2 # SPDX-License-Identifier: GPL-2.0
7 readonly BASE="ns-$(mktemp -u XXXXXX)"
11 readonly NS_SRC=$BASE$SRC
12 readonly NS_DST=$BASE$DST
14 # "baremetal" network used for raw UDP traffic
15 readonly BM_NET_V4=192.168.1.
16 readonly BM_NET_V6=2001:db8::
18 # "overlay" network used for UDP over UDP tunnel traffic
19 readonly OL_NET_V4=172.16.1.
20 readonly OL_NET_V6=2001:db8:1::
21 readonly NPROCS=`nproc`
25 local -r jobs="$(jobs -p)"
26 [ -n "${jobs}" ] && kill -1 ${jobs} 2>/dev/null
28 for ns in $NS_SRC $NS_DST; do
29 ip netns del $ns 2>/dev/null
39 for ns in $NS_SRC $NS_DST; do
41 ip -n $ns link set dev lo up
44 ip link add name veth$SRC type veth peer name veth$DST
46 for ns in $SRC $DST; do
47 ip link set dev veth$ns netns $BASE$ns
48 ip -n $BASE$ns link set dev veth$ns up
49 ip -n $BASE$ns addr add dev veth$ns $BM_NET_V4$ns/24
50 ip -n $BASE$ns addr add dev veth$ns $BM_NET_V6$ns/64 nodad
52 ip -n $NS_DST link set veth$DST xdp object ${BPF_FILE} section xdp 2>/dev/null
55 create_vxlan_endpoint() {
58 local -r bm_rem_addr=$3
61 local -r vxlan_port=4789
63 ip -n $netns link set dev $bm_dev up
64 ip -n $netns link add dev $vxlan_dev type vxlan id $vxlan_id \
65 dstport $vxlan_port remote $bm_rem_addr
66 ip -n $netns link set dev $vxlan_dev up
74 for ns in $SRC $DST; do
75 # note that 3 - $SRC == $DST and 3 - $DST == $SRC
76 create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V4$((3 - $ns)) vxlan$ns 4
77 ip -n $BASE$ns addr add dev vxlan$ns $OL_NET_V4$ns/24
79 for ns in $SRC $DST; do
80 create_vxlan_endpoint $BASE$ns veth$ns $BM_NET_V6$((3 - $ns)) vxlan6$ns 6
81 ip -n $BASE$ns addr add dev vxlan6$ns $OL_NET_V6$ns/24 nodad
86 if [[ $1 =~ .*:.* ]]; then
101 local filter=IpInReceives
104 printf "%-40s" "$msg"
106 if is_ipv6 $dst; then
107 # rx program does not support '-6' and implies ipv6 usage by default
115 [ -n "$bind" ] && rx_args="$rx_args -b $bind"
117 # send a single GSO packet, segmented in 10 UDP frames.
118 # Always expect 10 UDP frames on RX side as rx socket does
120 ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 4789
121 ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 8000
122 ip netns exec $NS_DST ./udpgso_bench_rx -C 1000 -R 10 -n 10 -l 1300 $rx_args &
124 wait_local_port_listen "$NS_DST" 8000 udp
125 ip netns exec $NS_SRC ./udpgso_bench_tx $family -M 1 -s 13000 -S 1300 -D $dst
129 if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then
130 echo " fail client exit code $retc, server $rets"
135 local rcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 8000' | \
136 sed -e 's/\[//' -e 's/:.*//'`
137 if [ $rcv != $pkts ]; then
138 echo " fail - received $rcv packets, expected $pkts"
143 local vxrcv=`ip netns exec $NS_DST $ipt"-save" -c | grep 'dport 4789' | \
144 sed -e 's/\[//' -e 's/:.*//'`
146 # upper net can generate a little noise, allow some tolerance
147 if [ $vxrcv -lt $vxpkts -o $vxrcv -gt $((vxpkts + 3)) ]; then
148 echo " fail - received $vxrcv vxlan packets, expected $vxpkts"
160 printf "%-40s" "$msg"
161 if [ $NPROCS -lt 2 ]; then
162 echo " skip - needed 2 CPUs found $NPROCS"
166 is_ipv6 $dst && family=-6
168 # bind the sender and the receiver to different CPUs to try
169 # get reproducible results
170 ip netns exec $NS_DST bash -c "echo 2 > /sys/class/net/veth$DST/queues/rx-0/rps_cpus"
171 ip netns exec $NS_DST taskset 0x2 ./udpgso_bench_rx -C 1000 -R 10 &
173 wait_local_port_listen "$NS_DST" 8000 udp
174 ip netns exec $NS_SRC taskset 0x1 ./udpgso_bench_tx $family -l 3 -S 1300 -D $dst
178 if [ ${rets} -ne 0 ] || [ ${retc} -ne 0 ]; then
179 echo " fail client exit code $retc, server $rets"
185 for family in 4 6; do
193 if [ $family = 6 ]; then
199 # Use ping6 on systems where ping doesn't handle IPv6
200 ping -w 1 -c 1 ::1 > /dev/null 2>&1 || PING="ping6"
206 run_test "No GRO" $BM_NET$DST 10 0
210 ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
211 run_test "GRO frag list" $BM_NET$DST 1 0
214 # UDP GRO fwd skips aggregation when find an udp socket with the GRO option
215 # if there is an UDP tunnel in the running system, such lookup happen
217 # use NAT to circumvent GRO FWD check
219 ip -n $NS_DST addr add dev veth$DST $BM_NET$DST_NAT/$SUFFIX
220 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
221 ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $BM_NET$DST_NAT \
222 -j DNAT --to-destination $BM_NET$DST
223 run_test "GRO fwd" $BM_NET$DST_NAT 1 0 $BM_NET$DST
227 run_bench "UDP fwd perf" $BM_NET$DST
228 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
229 run_bench "UDP GRO fwd perf" $BM_NET$DST
233 ip netns exec $NS_DST ethtool -K veth$DST rx-gro-list on
234 run_test "GRO frag list over UDP tunnel" $OL_NET$DST 1 1
237 # use NAT to circumvent GRO FWD check
239 ip -n $NS_DST addr add dev $VXDEV$DST $OL_NET$DST_NAT/$SUFFIX
240 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
241 ip netns exec $NS_DST $IPT -t nat -I PREROUTING -d $OL_NET$DST_NAT \
242 -j DNAT --to-destination $OL_NET$DST
244 # load arp cache before running the test to reduce the amount of
245 # stray traffic on top of the UDP tunnel
246 ip netns exec $NS_SRC $PING -q -c 1 $OL_NET$DST_NAT >/dev/null
247 run_test "GRO fwd over UDP tunnel" $OL_NET$DST_NAT 1 1 $OL_NET$DST
251 run_bench "UDP tunnel fwd perf" $OL_NET$DST
252 ip netns exec $NS_DST ethtool -K veth$DST rx-udp-gro-forwarding on
253 run_bench "UDP tunnel GRO fwd perf" $OL_NET$DST