diff options
Diffstat (limited to 'src/vnet/gso/test')
-rw-r--r-- | src/vnet/gso/test/test_gro.py | 142 | ||||
-rw-r--r-- | src/vnet/gso/test/test_gso.py | 722 |
2 files changed, 0 insertions, 864 deletions
diff --git a/src/vnet/gso/test/test_gro.py b/src/vnet/gso/test/test_gro.py deleted file mode 100644 index 33215d65fa7..00000000000 --- a/src/vnet/gso/test/test_gro.py +++ /dev/null @@ -1,142 +0,0 @@ -#!/usr/bin/env python3 -"""GRO functional tests""" - -# -# Add tests for: -# - GRO -# - Verify that sending 1500 Bytes frame without GRO enabled correctly -# - Verify that sending 1500 Bytes frame with GRO enabled correctly -# -import unittest - -from scapy.packet import Raw -from scapy.layers.inet6 import IPv6, Ether, IP, UDP, ICMPv6PacketTooBig -from scapy.layers.inet6 import ipv6nh, IPerror6 -from scapy.layers.inet import TCP, ICMP -from scapy.data import ETH_P_IP, ETH_P_IPV6, ETH_P_ARP - -from framework import VppTestCase, VppTestRunner -from vpp_object import VppObject -from vpp_interface import VppInterface - - -""" Test_gro is a subclass of VPPTestCase classes. - GRO tests. -""" - - -class TestGRO(VppTestCase): - """ GRO Test Case """ - - @classmethod - def setUpClass(self): - super(TestGRO, self).setUpClass() - res = self.create_pg_interfaces(range(2)) - res_gro = self.create_pg_interfaces(range(2, 3), 1, 1460) - self.create_pg_interfaces(range(3, 4), 1, 8940) - self.pg_interfaces.append(res[0]) - self.pg_interfaces.append(res[1]) - self.pg_interfaces.append(res_gro[0]) - self.pg2.coalesce_enable() - self.pg3.coalesce_enable() - - @classmethod - def tearDownClass(self): - super(TestGRO, self).tearDownClass() - - def setUp(self): - super(TestGRO, self).setUp() - for i in self.pg_interfaces: - i.admin_up() - i.config_ip4() - i.config_ip6() - i.disable_ipv6_ra() - i.resolve_arp() - i.resolve_ndp() - - def tearDown(self): - super(TestGRO, self).tearDown() - if not self.vpp_dead: - for i in self.pg_interfaces: - i.unconfig_ip4() - i.unconfig_ip6() - i.admin_down() - - def test_gro(self): - """ GRO test """ - - n_packets = 124 - # - # Send 1500 bytes frame with gro disabled - # - p4 = (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=4321) / - Raw(b'\xa5' * 1460)) - - rxs = self.send_and_expect(self.pg0, n_packets * p4, self.pg1) - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg1.local_mac) - self.assertEqual(rx[Ether].dst, self.pg1.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg1.remote_ip4) - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 4321) - - # - # Send 1500 bytes frame with gro enabled on - # output interfaces support GRO - # - p = [] - s = 0 - for n in range(0, n_packets): - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_ip4, dst=self.pg2.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=4321, seq=s, ack=n, flags='A') / - Raw(b'\xa5' * 1460))) - s += 1460 - - rxs = self.send_and_expect(self.pg0, p, self.pg2, n_rx=2) - - i = 0 - for rx in rxs: - i += 1 - self.assertEqual(rx[Ether].src, self.pg2.local_mac) - self.assertEqual(rx[Ether].dst, self.pg2.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg2.remote_ip4) - self.assertEqual(rx[IP].len, 64280) # 1460 * 44 + 40 < 65536 - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 4321) - self.assertEqual(rx[TCP].ack, (44*i - 1)) - - p4_temp = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IP(src=self.pg2.remote_ip4, dst=self.pg0.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=4321, flags='F')) - - rxs = self.send_and_expect(self.pg2, 100*[p4_temp], self.pg0, n_rx=100) - rx_coalesce = self.pg2.get_capture(1, timeout=1) - - rx0 = rx_coalesce[0] - self.assertEqual(rx0[Ether].src, self.pg2.local_mac) - self.assertEqual(rx0[Ether].dst, self.pg2.remote_mac) - self.assertEqual(rx0[IP].src, self.pg0.remote_ip4) - self.assertEqual(rx0[IP].dst, self.pg2.remote_ip4) - self.assertEqual(rx0[IP].len, 52600) # 1460 * 36 + 40 - self.assertEqual(rx0[TCP].sport, 1234) - self.assertEqual(rx0[TCP].dport, 4321) - - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg2.