#!/usr/bin/env python3 import unittest import os from socket import AF_INET, AF_INET6, inet_pton from framework import VppTestCase, VppTestRunner from vpp_neighbor import VppNeighbor, find_nbr from vpp_ip_route import VppIpRoute, VppRoutePath, find_route, \ VppIpTable, DpoProto, FibPathType from vpp_papi import VppEnum import scapy.compat from scapy.packet import Raw from scapy.layers.l2 import Ether, ARP, Dot1Q from scapy.layers.inet import IP, UDP, TCP from scapy.layers.inet6 import IPv6 from scapy.contrib.mpls import MPLS from scapy.layers.inet6 import IPv6 NUM_PKTS = 67 # not exported by scapy, so redefined here arp_opts = {"who-has": 1, "is-at": 2} class ARPTestCase(VppTestCase): """ ARP Test Case """ @classmethod def setUpClass(cls): super(ARPTestCase, cls).setUpClass() @classmethod def tearDownClass(cls): super(ARPTestCase, cls).tearDownClass() def setUp(self): super(ARPTestCase, self).setUp() # create 3 pg interfaces self.create_pg_interfaces(range(4)) # pg0 configured with ip4 and 6 addresses used for input # pg1 configured with ip4 and 6 addresses used for output # pg2 is unnumbered to pg0 for i in self.pg_interfaces: i.admin_up() self.pg0.config_ip4() self.pg0.config_ip6() self.pg0.resolve_arp() self.pg1.config_ip4() self.pg1.config_ip6() # pg3 in a different VRF self.tbl = VppIpTable(self, 1) self.tbl.add_vpp_config() self.pg3.set_table_ip4(1) self.pg3.config_ip4() def tearDown(self): self.pg0.unconfig_ip4() self.pg0.unconfig_ip6() self.pg1.unconfig_ip4() self.pg1.unconfig_ip6() self.pg3.unconfig_ip4() self.pg3.set_table_ip4(0) for i in self.pg_interfaces: i.admin_down() super(ARPTestCase, self).tearDown() def verify_arp_req(self, rx, smac, sip, dip): ether = rx[Ether] self.assertEqual(ether.dst, "ff:ff:ff:ff:ff:ff") self.assertEqual(ether.src, smac) arp = rx[ARP] self.assertEqual(arp.hwtype, 1) self.assertEqual(arp.ptype, 0x800) self.assertEqual(arp.hwlen, 6) self.assertEqual(arp.plen, 4) self.assertEqual(arp.op, arp_opts["who-has"]) self.assertEqual(arp.hwsrc, smac) self.assertEqual(arp.hwdst, "00:00:00:00:00:00") self.assertEqual(arp.psrc, sip) self.assertEqual(arp.pdst, dip) def verify_arp_resp(self, rx, smac, dmac, sip, dip): ether = rx[Ether] self.assertEqual(ether.dst, dmac) self.assertEqual(ether.src, smac) arp = rx[ARP] self.assertEqual(arp.hwtype, 1) self.assertEqual(arp.ptype, 0x800) self.assertEqual(arp.hwlen, 6) self.assertEqual(arp.plen, 4) self.assertEqual(arp.op, arp_opts["is-at"]) self.assertEqual(arp.hwsrc, smac) self.assertEqual(arp.hwdst, dmac) self.assertEqual(arp.psrc, sip) self.assertEqual(arp.pdst, dip) def verify_arp_vrrp_resp(self, rx, smac, dmac, sip, dip): ether = rx[Ether] self.assertEqual(ether.dst, dmac) self.assertEqual(ether.src, smac) arp = rx[ARP] self.assertEqual(arp.hwtype, 1) self.assertEqual(arp.ptype, 0x800) self.assertEqual(arp.hwlen, 6) self.assertEqual(arp.plen, 4) self.assertEqual(arp.op, arp_opts["is-at"]) self.assertNotEqual(arp.hwsrc, smac) self.assertTrue("00:00:5e:00:01" in arp.hwsrc or "00:00:5E:00:01" in arp.hwsrc) self.assertEqual(arp.hwdst, dmac) self.assertEqual(arp.psrc, sip) self.assertEqual(arp.pdst, dip) def verify_ip(self, rx, smac, dmac, sip, dip): ether = rx[Ether] self.assertEqual(ether.dst, dmac) self.assertEqual(ether.src, smac) ip = rx[IP] self.assertEqual(ip.src, sip) self.assertEqual(ip.dst, dip) def