blob: 568a147a9a489d439bb3eb425e923fad87958003 [file] [log] [blame]
Ole Troan8a9c8f12018-05-18 11:01:31 +02001#!/usr/bin/env python
2"""IP4 and IP6 MTU functional tests"""
3
4#
5# Add tests for:
6# - sub interfaces
7# - Verify that adjacencies inherit MTU correctly
8# - Verify that sub-interfaces inherit MTU correctly
9# - Different types of interfaces?
10#
11import unittest
12from scapy.layers.inet6 import IPv6, Ether, IP, UDP, ICMPv6PacketTooBig
13from scapy.layers.inet import ICMP
14from framework import VppTestCase, VppTestRunner
Neale Rannsc0a93142018-09-05 15:42:26 -070015from vpp_ip import DpoProto
Neale Ranns097fa662018-05-01 05:17:55 -070016from vpp_ip_route import VppIpRoute, VppRoutePath, FibPathProto
Ole Troan8a9c8f12018-05-18 11:01:31 +020017from socket import AF_INET, AF_INET6, inet_pton
Ole Troan7f991832018-12-06 17:35:12 +010018from util import reassemble4
19
Ole Troan8a9c8f12018-05-18 11:01:31 +020020
21""" Test_mtu is a subclass of VPPTestCase classes.
22 MTU tests.
23"""
24
25
Ole Troan8a9c8f12018-05-18 11:01:31 +020026class TestMTU(VppTestCase):
27 """ MTU Test Case """
Ole Troan7f991832018-12-06 17:35:12 +010028 maxDiff = None
Ole Troan8a9c8f12018-05-18 11:01:31 +020029
30 @classmethod
31 def setUpClass(cls):
32 super(TestMTU, cls).setUpClass()
33 cls.create_pg_interfaces(range(2))
34 cls.interfaces = list(cls.pg_interfaces)
35
Paul Vinciguerra7f9b7f92019-03-12 19:23:27 -070036 @classmethod
37 def tearDownClass(cls):
38 super(TestMTU, cls).tearDownClass()
39
Paul Vinciguerra0c794532018-11-24 22:02:58 -080040 def setUp(self):
41 super(TestMTU, self).setUp()
42 for i in self.interfaces:
Ole Troan8a9c8f12018-05-18 11:01:31 +020043 i.admin_up()
44 i.config_ip4()
45 i.config_ip6()
46 i.disable_ipv6_ra()
47 i.resolve_arp()
48 i.resolve_ndp()
49
50 def tearDown(self):
51 super(TestMTU, self).tearDown()
52 if not self.vpp_dead:
53 for i in self.pg_interfaces:
54 i.unconfig_ip4()
55 i.unconfig_ip6()
56 i.admin_down()
57
58 def validate(self, rx, expected):
Ole Troan7f991832018-12-06 17:35:12 +010059 self.assertEqual(rx, expected.__class__(expected))
Ole Troan8a9c8f12018-05-18 11:01:31 +020060
61 def validate_bytes(self, rx, expected):
62 self.assertEqual(rx, expected)
63
64 def payload(self, len):
65 return 'x' * len
66
67 def get_mtu(self, sw_if_index):
Paul Vinciguerra7a998232019-06-07 15:01:12 -040068 rv = self.vapi.sw_interface_dump(sw_if_index=sw_if_index)
Ole Troan8a9c8f12018-05-18 11:01:31 +020069 for i in rv:
70 if i.sw_if_index == sw_if_index:
Ole Troand7231612018-06-07 10:17:57 +020071 return i.mtu[0]
Ole Troan8a9c8f12018-05-18 11:01:31 +020072 return 0
73
74 def test_ip4_mtu(self):
75 """ IP4 MTU test """
76
Ole Troan8a9c8f12018-05-18 11:01:31 +020077 p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
78 p_ip4 = IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4,
79 flags='DF')
80
Ole Troan8a9c8f12018-05-18 11:01:31 +020081 current_mtu = self.get_mtu(self.pg1.sw_if_index)
Ole Troan8a9c8f12018-05-18 11:01:31 +020082
83 p_payload = UDP(sport=1234, dport=1234) / self.payload(
84 current_mtu - 20 - 8)
85
86 p4 = p_ether / p_ip4 / p_payload
87 p4_reply = p_ip4 / p_payload
88 p4_reply.ttl -= 1
89 rx = self.send_and_expect(self.pg0, p4*11, self.pg1)
90 for p in rx:
91 self.validate(p[1], p4_reply)
92
93 # MTU
Ole Troand7231612018-06-07 10:17:57 +020094 self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [576, 0, 0, 0])
95 self.assertEqual(576, self.get_mtu(self.pg1.sw_if_index))
Ole Troan8a9c8f12018-05-18 11:01:31 +020096
97 # Should fail. Too large MTU
98 p_icmp4 = ICMP(type='dest-unreach', code='fragmentation-needed',
99 nexthopmtu=576, chksum=0x2dbb)
100 icmp4_reply = (IP(src=self.pg0.local_ip4,
101 dst=self.pg0.remote_ip4,
102 ttl=254, len=576, id=0) /
103 p_icmp4 / p_ip4 / p_payload)
104 icmp4_reply[1].ttl -= 1
Ole Troan7f991832018-12-06 17:35:12 +0100105 n = icmp4_reply.__class__(icmp4_reply)
106 s = bytes(icmp4_reply)
Ole Troan8a9c8f12018-05-18 11:01:31 +0200107 icmp4_reply = s[0:576]
108 rx = self.send_and_expect(self.pg0, p4*11, self.pg0)
109 for p in rx:
110 # p.show2()
111 # n.show2()
Ole Troan7f991832018-12-06 17:35:12 +0100112 self.validate_bytes(bytes(p[1]), icmp4_reply)
Ole Troan8a9c8f12018-05-18 11:01:31 +0200113
Ole Troan8a9c8f12018-05-18 11:01:31 +0200114 # Now with DF off. Expect fragments.