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assertEqual(rx[IP].len, 40) - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 4321) - -if __name__ == '__main__': - unittest.main(testRunner=VppTestRunner) diff --git a/src/vnet/gso/test/test_gso.py b/src/vnet/gso/test/test_gso.py deleted file mode 100644 index 094600eb74c..00000000000 --- a/src/vnet/gso/test/test_gso.py +++ /dev/null @@ -1,722 +0,0 @@ -#!/usr/bin/env python3 -"""GSO functional tests""" - -# -# Add tests for: -# - GSO -# - Verify that sending Jumbo frame without GSO enabled correctly -# - Verify that sending Jumbo frame with GSO enabled correctly -# - Verify that sending Jumbo frame with GSO enabled only on ingress interface -# -import unittest - -from scapy.packet import Raw -from scapy.layers.inet6 import IPv6, Ether, IP, UDP, ICMPv6PacketTooBig -from scapy.layers.inet6 import ipv6nh, IPerror6 -from scapy.layers.inet import TCP, ICMP -from scapy.layers.vxlan import VXLAN -from scapy.data import ETH_P_IP, ETH_P_IPV6, ETH_P_ARP - -from framework import VppTestCase, VppTestRunner -from vpp_object import VppObject -from vpp_interface import VppInterface -from vpp_ip import DpoProto -from vpp_ip_route import VppIpRoute, VppRoutePath, FibPathProto -from vpp_ipip_tun_interface import VppIpIpTunInterface -from vpp_vxlan_tunnel import VppVxlanTunnel -from socket import AF_INET, AF_INET6, inet_pton -from util import reassemble4 - - -""" Test_gso is a subclass of VPPTestCase classes. - GSO tests. -""" - - -class TestGSO(VppTestCase): - """ GSO Test Case """ - - def __init__(self, *args): - VppTestCase.__init__(self, *args) - - @classmethod - def setUpClass(self): - super(TestGSO, self).setUpClass() - res = self.create_pg_interfaces(range(2)) - res_gso = self.create_pg_interfaces(range(2, 4), 1, 1460) - self.create_pg_interfaces(range(4, 5), 1, 8940) - self.pg_interfaces.append(res[0]) - self.pg_interfaces.append(res[1]) - self.pg_interfaces.append(res_gso[0]) - self.pg_interfaces.append(res_gso[1]) - - @classmethod - def tearDownClass(self): - super(TestGSO, self).tearDownClass() - - def setUp(self): - super(TestGSO, self).setUp() - for i in self.pg_interfaces: - i.admin_up() - i.config_ip4() - i.config_ip6() - i.disable_ipv6_ra() - i.resolve_arp() - i.resolve_ndp() - - self.single_tunnel_bd = 10 - self.vxlan = VppVxlanTunnel(self, src=self.pg0.local_ip4, - dst=self.pg0.remote_ip4, - vni=self.single_tunnel_bd) - - self.vxlan2 = VppVxlanTunnel(self, src=self.pg0.local_ip6, - dst=self.pg0.remote_ip6, - vni=self.single_tunnel_bd) - - self.ipip4 = VppIpIpTunInterface(self, self.pg0, self.pg0.local_ip4, - self.pg0.remote_ip4) - self.ipip6 = VppIpIpTunInterface(self, self.pg0, self.pg0.local_ip6, - self.pg0.remote_ip6) - - def tearDown(self): - super(TestGSO, self).tearDown() - if not self.vpp_dead: - for i in self.pg_interfaces: - i.unconfig_ip4() - i.unconfig_ip6() - i.admin_down() - - def test_gso(self): - """ GSO test """ - # - # Send jumbo frame with gso disabled and DF bit is set - # - p4 = (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg0, [p4], self.pg0) - - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.local_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assertEqual(rx[ICMP].type, 3) # "dest-unreach" - self.assertEqual(rx[ICMP].code, 4) # "fragmentation-needed" - - # - # Send checksum offload frames - # - p40 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IP(src=self.pg2.remote_ip4, dst=self.pg0.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 1460)) - - rxs = self.send_and_expect(self.pg2, 100*[p40], self.pg0) - - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg2.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - payload_len = rx[IP].len - 20 - 20 - self.assert_ip_checksum_valid(rx) - self.assert_tcp_checksum_valid(rx) - self.assertEqual(payload_len, len(rx[Raw])) - - p60 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IPv6(src=self.pg2.remote_ip6, dst=self.pg0.remote_ip6) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 1440)) - - rxs = self.send_and_expect(self.pg2, 100*[p60], self.pg0) - - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(rx[IPv6].dst, self.pg0.remote_ip6) - payload_len = rx[IPv6].plen - 20 - self.assert_tcp_checksum_valid(rx) - self.assertEqual(payload_len, len(rx[Raw])) - - # - # Send jumbo frame with gso enabled and DF bit is set - # input and output interfaces support GSO - # - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg3.sw_if_index, - enable_disable=1) - p41 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IP(src=self.pg2.remote_ip4, dst=self.pg3.