verify_ip_o_mpls(self, rx, smac, dmac, label, sip, dip): ether = rx[Ether] self.assertEqual(ether.dst, dmac) self.assertEqual(ether.src, smac) mpls = rx[MPLS] self.assertTrue(mpls.label, label) ip = rx[IP] self.assertEqual(ip.src, sip) self.assertEqual(ip.dst, dip) def test_arp(self): """ ARP """ # # Generate some hosts on the LAN # self.pg1.generate_remote_hosts(11) # # watch for: # - all neighbour events # - all neighbor events on pg1 # - neighbor events for host[1] on pg1 # self.vapi.want_ip_neighbor_events(enable=1, pid=os.getpid()) self.vapi.want_ip_neighbor_events(enable=1, pid=os.getpid(), sw_if_index=self.pg1.sw_if_index) self.vapi.want_ip_neighbor_events(enable=1, pid=os.getpid(), sw_if_index=self.pg1.sw_if_index, ip=self.pg1.remote_hosts[1].ip4) self.logger.info(self.vapi.cli("sh ip neighbor-watcher")) # # Send IP traffic to one of these unresolved hosts. # expect the generation of an ARP request # p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg1._remote_hosts[1].ip4) / UDP(sport=1234, dport=1234) / Raw()) self.pg0.add_stream(p) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg1.get_capture(1) self.verify_arp_req(rx[0], self.pg1.local_mac, self.pg1.local_ip4, self.pg1._remote_hosts[1].ip4) # # And a dynamic ARP entry for host 1 # dyn_arp = VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[1].mac, self.pg1.remote_hosts[1].ip4) dyn_arp.add_vpp_config() self.assertTrue(dyn_arp.query_vpp_config()) # this matches all of the listnerers es = [self.vapi.wait_for_event(1, "ip_neighbor_event") for i in range(3)] for e in es: self.assertEqual(str(e.neighbor.ip_address), self.pg1.remote_hosts[1].ip4) # # now we expect IP traffic forwarded # dyn_p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg1._remote_hosts[1].ip4) / UDP(sport=1234, dport=1234) / Raw()) self.pg0.add_stream(dyn_p) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg1.get_capture(1) self.verify_ip(rx[0], self.pg1.local_mac, self.pg1.remote_hosts[1].mac, self.pg0.remote_ip4, self.pg1._remote_hosts[1].ip4) # # And a Static ARP entry for host 2 # static_arp = VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[2].mac, self.pg1.remote_hosts[2].ip4, is_static=1) static_arp.add_vpp_config() es = [self.vapi.wait_for_event(1, "ip_neighbor_event") for i in range(2)] for e in es: self.assertEqual(str(e.neighbor.ip_address), self.pg1.remote_hosts[2].ip4) static_p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg1._remote_hosts[2].ip4) / UDP(sport=1234, dport=1234) / Raw()) self.pg0.add_stream(static_p) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg1.get_capture(1) self.verify_ip(rx[0], self.pg1.local_mac, self.pg1.remote_hosts[2].mac, self.pg0.remote_ip4, self.pg1._remote_hosts[2].ip4) # # remove all the listeners # self.vapi.want_ip_neighbor_events(enable=0, pid=os.getpid()) self.vapi.want_ip_neighbor_events(enable=0, pid=os.getpid(), sw_if_index=self.pg1.sw_if_index) self.vapi.want_ip_neighbor_events(enable=0, pid=os.getpid(), sw_if_index=self.pg1.sw_if_index, ip=self.pg1.remote_hosts[1].ip4) # # flap the link. dynamic ARPs get flush, statics don't # self.pg1.admin_down() self.pg1.admin_up() self.pg0.add_stream(static_p) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg1.get_capture(1) self.verify_ip(rx[0], self.pg1.local_mac, self.pg1.remote_hosts[2].mac, self.pg0.remote_ip4, self.pg1._remote_hosts[2].ip4) self.pg0.add_stream(dyn_p) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg1.get_capture(1) self.verify_arp_req(rx[0], self.pg1.local_mac, self.pg1.local_ip4, self.pg1._remote_hosts[1].ip4) self.assertFalse(dyn_arp.query_vpp_config()) self.assertTrue(static_arp.query_vpp_config()) # # Send an ARP request from one of the so-far unlearned remote hosts # p = (Ether(dst="ff:ff:ff:ff:ff:ff", src=self.pg1._remote_hosts[3].mac) / ARP(op="who-has", hwsrc=self.pg1._remote_hosts[3].mac, pdst=self.pg1.local_ip4, psrc=self.pg1._remote_hosts[3].ip4)) self.pg1.add_stream(p) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg1.get_capture(1) self.verify_arp_resp(rx[0], self.pg1.local_mac, self.pg1._remote_hosts[3].mac, self.pg1.local_ip4, self.pg1._remote_hosts[3].ip4) # # VPP should have learned the mapping for the remote host # self.assertTrue(find_nbr(self, self.pg1.sw_if_index, self.pg1._remote_hosts[3].ip4)) # # Fire in an ARP request before the interface becomes IP enabled # self.pg2.generate_remote_hosts(4) p = (Ether(dst="ff:ff:ff:ff:ff:ff", src=self.pg2.remote_mac) / ARP(op="who-has", hwsrc=self.pg2.remote_mac, pdst=self.pg1.local_ip4, psrc=self.pg2.remote_hosts[3].ip4)) pt = (Ether(dst="ff:ff:ff:ff:ff:ff", src=self.pg2.remote_mac) / Dot1Q(vlan=0) / ARP(op="who-has", hwsrc=self.pg2.remote_mac, pdst=self.pg1.local_ip4, psrc=self.pg2.remote_hosts[3].ip4)) self.send_and_assert_no_replies(self.pg2, p, "interface not IP enabled") # # Make pg2 un-numbered to pg1 # self.pg2.set_unnumbered(self.pg1.sw_if_index) # # test the unnumbered dump both by all interfaces and just the enabled # one # unnum = self.vapi.ip_unnumbered_dump() self.assertTrue(len(unnum)) self.assertEqual(unnum[0].ip_sw_if_index, self.pg1.sw_if_index) self.assertEqual(unnum[0].sw_if_index, self.pg2.sw_if_index) unnum = self.vapi.ip_unnumbered_dump(self.pg2.sw_if_index) self.assertTrue(len(unnum)) self.assertEqual(unnum[0].ip_sw_if_index, self.pg1.sw_if_index) self.assertEqual(unnum[0].sw_if_index, self.pg2.sw_if_index) # # We should respond to ARP requests for the unnumbered to address # once an attached route to the source is known # self.send_and_assert_no_replies( self.pg2, p,
/*
 * Copyright (c) 2015 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
/*
 * trace_funcs.h: VLIB trace buffer.
 *
 * Copyright (c) 2008 Eliot Dresselhaus
 *
 * Permission is hereby granted, free of charge, to any person obtaining
 * a copy of this software and associated documentation files (the
 * "Software"), to deal in the Software without restriction, including
 * without limitation the rights to use, copy, modify, merge, publish,
 * distribute, sublicense, and/or sell copies of the Software, and to
 * permit persons to whom the Software is furnished to do so, subject to
 * the following conditions:
 *
 * The above copyright notice and this permission notice shall be
 * included in all copies or substantial portions of the Software.
 *
 *  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 *  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 *  MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 *  NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
 *  LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
 *  OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
 *  WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 */

