diff options
author | Piotr Bronowski <piotrx.bronowski@intel.com> | 2022-05-05 18:51:21 +0000 |
---|---|---|
committer | Piotr Bronowski <piotrx.bronowski@intel.com> | 2022-06-29 10:33:41 +0000 |
commit | 422544363c5010b4580eb15f3661aa59ad9e4ad9 (patch) | |
tree | 8246fe2899cd00e40767777525664214dbf7d147 /src/plugins/unittest | |
parent | 93bc431df342acffadccd19c62d8d0f50d108b66 (diff) |
tests: add ipsec flow performance unit test
This patch adds performacne and functional tests for ip4
outbound traffic policy matching.
Test setup is configurable in startup.conf and though the test
parameters. Cache, fast path, fast path burst mode can be enabled
and disabled,
and performance for different lookup setup can be measured.
Type: feature
Signed-off-by: Piotr Bronowski <piotrx.bronowski@intel.com>
Change-Id: I1d04d196e412f47f43b7e5cbd46607bf6a9cc40e
Diffstat (limited to 'src/plugins/unittest')
-rw-r--r-- | src/plugins/unittest/ipsec_test.c | 309 |
1 files changed, 309 insertions, 0 deletions
diff --git a/src/plugins/unittest/ipsec_test.c b/src/plugins/unittest/ipsec_test.c index 0e9865052b4..55fd031b9b9 100644 --- a/src/plugins/unittest/ipsec_test.c +++ b/src/plugins/unittest/ipsec_test.c @@ -15,6 +15,7 @@ #include <vnet/ipsec/ipsec.h> #include <vnet/ipsec/ipsec_sa.h> +#include <vnet/ipsec/ipsec_output.h> static clib_error_t * test_ipsec_command_fn (vlib_main_t * vm, @@ -58,6 +59,314 @@ test_ipsec_command_fn (vlib_main_t * vm, return (NULL); } +static clib_error_t * +test_ipsec_spd_outbound_perf_command_fn (vlib_main_t *vm, + unformat_input_t *input, + vlib_cli_command_t *cmd) +{ + clib_error_t *err = 0; + ipsec_crypto_alg_t crypto_alg = IPSEC_CRYPTO_ALG_AES_GCM_128; + ipsec_integ_alg_t integ_alg = IPSEC_INTEG_ALG_NONE; + ipsec_protocol_t proto = IPSEC_PROTOCOL_ESP; + ipsec_sa_flags_t sa_flags = IPSEC_SA_FLAG_NONE; + ipsec_key_t ck = { 0 }; + u8 key_data[] = { 31, 32, 33, 34, 35, 36, 37, 38, + 39, 30, 31, 32, 33, 34, 35, 36 }; + ipsec_mk_key (&ck, key_data, 16); + ipsec_key_t ik = { 0 }; + u32 sa_id = 123456, spi = 654321, salt = 1234, sai; + u16 udp_src = IPSEC_UDP_PORT_NONE, udp_dst = IPSEC_UDP_PORT_NONE; + tunnel_t tun = {}; + + /* SPD policy */ + ipsec_main_t *im = &ipsec_main; + ipsec_policy_t *p0 = NULL; + ipsec_spd_t *spd0; + uword *pp; + u32 stat_index, spd_idx, spd_id = 1; + int is_add = 1; + int rv; + ipsec_policy_t *p_vec = NULL; + u64 i; + u64 flows = 100; + + u64 t_add_0 = 0; + u64 t_add_1 = 0; + u64 t_add = 0; + u64 t_look_0 = 0; + u64 t_look_1 = 0; + u64 t_look = 0; + u8 flow_cache_enabled = im->output_flow_cache_flag; + u32 count_cached = 0; + u32 count_slow_path = 0; + u32 seed = random_default_seed (); + u32 *rand_val = NULL; + u32 ip4_start; +#define BURST_MAX_SIZE 256 + ipsec_policy_t *policies[BURST_MAX_SIZE]; + ipsec4_spd_5tuple_t ip4_5tuples[BURST_MAX_SIZE]; + u32 burst_size = 10; + int burst_enabled = 0; + u64 t0 = clib_cpu_time_now (); + u64 t1 = 0; + u32 k = 0, m; + u64 burst_counter = 0; + + while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) + { + if (unformat (input, "flows %d", &flows)) + ; + else if (unformat (input, "burst %d", &burst_size)) + { + if (burst_size == 0) + burst_enabled = 0; + else + { + burst_enabled = 1; + burst_size = clib_min (burst_size, BURST_MAX_SIZE); + } + } + else + break; + } + + vlib_cli_output (vm, "Create env:"); + /* creating a new SA */ + rv = ipsec_sa_add_and_lock (sa_id, spi, proto, crypto_alg, &ck, integ_alg, + &ik, sa_flags, clib_host_to_net_u32 (salt), + udp_src, udp_dst, &tun, &sai); + if (rv) + { + err = clib_error_return (0, "create sa failure"); + goto done; + } + else + vlib_cli_output (vm, "\tAdd a new SA"); + + /* creating a new SPD */ + rv = ipsec_add_del_spd (vm, spd_id, is_add); + if (rv) + { + err = clib_error_return (0, "create spd failure"); + goto done; + } + else + vlib_cli_output (vm, "\tAdd a new SPD"); + + /* vector for spd_policy */ + vec_validate (p_vec, flows + 1); + vec_validate (rand_val, flows + 1); + + /* fill spd policy */ + for (i = 0; i < flows; i++) + { + rand_val[i] = random_u32 (&seed) % flows; + + p_vec[i].type = IPSEC_SPD_POLICY_IP4_OUTBOUND; + p_vec[i].priority = flows - i; + p_vec[i].policy = IPSEC_POLICY_ACTION_PROTECT; + p_vec[i].id = spd_id; + p_vec[i].sa_id = sa_id; + p_vec[i].protocol = IP_PROTOCOL_UDP; + p_vec[i].lport.start = 1; + p_vec[i].lport.stop = 1; + p_vec[i].rport.start = 1; + p_vec[i].rport.stop = 1; + /* address: 1.0.0.0 as u32 */ + ip4_start = 16777216; + p_vec[i].laddr.start.ip4.data_u32 = + clib_host_to_net_u32 (ip4_start + i * 32); + p_vec[i].laddr.stop.ip4.data_u32 = + clib_host_to_net_u32 (ip4_start + i * 32); + p_vec[i].raddr.start.ip4.data_u32 = + clib_host_to_net_u32 (ip4_start + i * 32); + p_vec[i].raddr.stop.ip4.data_u32 = + clib_host_to_net_u32 (ip4_start + i * 32); + } + + vlib_cli_output (vm, "Add SPD Policy"); + t_add_0 = clib_cpu_time_now (); + for (i = 0; i < flows; i++) + { + rv = ipsec_add_del_policy (vm, &p_vec[i], is_add, &stat_index); + if (rv) + { + clib_warning ("No add SPD Policy: %u", stat_index); + err = clib_error_return (0, "add SPD Policy failure"); + goto done; + } + } + t_add_1 = clib_cpu_time_now (); + + pp = hash_get (im->spd_index_by_spd_id, spd_id); + spd_idx = pp[0]; + spd0 = pool_elt_at_index (im->spds, spd_idx); + + vlib_cli_output (vm, "Lookup SPD Policy"); + u64 j = 0; + u64 n_lookup = 1000 * 1000; + t_look_0 = clib_cpu_time_now (); + for (i = 0; i < n_lookup; i++) + { + if (flows == j) + j = 0; + + p0 = NULL; + if (flow_cache_enabled) + { + p0 = ipsec4_out_spd_find_flow_cache_entry ( + im, 0, + clib_net_to_host_u32 (ip4_start + + ((flows - 1) - rand_val[j]) * 32), + clib_net_to_host_u32 (ip4_start + + ((flows - 1) - rand_val[j]) * 32), + clib_net_to_host_u16 (1), clib_net_to_host_u16 (1)); + if (p0) + count_cached++; + } + if (p0 == NULL) + { + if (burst_enabled) + { + u32 src_addr = (ip4_start + ((flows - 1) - rand_val[j]) * 32); + u32 dst_addr = (ip4_start + ((flows - 1) - rand_val[j]) * 32); + ipsec4_spd_5tuple_t ip4_5tuple = { + .ip4_addr = { (ip4_address_t) src_addr, + (ip4_address_t) dst_addr }, + .port = { 1, 1 }, + .proto = IP_PROTOCOL_UDP + }; + + if (k == burst_size) + { + k = 0; + clib_memset (policies, 0, + burst_size * sizeof (ipsec_policy_t *)); + burst_counter += ipsec_output_policy_match_n ( + spd0, ip4_5tuples, policies, burst_size, + flow_cache_enabled); + for (m = 0; m < burst_size; m++) + { + ASSERT (policies[m] != 0); + } + } + + clib_memcpy (ip4_5tuples + k, &ip4_5tuple, + sizeof (ipsec4_spd_5tuple_t)); + k++; + } + else + { + + p0 = ipsec_output_policy_match ( + spd0, IP_PROTOCOL_UDP, + (ip4_start + ((flows - 1) - rand_val[j]) * 32), + (ip4_start + ((flows - 1) - rand_val[j]) * 32), 1, 1, + flow_cache_enabled); + } + + count_slow_path++; + } + j++; + if (!burst_enabled) + ASSERT (p0 != 0); + } + + if (burst_enabled && k > 0) + { + clib_memset (policies, 0, k * sizeof (ipsec_policy_t *)); + burst_counter += ipsec_output_policy_match_n ( + spd0, ip4_5tuples, policies, k, flow_cache_enabled); + for (m = 0; m < k; m++) + { + ASSERT (policies[m] != 0); + } + } + t_look_1 = clib_cpu_time_now (); + + t_add = (t_add_1 - t_add_0); + t_look = (t_look_1 - t_look_0); + + vlib_cli_output (vm, "Results Outbound:"); + vlib_cli_output (vm, "Time to add %u flows: \t\t%12.10f s", flows, + (t_add / vm->clib_time.clocks_per_second)); + vlib_cli_output (vm, "Average time to add 1 flow: \t\t%12.10f s", + ((t_add / flows) / vm->clib_time.clocks_per_second)); + vlib_cli_output (vm, "Time to lookup %u flows: \t\t%12.10f s", flows, + (t_look / vm->clib_time.clocks_per_second)); + vlib_cli_output (vm, "Average time to lookup 1 flow: \t\t%12.10f s", + ((t_look / n_lookup) / vm->clib_time.clocks_per_second)); + + vlib_cli_output (vm, " "); + + vlib_cli_output (vm, "Cycle CPU to add %u flows: \t\t%32lu cycles", flows, + t_add); + vlib_cli_output (vm, "Average cycle CPU to add 1 flow: \t%32lu cycles", + t_add / flows); + vlib_cli_output (vm, "Cycle CPU to lookup %u flows: \t%32lu cycles", flows, + t_look); + vlib_cli_output (vm, "Average cycle CPU to lookup 1 flow: \t%32lu cycles", + t_look / n_lookup); + + if (count_slow_path || count_cached) + vlib_cli_output ( + vm, "flow cache hit rate: \t\t%12.10f\n cached: \t%d\n slow_path: \t%d", + ((float) count_cached) / ((float) count_cached + count_slow_path), + count_cached, count_slow_path); + + if (burst_enabled) + vlib_cli_output (vm, "Total number of packets matched in bursts: \t\t%d\n", + burst_counter); + +done: + vlib_cli_output (vm, "Cleaning:"); + /* delete SPD policy */ + is_add = 0; + for (i = 0; i < flows; i++) + { + rv = ipsec_add_del_policy (vm, &p_vec[i], is_add, &stat_index); + if (rv) + { + clib_warning ("No delete SPD Policy: %u", i); + err = clib_error_return (0, "delete SPD Policy failure"); + } + } + vlib_cli_output (vm, "\tDelete all SPD Policy"); + + /* delete SPD */ + rv = ipsec_add_del_spd (vm, spd_id, is_add); + if (rv) + { + err = clib_error_return (0, "delete spd failure"); + } + else + vlib_cli_output (vm, "\tDelete SPD"); + + /* delete SA */ + rv = ipsec_sa_unlock_id (sa_id); + if (rv) + { + err = clib_error_return (0, "delete sa failure"); + } + else + vlib_cli_output (vm, "\tDelete SA"); + + t1 = clib_cpu_time_now (); + vlib_cli_output (vm, "Time for test: \t%12.10f s", + ((t1 - t0) / vm->clib_time.clocks_per_second)); + + vec_free (p_vec); + vlib_cli_output (vm, "End"); + + return (err); +} + +VLIB_CLI_COMMAND (test_ipsec_spd_perf_command, static) = { + .path = "test ipsec_spd_outbound_perf", + .short_help = "test ipsec_spd_outbound_perf flows <n_flows>", + .function = test_ipsec_spd_outbound_perf_command_fn, +}; + /* *INDENT-OFF* */ VLIB_CLI_COMMAND (test_ipsec_command, static) = { |