Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp7532338rwl; Tue, 10 Jan 2023 01:57:31 -0800 (PST) X-Google-Smtp-Source: AMrXdXu7bK8FzcvYvea606ous2ADjZFfm5wWFmDKdkkreIFT3QXVwodkX4Ax8US2QB2vT5hW9bt9 X-Received: by 2002:a17:90a:6d03:b0:226:3232:2de2 with SMTP id z3-20020a17090a6d0300b0022632322de2mr40338363pjj.46.1673344650976; Tue, 10 Jan 2023 01:57:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673344650; cv=none; d=google.com; s=arc-20160816; b=D6GPk+PHlVHORNevRJ9pK4xtkbvCvtef47h2GJZooh4Gk8HvppAr4IH8qEsiBvt79Q mqOYoqqRhFpRRs/1ATGm+6TLU7WrppN6O3J+8aBoF2vyFiaXPTtLRI9fmDhla3kUWJTc aLv7wwttPoH4QJWfMeifHG2loSlw2MR+sosso9va9SsSROzqGnengiaC1BHvyozg0jQ4 GiKuuJ+0Vhi+xz23TSIvcjCkkUGssrvMLvYDngLFP7qreZAbBHQwBABfzAY+q0gPrFSM r4qWw6iRFedrNfNfB7Oa3vBu0/qf8R3OjNcR11wUAkutnwRZmuo0OJ78WT3Z1a4II0dw e1Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=3IoltaMTP/SoP1SsfQmBngAKvER3lkKce2svsoNj6DA=; b=ziYwMWIb0HcUk8GKA+GgwZ83DvitX7cJ+bWMOrPl/ReaPf+CD/OS8YN4zCJ5L3pioT OieCijgWqw4ITu/llVnolC0a3FepAmPo3Yfnu0NjgKX1BVlgRoFBe4NEph0l3geMLg+z mz+YqMTWtuKjuB6/vKXcSgzst2BSRlwox/LogglaUpx0SJKll920O3CZni9Nk2Bm7C2/ zI8OuNn+uZkqtjnZhSf5lutp7wYDbR1ZfSZDt2ZA8Gz6WggEGIGL0eXZvF/PXkLQOIV/ TTVMArsgGI7RO50wR1rpj5egvqmjBoqHEBJtkwZTCHGJ+YjFIzgh8uncSAB4IS0vIUHe Gxgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Bp8NhIqf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mu3-20020a17090b388300b002190932890asi12243160pjb.57.2023.01.10.01.57.24; Tue, 10 Jan 2023 01:57:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Bp8NhIqf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238221AbjAJJh5 (ORCPT + 55 others); Tue, 10 Jan 2023 04:37:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238265AbjAJJhv (ORCPT ); Tue, 10 Jan 2023 04:37:51 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3913E431A0 for ; Tue, 10 Jan 2023 01:37:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1673343424; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=3IoltaMTP/SoP1SsfQmBngAKvER3lkKce2svsoNj6DA=; b=Bp8NhIqfz73pT/03p684KQt+KC+aY27Q22aj9Kp/HwC5/rgz23R4FeHFlceznSYCapLiFY Zn+ljdRmJgwezJ2QzlIkIaGUEKeDZ+S2HMIjuwegt9HNcAOuZpitU0pbXUr8tkVV0CWUty 8fp7sIGEBM4f8sKl2VHapyiqVNAznYc= Received: from mail-qv1-f71.google.com (mail-qv1-f71.google.com [209.85.219.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-261-42eJO8OoMHqm10LEUlIT1A-1; Tue, 10 Jan 2023 04:37:02 -0500 X-MC-Unique: 42eJO8OoMHqm10LEUlIT1A-1 Received: by mail-qv1-f71.google.com with SMTP id ng1-20020a0562143bc100b004bb706b3a27so6674430qvb.20 for ; Tue, 10 Jan 2023 01:37:02 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=3IoltaMTP/SoP1SsfQmBngAKvER3lkKce2svsoNj6DA=; b=i2/ojPBGwccOHfs9x47bibTooNm5fWql4a6aCrrk+AAvplPLVWT5L9FsDfGucWNNUa eEIEw1watJQ/X5supNcMdmyy7XZSn8lyVPHbA8jL8JyXgt1IHw0bngVywUZZ/79cTgHw eedPf5rQJjMj4pAKYvvt83mkw+Iqw8Zj1s/5Wt+Y25hyRp8DpDaqdRSBGMOGp8uae/0O tP2bJMvE92/RVKBkWH31QgBqM9hrfuSviJZpExjEqp0+G6vmv2yBXXvgfJ/QpVjH7sIz bBU3r8QcB8ondUUlz4w0gMBqD3p6WqPCjTAqV7JttyMrFAHhP/Lbi0byxHjhRCRHB9Sh 3laA== X-Gm-Message-State: AFqh2krCfxwTt9HR6BEe0tUT9lJMfgt5EESbPxLUyN4W9xO3paB0hL5V bFMzYqsM1OR3okUq3KR6LArw/1XCke9ZRh/OfwYLzqXSO2FK0HOVVGP20d3LeBtqx/5tIvsHm89 7FowerJrs+XhQh9UI3vpQNvag X-Received: by 