#ifndef included_vlib_trace_funcs_h
#define included_vlib_trace_funcs_h

extern u8 *vnet_trace_placeholder;

always_inline void
vlib_validate_trace (vlib_trace_main_t * tm, vlib_buffer_t * b)
{
  ASSERT (!pool_is_free_index (tm->trace_buffer_pool,
			       vlib_buffer_get_trace_index (b)));
}

int vlib_add_handoff_trace (vlib_main_t * vm, vlib_buffer_t * b);

always_inline void *
vlib_add_trace_inline (vlib_main_t * vm,
		       vlib_node_runtime_t * r, vlib_buffer_t * b,
		       u32 n_data_bytes)
{
  vlib_trace_main_t *tm = &vm->trace_main;
  vlib_trace_header_t *h;
  u32 n_data_words, trace_index;

  ASSERT (vnet_trace_placeholder);

  if (PREDICT_FALSE ((b->flags & VLIB_BUFFER_IS_TRACED) == 0))
    return vnet_trace_placeholder;

  if (PREDICT_FALSE (tm->add_trace_callback != 0))
    {
      return tm->add_trace_callback ((struct vlib_main_t *) vm,
				     (struct vlib_node_runtime_t *) r,
				     (struct vlib_buffer_t *) b,
				     n_data_bytes);
    }
  else if (PREDICT_FALSE (tm->trace_enable == 0))
    {
      ASSERT (vec_len (vnet_trace_placeholder) >= n_data_bytes + sizeof (*h));
      return vnet_trace_placeholder;
    }

  /* Are we trying to trace a handoff case? */
  if (PREDICT_FALSE (vlib_buffer_get_trace_thread (b) != vm->thread_index))
    if (PREDICT_FALSE (!vlib_add_handoff_trace (vm, b)))
      return vnet_trace_placeholder;

  /*
   * there is a small chance of a race condition with 'clear trace' here: if a
   * buffer was set to be traced before the 'clear trace' and is still going
   * through the graph after the 'clear trace', its trace_index is staled as
   * the pool was destroyed.
   * The pool may have been re-allocated because of a new traced buffer, and
   * the trace_index might be valid by pure (bad) luck. In that case the trace
   * will be a mix of both buffer traces, but this should be acceptable.
   */
  trace_index = vlib_buffer_get_trace_index (b);
  if (PREDICT_FALSE (pool_is_free_index (tm->trace_buffer_pool, trace_index)))
    return vnet_trace_placeholder;

  n_data_bytes = round_pow2 (n_data_bytes, sizeof (h[0]));
  n_data_words = n_data_bytes / sizeof (h[0]);
  vec_add2_aligned (tm->trace_buffer_pool[trace_index], h, 1 + n_data_words,
		    sizeof (h[0]));

  h->time = vm->cpu_time_last_node_dispatch;
  h->n_data = n_data_words;
  h->node_index = r->node_index;

  return h->data;
}

/* Non-inline (typical use-case) version of the above */
void *vlib_add_trace (vlib_main_t * vm,
		      vlib_node_runtime_t * r, vlib_buffer_t * b,
		      u32 n_data_bytes);

always_inline vlib_trace_header_t *
vlib_trace_header_next (vlib_trace_header_t * h)
{
  return h + 1 + h->n_data;
}

always_inline void
vlib_free_trace (vlib_main_t * vm, vlib_buffer_t * b)
{
  vlib_trace_main_t *tm = &vm->trace_main;
  u32 trace_index = vlib_buffer_get_trace_index (b);
  vlib_validate_trace (tm, b);
  _vec_len (tm->trace_buffer_pool[trace_index]) = 0;
  pool_put_index (tm->trace_buffer_pool, trace_index);
}

always_inline void
vlib_trace_next_frame (vlib_main_t * vm,
		       vlib_node_runtime_t * r, u32 next_index)
{
  vlib_next_frame_t *nf;
  nf = vlib_node_runtime_get_next_frame (vm, r, next_index);
  nf->flags |= VLIB_FRAME_TRACE;
}

void trace_apply_filter (vlib_main_t * vm);
int vnet_is_packet_traced (vlib_buffer_t * b,
			   u32 classify_table_index, int func);


/*
 * Mark buffer as traced and allocate trace buffer.
 * return 1 if the buffer is successfully traced, 0 if not
 * A buffer might not be traced if tracing is off or if the packet did not
 * match the filter.
 */
always_inline __clib_warn_unused_result int
vlib_trace_buffer (vlib_main_t * vm,
		   vlib_node_runtime_t * r,
		   u32 next_index, vlib_buffer_t * b, int follow_chain)
{
  vlib_trace_main_t *tm = &vm->trace_main;
  vlib_trace_header_t **h;

  if (PREDICT_FALSE (tm->trace_enable == 0))
    return 0;

