Modify the stat of session manager
This commit is contained in:
@@ -47,7 +47,7 @@ struct session_manager_options opts = {
|
||||
.tcp_reassembly_max_segments = 16,
|
||||
};
|
||||
|
||||
static void packet_set_tcp_src_addr(struct packet *pkt, uint32_t addr)
|
||||
static void packet_set_ip_src_addr(struct packet *pkt, uint32_t addr)
|
||||
{
|
||||
const struct pkt_layer *ipv4_layer = packet_get_innermost_layer(pkt, LAYER_TYPE_IPV4);
|
||||
EXPECT_TRUE(ipv4_layer);
|
||||
@@ -74,23 +74,21 @@ TEST(UDP_OVERLOAD, EVICT_OLD_SESS)
|
||||
// new session
|
||||
for (uint32_t i = 0; i < opts.max_udp_session_num; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, i);
|
||||
packet_set_ip_src_addr(&pkt, i);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1));
|
||||
}
|
||||
printf("=> Session Manager: after add %lu new sessions\n", opts.max_udp_session_num);
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_used == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closed == RX_BURST_MAX); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->udp_sess.nr_new_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_old_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_used == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closed == RX_BURST_MAX); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->nr_udp_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_no_space == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_hit_evc == 0);
|
||||
|
||||
// evicted session
|
||||
while (1)
|
||||
@@ -108,7 +106,7 @@ TEST(UDP_OVERLOAD, EVICT_OLD_SESS)
|
||||
|
||||
for (uint32_t i = 0; i < RX_BURST_MAX; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, i);
|
||||
packet_set_ip_src_addr(&pkt, i);
|
||||
EXPECT_TRUE(session_manager_lookup_session(mgr, &pkt) == NULL);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1) == NULL); // hit evicted session, can't renew session
|
||||
}
|
||||
@@ -116,35 +114,31 @@ TEST(UDP_OVERLOAD, EVICT_OLD_SESS)
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_used == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_new_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_old_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == RX_BURST_MAX * sizeof(udp_pkt1_dns_req));
|
||||
EXPECT_TRUE(stat->nr_udp_sess_used == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_no_space == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_hit_evc == RX_BURST_MAX);
|
||||
|
||||
// evicted session timeout
|
||||
packet_set_tcp_src_addr(&pkt, 0);
|
||||
packet_set_ip_src_addr(&pkt, 0);
|
||||
EXPECT_TRUE(session_manager_lookup_session(mgr, &pkt) == NULL);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1 + opts.evicted_session_filter_timeout));
|
||||
printf("=> Session Manager: after evicted session timeout\n");
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_used == RX_BURST_MAX + 1);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closed == 1); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->udp_sess.nr_new_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_old_sess_evicted == RX_BURST_MAX + 1);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == RX_BURST_MAX * sizeof(udp_pkt1_dns_req));
|
||||
EXPECT_TRUE(stat->nr_udp_sess_used == RX_BURST_MAX + 1);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_opening == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closed == 1); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->nr_udp_sess_evicted == RX_BURST_MAX + 1);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_no_space == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_hit_evc == RX_BURST_MAX);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -171,23 +165,21 @@ TEST(UDP_OVERLOAD, EVICT_NEW_SESS)
|
||||
// new session
|
||||
for (uint32_t i = 0; i < opts.max_udp_session_num; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, i);
|
||||
packet_set_ip_src_addr(&pkt, i);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1));
|
||||
}
|
||||
printf("=> Session Manager: after add %lu new sessions\n", opts.max_udp_session_num);
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_used == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_opening == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_new_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_old_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_used == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_opening == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_no_space == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_hit_evc == 0);
|
||||
|
||||
// evicted session
|
||||
EXPECT_TRUE(session_manager_get_evicted_session(mgr) == NULL);
|
||||
@@ -195,7 +187,7 @@ TEST(UDP_OVERLOAD, EVICT_NEW_SESS)
|
||||
// table full, evict new session
|
||||
for (uint32_t i = 0; i < RX_BURST_MAX; i++)
|
||||
{
|
||||
packet_set_tcp_src_addr(&pkt, opts.max_udp_session_num + i);
|
||||
packet_set_ip_src_addr(&pkt, opts.max_udp_session_num + i);
|
||||
EXPECT_TRUE(session_manager_lookup_session(mgr, &pkt) == NULL);
|
||||
EXPECT_TRUE(session_manager_new_session(mgr, &pkt, 1) == NULL);
|
||||
}
|
||||
@@ -203,16 +195,14 @@ TEST(UDP_OVERLOAD, EVICT_NEW_SESS)
|
||||
session_manager_print_stat(mgr);
|
||||
stat = session_manager_get_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_used == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_init == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_opening == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_active == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_new_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_sess.nr_old_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_pkts == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->evc_pkt.nr_bytes == RX_BURST_MAX * sizeof(udp_pkt1_dns_req));
|
||||
EXPECT_TRUE(stat->nr_udp_sess_used == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_opening == opts.max_udp_session_num);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_active == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_no_space == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->nr_udp_pkts_bypass_hit_evc == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user