2020-04-27 09:11:19 -04:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
|
2020-05-06 16:38:40 -04:00
|
|
|
import os
|
2020-04-27 09:11:19 -04:00
|
|
|
import unittest
|
|
|
|
|
2023-01-13 08:04:55 +00:00
|
|
|
from scapy.layers.l2 import Ether
|
|
|
|
from scapy.layers.inet import IP, UDP
|
|
|
|
from scapy.packet import Raw
|
|
|
|
|
2023-08-31 00:47:44 -04:00
|
|
|
from framework import VppTestCase
|
|
|
|
from asfframework import VppTestRunner
|
2024-03-11 10:38:46 +00:00
|
|
|
from config import config
|
2020-04-27 09:11:19 -04:00
|
|
|
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf(
|
|
|
|
"dispatch-trace" in config.excluded_plugins, "Exclude dispatch trace plugin tests"
|
|
|
|
)
|
2020-04-27 09:11:19 -04:00
|
|
|
class TestPcap(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Pcap Unit Test Cases"""
|
2020-04-27 09:11:19 -04:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestPcap, cls).setUpClass()
|
|
|
|
|
2023-01-13 08:04:55 +00:00
|
|
|
cls.create_pg_interfaces(range(1))
|
|
|
|
for i in cls.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip4()
|
|
|
|
i.resolve_arp()
|
|
|
|
|
2020-04-27 09:11:19 -04:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
2023-01-13 08:04:55 +00:00
|
|
|
for i in cls.pg_interfaces:
|
|
|
|
i.admin_down()
|
|
|
|
|
2020-04-27 09:11:19 -04:00
|
|
|
super(TestPcap, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestPcap, self).setUp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestPcap, self).tearDown()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
# This is a code coverage test, but it only runs for 0.3 seconds
|
|
|
|
# might as well just run it...
|
2020-04-27 09:11:19 -04:00
|
|
|
def test_pcap_unittest(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""PCAP Capture Tests"""
|
|
|
|
cmds = [
|
|
|
|
"loop create",
|
|
|
|
"set int ip address loop0 11.22.33.1/24",
|
|
|
|
"set int state loop0 up",
|
|
|
|
"loop create",
|
|
|
|
"set int ip address loop1 11.22.34.1/24",
|
|
|
|
"set int state loop1 up",
|
|
|
|
"set ip neighbor loop1 11.22.34.44 03:00:11:22:34:44",
|
|
|
|
"packet-generator new {\n"
|
|
|
|
" name s0\n"
|
|
|
|
" limit 10\n"
|
|
|
|
" size 128-128\n"
|
|
|
|
" interface loop0\n"
|
|
|
|
" tx-interface loop1\n"
|
|
|
|
" node loop1-output\n"
|
|
|
|
" buffer-flags ip4 offload\n"
|
|
|
|
" buffer-offload-flags offload-ip-cksum offload-udp-cksum\n"
|
|
|
|
" data {\n"
|
|
|
|
" IP4: 1.2.3 -> dead.0000.0001\n"
|
|
|
|
" UDP: 11.22.33.44 -> 11.22.34.44\n"
|
|
|
|
" ttl 2 checksum 13\n"
|
|
|
|
" UDP: 1234 -> 2345\n"
|
|
|
|
" checksum 11\n"
|
|
|
|
" incrementing 114\n"
|
|
|
|
" }\n"
|
|
|
|
"}",
|
|
|
|
"pcap dispatch trace on max 100 buffer-trace pg-input 10",
|
|
|
|
"pa en",
|
|
|
|
"pcap dispatch trace off",
|
|
|
|
"pcap trace rx tx max 1000 intfc any",
|
2024-11-26 15:58:40 +01:00
|
|
|
"pcap trace status",
|
2022-04-26 19:02:15 +02:00
|
|
|
"pa en",
|
|
|
|
"pcap trace status",
|
|
|
|
"pcap trace rx tx off",
|
|
|
|
"classify filter pcap mask l3 ip4 src match l3 ip4 src 11.22.33.44",
|
|
|
|
"pcap trace rx tx max 1000 intfc any file filt.pcap filter",
|
2024-11-26 15:58:40 +01:00
|
|
|
"pcap trace status",
|
2022-04-26 19:02:15 +02:00
|
|
|
"show cla t verbose 2",
|
|
|
|
