SO_ATTACH_REUSEPORT_EBPF");
1033c2c3c16SDaniel Borkmann 
1043c2c3c16SDaniel Borkmann 	close(bpf_fd);
1053c2c3c16SDaniel Borkmann }
1063c2c3c16SDaniel Borkmann 
send_from_node(int node_id,int family,int proto)1073c2c3c16SDaniel Borkmann static void send_from_node(int node_id, int family, int proto)
1083c2c3c16SDaniel Borkmann {
1093c2c3c16SDaniel Borkmann 	struct sockaddr_storage saddr, daddr;
1103c2c3c16SDaniel Borkmann 	struct sockaddr_in  *saddr4, *daddr4;
1113c2c3c16SDaniel Borkmann 	struct sockaddr_in6 *saddr6, *daddr6;
1123c2c3c16SDaniel Borkmann 	int fd;
1133c2c3c16SDaniel Borkmann 
1143c2c3c16SDaniel Borkmann 	switch (family) {
1153c2c3c16SDaniel Borkmann 	case AF_INET:
1163c2c3c16SDaniel Borkmann 		saddr4 = (struct sockaddr_in *)&saddr;
1173c2c3c16SDaniel Borkmann 		saddr4->sin_family = AF_INET;
1183c2c3c16SDaniel Borkmann 		saddr4->sin_addr.s_addr = htonl(INADDR_ANY);
1193c2c3c16SDaniel Borkmann 		saddr4->sin_port = 0;
1203c2c3c16SDaniel Borkmann 
1213c2c3c16SDaniel Borkmann 		daddr4 = (struct sockaddr_in *)&daddr;
1223c2c3c16SDaniel Borkmann 		daddr4->sin_family = AF_INET;
1233c2c3c16SDaniel Borkmann 		daddr4->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
1243c2c3c16SDaniel Borkmann 		daddr4->sin_port = htons(PORT);
1253c2c3c16SDaniel Borkmann 		break;
1263c2c3c16SDaniel Borkmann 	case AF_INET6:
1273c2c3c16SDaniel Borkmann 		saddr6 = (struct sockaddr_in6 *)&saddr;
1283c2c3c16SDaniel Borkmann 		saddr6->sin6_family = AF_INET6;
1293c2c3c16SDaniel Borkmann 		saddr6->sin6_addr = in6addr_any;
1303c2c3c16SDaniel Borkmann 		saddr6->sin6_port = 0;
1313c2c3c16SDaniel Borkmann 
1323c2c3c16SDaniel Borkmann 		daddr6 = (struct sockaddr_in6 *)&daddr;
1333c2c3c16SDaniel Borkmann 		daddr6->sin6_family = AF_INET6;
1343c2c3c16SDaniel Borkmann 		daddr6->sin6_addr = in6addr_loopback;
1353c2c3c16SDaniel Borkmann 		daddr6->sin6_port = htons(PORT);
1363c2c3c16SDaniel Borkmann 		break;
1373c2c3c16SDaniel Borkmann 	default:
1383c2c3c16SDaniel Borkmann 		error(1, 0, "Unsupported family %d", family);
1393c2c3c16SDaniel Borkmann 	}
1403c2c3c16SDaniel Borkmann 
1413c2c3c16SDaniel Borkmann 	if (numa_run_on_node(node_id) < 0)
1423c2c3c16SDaniel Borkmann 		error(1, errno, "failed to pin to node");
1433c2c3c16SDaniel Borkmann 
1443c2c3c16SDaniel Borkmann 	fd = socket(family, proto, 0);
1453c2c3c16SDaniel Borkmann 	if (fd < 0)
1463c2c3c16SDaniel Borkmann 		error(1, errno, "failed to create send socket");
1473c2c3c16SDaniel Borkmann 
1483c2c3c16SDaniel Borkmann 	if (bind(fd, (struct sockaddr *)&saddr, sizeof(saddr)))
1493c2c3c16SDaniel Borkmann 		error(1, errno, "failed to bind send socket");
1503c2c3c16SDaniel Borkmann 
1513c2c3c16SDaniel Borkmann 	if (connect(fd, (struct sockaddr *)&daddr, sizeof(daddr)))
1523c2c3c16SDaniel Borkmann 		error(1, errno, "failed to connect send socket");
1533c2c3c16SDaniel Borkmann 
