1#!/bin/bash 2# SPDX-License-Identifier: GPL-2.0 3 4source net_helper.sh 5 6BPF_FILE="xdp_dummy.o" 7readonly BASE="ns-$(mktemp -u XXXXXX)" 8readonly SRC=2 9readonly DST=1 10readonly DST_NAT=100 11readonly NS_SRC=$BASE$SRC 12readonly NS_DST=$BASE$DST 13 14# "baremetal" network used for raw UDP traffic 15readonly BM_NET_V4=192.168.1. 16readonly BM_NET_V6=2001:db8:: 17 18# "overlay" network used for UDP over UDP tunnel traffic 19readonly OL_NET_V4=172.16.1. 20readonly OL_NET_V6=2001:db8:1:: 21readonly NPROCS=`nproc` 22 23cleanup() { 24 local ns 25 local -r jobs="$(jobs -p)" 26 [ -n "${jobs}" ] && kill -1 ${jobs} 2>/dev/null 27 28 for ns in $NS_SRC $NS_DST; do 29 ip netns del $ns 2>/dev/null 30 done 31} 32 33trap cleanup EXIT 34 35create_ns() { 36 local net 37 local ns 38 39 for ns in $NS_SRC $NS_DST; do 40 ip netns add $ns 41 ip -n $ns link set dev lo up 42 done 43 44 ip link add name veth$SRC type veth peer name veth$DST 45 46 for ns in $SRC $DST; do 47 ip link set dev veth$ns netns $BASE$ns 48 ip -n $BASE$ns link set dev veth$ns up 49 ip -n $BASE$ns addr add dev veth$ns $BM_NET_V4$ns/24 50 ip -n $BASE$ns addr add dev veth$ns $BM_NET_V6$ns/64 nodad 51 done 52 ip -n $NS_DST link set veth$DST xdp object ${BPF_FILE} section xdp 2>/dev/null 53} 54 55create_vxlan_endpoint() { 56 local -r netns=$1 57 local -r bm_dev=$2 58 local -r bm_rem_addr=$3 59 local -r vxlan_dev=$4 60 local -r vxlan_id=$5 61 local -r vxlan_port=4789 62 63 ip -n $netns link set dev $bm_dev up 64 ip -n $netns link add dev $vxlan_dev type vxlan id $vxlan_id \ 65 dstport $vxlan_port remote $bm_rem_addr 66 ip -n $netns link set dev $vxlan_dev up 67} 68 69create_vxlan_pair() { 70 local ns 71 72 create_ns 73 74 for ns in $SRC $DST; do 75 # note that 3 - $SRC == $DST and 3 - $DST == $SRC 76 create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V4$((3 - $ns)) vxlan$ns 4 77 ip -n $BASE$ns addr add dev vxlan$ns $OL_NET_V4$ns/24 78 done 79 for ns in $SRC $DST; do 80 create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V6$((3 - $ns)) vxlan6$ns 6 81 ip -n $BASE$ns addr add dev vxlan6$ns $OL_NET_V6$ns/24 nodad 82 done 83} 84 85is_ipv6() { 86 if [[ $1 =~ .*:.* ]]; then 87 return 0 88 fi 89 return 1 90} 91 92run_test() { 93 local -r msg=$1 94 local -r dst=$2 95 local -r pkts=$3 96 local -r vxpkts=$4 97 local bind=$5 98 local rx_args="" 99 local rx_family="-4" 100 local family=-4 101 local filter=IpInReceives 102 local ipt=iptables 103 104 printf "%-40s" "$msg" 105 106 if is_ipv6 $dst; then 107 # rx program does not support '-6' and implies ipv6 usage by default 108 rx_family="" 109 family=-6 110 filter=Ip6InReceives 111 ipt=ip6tables 112 fi 113 114 rx_args="$rx_family" 115 [ -n "$bind" ] && rx_args="$rx_args -b $bind" 116 117 # send a single GSO packet, segmented in 10 UDP frames. 118 # Always expect 10 UDP frames on RX side as rx socket does 119 # not enable GRO 120 ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 4789 121 ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 8000 122 ip netns exec $NS_DST ./udpgso_bench_rx -C 1000 -R 10 -n 10 -l 1300 $rx_args & 123 local spid=$! 124 wait_local_port_listen "$NS_DST" 8000 udp 125 ip netns exec $NS_SRC ./udpgso_bench_tx $family -M 1 -s 13000 -S 1300 -D $dst 126 local retc=$? 127 wait $spid 128 local rets=$? 129 if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then 130 echo " fail client exit code $retc, server $rets" 131 ret=1 132 return 133 fi 134 135 local rcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 8000' | \ 136 sed -e 's/\[//' -e 's/:.