"show cla t verbose",
|
|
|
|
"show cla t",
|
|
|
|
"pa en",
|
|
|
|
"pcap trace rx tx off",
|
|
|
|
"classify filter pcap del mask l3 ip4 src",
|
|
|
|
]
|
2020-04-27 09:11:19 -04:00
|
|
|
|
|
|
|
for cmd in cmds:
|
|
|
|
r = self.vapi.cli_return_response(cmd)
|
|
|
|
if r.retval != 0:
|
2022-04-26 19:02:15 +02:00
|
|
|
if hasattr(r, "reply"):
|
2020-04-27 09:11:19 -04:00
|
|
|
self.logger.info(cmd + " FAIL reply " + r.reply)
|
|
|
|
else:
|
|
|
|
self.logger.info(cmd + " FAIL retval " + str(r.retval))
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(os.path.exists("/tmp/dispatch.pcap"))
|
|
|
|
self.assertTrue(os.path.exists("/tmp/rxtx.pcap"))
|
|
|
|
self.assertTrue(os.path.exists("/tmp/filt.pcap"))
|
|
|
|
os.remove("/tmp/dispatch.pcap")
|
|
|
|
os.remove("/tmp/rxtx.pcap")
|
|
|
|
os.remove("/tmp/filt.pcap")
|
2020-04-27 09:11:19 -04:00
|
|
|
|
2023-01-13 08:04:55 +00:00
|
|
|
def test_pcap_trace_api(self):
|
|
|
|
"""PCAP API Tests"""
|
|
|
|
|
|
|
|
pkt = (
|
|
|
|
Ether(src=self.pg0.local_mac, dst=self.pg0.remote_mac)
|
|
|
|
/ IP(src=self.pg0.local_ip4, dst=self.pg0.remote_ip4, ttl=2)
|
|
|
|
/ UDP(sport=1234, dport=2345)
|
|
|
|
/ Raw(b"\xa5" * 128)
|
|
|
|
)
|
|
|
|
|
|
|
|
self.vapi.pcap_trace_on(
|
|
|
|
capture_rx=True,
|
|
|
|
capture_tx=True,
|
|
|
|
max_packets=1000,
|
|
|
|
sw_if_index=0,
|
|
|
|
filename="trace_any.pcap",
|
|
|
|
)
|
|
|
|
self.pg_send(self.pg0, pkt * 10)
|
|
|
|
self.vapi.pcap_trace_off()
|
|
|
|
|
2024-11-26 15:58:40 +01:00
|
|
|
# Launching trace with filter & no classifier table specified
|
|
|
|
# should result in no packet capture
|
|
|
|
self.vapi.pcap_trace_on(
|
|
|
|
capture_rx=True,
|
|
|
|
capture_tx=True,
|
|
|
|
max_packets=1000,
|
|
|
|
filter=True,
|
|
|
|
sw_if_index=0,
|
|
|
|
filename="trace_any_invalid_filter.pcap",
|
|
|
|
)
|
|
|
|
self.pg_send(self.pg0, pkt * 10)
|
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
self.vapi.pcap_trace_off()
|
|
|
|
self.assertFalse(os.path.exists("/tmp/trace_any_invalid_filter.pcap"))
|
|
|
|
|
2023-01-13 08:04:55 +00:00
|
|
|
self.vapi.cli(
|
|
|
|
f"classify filter pcap mask l3 ip4 src match l3 ip4 src {self.pg0.local_ip4}"
|
|
|
|
)
|
|
|
|
self.vapi.pcap_trace_on(
|
|
|
|
capture_rx=True,
|
|
|
|
capture_tx=True,
|
|
|
|
filter=True,
|
|
|
|
max_packets=1000,
|
|
|
|
sw_if_index=0,
|
|
|
|
filename="trace_any_filter.pcap",
|
|
|
|
)
|
|
|
|
self.pg_send(self.pg0, pkt * 10)
|
|
|
|
self.vapi.pcap_trace_off()
|
|
|
|
self.vapi.cli("classify filter pcap del mask l3 ip4 src")
|
|
|
|
|
|
|
|
pkt = (
|
ethernet: check destination mac for L3 in ethernet-input node
When the NIC does not support mac filter, we rely on ethernet-input
node to do the destination mac check, ie, when the interface is in L3,
the mac address for the packet must be the mac address of the
interface where the packet arrives. This works fine in ethernet-input
node when all packets in the frame might have different interfaces, ie,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is not set in the frame. However,
when all packets are having the same interface,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is set, ethernet-input node goes
through the optimized routine eth_input_single_int -> eth_input_process_frame.
