2018-05-18 11:01:31 +02:00
|
|
|
#!/usr/bin/env python
|
|
|
|
"""IP4 and IP6 MTU functional tests"""
|
|
|
|
|
|
|
|
#
|
|
|
|
# Add tests for:
|
|
|
|
# - sub interfaces
|
|
|
|
# - Verify that adjacencies inherit MTU correctly
|
|
|
|
# - Verify that sub-interfaces inherit MTU correctly
|
|
|
|
# - Different types of interfaces?
|
|
|
|
#
|
|
|
|
import unittest
|
|
|
|
from scapy.layers.inet6 import IPv6, Ether, IP, UDP, ICMPv6PacketTooBig
|
|
|
|
from scapy.layers.inet import ICMP
|
|
|
|
from framework import VppTestCase, VppTestRunner
|
2018-09-05 15:42:26 -07:00
|
|
|
from vpp_ip import DpoProto
|
2018-05-01 05:17:55 -07:00
|
|
|
from vpp_ip_route import VppIpRoute, VppRoutePath, FibPathProto
|
2018-05-18 11:01:31 +02:00
|
|
|
from socket import AF_INET, AF_INET6, inet_pton
|
2018-12-06 17:35:12 +01:00
|
|
|
from util import reassemble4
|
|
|
|
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
""" Test_mtu is a subclass of VPPTestCase classes.
|
|
|
|
MTU tests.
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
|
|
class TestMTU(VppTestCase):
|
|
|
|
""" MTU Test Case """
|
2018-12-06 17:35:12 +01:00
|
|
|
maxDiff = None
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestMTU, cls).setUpClass()
|
|
|
|
cls.create_pg_interfaces(range(2))
|
|
|
|
cls.interfaces = list(cls.pg_interfaces)
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestMTU, cls).tearDownClass()
|
|
|
|
|
2018-11-24 22:02:58 -08:00
|
|
|
def setUp(self):
|
|
|
|
super(TestMTU, self).setUp()
|
|
|
|
for i in self.interfaces:
|
2018-05-18 11:01:31 +02:00
|
|
|
i.admin_up()
|
|
|
|
i.config_ip4()
|
|
|
|
i.config_ip6()
|
|
|
|
i.disable_ipv6_ra()
|
|
|
|
i.resolve_arp()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestMTU, self).tearDown()
|
|
|
|
if not self.vpp_dead:
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip4()
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def validate(self, rx, expected):
|
2018-12-06 17:35:12 +01:00
|
|
|
self.assertEqual(rx, expected.__class__(expected))
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
def validate_bytes(self, rx, expected):
|
|
|
|
self.assertEqual(rx, expected)
|
|
|
|
|
|
|
|
def payload(self, len):
|
|
|
|
return 'x' * len
|
|
|
|
|
|
|
|
def get_mtu(self, sw_if_index):
|
2019-06-07 15:01:12 -04:00
|
|
|
rv = self.vapi.sw_interface_dump(sw_if_index=sw_if_index)
|
2018-05-18 11:01:31 +02:00
|
|
|
for i in rv:
|
|
|
|
if i.sw_if_index == sw_if_index:
|
2018-06-07 10:17:57 +02:00
|
|
|
return i.mtu[0]
|
2018-05-18 11:01:31 +02:00
|
|
|
return 0
|
|
|
|
|
|
|
|
def test_ip4_mtu(self):
|
|
|
|
""" IP4 MTU test """
|
|
|
|
|
|
|
|
p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
p_ip4 = IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4,
|
|
|
|
flags='DF')
|
|
|
|
|
|
|
|
current_mtu = self.get_mtu(self.pg1.sw_if_index)
|
|
|
|
|
|
|
|
p_payload = UDP(sport=1234, dport=1234) / self.payload(
|
|
|
|
current_mtu - 20 - 8)
|
|
|
|
|
|
|
|
p4 = p_ether / p_ip4 / p_payload
|
|
|
|
p4_reply = p_ip4 / p_payload
|
|
|
|
p4_reply.ttl -= 1
|
|
|
|
rx = self.send_and_expect(self.pg0, p4*11, self.pg1)
|
|
|
|
for p in rx:
|
|
|
|
self.validate(p[1], p4_reply)
|
|
|
|
|
|
|
|
# MTU
|
2018-06-07 10:17:57 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [576, 0, 0, 0])
|
|
|
|
self.assertEqual(576, self.get_mtu(self.pg1.sw_if_index))
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
# Should fail. Too large MTU
|
|
|
|
p_icmp4 = ICMP(type='dest-unreach', code='fragmentation-needed',
|
|
|
|
nexthopmtu=576, chksum=0x2dbb)
|
|
|
|
icmp4_reply = (IP(src=self.pg0.local_ip4,
|
|
|
|
dst=self.pg0.remote_ip4,
|
|
|
|
ttl=254, len=576, id=0) /
|
|
|
|
p_icmp4 / p_ip4 / p_payload)
|
2018-12-06 17:35:12 +01:00
|
|
|
n = icmp4_reply.__class__(icmp4_reply)
|
|
|
|
s = bytes(icmp4_reply)
|
2018-05-18 11:01:31 +02:00
|
|
|
icmp4_reply = s[0:576]
|
|
|
|
rx = self.send_and_expect(self.pg0, p4*11, self.pg0)
|
|
|
|
for p in rx:
|
|
|
|
# p.show2()
|
|
|
|
# n.show2()
|
2018-12-06 17:35:12 +01:00
|
|
|
self.validate_bytes(bytes(p[1]), icmp4_reply)
