blob: 6c68299d7f4b8bb7f1082a25d97c359f04cc3502 [file] [log] [blame]
#!/usr/bin/env python3
"""GRO functional tests"""
#
# Add tests for:
# - GRO
# - Verify that sending 1500 Bytes frame without GRO enabled correctly
# - Verify that sending 1500 Bytes frame with GRO enabled correctly
#
import unittest
from scapy.packet import Raw
from scapy.layers.inet6 import IPv6, Ether, IP, UDP, ICMPv6PacketTooBig
from scapy.layers.inet6 import ipv6nh, IPerror6
from scapy.layers.inet import TCP, ICMP
from scapy.data import ETH_P_IP, ETH_P_IPV6, ETH_P_ARP
from framework import VppTestCase, VppTestRunner
from vpp_object import VppObject
from vpp_interface import VppInterface
""" Test_gro is a subclass of VPPTestCase classes.
GRO tests.
"""
class TestGRO(VppTestCase):
""" GRO Test Case """
@classmethod
def setUpClass(self):
super(TestGRO, self).setUpClass()
res = self.create_pg_interfaces(range(2))
res_gro = self.create_pg_interfaces(range(2, 3), 1, 1460)
self.create_pg_interfaces(range(3, 4), 1, 8940)
self.pg_interfaces.append(res[0])
self.pg_interfaces.append(res[1])
self.pg_interfaces.append(res_gro[0])
self.pg2.coalesce_enable()
self.pg3.coalesce_enable()
@classmethod
def tearDownClass(self):
super(TestGRO, self).tearDownClass()
def setUp(self):
super(TestGRO, self).setUp()
for i in self.pg_interfaces:
i.admin_up()
i.config_ip4()
i.config_ip6()
i.disable_ipv6_ra()
i.resolve_arp()
i.resolve_ndp()
def tearDown(self):
super(TestGRO, self).tearDown()
if not self.vpp_dead:
for i in self.pg_interfaces:
i.unconfig_ip4()
i.unconfig_ip6()
i.admin_down()
def test_gro(self):
""" GRO test """
n_packets = 124
#
# Send 1500 bytes frame with gro disabled
#
p4 = (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4,
flags='DF') /
TCP(sport=1234, dport=4321) /
Raw(b'\xa5' * 1460))
rxs = self.send_and_expect(self.pg0, n_packets * p4, self.pg1)
for rx in rxs:
self.assertEqual(rx[Ether].src, self.pg1.local_mac)
self.assertEqual(rx[Ether].dst, self.pg1.remote_mac)
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
self.assertEqual(rx[IP].dst, self.pg1.remote_ip4)
self.assertEqual(rx[TCP].sport, 1234)
self.assertEqual(rx[TCP].dport, 4321)
#
# Send 1500 bytes frame with gro enabled on
# output interfaces support GRO
#
p = []
s = 0
for n in range(0, n_packets):
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4,
flags='DF') /
TCP(sport=1234, dport=4321, seq=s, ack=n, flags='A') /
Raw(b'\xa5' * 1460)))
s += 1460
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2)
i = 0
for rx in rxs:
i += 1
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
self.assertEqual(rx[IP].dst, self.pg2.remote_ip4)
self.assertEqual(rx[IP].len, 64280) # 1460 * 44 + 40 < 65536
self.assertEqual(rx[TCP].sport, 1234)
self.assertEqual(rx[TCP].dport, 4321)
self.assertEqual(rx[TCP].ack, (44*i - 1))
p4_temp = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) /
IP(src=self.pg2.remote_ip4, dst=self.pg0.remote_ip4,
flags='DF') /
TCP(sport=1234, dport=4321, flags='F'))
rxs = self.send_and_expect(self.pg2, 100*[p4_temp], self.pg0, n_rx=100)
rx_coalesce = self.pg2.get_capture(1, timeout=1)
rx0 = rx_coalesce[0]
self.assertEqual(rx0[Ether].src, self.pg2.local_mac)
self.assertEqual(rx0[Ether].dst, self.pg2.remote_mac)
self.assertEqual(rx0[IP].src, self.pg0.remote_ip4)
