packet bypass metric rename
This commit is contained in:
@@ -80,7 +80,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SYN_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// C2S SYN dup Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN dup packet\n");
|
||||
@@ -96,7 +96,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SYN_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 1);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 1);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 1);
|
||||
|
||||
// C2S SYN retransmission Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN retransmission packet\n");
|
||||
@@ -115,7 +115,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SYN_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 1);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 1);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 1);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -146,7 +146,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SYNACK_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// S2C SYNACK dup Packet
|
||||
printf("\n=> Packet Parse: TCP S2C SYNACK dup packet\n");
|
||||
@@ -162,7 +162,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SYNACK_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 1);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 1);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 1);
|
||||
|
||||
// S2C SYNACK retransmission Packet
|
||||
printf("\n=> Packet Parse: TCP S2C SYNACK retransmission packet\n");
|
||||
@@ -181,7 +181,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SYNACK_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 1);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 1);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 1);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -213,7 +213,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SKIP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// C2S SYN retransmission Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN retransmission packet\n");
|
||||
@@ -231,7 +231,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SKIP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// C2S SYN retransmission Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN retransmission packet\n");
|
||||
@@ -249,7 +249,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SKIP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// C2S SYN dup Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN dup packet\n");
|
||||
@@ -265,7 +265,7 @@ TEST(TCP_DUPKT_FILTER_ENABLE, SKIP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -299,7 +299,7 @@ TEST(TCP_DUPKT_FILTER_DISABLE, SYN_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// C2S SYN dup Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN dup packet\n");
|
||||
@@ -315,7 +315,7 @@ TEST(TCP_DUPKT_FILTER_DISABLE, SYN_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -349,7 +349,7 @@ TEST(TCP_DUPKT_FILTER_DISABLE, SYNACK_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
// S2C SYNACK dup Packet
|
||||
printf("\n=> Packet Parse: TCP S2C SYNACK dup packet\n");
|
||||
@@ -365,7 +365,7 @@ TEST(TCP_DUPKT_FILTER_DISABLE, SYNACK_DUP)
|
||||
EXPECT_TRUE(session_has_duplicate_traffic(sess) == 0);
|
||||
stat = session_manager_stat(mgr);
|
||||
EXPECT_TRUE(stat);
|
||||
EXPECT_TRUE(stat->tcp_pkts_duped_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_duplicated == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
|
||||
@@ -87,8 +87,8 @@ TEST(TCP_OVERLOAD, EVICT_OLD_SESS)
|
||||
EXPECT_TRUE(stat->curr_tcp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_tcp_sess_closed == RX_BURST_MAX); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->tcp_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->tcp_pkts_nospace_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_nosess_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_table_full == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_session_not_found == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -128,8 +128,8 @@ TEST(TCP_OVERLOAD, EVICT_NEW_SESS)
|
||||
EXPECT_TRUE(stat->curr_tcp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_tcp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_nospace_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_nosess_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_table_full == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_session_not_found == 0);
|
||||
|
||||
// table full, evict new session
|
||||
for (uint32_t i = 0; i < RX_BURST_MAX; i++)
|
||||
@@ -147,8 +147,8 @@ TEST(TCP_OVERLOAD, EVICT_NEW_SESS)
|
||||
EXPECT_TRUE(stat->curr_tcp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_tcp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->tcp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_nospace_bypass == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->tcp_pkts_nosess_bypass == 0);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_table_full == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->tcp_pkts_bypass_session_not_found == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
|
||||
@@ -88,8 +88,8 @@ TEST(UDP_OVERLOAD, EVICT_OLD_SESS)
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closed == RX_BURST_MAX); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->udp_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_pkts_nospace_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_evctd_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_table_full == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_session_evicted == 0);
|
||||
|
||||
// evicted session
|
||||
while (1)
|
||||
@@ -120,8 +120,8 @@ TEST(UDP_OVERLOAD, EVICT_OLD_SESS)
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->udp_sess_evicted == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_pkts_nospace_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_evctd_bypass == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_table_full == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_session_evicted == RX_BURST_MAX);
|
||||
|
||||
// evicted session timeout
|
||||
packet_set_ip_src_addr(&pkt, 0);
|
||||
@@ -136,8 +136,8 @@ TEST(UDP_OVERLOAD, EVICT_OLD_SESS)
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closed == 1); // have evicted, have't free
|
||||
EXPECT_TRUE(stat->udp_sess_evicted == RX_BURST_MAX + 1);
|
||||
EXPECT_TRUE(stat->udp_pkts_nospace_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_evctd_bypass == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_table_full == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_session_evicted == RX_BURST_MAX);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
@@ -177,8 +177,8 @@ TEST(UDP_OVERLOAD, EVICT_NEW_SESS)
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->udp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_nospace_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_evctd_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_table_full == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_session_evicted == 0);
|
||||
|
||||
// evicted session
|
||||
EXPECT_TRUE(session_manager_get_evicted_session(mgr) == NULL);
|
||||
@@ -199,8 +199,8 @@ TEST(UDP_OVERLOAD, EVICT_NEW_SESS)
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closing == 0);
|
||||
EXPECT_TRUE(stat->curr_udp_sess_closed == 0);
|
||||
EXPECT_TRUE(stat->udp_sess_evicted == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_nospace_bypass == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_pkts_evctd_bypass == 0);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_table_full == RX_BURST_MAX);
|
||||
EXPECT_TRUE(stat->udp_pkts_bypass_session_evicted == 0);
|
||||
|
||||
session_manager_free(mgr);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user