*//'` 137 if [ $rcv != $pkts ]; then 138 echo " fail - received $rcv packets, expected $pkts" 139 ret=1 140 return 141 fi 142 143 local vxrcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 4789' | \ 144 sed -e 's/\[//' -e 's/:.*//'` 145 146 # upper net can generate a little noise, allow some tolerance 147 if [ $vxrcv -lt $vxpkts -o $vxrcv -gt $((vxpkts + 3)) ]; then 148 echo " fail - received $vxrcv vxlan packets, expected $vxpkts" 149 ret=1 150 return 151 fi 152 echo " ok" 153} 154 155run_bench() { 156 local -r msg=$1 157 local -r dst=$2 158 local family=-4 159 160 printf "%-40s" "$msg" 161 if [ $NPROCS -lt 2 ]; then 162 echo " skip - needed 2 CPUs found $NPROCS" 163 return 164 fi 165 166 is_ipv6 $dst && family=-6 167 168 # bind the sender and the receiver to different CPUs to try 169 # get reproducible results 170 ip netns exec $NS_DST bash -c "echo 2 > /sys/class/net/veth$DST/queues/rx-0/rps_cpus" 171 ip netns exec $NS_DST taskset 0x2 ./udpgso_bench_rx -C 1000 -R 10 & 172 local spid=$! 173 wait_local_port_listen "$NS_DST" 8000 udp 174 ip netns exec $NS_SRC taskset 0x1 ./udpgso_bench_tx $family -l 3 -S 1300 -D $dst 175 local retc=$? 176 wait $spid 177 local rets=$? 178 if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then 179 echo " fail client exit code $retc, server $rets" 180 ret=1 181 return 182 fi 183} 184 185for family in 4 6; do 186 BM_NET=$BM_NET_V4 187 OL_NET=$OL_NET_V4 188 IPT=iptables 189 SUFFIX=24 190 VXDEV=vxlan 191 PING=ping 192 193 if [ $family = 6 ]; then 194 BM_NET=$BM_NET_V6 195 OL_NET=$OL_NET_V6 196 SUFFIX="64 nodad" 197 VXDEV=vxlan6 198 IPT=ip6tables 199 # Use ping6 on systems where ping doesn't handle IPv6 200 ping -w 1 -c 1 ::1 > /dev/null 2>&1 || PING="ping6" 201 fi 202 203 echo "IPv$family" 204 205 create_ns 206 run_test "No GRO" $BM_NET$DST 10 0 207 cleanup 208 209 create_ns 210 ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on 211 run_test "GRO frag list" $BM_NET$DST 1 0 212 cleanup 213 214 # UDP GRO fwd skips aggregation when find an udp socket with the GRO option 215 # if there is an UDP tunnel in the running system, such lookup happen 216 # take place. 217 # use NAT to circumvent GRO FWD check 218 create_ns 219 ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX 220 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on 221 ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \ 222 -j DNAT --to-destination $BM_NET$DST 223 run_test "GRO fwd" $BM_NET$DST_NAT 1 0 $BM_NET$DST 224 cleanup 225 226 create_ns 227 run_bench "UDP fwd perf" $BM_NET$DST 228 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on 229 run_bench "UDP GRO fwd perf" $BM_NET$DST 230 cleanup 231 232 create_vxlan_pair 233 ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on 234 run_test "GRO frag list over UDP tunnel" $OL_NET$DST 1 1 235 cleanup 236 237 # use NAT to circumvent GRO FWD check 238 create_vxlan_pair 239 ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX 240 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on 241 ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \ 242 -j DNAT --to-destination $OL_NET$DST 243 244 # load arp cache before running the test to reduce the amount of 245 # stray traffic on top of the UDP tunnel 246 ip netns exec $NS_SRC $PING -q -c 1 $OL_NET$DST_NAT >/dev/null 247 run_test "GRO fwd over UDP tunnel" $OL_NET$DST_NAT 1 1 $OL_NET$DST 248 cleanup 249 250 create_vxlan_pair 251 run_bench "UDP tunnel fwd perf" $OL_NET$DST 252 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on 253 run_bench "UDP tunnel GRO fwd perf" $OL_NET$DST 254 cleanup 255done 256 257exit $ret 258