| #!/bin/bash |
| # SPDX-License-Identifier: GPL-2.0 |
| |
| readonly BASE="ns-$(mktemp -u XXXXXX)" |
| readonly SRC=2 |
| readonly DST=1 |
| readonly DST_NAT=100 |
| readonly NS_SRC=$BASE$SRC |
| readonly NS_DST=$BASE$DST |
| |
| # "baremetal" network used for raw UDP traffic |
| readonly BM_NET_V4=192.168.1. |
| readonly BM_NET_V6=2001:db8:: |
| |
| # "overlay" network used for UDP over UDP tunnel traffic |
| readonly OL_NET_V4=172.16.1. |
| readonly OL_NET_V6=2001:db8:1:: |
| readonly NPROCS=`nproc` |
| |
| cleanup() { |
| local ns |
| local -r jobs="$(jobs -p)" |
| [ -n "${jobs}" ] && kill -1 ${jobs} 2>/dev/null |
| |
| for ns in $NS_SRC $NS_DST; do |
| ip netns del $ns 2>/dev/null |
| done |
| } |
| |
| trap cleanup EXIT |
| |
| create_ns() { |
| local net |
| local ns |
| |
| for ns in $NS_SRC $NS_DST; do |
| ip netns add $ns |
| ip -n $ns link set dev lo up |
| done |
| |
| ip link add name veth$SRC type veth peer name veth$DST |
| |
| for ns in $SRC $DST; do |
| ip link set dev veth$ns netns $BASE$ns |
| ip -n $BASE$ns link set dev veth$ns up |
| ip -n $BASE$ns addr add dev veth$ns $BM_NET_V4$ns/24 |
| ip -n $BASE$ns addr add dev veth$ns $BM_NET_V6$ns/64 nodad |
| done |
| ip -n $NS_DST link set veth$DST xdp object ../bpf/xdp_dummy.o section xdp_dummy 2>/dev/null |
| } |
| |
| create_vxlan_endpoint() { |
| local -r netns=$1 |
| local -r bm_dev=$2 |
| local -r bm_rem_addr=$3 |
| local -r vxlan_dev=$4 |
| local -r vxlan_id=$5 |
| local -r vxlan_port=4789 |
| |
| ip -n $netns link set dev $bm_dev up |
| ip -n $netns link add dev $vxlan_dev type vxlan id $vxlan_id \ |
| dstport $vxlan_port remote $bm_rem_addr |
| ip -n $netns link set dev $vxlan_dev up |
| } |
| |
| create_vxlan_pair() { |
| local ns |
| |
| create_ns |
| |
| for ns in $SRC $DST; do |
| # note that 3 - $SRC == $DST and 3 - $DST == $SRC |
| create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V4$((3 - $ns)) vxlan$ns 4 |
| ip -n $BASE$ns addr add dev vxlan$ns $OL_NET_V4$ns/24 |
| done |
| for ns in $SRC $DST; do |
| create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V6$((3 - $ns)) vxlan6$ns 6 |
| ip -n $BASE$ns addr add dev vxlan6$ns $OL_NET_V6$ns/24 nodad |
| done |
| } |
| |
| is_ipv6() { |
| if [[ $1 =~ .*:.* ]]; then |
| return 0 |
| fi |
| return 1 |
| } |
| |
| run_test() { |
| local -r msg=$1 |
| local -r dst=$2 |
| local -r pkts=$3 |
| local -r vxpkts=$4 |
| local bind=$5 |
| local rx_args="" |
| local rx_family="-4" |
| local family=-4 |
| local filter=IpInReceives |
| local ipt=iptables |
| |
| printf "%-40s" "$msg" |
| |
| if is_ipv6 $dst; then |
| # rx program does not support '-6' and implies ipv6 usage by default |
| rx_family="" |
| family=-6 |
| filter=Ip6InReceives |
| ipt=ip6tables |
| fi |
| |
| rx_args="$rx_family" |
| [ -n "$bind" ] && rx_args="$rx_args -b $bind" |
| |
| # send a single GSO packet, segmented in 10 UDP frames. |
| # Always expect 10 UDP frames on RX side as rx socket does |
| # not enable GRO |
| ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 4789 |
| ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 8000 |
| ip netns exec $NS_DST ./udpgso_bench_rx -C 1000 -R 10 -n 10 -l 1300 $rx_args & |
| local spid=$! |
| sleep 0.1 |
| ip netns exec $NS_SRC ./udpgso_bench_tx $family -M 1 -s 13000 -S 1300 -D $dst |
| local retc=$? |
| wait $spid |
| local rets=$? |
| if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then |
| echo " fail client exit code $retc, server $rets" |
| ret=1 |
| return |
| fi |
| |
| local rcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 8000' | \ |