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 100*[p41], self.pg3, 100) - - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg3.local_mac) - self.assertEqual(rx[Ether].dst, self.pg3.remote_mac) - self.assertEqual(rx[IP].src, self.pg2.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg3.remote_ip4) - self.assertEqual(rx[IP].len, 65240) # 65200 + 20 (IP) + 20 (TCP) - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 1234) - - # - # ipv6 - # - p61 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IPv6(src=self.pg2.remote_ip6, dst=self.pg3.remote_ip6) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 100*[p61], self.pg3, 100) - - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg3.local_mac) - self.assertEqual(rx[Ether].dst, self.pg3.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(rx[IPv6].dst, self.pg3.remote_ip6) - self.assertEqual(rx[IPv6].plen, 65220) # 65200 + 20 (TCP) - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 1234) - - # - # Send jumbo frame with gso enabled only on input interface - # and DF bit is set. GSO packet will be chunked into gso_size - # data payload - # - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=1) - p42 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IP(src=self.pg2.remote_ip4, dst=self.pg0.remote_ip4, - flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p42], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg2.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - payload_len = rx[IP].len - 20 - 20 # len - 20 (IP4) - 20 (TCP) - self.assert_ip_checksum_valid(rx) - self.assert_tcp_checksum_valid(rx) - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 1234) - self.assertEqual(payload_len, len(rx[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # ipv6 - # - p62 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IPv6(src=self.pg2.remote_ip6, dst=self.pg0.remote_ip6) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p62], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(rx[IPv6].dst, self.pg0.remote_ip6) - payload_len = rx[IPv6].plen - 20 - self.assert_tcp_checksum_valid(rx) - self.assertEqual(rx[TCP].sport, 1234) - self.assertEqual(rx[TCP].dport, 1234) - self.assertEqual(payload_len, len(rx[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # Send jumbo frame with gso enabled only on input interface - # and DF bit is unset. GSO packet will be fragmented. - # - self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [576, 0, 0, 0]) - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg1.sw_if_index, - enable_disable=1) - - p43 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IP(src=self.pg2.remote_ip4, dst=self.pg1.remote_ip4) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p43], self.pg1, 5*119) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg1.local_mac) - self.assertEqual(rx[Ether].dst, self.pg1.remote_mac) - self.assertEqual(rx[IP].src, self.pg2.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg1.remote_ip4) - self.assert_ip_checksum_valid(rx) - size += rx[IP].len - 20 - size -= 20*5 # TCP header - self.assertEqual(size, 65200*5) - - # - # IPv6 - # Send jumbo frame with gso enabled only on input interface. - # ICMPv6 Packet Too Big will be sent back to sender. - # - self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [1280, 0, 0, 0]) - p63 = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) / - IPv6(src=self.pg2.remote_ip6, dst=self.pg1.remote_ip6) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p63], self.pg2, 5) - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg2.local_mac) - self.assertEqual(rx[Ether].dst, self.pg2.