1#!/bin/bash
2# SPDX-License-Identifier: GPL-2.0
3
4readonly BASE="ns-$(mktemp -u XXXXXX)"
5readonly SRC=2
6readonly DST=1
7readonly DST_NAT=100
8readonly NS_SRC=$BASE$SRC
9readonly NS_DST=$BASE$DST
10
11# "baremetal" network used for raw UDP traffic
12readonly BM_NET_V4=192.168.1.
13readonly BM_NET_V6=2001:db8::
14
15# "overlay" network used for UDP over UDP tunnel traffic
16readonly OL_NET_V4=172.16.1.
17readonly OL_NET_V6=2001:db8:1::
18readonly NPROCS=`nproc`
19
20cleanup() {
21	local ns
22	local -r jobs="$(jobs -p)"
23	[ -n "${jobs}" ] && kill -1 ${jobs} 2>/dev/null
24
25	for ns in $NS_SRC $NS_DST; do
26		ip netns del $ns 2>/dev/null
27	done
28}
29
30trap cleanup EXIT
31
32create_ns() {
33	local net
34	local ns
35
36	for ns in $NS_SRC $NS_DST; do
37		ip netns add $ns
38		ip -n $ns link set dev lo up
39	done
40
41	ip link add name veth$SRC type veth peer name veth$DST
42
43	for ns in $SRC $DST; do
44		ip link set dev veth$ns netns $BASE$ns
45		ip -n $BASE$ns link set dev veth$ns up
46		ip -n $BASE$ns addr add dev veth$ns $BM_NET_V4$ns/24
47		ip -n $BASE$ns addr add dev veth$ns $BM_NET_V6$ns/64 nodad
48	done
49	ip -n $NS_DST link set veth$DST xdp object ../bpf/xdp_dummy.o section xdp_dummy 2>/dev/null
50}
51
52create_vxlan_endpoint() {
53	local -r netns=$1
54	local -r bm_dev=$2
55	local -r bm_rem_addr=$3
56	local -r vxlan_dev=$4
57	local -r vxlan_id=$5
58	local -r vxlan_port=4789
59
60	ip -n $netns link set dev $bm_dev up
61	ip -n $netns link add dev $vxlan_dev type vxlan id $vxlan_id \
62				dstport $vxlan_port remote $bm_rem_addr
63	ip -n $netns link set dev $vxlan_dev up
64}
65
66create_vxlan_pair() {
67	local ns
68
69	create_ns
70
71	for ns in $SRC $DST; do
72		# note that 3 - $SRC == $DST and 3 - $DST == $SRC
73		create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V4$((3 - $ns)) vxlan$ns 4
74		ip -n $BASE$ns addr add dev vxlan$ns $OL_NET_V4$ns/24
75	done
76	for ns in $SRC $DST; do
77		create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V6$((3 - $ns)) vxlan6$ns 6
78		ip -n $BASE$ns addr add dev vxlan6$ns $OL_NET_V6$ns/24 nodad
79	done
80}
81
82is_ipv6() {
83	if [[ $1 =~ .*:.* ]]; then
84		return 0
85	fi
86	return 1
87}
88
89run_test() {
90	local -r msg=$1
91	local -r dst=$2
92	local -r pkts=$3
93	local -r vxpkts=$4
94	local bind=$5
95	local rx_args=""
96	local rx_family="-4"
97	local family=-4
98	local filter=IpInReceives
99	local ipt=iptables
100
101	printf "%-40s" "$msg"
102
103	if is_ipv6 $dst; then
104		# rx program does not support '-6' and implies ipv6 usage by default
105		rx_family=""
106		family=-6
107		filter=Ip6InReceives
108		ipt=ip6tables
109	fi
110
111	rx_args="$rx_family"
112	[ -n "$bind" ] && rx_args="$rx_args -b $bind"
113
114	# send a single GSO packet, segmented in 10 UDP frames.
115	# Always expect 10 UDP frames on RX side as rx socket does
116	# not enable GRO
117	ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 4789
118	ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 8000
119	ip netns exec $NS_DST ./udpgso_bench_rx -C 1000 -R 10 -n 10 -l 1300 $rx_args &
120	local spid=$!
121	sleep 0.1
122	ip netns exec $NS_SRC ./udpgso_bench_tx $family -M 1 -s 13000 -S 1300 -D $dst
123	local retc=$?