| sed -e 's/\[//' -e 's/:.*//'` |
| if [ $rcv != $pkts ]; then |
| echo " fail - received $rcv packets, expected $pkts" |
| ret=1 |
| return |
| fi |
| |
| local vxrcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 4789' | \ |
| sed -e 's/\[//' -e 's/:.*//'` |
| |
| # upper net can generate a little noise, allow some tolerance |
| if [ $vxrcv -lt $vxpkts -o $vxrcv -gt $((vxpkts + 3)) ]; then |
| echo " fail - received $vxrcv vxlan packets, expected $vxpkts" |
| ret=1 |
| return |
| fi |
| echo " ok" |
| } |
| |
| run_bench() { |
| local -r msg=$1 |
| local -r dst=$2 |
| local family=-4 |
| |
| printf "%-40s" "$msg" |
| if [ $NPROCS -lt 2 ]; then |
| echo " skip - needed 2 CPUs found $NPROCS" |
| return |
| fi |
| |
| is_ipv6 $dst && family=-6 |
| |
| # bind the sender and the receiver to different CPUs to try |
| # get reproducible results |
| ip netns exec $NS_DST bash -c "echo 2 > /sys/class/net/veth$DST/queues/rx-0/rps_cpus" |
| ip netns exec $NS_DST taskset 0x2 ./udpgso_bench_rx -C 1000 -R 10 & |
| local spid=$! |
| sleep 0.1 |
| ip netns exec $NS_SRC taskset 0x1 ./udpgso_bench_tx $family -l 3 -S 1300 -D $dst |
| local retc=$? |
| wait $spid |
| local rets=$? |
| if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then |
| echo " fail client exit code $retc, server $rets" |
| ret=1 |
| return |
| fi |
| } |
| |
| for family in 4 6; do |
| BM_NET=$BM_NET_V4 |
| OL_NET=$OL_NET_V4 |
| IPT=iptables |
| SUFFIX=24 |
| VXDEV=vxlan |
| PING=ping |
| |
| if [ $family = 6 ]; then |
| BM_NET=$BM_NET_V6 |
| OL_NET=$OL_NET_V6 |
| SUFFIX="64 nodad" |
| VXDEV=vxlan6 |
| IPT=ip6tables |
| # Use ping6 on systems where ping doesn't handle IPv6 |
| ping -w 1 -c 1 ::1 > /dev/null 2>&1 || PING="ping6" |
| fi |
| |
| echo "IPv$family" |
| |
| create_ns |
| run_test "No GRO" $BM_NET$DST 10 0 |
| cleanup |
| |
| create_ns |
| ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on |
| run_test "GRO frag list" $BM_NET$DST 1 0 |
| cleanup |
| |
| # UDP GRO fwd skips aggregation when find an udp socket with the GRO option |
| # if there is an UDP tunnel in the running system, such lookup happen |
| # take place. |
| # use NAT to circumvent GRO FWD check |
| create_ns |
| ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX |
| ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on |
| ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \ |
| -j DNAT --to-destination $BM_NET$DST |
| run_test "GRO fwd" $BM_NET$DST_NAT 1 0 $BM_NET$DST |
| cleanup |
| |
| create_ns |
| run_bench "UDP fwd perf" $BM_NET$DST |
| ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on |
| run_bench "UDP GRO fwd perf" $BM_NET$DST |
| cleanup |
| |
| create_vxlan_pair |
| ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on |
| run_test "GRO frag list over UDP tunnel" $OL_NET$DST 1 1 |
| cleanup |
| |
| # use NAT to circumvent GRO FWD check |
| create_vxlan_pair |
| ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX |
| ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on |
| ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \ |
| -j DNAT --to-destination $OL_NET$DST |
| |
| # load arp cache before running the test to reduce the amount of |
| # stray traffic on top of the UDP tunnel |
| ip netns exec $NS_SRC $PING -q -c 1 $OL_NET$DST_NAT >/dev/null |
| run_test "GRO fwd over UDP tunnel" $OL_NET$DST_NAT 1 1 $OL_NET$DST |
| cleanup |
| |
| create_vxlan_pair |
| run_bench "UDP tunnel fwd perf" $OL_NET$DST |
| ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on |
| run_bench "UDP tunnel GRO fwd perf" $OL_NET$DST |
| cleanup |
| done |
| |
| exit $ret |