From patchwork Fri Jul 8 18:45:38 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dylan Yudaken X-Patchwork-Id: 12911759 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5E0CACCA47B for ; Fri, 8 Jul 2022 18:45:56 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239539AbiGHSpz (ORCPT ); Fri, 8 Jul 2022 14:45:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37864 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239627AbiGHSpw (ORCPT ); Fri, 8 Jul 2022 14:45:52 -0400 Received: from mx0a-00082601.pphosted.com (mx0a-00082601.pphosted.com [67.231.145.42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A6A367B344 for ; Fri, 8 Jul 2022 11:45:51 -0700 (PDT) Received: from pps.filterd (m0109333.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 268HAUTP001956 for ; Fri, 8 Jul 2022 11:45:51 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=facebook; bh=mBL3z+NSeKcOFtGhF5bcinO8VhjtUpk/DQPQTzSev24=; b=SJWiuCS0Ev7X9yjvfC/ifciIRnU1XunDQ0k1RjORTd5nyaSdDjq3LFcfgJSvRKcA3c13 JZw+HVo67QB430M0Hk2rAAfE9aFlEm5SzLX8/DUXs46nRDySrYMt0e62hltD7abmmkgx L2xnGh0dnswcvQPhdpTPwEKY8qw3lB2eVCM= Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3h67d26d4f-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Fri, 08 Jul 2022 11:45:51 -0700 Received: from twshared25478.08.ash9.facebook.com (2620:10d:c0a8:1b::d) by mail.thefacebook.com (2620:10d:c0a8:83::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.28; Fri, 8 Jul 2022 11:45:49 -0700 Received: by devbig038.lla2.facebook.com (Postfix, from userid 572232) id 9CC022BA20C9; Fri, 8 Jul 2022 11:45:41 -0700 (PDT) From: Dylan Yudaken To: , CC: , , Dylan Yudaken Subject: [PATCH RFC liburing 2/2] add tests for multishot recvmsg Date: Fri, 8 Jul 2022 11:45:38 -0700 Message-ID: <20220708184538.1632315-3-dylany@fb.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220708184538.1632315-1-dylany@fb.com> References: <20220708184538.1632315-1-dylany@fb.com> MIME-Version: 1.0 X-FB-Internal: Safe X-Proofpoint-GUID: bJP8Nu4FCSlBmEXu6JfVqR0PprebcWgL X-Proofpoint-ORIG-GUID: bJP8Nu4FCSlBmEXu6JfVqR0PprebcWgL X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-07-08_15,2022-07-08_01,2022-06-22_01 Precedence: bulk List-ID: X-Mailing-List: io-uring@vger.kernel.org Expand the multishot recv test to include recvmsg. This also checks that sockaddr comes back, and that control messages work properly. Signed-off-by: Dylan Yudaken --- test/recv-multishot.c | 137 +++++++++++++++++++++++++++++++++++++----- 1 file changed, 123 insertions(+), 14 deletions(-) diff --git a/test/recv-multishot.c b/test/recv-multishot.c index 9df8184..b1cc335 100644 --- a/test/recv-multishot.c +++ b/test/recv-multishot.c @@ -27,20 +27,42 @@ enum early_error_t { struct args { bool stream; bool wait_each; + bool recvmsg; enum early_error_t early_error; }; +static int check_sockaddr(struct sockaddr_in *in) +{ + struct in_addr expected; + inet_pton(AF_INET, "127.0.0.1", &expected); + if (in->sin_family != AF_INET) { + fprintf(stderr, "bad family %d\n", (int)htons(in->sin_family)); + return -1; + } + if (memcmp(&expected, &in->sin_addr, sizeof(in->sin_addr))) { + char buff[256]; + const char *addr = inet_ntop(AF_INET, &in->sin_addr, buff, sizeof(buff)); + fprintf(stderr, "unexpected address %s\n", addr ? addr : "INVALID"); + return -1; + } + return 0; +} + static int test(struct args *args) { int const N = 8; int const N_BUFFS = N * 64; int const N_CQE_OVERFLOW = 4; int const min_cqes = 2; + int const NAME_LEN = sizeof(struct sockaddr_storage); + int const CONTROL_LEN = CMSG_ALIGN(sizeof(struct sockaddr_storage)) + + sizeof(struct cmsghdr); struct io_uring ring; struct io_uring_cqe *cqe; struct io_uring_sqe *sqe; int fds[2], ret, i, j, total_sent_bytes = 0, total_recv_bytes = 0; int send_buff[256]; + int *sent_buffs[N_BUFFS]; int *recv_buffs[N_BUFFS]; int *at; struct io_uring_cqe recv_cqe[N_BUFFS]; @@ -50,7 +72,7 @@ static int test(struct args *args) struct __kernel_timespec timeout = { .tv_sec = 1, }; - + struct msghdr msg; memset(recv_buffs, 0, sizeof(recv_buffs)); @@ -75,21 +97,39 @@ static int test(struct args *args) return ret; } + if (!args->stream) { + bool val = true; + /* force some cmsgs to come back to us */ + if (setsockopt(fds[0], IPPROTO_IP, + IP_RECVORIGDSTADDR, &val, sizeof(val))) { + fprintf(stderr, "setsockopt failed %d\n", errno); + goto cleanup; + } + } + for (i = 0; i < ARRAY_SIZE(send_buff); i++) send_buff[i] = i; for (i = 0; i < ARRAY_SIZE(recv_buffs); i++) { /* prepare some different sized buffers */ - int buffer_size = (i % 2 == 0 && args->stream) ? 1 : N * sizeof(int); + int buffer_size = (i % 2 == 0 && args->stream) ? 1 : N; + buffer_size *= sizeof(int); + if (args->recvmsg) { + buffer_size += + sizeof(struct io_uring_recvmsg_out) + + NAME_LEN + + CONTROL_LEN; + } - recv_buffs[i] = malloc(sizeof(*at) * buffer_size); + recv_buffs[i] = malloc(buffer_size); if (i > 2 && args->early_error == ERROR_NOT_ENOUGH_BUFFERS) continue; sqe = io_uring_get_sqe(&ring); io_uring_prep_provide_buffers(sqe, recv_buffs[i], - buffer_size * sizeof(*recv_buffs[i]), 1, 7, i); + buffer_size, 1, 7, i); + memset(recv_buffs[i], 0xcc, buffer_size); if (io_uring_submit_and_wait_timeout(&ring, &cqe, 1, &timeout, NULL) != 0) { fprintf(stderr, "provide buffers failed: %d\n", ret); ret = -1; @@ -99,7 +139,15 @@ static int test(struct args *args) } sqe = io_uring_get_sqe(&ring); - io_uring_prep_recv_multishot(sqe, fds[0], NULL, 0, 0); + if (args->recvmsg) { + memset(&msg, 0, sizeof(msg)); + msg.msg_namelen = NAME_LEN; + msg.msg_controllen = CONTROL_LEN; + + io_uring_prep_recvmsg_multishot(sqe, fds[0], &msg, 0); + } else { + io_uring_prep_recv_multishot(sqe, fds[0], NULL, 0, 0); + } sqe->flags |= IOSQE_BUFFER_SELECT; sqe->buf_group = 7; io_uring_sqe_set_data64(sqe, 1234); @@ -111,6 +159,7 @@ static int test(struct args *args) int to_send = sizeof(*at) * (i+1); total_sent_bytes += to_send; + sent_buffs[i] = at; if (send(fds[1], at, to_send, 0) != to_send) { if (early_error_started) break; @@ -205,6 +254,8 @@ static int test(struct args *args) if (should_be_last) { + int used_res = cqe->res; + if (!is_last) { fprintf(stderr, "not last cqe had error %d\n", i); goto