124	wait $spid
125	local rets=$?
126	if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then
127		echo " fail client exit code $retc, server $rets"
128		ret=1
129		return
130	fi
131
132	local rcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 8000' | \
133							  sed -e 's/\[//' -e 's/:.*//'`
134	if [ $rcv != $pkts ]; then
135		echo " fail - received $rvs packets, expected $pkts"
136		ret=1
137		return
138	fi
139
140	local vxrcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 4789' | \
141							    sed -e 's/\[//' -e 's/:.*//'`
142
143	# upper net can generate a little noise, allow some tolerance
144	if [ $vxrcv -lt $vxpkts -o $vxrcv -gt $((vxpkts + 3)) ]; then
145		echo " fail - received $vxrcv vxlan packets, expected $vxpkts"
146		ret=1
147		return
148	fi
149	echo " ok"
150}
151
152run_bench() {
153	local -r msg=$1
154	local -r dst=$2
155	local family=-4
156
157	printf "%-40s" "$msg"
158	if [ $NPROCS -lt 2 ]; then
159		echo " skip - needed 2 CPUs found $NPROCS"
160		return
161	fi
162
163	is_ipv6 $dst && family=-6
164
165	# bind the sender and the receiver to different CPUs to try
166	# get reproducible results
167	ip netns exec $NS_DST bash -c "echo 2 > /sys/class/net/veth$DST/queues/rx-0/rps_cpus"
168	ip netns exec $NS_DST taskset 0x2 ./udpgso_bench_rx -C 1000 -R 10  &
169	local spid=$!
170	sleep 0.1
171	ip netns exec $NS_SRC taskset 0x1 ./udpgso_bench_tx $family -l 3 -S 1300 -D $dst
172	local retc=$?
173	wait $spid
174	local rets=$?
175	if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then
176		echo " fail client exit code $retc, server $rets"
177		ret=1
178		return
179	fi
180}
181
182for family in 4 6; do
183	BM_NET=$BM_NET_V4
184	OL_NET=$OL_NET_V4
185	IPT=iptables
186	SUFFIX=24
187	VXDEV=vxlan
188
189	if [ $family = 6 ]; then
190		BM_NET=$BM_NET_V6
191		OL_NET=$OL_NET_V6
192		SUFFIX="64 nodad"
193		VXDEV=vxlan6
194		IPT=ip6tables
195	fi
196
197	echo "IPv$family"
198
199	create_ns
200	run_test "No GRO" $BM_NET$DST 10 0
201	cleanup
202
203	create_ns
204	ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
205	run_test "GRO frag list" $BM_NET$DST 1 0
206	cleanup
207
208	# UDP GRO fwd skips aggregation when find an udp socket with the GRO option
209	# if there is an UDP tunnel in the running system, such lookup happen
210	# take place.
211	# use NAT to circumvent GRO FWD check
212	create_ns
213	ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX
214	ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
215	ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \
216					-j DNAT --to-destination $BM_NET$DST
217	run_test "GRO fwd" $BM_NET$DST_NAT 1 0 $BM_NET$DST
218	cleanup
219
220	create_ns
221	run_bench "UDP fwd perf" $BM_NET$DST
222	ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
223	run_bench "UDP GRO fwd perf" $BM_NET$DST
224	cleanup
225
226	create_vxlan_pair
227	ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
228	run_test "GRO frag list over UDP tunnel" $OL_NET$DST 1 1
229	cleanup
230
231	# use NAT to circumvent GRO FWD check
232	create_vxlan_pair
233	ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX
234	ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
235	ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \
236					-j DNAT --to-destination $OL_NET$DST
237
238	# load arp cache before running the test to reduce the amount of
239	# stray traffic on top of the UDP tunnel
240	ip netns exec $NS_SRC ping -q -c 1 $OL_NET$DST_NAT >/dev/null
241	run_test "GRO fwd over UDP tunnel" $OL_NET$DST_NAT 1 1 $OL_NET$DST
242	cleanup
243
244	create_vxlan_pair
245	run_bench "UDP tunnel fwd perf" $OL_NET$DST
246	ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
247	run_bench "UDP tunnel GRO fwd perf" $OL_NET$DST
248	cleanup
249done
250
251exit $ret
252