  /* Classifier filter in use? */
  if (PREDICT_FALSE (vlib_global_main.trace_filter.trace_filter_enable))
    {
      /* See if we're supposed to trace this packet... */
      if (vnet_is_packet_traced (
	    b, vlib_global_main.trace_filter.classify_table_index,
	    0 /* full classify */) != 1)
	return 0;
    }

  /*
   * Apply filter to existing traces to keep number of allocated traces low.
   * Performed each time around the main loop.
   */
  if (tm->last_main_loop_count != vm->main_loop_count)
    {
      tm->last_main_loop_count = vm->main_loop_count;
      trace_apply_filter (vm);

      if (tm->trace_buffer_callback)
	(tm->trace_buffer_callback) ((struct vlib_main_t *) vm,
				     (struct vlib_trace_main_t *) tm);
    }

  vlib_trace_next_frame (vm, r, next_index);

  pool_get (tm->trace_buffer_pool, h);

  do
    {
      b->flags |= VLIB_BUFFER_IS_TRACED;
      b->trace_handle = vlib_buffer_make_trace_handle
	(vm->thread_index, h - tm->trace_buffer_pool);
    }
  while (follow_chain && (b = vlib_get_next_buffer (vm, b)));

  return 1;
}

always_inline void
vlib_buffer_copy_trace_flag (vlib_main_t * vm, vlib_buffer_t * b,
			     u32 bi_target)
{
  vlib_buffer_t *b_target = vlib_get_buffer (vm, bi_target);
  b_target->flags |= b->flags & VLIB_BUFFER_IS_TRACED;
  b_target->trace_handle = b->trace_handle;
}

always_inline u32
vlib_get_trace_count (vlib_main_t * vm, vlib_node_runtime_t * rt)
{
  vlib_trace_main_t *tm = &vm->trace_main;
  vlib_trace_node_t *tn;

  if (rt->node_index >= vec_len (tm->nodes))
    return 0;
  tn = tm->nodes + rt->node_index;
  ASSERT (tn->count <= tn->limit);

  return tn->limit - tn->count;
}

always_inline void
vlib_set_trace_count (vlib_main_t * vm, vlib_node_runtime_t * rt, u32 count)
{
  vlib_trace_main_t *tm = &vm->trace_main;
  vlib_trace_node_t *tn = vec_elt_at_index (tm->nodes, rt->node_index);

  ASSERT (count <= tn->limit);
  tn->count = tn->limit - count;
}

/* Helper function for nodes which only trace buffer data. */
void
vlib_trace_frame_buffers_only (vlib_main_t * vm,
			       vlib_node_runtime_t * node,
			       u32 * buffers,
			       uword n_buffers,
			       uword next_buffer_stride,
			       uword n_buffer_data_bytes_in_trace);