cleanup; @@ -234,7 +285,16 @@ static int test(struct args *args) break; case ERROR_NONE: case ERROR_EARLY_CLOSE_SENDER: - if (cqe->res != 0) { + if (args->recvmsg && (cqe->flags & IORING_CQE_F_BUFFER)) { + struct io_uring_recvmsg_out *o = + (struct io_uring_recvmsg_out *)recv_buffs[cqe->flags >> 16]; + if (o->payloadlen != 0) { + fprintf(stderr, "early error expected 0 payloadlen, got %u\n", + o->payloadlen); + goto cleanup; + } + used_res = 0; + } else if (cqe->res != 0) { fprintf(stderr, "early error: res %d\n", cqe->res); goto cleanup; } @@ -254,7 +314,7 @@ static int test(struct args *args) goto cleanup; } - if (cqe->res <= 0) + if (used_res <= 0) continue; } else { if (!(cqe->flags & IORING_CQE_F_MORE)) { @@ -268,7 +328,48 @@ static int test(struct args *args) goto cleanup; } + this_recv = recv_buffs[cqe->flags >> 16]; + + if (args->recvmsg) { + struct io_uring_recvmsg_out *o = io_uring_recvmsg_validate( + this_recv, cqe->res, &msg); + if (!o) { + fprintf(stderr, "bad recvmsg\n"); + goto cleanup; + } + cqe->res = o->payloadlen; + + if (!args->stream) { + struct cmsghdr *cmsg; + if (o->namelen < sizeof(struct sockaddr_in)) { + fprintf(stderr, "bad addr len %d", + o->namelen); + goto cleanup; + } + if (check_sockaddr((struct sockaddr_in*)io_uring_recvmsg_name(o))) + goto cleanup; + + cmsg = io_uring_recvmsg_cmsg_firsthdr(o, &msg); + if (!cmsg || + cmsg->cmsg_level != IPPROTO_IP || + cmsg->cmsg_type != IP_RECVORIGDSTADDR) { + fprintf(stderr, "bad cmsg"); + goto cleanup; + } + if (check_sockaddr((struct sockaddr_in *)CMSG_DATA(cmsg))) + goto cleanup; + cmsg = io_uring_recvmsg_cmsg_nexthdr(o, &msg, cmsg); + if (cmsg) { + fprintf(stderr, "unexpected extra cmsg\n"); + goto cleanup; + } + } + + this_recv = (int*)io_uring_recvmsg_payload(o, &msg); + } + total_recv_bytes += cqe->res; + if (cqe->res % 4 != 0) { /* * doesn't seem to happen in practice, would need some @@ -278,9 +379,19 @@ static int test(struct args *args) goto cleanup; } - /* check buffer arrived in order (for tcp) */ - this_recv = recv_buffs[cqe->flags >> 16]; - for (j = 0; args->stream && j < cqe->res / 4; j++) { + /* + * for tcp: check buffer arrived in order + * for udp: based on size validate data based on size + */ + if (!args->stream) { + int sent_idx = cqe->res / sizeof(*at) - 1; + if (sent_idx < 0 || sent_idx > N) { + fprintf(stderr, "Bad sent idx: %d\n", sent_idx); + goto cleanup; + } + at = sent_buffs[sent_idx]; + } + for (j = 0; j < cqe->res / 4; j++) { int sent = *at++; int recv = *this_recv++; @@ -297,9 +408,6 @@ static int test(struct args *args) goto cleanup; } - /* check the final one */ - cqe = &recv_cqe[recv_cqes-1]; - ret = 0; cleanup: for (i = 0; i < ARRAY_SIZE(recv_buffs); i++) @@ -320,10 +428,11 @@ int main(int argc, char *argv[]) if (argc > 1) return T_EXIT_SKIP; - for (loop = 0; loop < 4; loop++) { + for (loop = 0; loop < 8; loop++) { struct args a = { .stream = loop & 0x01, .wait_each = loop & 0x2, + .recvmsg = loop & 0x04, }; for (early_error = 0; early_error < ERROR_EARLY_LAST; early_error++) { a.early_error = (enum early_error_t)early_error;