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg2.local_ip6) - self.assertEqual(rx[IPv6].dst, self.pg2.remote_ip6) - self.assertEqual(rx[IPv6].plen, 1240) # MTU - IPv6 header - self.assertEqual(ipv6nh[rx[IPv6].nh], "ICMPv6") - self.assertEqual(rx[ICMPv6PacketTooBig].mtu, 1280) - self.assertEqual(rx[IPerror6].src, self.pg2.remote_ip6) - self.assertEqual(rx[IPerror6].dst, self.pg1.remote_ip6) - self.assertEqual(rx[IPerror6].plen - 20, 65200) - - # - # Send jumbo frame with gso enabled only on input interface with 9K MTU - # and DF bit is unset. GSO packet will be fragmented. MSS is 8960. GSO - # size will be min(MSS, 2048 - 14 - 20) vlib_buffer_t size - # - self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [9000, 0, 0, 0]) - self.vapi.sw_interface_set_mtu(self.pg4.sw_if_index, [9000, 0, 0, 0]) - p44 = (Ether(src=self.pg4.remote_mac, dst=self.pg4.local_mac) / - IP(src=self.pg4.remote_ip4, dst=self.pg1.remote_ip4) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg4, 5*[p44], self.pg1, 165) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg1.local_mac) - self.assertEqual(rx[Ether].dst, self.pg1.remote_mac) - self.assertEqual(rx[IP].src, self.pg4.remote_ip4) - self.assertEqual(rx[IP].dst, self.pg1.remote_ip4) - payload_len = rx[IP].len - 20 - 20 # len - 20 (IP4) - 20 (TCP) - self.assert_ip_checksum_valid(rx) - self.assert_tcp_checksum_valid(rx) - self.assertEqual(payload_len, len(rx[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # IPv6 - # - p64 = (Ether(src=self.pg4.remote_mac, dst=self.pg4.local_mac) / - IPv6(src=self.pg4.remote_ip6, dst=self.pg1.remote_ip6) / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg4, 5*[p64], self.pg1, 170) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg1.local_mac) - self.assertEqual(rx[Ether].dst, self.pg1.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg4.remote_ip6) - self.assertEqual(rx[IPv6].dst, self.pg1.remote_ip6) - payload_len = rx[IPv6].plen - 20 - self.assert_tcp_checksum_valid(rx) - self.assertEqual(payload_len, len(rx[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=0) - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg1.sw_if_index, - enable_disable=0) - - def test_gso_vxlan(self): - """ GSO VXLAN test """ - self.logger.info(self.vapi.cli("sh int addr")) - # - # Send jumbo frame with gso enabled only on input interface and - # create VXLAN VTEP on VPP pg0, and put vxlan_tunnel0 and pg2 - # into BD. - # - - # - # enable ipv4/vxlan - # - self.vxlan.add_vpp_config() - self.vapi.sw_interface_set_l2_bridge( - rx_sw_if_index=self.vxlan.sw_if_index, bd_id=self.single_tunnel_bd) - self.vapi.sw_interface_set_l2_bridge( - rx_sw_if_index=self.pg2.sw_if_index, bd_id=self.single_tunnel_bd) - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=1) - - # - # IPv4/IPv4 - VXLAN - # - p45 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IP(src=self.pg2.remote_ip4, dst="172.16.3.3", flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p45], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.local_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assert_ip_checksum_valid(rx) - self.assert_udp_checksum_valid(rx, ignore_zero_checksum=False) - self.assertEqual(rx[VXLAN].vni, 10) - inner = rx[VXLAN].payload - self.assertEqual(rx[IP].len - 20 - 8 - 8, len(inner)) - self.assertEqual(inner[Ether].src, self.pg2.remote_mac) - self.assertEqual(inner[Ether].dst, "02:fe:60:1e:a2:79") - self.assertEqual(inner[IP].src, self.pg2.remote_ip4) - self.assertEqual(inner[IP].dst, "172.16.3.3") - self.assert_ip_checksum_valid(inner) - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IP].len - 20 - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # IPv4/IPv6 - VXLAN - # - p65 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IPv6(src=self.pg2.remote_ip6, dst="fd01:3::3") / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p65], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.local_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assert_ip_checksum_valid(rx) - self.assert_udp_checksum_valid(rx, ignore_zero_checksum=False) - self.assertEqual(rx[VXLAN].vni, 10) - inner = rx[VXLAN].payload - self.assertEqual(rx[IP].len - 20 - 8 - 8, len(inner)) - self.assertEqual(inner[Ether].src, self.pg2.remote_mac) - self.assertEqual(inner[Ether].dst, "02:fe:60:1e:a2:79") - self.assertEqual(inner[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(inner[IPv6].dst, "fd01:3::3") - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IPv6].plen - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # disable ipv4/vxlan - # - self.vxlan.remove_vpp_config() - - # - # enable ipv6/vxlan - # - self.vxlan2.add_vpp_config() - self.vapi.sw_interface_set_l2_bridge( - rx_sw_if_index=self.vxlan2.sw_if_index, - bd_id=self.single_tunnel_bd) - - # - # IPv6/IPv4 - VXLAN - # - p46 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IP(src=self.pg2.remote_ip4, dst="172.16.3.3", flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p46], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg0.local_ip6) - self.assertEqual(rx[IPv6].dst, self.pg0.remote_ip6) - self.assert_udp_checksum_valid(rx, ignore_zero_checksum=False) - self.assertEqual(rx[VXLAN].vni, 10) - inner = rx[VXLAN].payload - self.assertEqual(rx[IPv6].plen - 8 - 8, len(inner)) - self.assertEqual(inner[Ether].src, self.pg2.remote_mac) - self.assertEqual(inner[Ether].dst, "02:fe:60:1e:a2:79") - self.assertEqual(inner[IP].src, self.pg2.remote_ip4) - self.assertEqual(inner[IP].dst, "172.16.3.3") - self.assert_ip_checksum_valid(inner) - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IP].len - 20 - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # IPv6/IPv6 - VXLAN - # - p66 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IPv6(src=self.pg2.remote_ip6, dst="fd01:3::3") / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p66], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg0.local_ip6) - self.assertEqual(rx[IPv6].dst, self.pg0.remote_ip6) - self.assert_udp_checksum_valid(rx, ignore_zero_checksum=False) - self.assertEqual(rx[VXLAN].vni, 10) - inner = rx[VXLAN].payload - self.assertEqual(rx[IPv6].plen - 8 - 8, len(inner)) - self.assertEqual(inner[Ether].src, self.pg2.remote_mac) - self.assertEqual(inner[Ether].dst, "02:fe:60:1e:a2:79") - self.assertEqual(inner[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(inner[IPv6].dst, "fd01:3::3") - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IPv6].plen - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # disable ipv4/vxlan - # - self.vxlan2.remove_vpp_config() - - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=0) - - def test_gso_ipip(self): - """ GSO IPIP test """ - self.logger.info(self.vapi.cli("sh int addr")) - # - # Send jumbo frame with gso enabled only on input interface and - # create IPIP tunnel on VPP pg0. - # - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=1) - - # - # enable ipip4 - # - self.ipip4.add_vpp_config() - - # Set interface up and enable IP on it - self.ipip4.admin_up() - self.ipip4.set_unnumbered(self.pg0.sw_if_index) - - # Add IPv4 routes via tunnel interface - self.ip4_via_ip4_tunnel = VppIpRoute( - self, "172.16.10.0", 24, - [VppRoutePath("0.0.0.0", - self.ipip4.sw_if_index, - proto=FibPathProto.FIB_PATH_NH_PROTO_IP4)]) - self.ip4_via_ip4_tunnel.add_vpp_config() - - # - # IPv4/IPv4 - IPIP - # - p47 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IP(src=self.pg2.remote_ip4, dst="172.16.10.3", flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p47], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.local_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assert_ip_checksum_valid(rx) - self.assertEqual(rx[IP].proto, 4) # ipencap - inner = rx[IP].payload - self.assertEqual(rx[IP].len - 20, len(inner)) - self.assertEqual(inner[IP].src, self.pg2.remote_ip4) - self.assertEqual(inner[IP].dst, "172.16.10.3") - self.assert_ip_checksum_valid(inner) - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IP].len - 20 - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - self.ip6_via_ip4_tunnel = VppIpRoute( - self, "fd01:10::", 64, - [VppRoutePath("::", - self.ipip4.sw_if_index, - proto=FibPathProto.FIB_PATH_NH_PROTO_IP6)]) - self.ip6_via_ip4_tunnel.add_vpp_config() - # - # IPv4/IPv6 - IPIP - # - p67 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IPv6(src=self.pg2.remote_ip6, dst="fd01:10::3") / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p67], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.local_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assert_ip_checksum_valid(rx) - self.assertEqual(rx[IP].proto, 