2020-08-11 15:00:44 +02:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
"""GRO functional tests"""
|
|
|
|
|
|
|
|
#
|
|
|
|
# Add tests for:
|
|
|
|
# - GRO
|
|
|
|
# - Verify that sending 1500 Bytes frame without GRO enabled correctly
|
|
|
|
# - Verify that sending 1500 Bytes frame with GRO enabled correctly
|
|
|
|
#
|
|
|
|
import unittest
|
|
|
|
|
|
|
|
from scapy.packet import Raw
|
2023-08-31 00:47:44 -04:00
|
|
|
from scapy.layers.inet6 import IPv6, Ether, IP
|
|
|
|
from scapy.layers.inet import TCP
|
|
|
|
|
|
|
|
from framework import VppTestCase
|
|
|
|
from asfframework import VppTestRunner
|
2020-08-11 15:00:44 +02:00
|
|
|
|
|
|
|
|
|
|
|
""" Test_gro is a subclass of VPPTestCase classes.
|
|
|
|
GRO tests.
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
|
|
class TestGRO(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""GRO Test Case"""
|
2020-08-11 15:00:44 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(self):
|
|
|
|
super(TestGRO, self).setUpClass()
|
|
|
|
res = self.create_pg_interfaces(range(2))
|
|
|
|
res_gro = self.create_pg_interfaces(range(2, 3), 1, 1460)
|
|
|
|
self.create_pg_interfaces(range(3, 4), 1, 8940)
|
|
|
|
self.pg_interfaces.append(res[0])
|
|
|
|
self.pg_interfaces.append(res[1])
|
|
|
|
self.pg_interfaces.append(res_gro[0])
|
|
|
|
self.pg2.coalesce_enable()
|
|
|
|
self.pg3.coalesce_enable()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(self):
|
|
|
|
super(TestGRO, self).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestGRO, self).setUp()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip4()
|
|
|
|
i.config_ip6()
|
|
|
|
i.disable_ipv6_ra()
|
|
|
|
i.resolve_arp()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestGRO, self).tearDown()
|
|
|
|
if not self.vpp_dead:
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip4()
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_gro(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""GRO test"""
|
2020-08-11 15:00:44 +02:00
|
|
|
|
|
|
|
n_packets = 124
|
|
|
|
#
|
|
|
|
# Send 1500 bytes frame with gro disabled
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p4 = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4, flags="DF")
|
|
|
|
/ TCP(sport=1234, dport=4321)
|
|
|
|
/ Raw(b"\xa5" * 1460)
|
|
|
|
)
|
2020-08-11 15:00:44 +02:00
|
|
|
|
|
|
|
rxs = self.send_and_expect(self.pg0, n_packets * p4, self.pg1)
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg1.local_mac)
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg1.remote_mac)
|
|
|
|
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].dst, self.pg1.remote_ip4)
|
|
|
|
self.assertEqual(rx[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx[TCP].dport, 4321)
|
|
|
|
|
|
|
|
#
|
|
|
|
# Send 1500 bytes frame with gro enabled on
|
|
|
|
# output interfaces support GRO
|
|
|
|
#
|
|
|
|
p = []
|
|
|
|
s = 0
|
|
|
|
for n in range(0, n_packets):
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, flags="DF")
|
|
|
|
/ TCP(sport=1234, dport=4321, seq=s, ack=n, flags="A")
|
|
|
|
/ Raw(b"\xa5" * 1460)
|
|
|
|
)
|
|
|
|
)
|
2020-08-11 15:00:44 +02:00
|
|
|
s += 1460
|
|
|
|
|
|
|
|
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2)
|
|
|
|
|
|
|
|
i = 0
|
|
|
|
for rx in rxs:
|
|
|
|
i += 1
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
|
|
|
|
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].dst, self.pg2.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].len, 64280) # 1460 * 44 + 40 < 65536
|
|
|
|
self.assertEqual(rx[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx[TCP].dport, 4321)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(rx[TCP].ack, (44 * i - 1))
|
2020-08-11 15:00:44 +02:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p4_temp = (
|
|
|
|
Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac)
|
|
|
|
/ IP(src=self.pg2.remote_ip4, dst=self.pg0.remote_ip4, flags="DF")
|
|
|
|
/ TCP(sport=1234, dport=4321, flags="F")
|
|
|
|
)
|
2020-08-11 15:00:44 +02:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
rxs = self.send_and_expect(self.pg2, 100 * [p4_temp], self.pg0, n_rx=100)
|
2020-08-11 15:00:44 +02:00
|
|
|
rx_coalesce = self.pg2.get_capture(1, timeout=1)
|
|
|
|
|
|
|
|
rx0 = rx_coalesce[0]
|
|
|
|
self.assertEqual(rx0[Ether].src, self.pg2.local_mac)
|
|
|
|
self.assertEqual(rx0[Ether].dst, self.pg2.remote_mac)
|
|
|
|
self.assertEqual(rx0[IP].src, self.pg0.remote_ip4)
|
|
|
|
self.assertEqual(rx0[IP].dst, self.pg2.remote_ip4)
|
|
|
|
self.assertEqual(rx0[IP].len, 52600) # 1460 * 36 + 40
|
|
|
|
self.assertEqual(rx0[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx0[TCP].dport, 4321)
|
|
|
|
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg0.local_mac)
