266 lines
7.1 KiB
Bash
Executable File
266 lines
7.1 KiB
Bash
Executable File
#!/bin/bash
|
|
# SPDX-License-Identifier: GPL-2.0
|
|
|
|
source net_helper.sh
|
|
|
|
BPF_FILE="xdp_dummy.bpf.o"
|
|
readonly BASE="ns-$(mktemp -u XXXXXX)"
|
|
readonly SRC=2
|
|
readonly DST=1
|
|
readonly DST_NAT=100
|
|
readonly NS_SRC=$BASE$SRC
|
|
readonly NS_DST=$BASE$DST
|
|
|
|
# "baremetal" network used for raw UDP traffic
|
|
readonly BM_NET_V4=192.168.1.
|
|
readonly BM_NET_V6=2001:db8::
|
|
|
|
# "overlay" network used for UDP over UDP tunnel traffic
|
|
readonly OL_NET_V4=172.16.1.
|
|
readonly OL_NET_V6=2001:db8:1::
|
|
readonly NPROCS=`nproc`
|
|
|
|
cleanup() {
|
|
local ns
|
|
local -r jobs="$(jobs -p)"
|
|
[ -n "${jobs}" ] && kill -1 ${jobs} 2>/dev/null
|
|
|
|
for ns in $NS_SRC $NS_DST; do
|
|
ip netns del $ns 2>/dev/null
|
|
done
|
|
}
|
|
|
|
trap cleanup EXIT
|
|
|
|
create_ns() {
|
|
local net
|
|
local ns
|
|
|
|
for ns in $NS_SRC $NS_DST; do
|
|
ip netns add $ns
|
|
ip -n $ns link set dev lo up
|
|
|
|
# disable route solicitations to decrease 'noise' traffic
|
|
ip netns exec $ns sysctl -qw net.ipv6.conf.default.router_solicitations=0
|
|
ip netns exec $ns sysctl -qw net.ipv6.conf.all.router_solicitations=0
|
|
done
|
|
|
|
ip link add name veth$SRC type veth peer name veth$DST
|
|
|
|
for ns in $SRC $DST; do
|
|
ip link set dev veth$ns netns $BASE$ns
|
|
ip -n $BASE$ns link set dev veth$ns up
|
|
ip -n $BASE$ns addr add dev veth$ns $BM_NET_V4$ns/24
|
|
ip -n $BASE$ns addr add dev veth$ns $BM_NET_V6$ns/64 nodad
|
|
done
|
|
ip -n $NS_DST link set veth$DST xdp object ${BPF_FILE} section xdp 2>/dev/null
|
|
}
|
|
|
|
create_vxlan_endpoint() {
|
|
local -r netns=$1
|
|
local -r bm_dev=$2
|
|
local -r bm_rem_addr=$3
|
|
local -r vxlan_dev=$4
|
|
local -r vxlan_id=$5
|
|
local -r vxlan_port=4789
|
|
|
|
ip -n $netns link set dev $bm_dev up
|
|
ip -n $netns link add dev $vxlan_dev type vxlan id $vxlan_id \
|
|
dstport $vxlan_port remote $bm_rem_addr
|
|
ip -n $netns link set dev $vxlan_dev up
|
|
}
|
|
|
|
create_vxlan_pair() {
|
|
local ns
|
|
|
|
create_ns
|
|
|
|
for ns in $SRC $DST; do
|
|
# note that 3 - $SRC == $DST and 3 - $DST == $SRC
|
|
create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V4$((3 - $ns)) vxlan$ns 4
|
|
ip -n $BASE$ns addr add dev vxlan$ns $OL_NET_V4$ns/24
|
|
done
|
|
for ns in $SRC $DST; do
|
|
create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V6$((3 - $ns)) vxlan6$ns 6
|
|
ip -n $BASE$ns addr add dev vxlan6$ns $OL_NET_V6$ns/24 nodad
|
|
done
|
|
|
|
# preload neighbur cache, do avoid some noisy traffic
|
|
local addr_dst=$(ip -j -n $BASE$DST link show dev vxlan6$DST |jq -r '.[]["address"]')
|
|
local addr_src=$(ip -j -n $BASE$SRC link show dev vxlan6$SRC |jq -r '.[]["address"]')
|
|
ip -n $BASE$DST neigh add dev vxlan6$DST lladdr $addr_src $OL_NET_V6$SRC
|
|
ip -n $BASE$SRC neigh add dev vxlan6$SRC lladdr $addr_dst $OL_NET_V6$DST
|
|
}
|
|
|
|
is_ipv6() {
|
|
if [[ $1 =~ .*:.* ]]; then
|
|
return 0
|
|
fi
|
|
return 1
|
|
}
|
|
|
|
run_test() {
|
|
local -r msg=$1
|
|
local -r dst=$2
|
|
local -r pkts=$3
|
|
local -r vxpkts=$4
|
|
local bind=$5
|
|
local rx_args=""
|
|
local rx_family="-4"
|
|
local family=-4
|
|
local filter=IpInReceives
|
|
local ipt=iptables
|
|
|
|
printf "%-40s" "$msg"
|
|
|
|
if is_ipv6 $dst; then
|
|
# rx program does not support '-6' and implies ipv6 usage by default
|
|
rx_family=""
|
|
family=-6
|
|
filter=Ip6InReceives
|
|
ipt=ip6tables
|
|
fi
|
|
|
|
rx_args="$rx_family"
|
|
[ -n "$bind" ] && rx_args="$rx_args -b $bind"
|
|
|
|
# send a single GSO packet, segmented in 10 UDP frames.
|
|
# Always expect 10 UDP frames on RX side as rx socket does
|
|
# not enable GRO
|
|
ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 4789
|
|
ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 8000
|
|
ip netns exec $NS_DST ./udpgso_bench_rx -C 2000 -R 100 -n 10 -l 1300 $rx_args &
|
|
local spid=$!