#endif /* included_vlib_trace_funcs_h */

/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
self.pg1.add_stream(p1 * 257) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg0._get_capture(1) # # how many we get is going to be dependent on the time for packet # processing but it should be small # self.assertLess(len(rx), 64) # # IPv6/ND # ip_10_1 = VppIpRoute(self, "10::1", 128, [VppRoutePath(self.pg0.remote_hosts[1].ip6, self.pg0.sw_if_index, proto=DpoProto.DPO_PROTO_IP6)]) ip_10_1.add_vpp_config() p1 = (Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) / IPv6(src=self.pg1.remote_ip6, dst="10::1") / UDP(sport=1234, dport=1234) / Raw()) self.pg1.add_stream(p1 * 257) self.pg_enable_capture(self.pg_interfaces) self.pg_start() rx = self.pg0._get_capture(1) # # how many we get is going to be dependent on the time for packet # processing but it should be small # self.assertLess(len(rx), 64) def test_arp_forus(self): """ ARP for for-us """ # # Test that VPP responds with ARP requests to addresses that # are connected and local routes. # Use one of the 'remote' addresses in the subnet as a local address # The intention of this route is that it then acts like a secondary # address added to an interface # self.pg0.generate_remote_hosts(2) forus = VppIpRoute( self, self.pg0.remote_hosts[1].ip4, 32, [VppRoutePath("0.0.0.0", self.pg0.sw_if_index, type=FibPathType.FIB_PATH_TYPE_LOCAL)]) forus.add_vpp_config() p = (Ether(dst="ff:ff:ff:ff:ff:ff", src=self.pg0.remote_mac) / ARP(op="who-has", hwdst=self.pg0.local_mac, hwsrc=self.pg0.remote_mac, pdst=self.pg0.remote_hosts[1].ip4, psrc=self.pg0.remote_ip4)) rx = self.send_and_expect(self.pg0, [p], self.pg0) self.verify_arp_resp(rx[0], self.pg0.local_mac, self.pg0.remote_mac, self.pg0.remote_hosts[1].ip4, self.pg0.remote_ip4) def test_arp_table_swap(self): # # Generate some hosts on the LAN # N_NBRS = 4 self.pg1.generate_remote_hosts(N_NBRS) for n in range(N_NBRS): # a route thru each neighbour VppIpRoute(self, "10.0.0.%d" % n, 32, [VppRoutePath(self.pg1.remote_hosts[n].ip4, self.pg1.sw_if_index)]).add_vpp_config() # resolve each neighbour p1 = (Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) / ARP(op="is-at", hwdst=self.pg1.local_mac, hwsrc="00:00:5e:00:01:09", pdst=self.pg1.local_ip4, psrc=self.pg1.remote_hosts[n].ip4)) self.send_and_assert_no_replies(self.pg1, p1, "ARP reply") self.logger.info(self.vapi.cli("sh ip neighbors")) # # swap the table pg1 is in # table = VppIpTable(self, 100).add_vpp_config() self.pg1.unconfig_ip4() self.pg1.set_table_ip4(100) self.pg1.config_ip4() # # all neighbours are cleared # for n in range(N_NBRS): self.assertFalse(find_nbr(self, self.pg1.sw_if_index, self.pg1.remote_hosts[n].ip4)) # # packets to all neighbours generate ARP requests # for n in range(N_NBRS): # a route thru each neighbour VppIpRoute(self, "10.0.0.%d" % n, 32, [VppRoutePath(self.pg1.remote_hosts[n].ip4, self.pg1.sw_if_index)], table_id=100).add_vpp_config() p = (Ether(src=self.pg1.remote_hosts[n].mac, dst=self.pg1.local_mac) / IP(src=self.pg1.remote_hosts[n].ip4, dst="10.0.0.%d" % n) / Raw(b'0x5' * 100)) rxs = self.send_and_expect(self.pg1, [p], self.pg1) for rx in rxs: self.verify_arp_req(rx, self.pg1.local_mac, self.pg1.local_ip4, self.pg1.remote_hosts[n].ip4) self.pg1.unconfig_ip4() self.pg1.set_table_ip4(0) class NeighborStatsTestCase(VppTestCase): """ ARP/ND Counters """ @classmethod def setUpClass(cls): super(NeighborStatsTestCase, cls).setUpClass() @classmethod def tearDownClass(cls): super(NeighborStatsTestCase, cls).tearDownClass() def setUp(self): super(NeighborStatsTestCase, self).setUp() self.create_pg_interfaces(range(2)) # pg0 configured with ip4 and 6 addresses used for input # pg1 configured with ip4 and 6 addresses used for output # pg2 is unnumbered to pg0 for i in self.pg_interfaces: i.admin_up() i.config_ip4() i.config_ip6() i.resolve_arp() i.resolve_ndp() def