self.assertEqual(rx0[IP].dst, self.pg2.remote_ip4)
self.assertEqual(rx0[IP].len, 52600) # 1460 * 36 + 40
self.assertEqual(rx0[TCP].sport, 1234)
self.assertEqual(rx0[TCP].dport, 4321)
for rx in rxs:
self.assertEqual(rx[Ether].src, self.pg0.local_mac)
self.assertEqual(rx[Ether].dst, self.pg0.remote_mac)
self.assertEqual(rx[IP].src, self.pg2.remote_ip4)
self.assertEqual(rx[IP].dst, self.pg0.remote_ip4)
self.assertEqual(rx[IP].len, 40)
self.assertEqual(rx[TCP].sport, 1234)
self.assertEqual(rx[TCP].dport, 4321)
#
# Same test with IPv6
#
p = []
s = 0
for n in range(0, 88):
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
IPv6(src=self.pg0.remote_ip6, dst=self.pg2.remote_ip6) /
TCP(sport=1234, dport=4321, seq=s, ack=n, flags='A') /
Raw(b'\xa5' * 1460)))
s += 1460
p[-1][TCP].flags = 'AP' # push to flush second packet
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2)
i = 0
for rx in rxs:
i += 1
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
self.assertEqual(rx[IPv6].src, self.pg0.remote_ip6)
self.assertEqual(rx[IPv6].dst, self.pg2.remote_ip6)
self.assertEqual(rx[IPv6].plen, 64260) # 1460 * 44 + 20 < 65536
self.assertEqual(rx[TCP].sport, 1234)
self.assertEqual(rx[TCP].dport, 4321)
self.assertEqual(rx[TCP].ack, (44*i - 1))
#
# Send a series of 1500 bytes packets each followed by a packet with a
# PSH flag. Verify that GRO stops everytime a PSH flag is encountered
#
p = []
s = 0
for n in range(0, n_packets):
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4,
flags='DF') /
TCP(sport=1234, dport=4321, seq=s, ack=2*n, flags='A') /
Raw(b'\xa5' * 1460)))
s += 1460
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4,
flags='DF') /
TCP(sport=1234, dport=4321, seq=s, ack=2*n+1,
flags='AP') /
Raw(b'\xa5' * 1340)))
s += 1340
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=n_packets)
i = 0
for rx in rxs:
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
self.assertEqual(rx[IP].dst, self.pg2.remote_ip4)
self.assertEqual(rx[IP].len, 40 + 1460 + 1340)
self.assertEqual(rx[TCP].sport, 1234)
self.assertEqual(rx[TCP].dport, 4321)
self.assertEqual(rx[TCP].ack, (2*i + 1))
i += 1
#
# Send a series of 1500 bytes packets each followed by a short packet
# with padding. Verify that GRO removes the padding and stops on short
# packets
#
p = []
s = 0
for n in range(0, n_packets):
i = self.pg0
p.append((Ether(src=i.remote_mac, dst=i.local_mac) /
IP(src=i.remote_ip4, dst=self.pg2.remote_ip4,
flags='DF') /
TCP(sport=1234, dport=4321, seq=s, ack=2*n, flags='A') /
Raw(b'\xa5' * 1459)))
s += 1459
p2 = (Ether(src=i.remote_mac, dst=i.local_mac) /
IP(src=i.remote_ip4, dst=self.pg2.remote_ip4,
flags='DF', len=41) /
TCP(sport=1234, dport=4321, seq=s, ack=2*n+1, flags='A') /
Raw(b'\xa5'))
# first compute csum of pkt w/o padding to work around scapy bug
p2 = Ether(bytes(p2))
p.append(p2 / Raw(b'\xa5' * 5)) # 1 byte data + 5 bytes padding
s += 1
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=n_packets)
i = 0
for rx in rxs:
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
self.assertEqual(rx[IP].dst, self.pg2.remote_ip4)
self.assertEqual(rx[IP].len, 40 + 1459 + 1)
self.assertEqual(rx[TCP].sport, 1234)
self.assertEqual(rx[TCP].dport, 4321)
self.assertEqual(rx[TCP].ack, (2*i + 1))
i += 1
if __name__ == '__main__':
unittest.main(testRunner=VppTestRunner)