Skip to content

Commit

Permalink
selftests: forwarding: Add test for custom multipath hash
Browse files Browse the repository at this point in the history
Test that when the hash policy is set to custom, traffic is distributed
only according to the outer fields set in the fib_multipath_hash_fields
sysctl.

Each time set a different field and make sure traffic is only
distributed when the field is changed in the packet stream.

The test only verifies the behavior with non-encapsulated IPv4 and IPv6
packets. Subsequent patches will add tests for IPv4/IPv6 overlays on top
of IPv4/IPv6 underlay networks.

Example output:

 # ./custom_multipath_hash.sh
 TEST: ping                                                          [ OK ]
 TEST: ping6                                                         [ OK ]
 INFO: Running IPv4 custom multipath hash tests
 TEST: Multipath hash field: Source IP (balanced)                    [ OK ]
 INFO: Packets sent on path1 / path2: 6353 / 6254
 TEST: Multipath hash field: Source IP (unbalanced)                  [ OK ]
 INFO: Packets sent on path1 / path2: 0 / 12600
 TEST: Multipath hash field: Destination IP (balanced)               [ OK ]
 INFO: Packets sent on path1 / path2: 6102 / 6502
 TEST: Multipath hash field: Destination IP (unbalanced)             [ OK ]
 INFO: Packets sent on path1 / path2: 1 / 12601
 TEST: Multipath hash field: Source port (balanced)                  [ OK ]
 INFO: Packets sent on path1 / path2: 16428 / 16345
 TEST: Multipath hash field: Source port (unbalanced)                [ OK ]
 INFO: Packets sent on path1 / path2: 32770 / 2
 TEST: Multipath hash field: Destination port (balanced)             [ OK ]
 INFO: Packets sent on path1 / path2: 16428 / 16345
 TEST: Multipath hash field: Destination port (unbalanced)           [ OK ]
 INFO: Packets sent on path1 / path2: 32770 / 2
 INFO: Running IPv6 custom multipath hash tests
 TEST: Multipath hash field: Source IP (balanced)                    [ OK ]
 INFO: Packets sent on path1 / path2: 6704 / 5903
 TEST: Multipath hash field: Source IP (unbalanced)                  [ OK ]
 INFO: Packets sent on path1 / path2: 12600 / 0
 TEST: Multipath hash field: Destination IP (balanced)               [ OK ]
 INFO: Packets sent on path1 / path2: 5551 / 7052
 TEST: Multipath hash field: Destination IP (unbalanced)             [ OK ]
 INFO: Packets sent on path1 / path2: 12603 / 0
 TEST: Multipath hash field: Flowlabel (balanced)                    [ OK ]
 INFO: Packets sent on path1 / path2: 8378 / 8080
 TEST: Multipath hash field: Flowlabel (unbalanced)                  [ OK ]
 INFO: Packets sent on path1 / path2: 2 / 12603
 TEST: Multipath hash field: Source port (balanced)                  [ OK ]
 INFO: Packets sent on path1 / path2: 16385 / 16388
 TEST: Multipath hash field: Source port (unbalanced)                [ OK ]
 INFO: Packets sent on path1 / path2: 0 / 32774
 TEST: Multipath hash field: Destination port (balanced)             [ OK ]
 INFO: Packets sent on path1 / path2: 16386 / 16390
 TEST: Multipath hash field: Destination port (unbalanced)           [ OK ]
 INFO: Packets sent on path1 / path2: 32771 / 2

