summaryrefslogtreecommitdiffstats
path: root/src/dpdk/lib/librte_eal/common/eal_common_cpuflags.c
blob: ecb124098fab1a197527eb2eb641521fad03cb42 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
/*-
 *   BSD LICENSE
 *
 *   Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
 *   All rights reserved.
 *
 *   Redistribution and use in source and binary forms, with or without
 *   modification, are permitted provided that the following conditions
 *   are met:
 *
 *     * Redistributions of source code must retain the above copyright
 *       notice, this list of conditions and the following disclaimer.
 *     * Redistributions in binary form must reproduce the above copyright
 *       notice, this list of conditions and the following disclaimer in
 *       the documentation and/or other materials provided with the
 *       distribution.
 *     * Neither the name of Intel Corporation nor the names of its
 *       contributors may be used to endorse or promote products derived
 *       from this software without specific prior written permission.
 *
 *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <stdio.h>

#include <rte_common.h>
#include <rte_cpuflags.h>

/**
 * Checks if the machine is adequate for running the binary. If it is not, the
 * program exits with status 1.
 * The function attribute forces this function to be called before main(). But
 * with ICC, the check is generated by the compiler.
 */
#ifndef __INTEL_COMPILER
void __attribute__ ((__constructor__))
#else
void
#endif
rte_cpu_check_supported(void)
{
	/* This is generated at compile-time by the build system */
	static const enum rte_cpu_flag_t compile_time_flags[] = {
			RTE_COMPILE_TIME_CPUFLAGS
	};
	unsigned count = RTE_DIM(compile_time_flags), i;
	int ret;

	for (i = 0; i < count; i++) {
		ret = rte_cpu_get_flag_enabled(compile_time_flags[i]);