1543c2c3c16SDaniel Borkmann 	if (send(fd, "a", 1, 0) < 0)
1553c2c3c16SDaniel Borkmann 		error(1, errno, "failed to send message");
1563c2c3c16SDaniel Borkmann 
1573c2c3c16SDaniel Borkmann 	close(fd);
1583c2c3c16SDaniel Borkmann }
1593c2c3c16SDaniel Borkmann 
1603c2c3c16SDaniel Borkmann static
receive_on_node(int * rcv_fd,int len,int epfd,int node_id,int proto)1613c2c3c16SDaniel Borkmann void receive_on_node(int *rcv_fd, int len, int epfd, int node_id, int proto)
1623c2c3c16SDaniel Borkmann {
1633c2c3c16SDaniel Borkmann 	struct epoll_event ev;
1643c2c3c16SDaniel Borkmann 	int i, fd;
1653c2c3c16SDaniel Borkmann 	char buf[8];
1663c2c3c16SDaniel Borkmann 
1673c2c3c16SDaniel Borkmann 	i = epoll_wait(epfd, &ev, 1, -1);
1683c2c3c16SDaniel Borkmann 	if (i < 0)
1693c2c3c16SDaniel Borkmann 		error(1, errno, "epoll_wait failed");
1703c2c3c16SDaniel Borkmann 
1713c2c3c16SDaniel Borkmann 	if (proto == SOCK_STREAM) {
1723c2c3c16SDaniel Borkmann 		fd = accept(ev.data.fd, NULL, NULL);
1733c2c3c16SDaniel Borkmann 		if (fd < 0)
1743c2c3c16SDaniel Borkmann 			error(1, errno, "failed to accept");
1753c2c3c16SDaniel Borkmann 		i = recv(fd, buf, sizeof(buf), 0);
1763c2c3c16SDaniel Borkmann 		close(fd);
1773c2c3c16SDaniel Borkmann 	} else {
1783c2c3c16SDaniel Borkmann 		i = recv(ev.data.fd, buf, sizeof(buf), 0);
1793c2c3c16SDaniel Borkmann 	}
1803c2c3c16SDaniel Borkmann 
1813c2c3c16SDaniel Borkmann 	if (i < 0)
1823c2c3c16SDaniel Borkmann 		error(1, errno, "failed to recv");
1833c2c3c16SDaniel Borkmann 
1843c2c3c16SDaniel Borkmann 	for (i = 0; i < len; ++i)
1853c2c3c16SDaniel Borkmann 		if (ev.data.fd == rcv_fd[i])
1863c2c3c16SDaniel Borkmann 			break;
1873c2c3c16SDaniel Borkmann 	if (i == len)
1883c2c3c16SDaniel Borkmann 		error(1, 0, "failed to find socket");
1893c2c3c16SDaniel Borkmann 	fprintf(stderr, "send node %d, receive socket %d\n", node_id, i);
1903c2c3c16SDaniel Borkmann 	if (node_id != i)
1913c2c3c16SDaniel Borkmann 		error(1, 0, "node id/receive socket mismatch");
1923c2c3c16SDaniel Borkmann }
1933c2c3c16SDaniel Borkmann 
test(int * rcv_fd,int len,int family,int proto)1943c2c3c16SDaniel Borkmann static void test(int *rcv_fd, int len, int family, int proto)
1953c2c3c16SDaniel Borkmann {
1963c2c3c16SDaniel Borkmann 	struct epoll_event ev;
1973c2c3c16SDaniel Borkmann 	int epfd, node;
1983c2c3c16SDaniel Borkmann 
1993c2c3c16SDaniel Borkmann 	build_rcv_group(rcv_fd, len, family, proto);
2003c2c3c16SDaniel Borkmann 	attach_bpf(rcv_fd[0]);
2013c2c3c16SDaniel Borkmann 
2023c2c3c16SDaniel Borkmann 	epfd = epoll_create(1);
2033c2c3c16SDaniel Borkmann 	if (epfd < 0)
2043c2c3c16SDaniel Borkmann 		error(1, errno, "failed to create epoll");
2053c2c3c16SDaniel Borkmann 	for (node = 0; node < len; ++node) {
2063c2c3c16SDaniel Borkmann 		ev.events = EPOLLIN;
2073c2c3c16SDaniel Borkmann 		ev.data.fd = rcv_fd[node];