Signed-off-by: Ido Schimmel <idosch@nvidia.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
  • Loading branch information
Ido Schimmel authored and David S. Miller committed May 18, 2021
1 parent 73c2c5c commit 511e8db
Showing 1 changed file with 364 additions and 0 deletions.
364 changes: 364 additions & 0 deletions tools/testing/selftests/net/forwarding/custom_multipath_hash.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,364 @@
#!/bin/bash
# SPDX-License-Identifier: GPL-2.0
#
# Test traffic distribution between two paths when using custom hash policy.
#
# +--------------------------------+
# | H1 |
# | $h1 + |
# | 198.51.100.{2-253}/24 | |
# | 2001:db8:1::{2-fd}/64 | |
# +-------------------------|------+
# |
# +-------------------------|-------------------------+
# | SW1 | |
# | $rp1 + |
# | 198.51.100.1/24 |
# | 2001:db8:1::1/64 |
# | |
# | |
# | $rp11 + + $rp12 |
# | 192.0.2.1/28 | | 192.0.2.17/28 |
# | 2001:db8:2::1/64 | | 2001:db8:3::1/64 |
# +------------------|-------------|------------------+
# | |
# +------------------|-------------|------------------+
# | SW2 | | |
# | | | |
# | $rp21 + + $rp22 |
# | 192.0.2.2/28 192.0.2.18/28 |
# | 2001:db8:2::2/64 2001:db8:3::2/64 |
# | |
# | |
# | $rp2 + |
# | 203.0.113.1/24 | |
# | 2001:db8:4::1/64 | |
# +-------------------------|-------------------------+
# |
# +-------------------------|------+
# | H2 | |
# | $h2 + |
# | 203.0.113.{2-253}/24 |
# | 2001:db8:4::{2-fd}/64 |
# +--------------------------------+

ALL_TESTS="
ping_ipv4
ping_ipv6
custom_hash
"

NUM_NETIFS=8
source lib.sh

h1_create()
{
simple_if_init $h1 198.51.100.2/24 2001:db8:1::2/64
ip route add vrf v$h1 default via 198.51.100.1 dev $h1
ip -6 route add vrf v$h1 default via 2001:db8:1::1 dev $h1
}

h1_destroy()
{
ip -6 route del vrf v$h1 default
ip route del vrf v$h1 default
simple_if_fini $h1 198.51.100.2/24 2001:db8:1::2/64
}

sw1_create()
{
simple_if_init $rp1 198.51.100.1/24 2001:db8:1::1/64
__simple_if_init $rp11 v$rp1 192.0.2.1/28 2001:db8:2::1/64
__simple_if_init $rp12 v$rp1 192.0.2.17/28 2001:db8:3::1/64

ip route add vrf v$rp1 203.0.113.0/24 \
nexthop via 192.0.2.2 dev $rp11 \
nexthop via 192.0.2.18 dev $rp12

ip -6 route add vrf v$rp1 2001:db8:4::/64 \
nexthop via 2001:db8:2::2 dev $rp11 \
nexthop via 2001:db8:3::2 dev $rp12
}

sw1_destroy()
{
ip -6 route del vrf v$rp1 2001:db8:4::/64

ip route del vrf v$rp1 203.0.113.0/24

__simple_if_fini $rp12 192.0.2.17/28 2001:db8:3::1/64
__simple_if_fini $rp11 192.0.2.1/28 2001:db8:2::1/64
simple_if_fini $rp1 198.51.100.1/24 2001:db8:1::1/64
}

sw2_create()
{
simple_if_init $rp2 203.0.113.1/24 2001:db8:4::1/64
__simple_if_init $rp21 v$rp2 192.0.2.2/28 2001:db8:2::2/64
__simple_if_init $rp22 v$rp2 192.0.2.18/28 2001:db8:3::2/64

ip route add vrf v$rp2 198.51.100.0/24 \
nexthop via 192.0.2.1 dev $rp21 \
nexthop via 192.0.2.17 dev $rp22

ip -6 route add vrf v$rp2 2001:db8:1::/64 \
nexthop via 2001:db8:2::1 dev $rp21 \
nexthop via 2001:db8:3::1 dev $rp22
}

sw2_destroy()
{
ip -6 route del vrf v$rp2 2001:db8:1::/64

ip route del vrf v$rp2 198.51.100.0/24

__simple_if_fini $rp22 192.0.2.18/28 2001:db8:3::2/64
__simple_if_fini $rp21 192.0.2.2/28 2001:db8:2::2/64
simple_if_fini $rp2 203.0.113.1/24 2001:db8:4::1/64
}

h2_create()
{
simple_if_init $h2 203.0.113.2/24 2001:db8:4::2/64
ip route add vrf v$h2 default via 203.0.113.1 dev $h2
ip -6 route add vrf v$h2 default via 2001:db8:4::1 dev $h2
}

