Modify the stat of session manager
This commit is contained in:
@@ -47,7 +47,7 @@ struct session_manager_options opts = {
|
||||
.tcp_reassembly_max_segments = 16,
|
||||
};
|
||||
|
||||
static void packet_set_tcp_src_addr(struct packet *pkt, uint32_t addr)
|
||||
static void packet_set_ip_src_addr(struct packet *pkt, uint32_t addr)
|
||||
{
|
||||
const struct pkt_layer *ipv4_layer = packet_get_innermost_layer(pkt, LAYER_TYPE_IPV4);
|
||||
EXPECT_TRUE(ipv4_layer);
|
||||
@@ -73,23 +73,21 @@ TEST(TCP_OVERLOAD, EVICT_OLD_SESS)
|
||||
// new session
|
||||
for (uint32_t i = 0; i < opts.max_tcp_session_num; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, i);
|
||||
packet_set_ip_src_addr(&pkt, i);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1));
|
||||
}
|
||||
printf("=> Session Manager: after add %lu new sessions\n", opts.max_tcp_session_num);
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_used == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_closed == RX_BURST_MAX); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_new_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_old_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_used == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_closed == RX_BURST_MAX); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_tcp_pkts_bypass_no_space == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_pkts_bypass_miss_sess == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -116,28 +114,26 @@ TEST(TCP_OVERLOAD, EVICT_NEW_SESS)
|
||||
// new session
|
||||
for (uint32_t i = 0; i < opts.max_tcp_session_num; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, i);
|
||||
packet_set_ip_src_addr(&pkt, i);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1));
|
||||
}
|
||||
printf("=> Session Manager: after add %lu new sessions\n", opts.max_tcp_session_num);
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_used == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_opening == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_new_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_old_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_used == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_opening == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_pkts_bypass_no_space == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_pkts_bypass_miss_sess == 0);
|
||||
|
||||
// table full, evict new session
|
||||
for (uint32_t i = 0; i < RX_BURST_MAX; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, opts.max_tcp_session_num + i);
|
||||
packet_set_ip_src_addr(&pkt, opts.max_tcp_session_num + i);
|
||||
EXPECT_TRUE(session_manager_lookup_session(mgr, &pkt) == NULL);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1) == NULL);
|
||||
}
|
||||
@@ -145,16 +141,14 @@ TEST(TCP_OVERLOAD, EVICT_NEW_SESS)
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_used == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_opening == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_new_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->tcp_sess.nr_old_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == RX_BURST_MAX * sizeof(tcp_pkt1_c2s_syn));
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_used == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_opening == opts.max_tcp_session_num);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->nr_tcp_pkts_bypass_no_space == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_tcp_pkts_bypass_miss_sess == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user