		if (ret < 0) {
			fprintf(stderr,
				"ERROR: CPU feature flag lookup failed with error %d\n",
				ret);
			exit(1);
		}
		if (!ret) {
			fprintf(stderr,
			        "ERROR: This system does not support \"%s\".\n"
			        "Please check that RTE_MACHINE is set correctly.\n",
			        rte_cpu_get_flag_name(compile_time_flags[i]));
			exit(1);
		}
	}
}
s="p">, Ether, IP from scapy.layers.inet import TCP from framework import VppTestCase from asfframework import VppTestRunner """ Test_gro is a subclass of VPPTestCase classes. GRO tests. """ class TestGRO(VppTestCase): """GRO Test Case""" @classmethod def setUpClass(self): super(TestGRO, self).setUpClass() res = self.create_pg_interfaces(range(2)) res_gro = self.create_pg_interfaces(range(2, 3), 1, 1460) self.create_pg_interfaces(range(3, 4), 1, 8940) self.pg_interfaces.append(res[0]) self.pg_interfaces.append(res[1]) self.pg_interfaces.append(res_gro[0]) self.pg2.coalesce_enable() self.pg3.coalesce_enable() @classmethod def tearDownClass(self): super(TestGRO, self).tearDownClass() def setUp(self): super(TestGRO, self).setUp() for i in self.pg_interfaces: i.admin_up() i.config_ip4() i.config_ip6() i.disable_ipv6_ra() i.resolve_arp() i.resolve_ndp() def tearDown(self): super(TestGRO, self).tearDown() if not self.vpp_dead: for i in self.pg_interfaces: i.unconfig_ip4() i.unconfig_ip6() i.admin_down() def test_gro(self): """GRO test""" n_packets = 124 # # Send 1500 bytes frame with gro disabled # p4 = ( Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4, flags="DF") / TCP(sport=1234, dport=4321) / Raw(b"\xa5" * 1460) ) rxs = self.send_and_expect(self.pg0, n_packets * p4, self.pg1) for rx in rxs: self.assertEqual(rx[Ether].src, self.pg1.local_mac) self.assertEqual(rx[Ether].dst, self.pg1.remote_mac) self.assertEqual(rx[IP].src, self.pg0.remote_ip4) self.assertEqual(rx[IP].dst, self.pg1.remote_ip4) self.assertEqual(rx[TCP].sport, 1234) self.assertEqual(rx[TCP].dport, 4321) # # Send 1500 bytes frame with gro enabled on # output interfaces support GRO # p = [] s = 0 for n in range(0, n_packets): p.append( ( Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, flags="DF") / TCP(sport=1234, dport=4321, seq=s, ack=n, flags="A") / Raw(b"\xa5" * 1460) ) ) s += 1460 rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2) i = 0 for rx in rxs: i += 1 self.assertEqual(rx[Ether].src, self.pg2.local_mac) self.assertEqual(rx[Ether].dst, self.pg2.remote_mac) self.assertEqual(rx[IP].src, self.pg0.remote_ip4) self.assertEqual(rx[IP].dst, self.pg2.remote_ip4) self.assertEqual(rx[IP].len, 64280) # 1460 * 44 + 40 < 65536 self.assertEqual(rx[TCP].sport, 1234) self.assertEqual(rx[TCP].dport, 4321) self.assertEqual(rx[TCP].ack, (44 * i - 1)) p4_temp = ( Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / IP(src=self.pg2.remote_ip4, dst=self.pg0.remote_ip4, flags="DF") / TCP(sport=1234, dport=4321, flags="F") ) rxs = self.send_and_expect(self.pg2, 100 * [p4_temp], self.pg0, n_rx=100) rx_coalesce = self.pg2.get_capture(1, timeout=1) rx0 = rx_coalesce[0] self.assertEqual(rx0[Ether].src, self.pg2.local_mac) self.assertEqual(rx0[Ether].dst, self.pg2.remote_mac) self.assertEqual(rx0[IP].src, self.pg0.remote_ip4) self.assertEqual(rx0[IP].dst, self.pg2.remote_ip4) self.assertEqual(rx0[IP].len, 52600) # 1460 * 36 + 40 self.assertEqual(rx0[TCP].sport, 1234) self.assertEqual(rx0[TCP].dport, 4321) for rx in rxs: self.assertEqual(rx[Ether].src, self.pg0.local_mac) self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) self.assertEqual(rx[IP].src, self.pg2.remote_ip4) self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) self.assertEqual(rx[IP].len, 40) self.assertEqual(rx[TCP].sport, 1234) self.assertEqual(rx[TCP].dport, 4321) # # Same test with IPv6 # p = [] s = 0 for n in range(0, 88): p.append( ( Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / IPv6(src=self.pg0.remote_ip6, dst=self.pg2.remote_ip6) / TCP(sport=1234, dport=4321, seq=s, ack=n, flags="A") / Raw(b"\xa5" * 1460) ) ) s += 1460 p[-1][TCP].flags = "AP" # push to flush second packet rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2) i = 0 for rx in rxs: i += 1 self.assertEqual(rx[Ether].src, self.pg2.local_mac) self.assertEqual(rx[Ether].dst, self.pg2.remote_mac) self.assertEqual(rx[IPv6].src, self.pg0.remote_ip6) self.assertEqual(rx[IPv6].dst, self.pg2.remote_ip6) self.assertEqual(rx[IPv6].plen, 64260) # 1460 * 44 + 20 < 65536 self.assertEqual(rx[TCP].sport, 1234) self.assertEqual(rx[TCP].dport, 4321) self.assertEqual(rx[TCP].ack, (44 * i - 1)) # # Send a series of 1500 bytes packets each followed by a packet with a # PSH flag. Verify that GRO stops everytime a PSH flag is encountered # p = [] s = 0 for n in range(0, n_packets): p.append( ( Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, flags="DF") / TCP(sport=1234, dport=4321, seq=s, ack=2 * n, flags="A") / Raw(b"\xa5" * 1460) ) ) s += 1460 p.append( ( Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, flags="DF") / TCP(sport=1234, dport=4321, seq=s, ack=2 * n + 1, flags="AP") / Raw(b"\xa5" * 1340) ) ) s += 1340 rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=n_packets) i = 0 for rx in rxs: self.assertEqual(rx[Ether].src, self.pg2.local_mac) self.assertEqual(rx[Ether].dst, self.pg2.remote_mac) self.assertEqual(rx[IP].src, self.pg0.remote_ip4) self.assertEqual(rx[IP].dst, self.pg2.remote_ip4) self.assertEqual(rx[IP].len, 40 + 1460 + 1340) self.assertEqual(rx[TCP].sport, 1234) self.assertEqual(rx[TCP].dport, 4321) self.assertEqual(rx[TCP].ack, (2 * i + 1)) i += 1 # # Send a series of 1500 bytes packets each followed by a short packet # with padding. Verify that GRO removes the padding and stops on short # packets # p = [] s = 0 for n in range(0, n_packets): i = self.pg0 p.append( ( Ether(src=i.remote_mac, dst=i.local_mac) / IP(src=i.remote_ip4, dst=self.pg2.remote_ip4, flags="DF") / TCP(sport=1234, dport=4321, seq=s, ack=2 * n, flags="A") / Raw(b"\xa5" * 1459) ) ) s += 1459 p2 = ( Ether(src=i.remote_mac, dst=i.local_mac) / IP(src=i.remote_ip4, dst=self.pg2.remote_ip4, flags="DF", len=41) / TCP(sport=1234, dport=4321, seq=s, ack=2 * n + 1, flags="A") / Raw(b"\xa5") ) # first compute csum of pkt w/o padding to work around scapy bug p2 = Ether(bytes(p2)) p.append(p2 / Raw(b"\xa5" * 5)) # 1 byte data + 5 bytes padding s += 1 rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=n_packets) i = 0 for rx in rxs: self.assertEqual(rx[Ether].src, self.pg2.local_mac) self.assertEqual(rx[Ether].dst, self.pg2.remote_mac) self.assertEqual(rx[IP].src, self.pg0.remote_ip4) self.assertEqual(rx[IP].dst, self.pg2.remote_ip4) self.assertEqual(rx[IP].len, 40 + 1459 + 1) self.assertEqual(rx[TCP].sport, 1234) self.assertEqual(rx[TCP].dport, 4321) self.assertEqual(rx[TCP].ack, (2 * i + 1)) i += 1 if __name__ == "__main__": unittest.main(testRunner=VppTestRunner)