h2_destroy()
{
ip -6 route del vrf v$h2 default
ip route del vrf v$h2 default
simple_if_fini $h2 203.0.113.2/24 2001:db8:4::2/64
}

setup_prepare()
{
h1=${NETIFS[p1]}

rp1=${NETIFS[p2]}

rp11=${NETIFS[p3]}
rp21=${NETIFS[p4]}

rp12=${NETIFS[p5]}
rp22=${NETIFS[p6]}

rp2=${NETIFS[p7]}

h2=${NETIFS[p8]}

vrf_prepare
h1_create
sw1_create
sw2_create
h2_create

forwarding_enable
}

cleanup()
{
pre_cleanup

forwarding_restore

h2_destroy
sw2_destroy
sw1_destroy
h1_destroy
vrf_cleanup
}

ping_ipv4()
{
ping_test $h1 203.0.113.2
}

ping_ipv6()
{
ping6_test $h1 2001:db8:4::2
}

send_src_ipv4()
{
$MZ $h1 -q -p 64 -A "198.51.100.2-198.51.100.253" -B 203.0.113.2 \
-d 1msec -c 50 -t udp "sp=20000,dp=30000"
}

send_dst_ipv4()
{
$MZ $h1 -q -p 64 -A 198.51.100.2 -B "203.0.113.2-203.0.113.253" \
-d 1msec -c 50 -t udp "sp=20000,dp=30000"
}

send_src_udp4()
{
$MZ $h1 -q -p 64 -A 198.51.100.2 -B 203.0.113.2 \
-d 1msec -t udp "sp=0-32768,dp=30000"
}

send_dst_udp4()
{
$MZ $h1 -q -p 64 -A 198.51.100.2 -B 203.0.113.2 \
-d 1msec -t udp "sp=20000,dp=0-32768"
}

send_src_ipv6()
{
$MZ -6 $h1 -q -p 64 -A "2001:db8:1::2-2001:db8:1::fd" -B 2001:db8:4::2 \
-d 1msec -c 50 -t udp "sp=20000,dp=30000"
}

send_dst_ipv6()
{
$MZ -6 $h1 -q -p 64 -A 2001:db8:1::2 -B "2001:db8:4::2-2001:db8:4::fd" \
-d 1msec -c 50 -t udp "sp=20000,dp=30000"
}

send_flowlabel()
{
# Generate 16384 echo requests, each with a random flow label.
for _ in $(seq 1 16384); do
ip vrf exec v$h1 \
$PING6 2001:db8:4::2 -F 0 -c 1 -q >/dev/null 2>&1
done
}

send_src_udp6()
{
$MZ -6 $h1 -q -p 64 -A 2001:db8:1::2 -B 2001:db8:4::2 \
-d 1msec -t udp "sp=0-32768,dp=30000"
}

send_dst_udp6()
{
$MZ -6 $h1 -q -p 64 -A 2001:db8:1::2 -B 2001:db8:4::2 \
-d 1msec -t udp "sp=20000,dp=0-32768"
}

custom_hash_test()
{
local field="$1"; shift
local balanced="$1"; shift
local send_flows="$@"

RET=0

local t0_rp11=$(link_stats_tx_packets_get $rp11)
local t0_rp12=$(link_stats_tx_packets_get $rp12)

$send_flows

local t1_rp11=$(link_stats_tx_packets_get $rp11)
local t1_rp12=$(link_stats_tx_packets_get $rp12)

local d_rp11=$((t1_rp11 - t0_rp11))
local d_rp12=$((t1_rp12 - t0_rp12))

local diff=$((d_rp12 - d_rp11))
local sum=$((d_rp11 + d_rp12))

local pct=$(echo "$diff / $sum * 100" | bc -l)
local is_balanced=$(echo "-20 <= $pct && $pct <= 20" | bc)