2002:ac8:541a:0:b0:3a7:e809:1fe3 with SMTP id b26-20020ac8541a000000b003a7e8091fe3mr93226486qtq.49.1673343421732; Tue, 10 Jan 2023 01:37:01 -0800 (PST) X-Received: by 2002:ac8:541a:0:b0:3a7:e809:1fe3 with SMTP id b26-20020ac8541a000000b003a7e8091fe3mr93226466qtq.49.1673343421423; Tue, 10 Jan 2023 01:37:01 -0800 (PST) Received: from gerbillo.redhat.com (146-241-120-128.dyn.eolo.it. [146.241.120.128]) by smtp.gmail.com with ESMTPSA id d13-20020ac8668d000000b003a6a4744432sm5830178qtp.87.2023.01.10.01.36.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Jan 2023 01:37:00 -0800 (PST) Message-ID: <5c8b538bcc9ac75027f41c21e810d3707a2e1ec7.camel@redhat.com> Subject: Re: [PATCH net-next v6 4/4] test/vsock: vsock_perf utility From: Paolo Abeni To: Arseniy Krasnov , Stefano Garzarella , "David S. Miller" , "edumazet@google.com" , Jakub Kicinski Cc: "linux-kernel@vger.kernel.org" , "netdev@vger.kernel.org" , "virtualization@lists.linux-foundation.org" , kernel , Krasnov Arseniy , Bobby Eshleman Date: Tue, 10 Jan 2023 10:36:58 +0100 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.42.4 (3.42.4-2.fc35) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, sorry for the late feedback, a couple of notes below... On Sun, 2023-01-08 at 20:43 +0000, Arseniy Krasnov wrote: > This adds utility to check vsock rx/tx performance. > > Usage as sender: > ./vsock_perf --sender --port --bytes > Usage as receiver: > ./vsock_perf --port --rcvlowat > > Signed-off-by: Arseniy Krasnov > Reviewed-by: Stefano Garzarella > --- > tools/testing/vsock/Makefile | 3 +- > tools/testing/vsock/README | 34 +++ > tools/testing/vsock/vsock_perf.c | 441 +++++++++++++++++++++++++++++++ > 3 files changed, 477 insertions(+), 1 deletion(-) > create mode 100644 tools/testing/vsock/vsock_perf.c > > diff --git a/tools/testing/vsock/Makefile b/tools/testing/vsock/Makefile > index f8293c6910c9..43a254f0e14d 100644 > --- a/tools/testing/vsock/Makefile > +++ b/tools/testing/vsock/Makefile > @@ -1,8 +1,9 @@ > # SPDX-License-Identifier: GPL-2.0-only > -all: test > +all: test vsock_perf > test: vsock_test vsock_diag_test > vsock_test: vsock_test.o timeout.o control.o util.o > vsock_diag_test: vsock_diag_test.o timeout.o control.o util.o > +vsock_perf: vsock_perf.o > > CFLAGS += -g -O2 -Werror -Wall -I. -I../../include -I../../../usr/include -Wno-pointer-sign -fno-strict-overflow -fno-strict-aliasing -fno-common -MMD -U_FORTIFY_SOURCE -D_GNU_SOURCE > .PHONY: all test clean > diff --git a/tools/testing/vsock/README b/tools/testing/vsock/README > index 4d5045e7d2c3..84ee217ba8ee 100644 > --- a/tools/testing/vsock/README > +++ b/tools/testing/vsock/README > @@ -35,3 +35,37 @@ Invoke test binaries in both directions as follows: > --control-port=$GUEST_IP \ > --control-port=1234 \ > --peer-cid=3 > + > +vsock_perf utility > +------------------- > +'vsock_perf' is a simple tool to measure vsock performance. It works in > +sender/receiver modes: sender connect to peer at the specified port and > +starts data transmission to the receiver. After data processing is done, > +it prints several metrics(see below). > + > +Usage: > +# run as sender > +# connect to CID 2, port 1234, send 1G of data, tx buf size is 