That is where dmac check has a bug when all packets in the frame are
either, ip4, ip6, or mpls without vlan tags. Because without vlan tags,
the code handles all packets in fast path and ignores dmac check.
With vlan tags, the code goes to slow path where dmac check is handled
properly.
The fix is to check if we have a bad dmac in the fast path and force the
code to go to slow path which will handle dmac check properly.
Also do a wholesale correction on all the testcases which do not use
the proper dmac when sending L3 packets.
Type: fix
Change-Id: I73153a805cecdc24c4eefcc781676de04737ae2c
Signed-off-by: Steven Luong <sluong@cisco.com>
2024-04-19 09:49:20 -07:00
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
2023-01-13 08:04:55 +00:00
|
|
|
# wrong destination address
|
|
|
|
/ IP(src=self.pg0.local_ip4, dst=self.pg0.local_ip4, ttl=2)
|
|
|
|
/ UDP(sport=1234, dport=2345)
|
|
|
|
/ Raw(b"\xa5" * 128)
|
|
|
|
)
|
|
|
|
|
|
|
|
self.vapi.pcap_trace_on(
|
|
|
|
capture_drop=True,
|
|
|
|
max_packets=1000,
|
|
|
|
sw_if_index=0,
|
|
|
|
error="{ip4-local}.{spoofed_local_packets}",
|
|
|
|
filename="trace_drop_err.pcap",
|
|
|
|
)
|
|
|
|
self.pg_send(self.pg0, pkt * 10)
|
|
|
|
self.vapi.pcap_trace_off()
|
|
|
|
|
|
|
|
self.assertTrue(os.path.exists("/tmp/trace_any.pcap"))
|
|
|
|
self.assertTrue(os.path.exists("/tmp/trace_any_filter.pcap"))
|
|
|
|
self.assertTrue(os.path.exists("/tmp/trace_drop_err.pcap"))
|
|
|
|
os.remove("/tmp/trace_any.pcap")
|
|
|
|
os.remove("/tmp/trace_any_filter.pcap")
|
|
|
|
os.remove("/tmp/trace_drop_err.pcap")
|
|
|
|
|
2024-11-26 17:25:27 +01:00
|
|
|
# Attempting to start a trace with no filename should return an error
|
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
self.vapi.pcap_trace_on(
|
|
|
|
capture_rx=True,
|
|
|
|
capture_tx=True,
|
|
|
|
filter=True,
|
|
|
|
max_packets=1000,
|
|
|
|
sw_if_index=0,
|
|
|
|
)
|
|
|
|
|
2020-05-06 16:38:40 -04:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
if __name__ == "__main__":
|
2020-04-27 09:11:19 -04:00
|
|
|
unittest.main(testRunner=VppTestRunner)
|