2083c2c3c16SDaniel Borkmann 		if (epoll_ctl(epfd, EPOLL_CTL_ADD, rcv_fd[node], &ev))
2093c2c3c16SDaniel Borkmann 			error(1, errno, "failed to register sock epoll");
2103c2c3c16SDaniel Borkmann 	}
2113c2c3c16SDaniel Borkmann 
2123c2c3c16SDaniel Borkmann 	/* Forward iterate */
2133c2c3c16SDaniel Borkmann 	for (node = 0; node < len; ++node) {
214a38bc45aSKleber Sacilotto de Souza 		if (!numa_bitmask_isbitset(numa_nodes_ptr, node))
215a38bc45aSKleber Sacilotto de Souza 			continue;
2163c2c3c16SDaniel Borkmann 		send_from_node(node, family, proto);
2173c2c3c16SDaniel Borkmann 		receive_on_node(rcv_fd, len, epfd, node, proto);
2183c2c3c16SDaniel Borkmann 	}
2193c2c3c16SDaniel Borkmann 
2203c2c3c16SDaniel Borkmann 	/* Reverse iterate */
2213c2c3c16SDaniel Borkmann 	for (node = len - 1; node >= 0; --node) {
222a38bc45aSKleber Sacilotto de Souza 		if (!numa_bitmask_isbitset(numa_nodes_ptr, node))
223a38bc45aSKleber Sacilotto de Souza 			continue;
2243c2c3c16SDaniel Borkmann 		send_from_node(node, family, proto);
2253c2c3c16SDaniel Borkmann 		receive_on_node(rcv_fd, len, epfd, node, proto);
2263c2c3c16SDaniel Borkmann 	}
2273c2c3c16SDaniel Borkmann 
2283c2c3c16SDaniel Borkmann 	close(epfd);
2293c2c3c16SDaniel Borkmann 	for (node = 0; node < len; ++node)
2303c2c3c16SDaniel Borkmann 		close(rcv_fd[node]);
2313c2c3c16SDaniel Borkmann }
2323c2c3c16SDaniel Borkmann 
main(void)2333c2c3c16SDaniel Borkmann int main(void)
2343c2c3c16SDaniel Borkmann {
2353c2c3c16SDaniel Borkmann 	int *rcv_fd, nodes;
2363c2c3c16SDaniel Borkmann 
2373c2c3c16SDaniel Borkmann 	if (numa_available() < 0)
2381a2b80ecSAnders Roxell 		ksft_exit_skip("no numa api support\n");
2393c2c3c16SDaniel Borkmann 
2403c2c3c16SDaniel Borkmann 	nodes = numa_max_node() + 1;
2413c2c3c16SDaniel Borkmann 
2423c2c3c16SDaniel Borkmann 	rcv_fd = calloc(nodes, sizeof(int));
2433c2c3c16SDaniel Borkmann 	if (!rcv_fd)
2443c2c3c16SDaniel Borkmann 		error(1, 0, "failed to allocate array");
2453c2c3c16SDaniel Borkmann 
2463c2c3c16SDaniel Borkmann 	fprintf(stderr, "---- IPv4 UDP ----\n");
2473c2c3c16SDaniel Borkmann 	test(rcv_fd, nodes, AF_INET, SOCK_DGRAM);
2483c2c3c16SDaniel Borkmann 
2493c2c3c16SDaniel Borkmann 	fprintf(stderr, "---- IPv6 UDP ----\n");
2503c2c3c16SDaniel Borkmann 	test(rcv_fd, nodes, AF_INET6, SOCK_DGRAM);
2513c2c3c16SDaniel Borkmann 
2523c2c3c16SDaniel Borkmann 	fprintf(stderr, "---- IPv4 TCP ----\n");
2533c2c3c16SDaniel Borkmann 	test(rcv_fd, nodes, AF_INET, SOCK_STREAM);
2543c2c3c16SDaniel Borkmann 
2553c2c3c16SDaniel Borkmann 	fprintf(stderr, "---- IPv6 TCP ----\n");
2563c2c3c16SDaniel Borkmann 	test(rcv_fd, nodes, AF_INET6, SOCK_STREAM);
2573c2c3c16SDaniel Borkmann 
2583c2c3c16SDaniel Borkmann 	free(rcv_fd);
2593c2c3c16SDaniel Borkmann 
2603c2c3c16SDaniel Borkmann 	fprintf(stderr, "SUCCESS\n");
2613c2c3c16SDaniel Borkmann 	return 0;
2623c2c3c16SDaniel Borkmann }
263