1M > +./vsock_perf --sender 2 --port 1234 --bytes 1G --buf-size 1M > + > +Output: > +tx performance: A Gbits/s > + > +Output explanation: > +A is calculated as "number of bits to send" / "time in tx loop" > + > +# run as receiver > +# listen port 1234, rx buf size is 1M, socket buf size is 1G, SO_RCVLOWAT is 64K > +./vsock_perf --port 1234 --buf-size 1M --vsk-size 1G --rcvlowat 64K > + > +Output: > +rx performance: A Gbits/s > +total in 'read()': B sec > +POLLIN wakeups: C > +average in 'read()': D ns > + > +Output explanation: > +A is calculated as "number of received bits" / "time in rx loop". > +B is time, spent in 'read()' system call(excluding 'poll()') > +C is number of 'poll()' wake ups with POLLIN bit set. > +D is B / C, e.g. average amount of time, spent in single 'read()'. > diff --git a/tools/testing/vsock/vsock_perf.c b/tools/testing/vsock/vsock_perf.c > new file mode 100644 > index 000000000000..ccd595462b40 > --- /dev/null > +++ b/tools/testing/vsock/vsock_perf.c > @@ -0,0 +1,441 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * vsock_perf - benchmark utility for vsock. > + * > + * Copyright (C) 2022 SberDevices. > + * > + * Author: Arseniy Krasnov > + */ > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +#define DEFAULT_BUF_SIZE_BYTES (128 * 1024) > +#define DEFAULT_TO_SEND_BYTES (64 * 1024) > +#define DEFAULT_VSOCK_BUF_BYTES (256 * 1024) > +#define DEFAULT_RCVLOWAT_BYTES 1 > +#define DEFAULT_PORT 1234 > + > +#define BYTES_PER_GB (1024 * 1024 * 1024ULL) > +#define NSEC_PER_SEC (1000000000ULL) > + > +static unsigned int port = DEFAULT_PORT; > +static unsigned long buf_size_bytes = DEFAULT_BUF_SIZE_BYTES; > +static unsigned long vsock_buf_bytes = DEFAULT_VSOCK_BUF_BYTES; > + > +static inline time_t current_nsec(void) Minor nit: you should avoid 'static inline' functions in c files, 'static' would suffice and will allow the compiler to do a better job. > +{ > + struct timespec ts; > + > + if (clock_gettime(CLOCK_REALTIME, &ts)) { > + perror("clock_gettime"); > + exit(EXIT_FAILURE); > + } > + > + return (ts.tv_sec * NSEC_PER_SEC) + ts.tv_nsec; > +} > + > +/* From lib/cmdline.c. */ > +static unsigned long memparse(const char *ptr) > +{ > + char *endptr; > + > + unsigned long long ret = strtoull(ptr, &endptr, 0); > + > + switch (*endptr) { > + case 'E': > + case 'e': > + ret <<= 10; > + case 'P': > + case 'p': > + ret <<= 10; > + case 'T': > + case 't': > + ret <<= 10; > + case 'G': > + case 'g': > + ret <<= 10; > + case 'M': > + case 'm': > + ret <<= 10; > + case 'K': > + case 'k': > + ret <<= 10; > + endptr++; > + default: > + break; > + } > + > + return ret; > +} > + > +static void vsock_increase_buf_size(int fd) > +{ > + if (setsockopt(fd, AF_VSOCK, SO_VM_SOCKETS_BUFFER_MAX_SIZE, > + &vsock_buf_bytes, sizeof(vsock_buf_bytes))) { > + perror("setsockopt(SO_VM_SOCKETS_BUFFER_MAX_SIZE)"); > + exit(EXIT_FAILURE); > + } > + > + if (setsockopt(fd, AF_VSOCK, SO_VM_SOCKETS_BUFFER_SIZE, > + &vsock_buf_bytes, sizeof(vsock_buf_bytes))) { > + perror("setsockopt(SO_VM_SOCKETS_BUFFER_SIZE)"); > + exit(EXIT_FAILURE); You use the above pattern frequently, but you could replace both libcall with a single error() call. Thanks, Paolo