[[ ( $is_balanced -eq 1 && $balanced == "balanced" ) ||
( $is_balanced -eq 0 && $balanced == "unbalanced" ) ]]
check_err $? "Expected traffic to be $balanced, but it is not"

log_test "Multipath hash field: $field ($balanced)"
log_info "Packets sent on path1 / path2: $d_rp11 / $d_rp12"
}

custom_hash_v4()
{
log_info "Running IPv4 custom multipath hash tests"

sysctl_set net.ipv4.fib_multipath_hash_policy 3

# Prevent the neighbour table from overflowing, as different neighbour
# entries will be created on $ol4 when using different destination IPs.
sysctl_set net.ipv4.neigh.default.gc_thresh1 1024
sysctl_set net.ipv4.neigh.default.gc_thresh2 1024
sysctl_set net.ipv4.neigh.default.gc_thresh3 1024

sysctl_set net.ipv4.fib_multipath_hash_fields 0x0001
custom_hash_test "Source IP" "balanced" send_src_ipv4
custom_hash_test "Source IP" "unbalanced" send_dst_ipv4

sysctl_set net.ipv4.fib_multipath_hash_fields 0x0002
custom_hash_test "Destination IP" "balanced" send_dst_ipv4
custom_hash_test "Destination IP" "unbalanced" send_src_ipv4

sysctl_set net.ipv4.fib_multipath_hash_fields 0x0010
custom_hash_test "Source port" "balanced" send_src_udp4
custom_hash_test "Source port" "unbalanced" send_dst_udp4

sysctl_set net.ipv4.fib_multipath_hash_fields 0x0020
custom_hash_test "Destination port" "balanced" send_dst_udp4
custom_hash_test "Destination port" "unbalanced" send_src_udp4

sysctl_restore net.ipv4.neigh.default.gc_thresh3
sysctl_restore net.ipv4.neigh.default.gc_thresh2
sysctl_restore net.ipv4.neigh.default.gc_thresh1

sysctl_restore net.ipv4.fib_multipath_hash_policy
}

custom_hash_v6()
{
log_info "Running IPv6 custom multipath hash tests"

sysctl_set net.ipv6.fib_multipath_hash_policy 3

# Prevent the neighbour table from overflowing, as different neighbour
# entries will be created on $ol4 when using different destination IPs.
sysctl_set net.ipv6.neigh.default.gc_thresh1 1024
sysctl_set net.ipv6.neigh.default.gc_thresh2 1024
sysctl_set net.ipv6.neigh.default.gc_thresh3 1024

sysctl_set net.ipv6.fib_multipath_hash_fields 0x0001
custom_hash_test "Source IP" "balanced" send_src_ipv6
custom_hash_test "Source IP" "unbalanced" send_dst_ipv6

sysctl_set net.ipv6.fib_multipath_hash_fields 0x0002
custom_hash_test "Destination IP" "balanced" send_dst_ipv6
custom_hash_test "Destination IP" "unbalanced" send_src_ipv6

sysctl_set net.ipv6.fib_multipath_hash_fields 0x0008
custom_hash_test "Flowlabel" "balanced" send_flowlabel
custom_hash_test "Flowlabel" "unbalanced" send_src_ipv6

sysctl_set net.ipv6.fib_multipath_hash_fields 0x0010
custom_hash_test "Source port" "balanced" send_src_udp6
custom_hash_test "Source port" "unbalanced" send_dst_udp6

sysctl_set net.ipv6.fib_multipath_hash_fields 0x0020
custom_hash_test "Destination port" "balanced" send_dst_udp6
custom_hash_test "Destination port" "unbalanced" send_src_udp6

sysctl_restore net.ipv6.neigh.default.gc_thresh3
sysctl_restore net.ipv6.neigh.default.gc_thresh2
sysctl_restore net.ipv6.neigh.default.gc_thresh1

sysctl_restore net.ipv6.fib_multipath_hash_policy
}

custom_hash()
{
# Test that when the hash policy is set to custom, traffic is
# distributed only according to the fields set in the
# fib_multipath_hash_fields sysctl.
#
# Each time set a different field and make sure traffic is only
# distributed when the field is changed in the packet stream.
custom_hash_v4
custom_hash_v6
}

trap cleanup EXIT

setup_prepare
setup_wait
tests_run

exit $EXIT_STATUS

0 comments on commit 511e8db

Please sign in to comment.