115 # First go with 1500 byte packets.
116 p_payload = UDP(sport=1234, dport=1234) / self.payload(
117 1500 - 20 - 8)
118 p4 = p_ether / p_ip4 / p_payload
119 p4.flags = 0
120 p4_reply = p_ip4 / p_payload
Ole Troan313f7e22018-04-10 16:02:51 +0200121 p4_reply.ttl = 62 # check this
Ole Troan8a9c8f12018-05-18 11:01:31 +0200122 p4_reply.flags = 0
123 p4_reply.id = 256
124 self.pg_enable_capture()
125 self.pg0.add_stream(p4*1)
126 self.pg_start()
127 rx = self.pg1.get_capture(3)
Ole Troan7f991832018-12-06 17:35:12 +0100128 reass_pkt = reassemble4(rx)
Ole Troan8a9c8f12018-05-18 11:01:31 +0200129 self.validate(reass_pkt, p4_reply)
Ole Troan313f7e22018-04-10 16:02:51 +0200130
Ole Troan8a9c8f12018-05-18 11:01:31 +0200131 '''
132 # Now what happens with a 9K frame
Ole Troan8a9c8f12018-05-18 11:01:31 +0200133 p_payload = UDP(sport=1234, dport=1234) / self.payload(
134 current_mtu - 20 - 8)
135 p4 = p_ether / p_ip4 / p_payload
136 p4.flags = 0
137 p4_reply = p_ip4 / p_payload
138 p4_reply.ttl = 62 # check this
139 p4_reply.flags = 0
140 p4_reply.id = 512
141
142 self.pg_enable_capture()
143 self.pg0.add_stream(p4*1)
144 self.pg_start()
145 rx = self.pg1.get_capture(16)
Ole Troan7f991832018-12-06 17:35:12 +0100146 reass_pkt = reassemble4(rx)
Ole Troan8a9c8f12018-05-18 11:01:31 +0200147 reass_pkt.show2()
148 p4_reply.show2()
149 self.validate(reass_pkt, p4_reply)
150 '''
Ole Troan313f7e22018-04-10 16:02:51 +0200151
Ole Troan8a9c8f12018-05-18 11:01:31 +0200152 # Reset MTU
Ole Troanda6e11b2018-05-23 11:21:42 +0200153 self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index,
Ole Troand7231612018-06-07 10:17:57 +0200154 [current_mtu, 0, 0, 0])
Ole Troan8a9c8f12018-05-18 11:01:31 +0200155
Ole Troan8a9c8f12018-05-18 11:01:31 +0200156 def test_ip6_mtu(self):
157 """ IP6 MTU test """
158
Ole Troanda6e11b2018-05-23 11:21:42 +0200159 current_mtu = self.get_mtu(self.pg1.sw_if_index)
Ole Troanda6e11b2018-05-23 11:21:42 +0200160
Ole Troan8a9c8f12018-05-18 11:01:31 +0200161 p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
162 p_ip6 = IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
163
Ole Troan8a9c8f12018-05-18 11:01:31 +0200164 p_payload = UDP(sport=1234, dport=1234) / self.payload(
165 current_mtu - 40 - 8)
166
167 p6 = p_ether / p_ip6 / p_payload
168 p6_reply = p_ip6 / p_payload
169 p6_reply.hlim -= 1
170 rx = self.send_and_expect(self.pg0, p6*9, self.pg1)
171 for p in rx:
172 self.validate(p[1], p6_reply)
173
174 # MTU (only checked on encap)
Ole Troand7231612018-06-07 10:17:57 +0200175 self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [1280, 0, 0, 0])
176 self.assertEqual(1280, self.get_mtu(self.pg1.sw_if_index))
Ole Troan8a9c8f12018-05-18 11:01:31 +0200177
178 # Should fail. Too large MTU
179 p_icmp6 = ICMPv6PacketTooBig(mtu=1280, cksum=0x4c7a)
180 icmp6_reply = (IPv6(src=self.pg0.local_ip6,
181 dst=self.pg0.remote_ip6,
Ole Troan282093f2018-09-19 12:38:51 +0200182 hlim=255, plen=1240) /
Ole Troan8a9c8f12018-05-18 11:01:31 +0200183 p_icmp6 / p_ip6 / p_payload)
184 icmp6_reply[2].hlim -= 1
Ole Troan7f991832018-12-06 17:35:12 +0100185 n = icmp6_reply.__class__(icmp6_reply)
186 s = bytes(icmp6_reply)
Ole Troan282093f2018-09-19 12:38:51 +0200187 icmp6_reply_str = s[0:1280]
Ole Troan8a9c8f12018-05-18 11:01:31 +0200188
189 rx = self.send_and_expect(self.pg0, p6*9, self.pg0)
190 for p in rx:
Ole Troan7f991832018-12-06 17:35:12 +0100191 self.validate_bytes(bytes(p[1]), icmp6_reply_str)
Ole Troan8a9c8f12018-05-18 11:01:31 +0200192
193 # Reset MTU
Ole Troand7231612018-06-07 10:17:57 +0200194 self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index,
195 [current_mtu, 0, 0, 0])
Ole Troan8a9c8f12018-05-18 11:01:31 +0200196
197
198if __name__ == '__main__':
199 unittest.main(testRunner=VppTestRunner)