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
# Now with DF off. Expect fragments.
|
|
|
|
# First go with 1500 byte packets.
|
|
|
|
p_payload = UDP(sport=1234, dport=1234) / self.payload(
|
|
|
|
1500 - 20 - 8)
|
|
|
|
p4 = p_ether / p_ip4 / p_payload
|
|
|
|
p4.flags = 0
|
|
|
|
p4_reply = p_ip4 / p_payload
|
2019-10-30 17:34:14 +00:00
|
|
|
p4_reply.ttl = p_ip4.ttl - 1
|
2018-05-18 11:01:31 +02:00
|
|
|
p4_reply.flags = 0
|
|
|
|
p4_reply.id = 256
|
|
|
|
self.pg_enable_capture()
|
|
|
|
self.pg0.add_stream(p4*1)
|
|
|
|
self.pg_start()
|
|
|
|
rx = self.pg1.get_capture(3)
|
2018-12-06 17:35:12 +01:00
|
|
|
reass_pkt = reassemble4(rx)
|
2018-05-18 11:01:31 +02:00
|
|
|
self.validate(reass_pkt, p4_reply)
|
2018-04-10 16:02:51 +02:00
|
|
|
|
2018-05-18 11:01:31 +02:00
|
|
|
'''
|
|
|
|
# Now what happens with a 9K frame
|
|
|
|
p_payload = UDP(sport=1234, dport=1234) / self.payload(
|
|
|
|
current_mtu - 20 - 8)
|
|
|
|
p4 = p_ether / p_ip4 / p_payload
|
|
|
|
p4.flags = 0
|
|
|
|
p4_reply = p_ip4 / p_payload
|
|
|
|
p4_reply.ttl = 62 # check this
|
|
|
|
p4_reply.flags = 0
|
|
|
|
p4_reply.id = 512
|
|
|
|
|
|
|
|
self.pg_enable_capture()
|
|
|
|
self.pg0.add_stream(p4*1)
|
|
|
|
self.pg_start()
|
|
|
|
rx = self.pg1.get_capture(16)
|
2018-12-06 17:35:12 +01:00
|
|
|
reass_pkt = reassemble4(rx)
|
2018-05-18 11:01:31 +02:00
|
|
|
reass_pkt.show2()
|
|
|
|
p4_reply.show2()
|
|
|
|
self.validate(reass_pkt, p4_reply)
|
|
|
|
'''
|
2018-04-10 16:02:51 +02:00
|
|
|
|
2018-05-18 11:01:31 +02:00
|
|
|
# Reset MTU
|
2018-05-23 11:21:42 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index,
|
2018-06-07 10:17:57 +02:00
|
|
|
[current_mtu, 0, 0, 0])
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
def test_ip6_mtu(self):
|
|
|
|
""" IP6 MTU test """
|
|
|
|
|
2018-05-23 11:21:42 +02:00
|
|
|
current_mtu = self.get_mtu(self.pg1.sw_if_index)
|
|
|
|
|
2018-05-18 11:01:31 +02:00
|
|
|
p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
p_ip6 = IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
|
|
|
|
|
|
|
|
p_payload = UDP(sport=1234, dport=1234) / self.payload(
|
|
|
|
current_mtu - 40 - 8)
|
|
|
|
|
|
|
|
p6 = p_ether / p_ip6 / p_payload
|
|
|
|
p6_reply = p_ip6 / p_payload
|
|
|
|
p6_reply.hlim -= 1
|
|
|
|
rx = self.send_and_expect(self.pg0, p6*9, self.pg1)
|
|
|
|
for p in rx:
|
|
|
|
self.validate(p[1], p6_reply)
|
|
|
|
|
|
|
|
# MTU (only checked on encap)
|
2018-06-07 10:17:57 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [1280, 0, 0, 0])
|
|
|
|
self.assertEqual(1280, self.get_mtu(self.pg1.sw_if_index))
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
# Should fail. Too large MTU
|
|
|
|
p_icmp6 = ICMPv6PacketTooBig(mtu=1280, cksum=0x4c7a)
|
|
|
|
icmp6_reply = (IPv6(src=self.pg0.local_ip6,
|
|
|
|
dst=self.pg0.remote_ip6,
|
2018-09-19 12:38:51 +02:00
|
|
|
hlim=255, plen=1240) /
|
2018-05-18 11:01:31 +02:00
|
|
|
p_icmp6 / p_ip6 / p_payload)
|
|
|
|
icmp6_reply[2].hlim -= 1
|
2018-12-06 17:35:12 +01:00
|
|
|
n = icmp6_reply.__class__(icmp6_reply)
|
|
|
|
s = bytes(icmp6_reply)
|
2018-09-19 12:38:51 +02:00
|
|
|
icmp6_reply_str = s[0:1280]
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
rx = self.send_and_expect(self.pg0, p6*9, self.pg0)
|
|
|
|
for p in rx:
|
2018-12-06 17:35:12 +01:00
|
|
|
self.validate_bytes(bytes(p[1]), icmp6_reply_str)
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
# Reset MTU
|
2018-06-07 10:17:57 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index,
|
|
|
|
[current_mtu, 0, 0, 0])
|
2018-05-18 11:01:31 +02:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main(testRunner=VppTestRunner)
|