|
|
wait_local_port_listen "$NS_DST" 8000 udp
|
|
ip netns exec $NS_SRC ./udpgso_bench_tx $family -M 1 -s 13000 -S 1300 -D $dst
|
|
local retc=$?
|
|
wait $spid
|
|
local rets=$?
|
|
if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then
|
|
echo " fail client exit code $retc, server $rets"
|
|
ret=1
|
|
return
|
|
fi
|
|
|
|
local rcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 8000' | \
|
|
sed -e 's/\[//' -e 's/:.*//'`
|
|
if [ $rcv != $pkts ]; then
|
|
echo " fail - received $rcv packets, expected $pkts"
|
|
ret=1
|
|
return
|
|
fi
|
|
|
|
local vxrcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 4789' | \
|
|
sed -e 's/\[//' -e 's/:.*//'`
|
|
|
|
# upper net can generate a little noise, allow some tolerance
|
|
if [ $vxrcv -lt $vxpkts -o $vxrcv -gt $((vxpkts + 3)) ]; then
|
|
echo " fail - received $vxrcv vxlan packets, expected $vxpkts"
|
|
ret=1
|
|
return
|
|
fi
|
|
echo " ok"
|
|
}
|
|
|
|
run_bench() {
|
|
local -r msg=$1
|
|
local -r dst=$2
|
|
local family=-4
|
|
|
|
printf "%-40s" "$msg"
|
|
if [ $NPROCS -lt 2 ]; then
|
|
echo " skip - needed 2 CPUs found $NPROCS"
|
|
return
|
|
fi
|
|
|
|
is_ipv6 $dst && family=-6
|
|
|
|
# bind the sender and the receiver to different CPUs to try
|
|
# get reproducible results
|
|
ip netns exec $NS_DST bash -c "echo 2 > /sys/class/net/veth$DST/queues/rx-0/rps_cpus"
|
|
ip netns exec $NS_DST taskset 0x2 ./udpgso_bench_rx -C 2000 -R 100 &
|
|
local spid=$!
|
|
wait_local_port_listen "$NS_DST" 8000 udp
|
|
ip netns exec $NS_SRC taskset 0x1 ./udpgso_bench_tx $family -l 3 -S 1300 -D $dst
|
|
local retc=$?
|
|
wait $spid
|
|
local rets=$?
|
|
if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then
|
|
echo " fail client exit code $retc, server $rets"
|
|
ret=1
|
|
return
|
|
fi
|
|
}
|
|
|
|
for family in 4 6; do
|
|
BM_NET=$BM_NET_V4
|
|
OL_NET=$OL_NET_V4
|
|
IPT=iptables
|
|
SUFFIX=24
|
|
VXDEV=vxlan
|
|
PING=ping
|
|
|
|
if [ $family = 6 ]; then
|
|
BM_NET=$BM_NET_V6
|
|
OL_NET=$OL_NET_V6
|
|
SUFFIX="64 nodad"
|
|
VXDEV=vxlan6
|
|
IPT=ip6tables
|
|
# Use ping6 on systems where ping doesn't handle IPv6
|
|
ping -w 1 -c 1 ::1 > /dev/null 2>&1 || PING="ping6"
|
|
fi
|
|
|
|
echo "IPv$family"
|
|
|
|
create_ns
|
|
run_test "No GRO" $BM_NET$DST 10 0
|
|
cleanup
|
|
|
|
create_ns
|
|
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
|
|
ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
|
|
run_test "GRO frag list" $BM_NET$DST 1 0
|
|
cleanup
|
|
|
|
# UDP GRO fwd skips aggregation when find an udp socket with the GRO option
|
|
# if there is an UDP tunnel in the running system, such lookup happen
|
|
# take place.
|
|
# use NAT to circumvent GRO FWD check
|
|
create_ns
|
|
ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX
|
|
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
|
|
ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
|
|
ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \
|
|
-j DNAT --to-destination $BM_NET$DST
|
|
run_test "GRO fwd" $BM_NET$DST_NAT 1 0 $BM_NET$DST
|
|
cleanup
|
|
|
|
create_ns
|
|
run_bench "UDP fwd perf" $BM_NET$DST
|
|
ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
|
|
run_bench "UDP GRO fwd perf" $BM_NET$DST
|
|
cleanup
|
|
|
|
create_vxlan_pair
|
|
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
|
|
ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
|
|
run_test "GRO frag list over UDP tunnel" $OL_NET$DST 10 10
|
|
cleanup
|
|
|
|
# use NAT to circumvent GRO FWD check
|
|
create_vxlan_pair
|
|
ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX
|
|
ip netns exec $NS_DST ethtool -K veth$DST generic-receive-offload on
|
|
ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
|
|
ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \
|
|
-j DNAT --to-destination $OL_NET$DST
|
|
|
|
# load arp cache before running the test to reduce the amount of
|
|
# stray traffic on top of the UDP tunnel
|
|
ip netns exec $NS_SRC $PING -q -c 1 $OL_NET$DST_NAT >/dev/null
|
|
run_test "GRO fwd over UDP tunnel" $OL_NET$DST_NAT 10 10 $OL_NET$DST
|
|
cleanup
|
|
done
|
|
|
|
exit $ret
|