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg0.remote_mac)
|
|
|
|
self.assertEqual(rx[IP].src, self.pg2.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].dst, self.pg0.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].len, 40)
|
|
|
|
self.assertEqual(rx[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx[TCP].dport, 4321)
|
|
|
|
|
2021-09-15 16:06:04 +02:00
|
|
|
#
|
|
|
|
# Same test with IPv6
|
|
|
|
#
|
|
|
|
p = []
|
|
|
|
s = 0
|
|
|
|
for n in range(0, 88):
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg2.remote_ip6)
|
|
|
|
/ TCP(sport=1234, dport=4321, seq=s, ack=n, flags="A")
|
|
|
|
/ Raw(b"\xa5" * 1460)
|
|
|
|
)
|
|
|
|
)
|
2021-09-15 16:06:04 +02:00
|
|
|
s += 1460
|
2022-04-26 19:02:15 +02:00
|
|
|
p[-1][TCP].flags = "AP" # push to flush second packet
|
2021-09-15 16:06:04 +02:00
|
|
|
|
|
|
|
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2)
|
|
|
|
|
|
|
|
i = 0
|
|
|
|
for rx in rxs:
|
|
|
|
i += 1
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
|
|
|
|
self.assertEqual(rx[IPv6].src, self.pg0.remote_ip6)
|
|
|
|
self.assertEqual(rx[IPv6].dst, self.pg2.remote_ip6)
|
|
|
|
self.assertEqual(rx[IPv6].plen, 64260) # 1460 * 44 + 20 < 65536
|
|
|
|
self.assertEqual(rx[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx[TCP].dport, 4321)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(rx[TCP].ack, (44 * i - 1))
|
2021-09-15 16:06:04 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
# Send a series of 1500 bytes packets each followed by a packet with a
|
|
|
|
# PSH flag. Verify that GRO stops everytime a PSH flag is encountered
|
|
|
|
#
|
|
|
|
p = []
|
|
|
|
s = 0
|
|
|
|
for n in range(0, n_packets):
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, flags="DF")
|
|
|
|
/ TCP(sport=1234, dport=4321, seq=s, ack=2 * n, flags="A")
|
|
|
|
/ Raw(b"\xa5" * 1460)
|
|
|
|
)
|
|
|
|
)
|
2021-09-15 16:06:04 +02:00
|
|
|
s += 1460
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, flags="DF")
|
|
|
|
/ TCP(sport=1234, dport=4321, seq=s, ack=2 * n + 1, flags="AP")
|
|
|
|
/ Raw(b"\xa5" * 1340)
|
|
|
|
)
|
|
|
|
)
|
2021-09-15 16:06:04 +02:00
|
|
|
s += 1340
|
|
|
|
|
|
|
|
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=n_packets)
|
|
|
|
|
|
|
|
i = 0
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
|
|
|
|
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].dst, self.pg2.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].len, 40 + 1460 + 1340)
|
|
|
|
self.assertEqual(rx[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx[TCP].dport, 4321)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(rx[TCP].ack, (2 * i + 1))
|
2021-09-15 16:06:04 +02:00
|
|
|
i += 1
|
|
|
|
|
|
|
|
#
|
|
|
|
# Send a series of 1500 bytes packets each followed by a short packet
|
|
|
|
# with padding. Verify that GRO removes the padding and stops on short
|
|
|
|
# packets
|
|
|
|
#
|
|
|
|
p = []
|
|
|
|
s = 0
|
|
|
|
for n in range(0, n_packets):
|
|
|
|
i = self.pg0
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(
|
|
|
|
(
|
|
|
|
Ether(src=i.remote_mac, dst=i.local_mac)
|
|
|
|
/ IP(src=i.remote_ip4, dst=self.pg2.remote_ip4, flags="DF")
|
|
|
|
/ TCP(sport=1234, dport=4321, seq=s, ack=2 * n, flags="A")
|
|
|
|
/ Raw(b"\xa5" * 1459)
|
|
|
|
)
|
|
|
|
)
|
2021-09-15 16:06:04 +02:00
|
|
|
s += 1459
|
2022-04-26 19:02:15 +02:00
|
|
|
p2 = (
|
|
|
|
Ether(src=i.remote_mac, dst=i.local_mac)
|
|
|
|
/ IP(src=i.remote_ip4, dst=self.pg2.remote_ip4, flags="DF", len=41)
|
|
|
|
/ TCP(sport=1234, dport=4321, seq=s, ack=2 * n + 1, flags="A")
|
|
|
|
/ Raw(b"\xa5")
|
|
|
|
)
|
2021-09-15 16:06:04 +02:00
|
|
|
# first compute csum of pkt w/o padding to work around scapy bug
|
|
|
|
p2 = Ether(bytes(p2))
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(p2 / Raw(b"\xa5" * 5)) # 1 byte data + 5 bytes padding
|
2021-09-15 16:06:04 +02:00
|
|
|
s += 1
|
|
|
|
|
|
|
|
rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=n_packets)
|
|
|
|
|
|
|
|
i = 0
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg2.local_mac)
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg2.remote_mac)
|
|
|
|
self.assertEqual(rx[IP].src, self.pg0.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].dst, self.pg2.remote_ip4)
|
|
|
|
self.assertEqual(rx[IP].len, 40 + 1459 + 1)
|
|
|
|
self.assertEqual(rx[TCP].sport, 1234)
|
|
|
|
self.assertEqual(rx[TCP].dport, 4321)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(rx[TCP].ack, (2 * i + 1))
|
2021-09-15 16:06:04 +02:00
|
|
|
i += 1
|
|
|
|
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
if __name__ == "__main__":
|
2020-08-11 15:00:44 +02:00
|
|
|
unittest.main(testRunner=VppTestRunner)
|