41) # ipv6 - inner = rx[IP].payload - self.assertEqual(rx[IP].len - 20, len(inner)) - self.assertEqual(inner[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(inner[IPv6].dst, "fd01:10::3") - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IPv6].plen - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # Send jumbo frame with gso enabled only on input interface and - # create IPIP tunnel on VPP pg0. Enable gso feature node on ipip - # tunnel - IPSec use case - # - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=0) - self.vapi.feature_gso_enable_disable( - sw_if_index=self.ipip4.sw_if_index, - enable_disable=1) - - rxs = self.send_and_expect(self.pg2, 5*[p47], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IP].src, self.pg0.local_ip4) - self.assertEqual(rx[IP].dst, self.pg0.remote_ip4) - self.assert_ip_checksum_valid(rx) - self.assertEqual(rx[IP].proto, 4) # ipencap - inner = rx[IP].payload - self.assertEqual(rx[IP].len - 20, len(inner)) - self.assertEqual(inner[IP].src, self.pg2.remote_ip4) - self.assertEqual(inner[IP].dst, "172.16.10.3") - self.assert_ip_checksum_valid(inner) - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IP].len - 20 - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # disable ipip4 - # - self.vapi.feature_gso_enable_disable( - sw_if_index=self.ipip4.sw_if_index, - enable_disable=0) - self.ip4_via_ip4_tunnel.remove_vpp_config() - self.ip6_via_ip4_tunnel.remove_vpp_config() - self.ipip4.remove_vpp_config() - - # - # enable ipip6 - # - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=1) - self.ipip6.add_vpp_config() - - # Set interface up and enable IP on it - self.ipip6.admin_up() - self.ipip6.set_unnumbered(self.pg0.sw_if_index) - - # Add IPv4 routes via tunnel interface - self.ip4_via_ip6_tunnel = VppIpRoute( - self, "172.16.10.0", 24, - [VppRoutePath("0.0.0.0", - self.ipip6.sw_if_index, - proto=FibPathProto.FIB_PATH_NH_PROTO_IP4)]) - self.ip4_via_ip6_tunnel.add_vpp_config() - - # - # IPv6/IPv4 - IPIP - # - p48 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IP(src=self.pg2.remote_ip4, dst="172.16.10.3", flags='DF') / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p48], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg0.local_ip6) - self.assertEqual(rx[IPv6].dst, self.pg0.remote_ip6) - self.assertEqual(ipv6nh[rx[IPv6].nh], "IP") - inner = rx[IPv6].payload - self.assertEqual(rx[IPv6].plen, len(inner)) - self.assertEqual(inner[IP].src, self.pg2.remote_ip4) - self.assertEqual(inner[IP].dst, "172.16.10.3") - self.assert_ip_checksum_valid(inner) - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IP].len - 20 - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - self.ip6_via_ip6_tunnel = VppIpRoute( - self, "fd01:10::", 64, - [VppRoutePath("::", - self.ipip6.sw_if_index, - proto=FibPathProto.FIB_PATH_NH_PROTO_IP6)]) - self.ip6_via_ip6_tunnel.add_vpp_config() - - # - # IPv6/IPv6 - IPIP - # - p68 = (Ether(src=self.pg2.remote_mac, dst="02:fe:60:1e:a2:79") / - IPv6(src=self.pg2.remote_ip6, dst="fd01:10::3") / - TCP(sport=1234, dport=1234) / - Raw(b'\xa5' * 65200)) - - rxs = self.send_and_expect(self.pg2, 5*[p68], self.pg0, 225) - size = 0 - for rx in rxs: - self.assertEqual(rx[Ether].src, self.pg0.local_mac) - self.assertEqual(rx[Ether].dst, self.pg0.remote_mac) - self.assertEqual(rx[IPv6].src, self.pg0.local_ip6) - self.assertEqual(rx[IPv6].dst, self.pg0.remote_ip6) - self.assertEqual(ipv6nh[rx[IPv6].nh], "IPv6") - inner = rx[IPv6].payload - self.assertEqual(rx[IPv6].plen, len(inner)) - self.assertEqual(inner[IPv6].src, self.pg2.remote_ip6) - self.assertEqual(inner[IPv6].dst, "fd01:10::3") - self.assert_tcp_checksum_valid(inner) - payload_len = inner[IPv6].plen - 20 - self.assertEqual(payload_len, len(inner[Raw])) - size += payload_len - self.assertEqual(size, 65200*5) - - # - # disable ipip6 - # - self.ip4_via_ip6_tunnel.remove_vpp_config() - self.ip6_via_ip6_tunnel.remove_vpp_config() - self.ipip6.remove_vpp_config() - - self.vapi.feature_gso_enable_disable(sw_if_index=self.pg0.sw_if_index, - enable_disable=0) - -if __name__ == '__main__': - unittest.main(testRunner=VppTestRunner) |