tearDown(self): super(NeighborStatsTestCase, self).tearDown() for i in self.pg_interfaces: i.unconfig_ip4() i.unconfig_ip6() i.admin_down() def test_arp_stats(self): """ ARP Counters """ self.vapi.cli("adj counters enable") self.pg1.generate_remote_hosts(2) arp1 = VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[0].mac, self.pg1.remote_hosts[0].ip4) arp1.add_vpp_config() arp2 = VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[1].mac, self.pg1.remote_hosts[1].ip4) arp2.add_vpp_config() p1 = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_hosts[0].ip4) / UDP(sport=1234, dport=1234) / Raw()) p2 = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_hosts[1].ip4) / UDP(sport=1234, dport=1234) / Raw()) rx = self.send_and_expect(self.pg0, p1 * NUM_PKTS, self.pg1) rx = self.send_and_expect(self.pg0, p2 * NUM_PKTS, self.pg1) self.assertEqual(NUM_PKTS, arp1.get_stats()['packets']) self.assertEqual(NUM_PKTS, arp2.get_stats()['packets']) rx = self.send_and_expect(self.pg0, p1 * NUM_PKTS, self.pg1) self.assertEqual(NUM_PKTS*2, arp1.get_stats()['packets']) def test_nd_stats(self): """ ND Counters """ self.vapi.cli("adj counters enable") self.pg0.generate_remote_hosts(3) nd1 = VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[1].mac, self.pg0.remote_hosts[1].ip6) nd1.add_vpp_config() nd2 = VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[2].mac, self.pg0.remote_hosts[2].ip6) nd2.add_vpp_config() p1 = (Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) / IPv6(src=self.pg1.remote_ip6, dst=self.pg0.remote_hosts[1].ip6) / UDP(sport=1234, dport=1234) / Raw()) p2 = (Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) / IPv6(src=self.pg1.remote_ip6, dst=self.pg0.remote_hosts[2].ip6) / UDP(sport=1234, dport=1234) / Raw()) rx = self.send_and_expect(self.pg1, p1 * 16, self.pg0) rx = self.send_and_expect(self.pg1, p2 * 16, self.pg0) self.assertEqual(16, nd1.get_stats()['packets']) self.assertEqual(16, nd2.get_stats()['packets']) rx = self.send_and_expect(self.pg1, p1 * NUM_PKTS, self.pg0) self.assertEqual(NUM_PKTS+16, nd1.get_stats()['packets']) class NeighborAgeTestCase(VppTestCase): """ ARP/ND Aging """ @classmethod def setUpClass(cls): super(NeighborAgeTestCase, cls).setUpClass() @classmethod def tearDownClass(cls): super(NeighborAgeTestCase, cls).tearDownClass() def setUp(self): super(NeighborAgeTestCase, self).setUp() self.create_pg_interfaces(range(1)) # pg0 configured with ip4 and 6 addresses used for input # pg1 configured with ip4 and 6 addresses used for output # pg2 is unnumbered to pg0 for i in self.pg_interfaces: i.admin_up() i.config_ip4() i.config_ip6() i.resolve_arp() i.resolve_ndp() def tearDown(self): super(NeighborAgeTestCase, self).tearDown() for i in self.pg_interfaces: i.unconfig_ip4() i.unconfig_ip6() i.admin_down() def wait_for_no_nbr(self, intf, address, n_tries=50, s_time=1): while (n_tries): if not find_nbr(self, intf, address): return True n_tries = n_tries - 1 self.sleep(s_time) return False def verify_arp_req(self, rx, smac, sip, dip): ether = rx[Ether] self.assertEqual(ether.dst, "ff:ff:ff:ff:ff:ff") self.assertEqual(ether.src, smac) arp = rx[ARP] self.assertEqual(arp.hwtype, 1) self.assertEqual(arp.ptype, 0x800) self.assertEqual(arp.hwlen, 6) self.assertEqual(arp.plen, 4) self.assertEqual(arp.op, arp_opts["who-has"]) self.assertEqual(arp.hwsrc, smac) self.assertEqual(arp.hwdst, "00:00:00:00:00:00") self.assertEqual(arp.psrc, sip) self.assertEqual(arp.pdst, dip) def test_age(self): """ Aging/Recycle """ self.vapi.cli("set logging unthrottle 0") self.vapi.cli("set logging size %d" % 0xffff) self.pg0.generate_remote_hosts(201) vaf = VppEnum.vl_api_address_family_t # # start listening on all interfaces # self.pg_enable_capture(self.pg_interfaces) # # Set the neighbor configuration: # limi = 200 # age = 0 seconds # recycle = false # self.vapi.ip_neighbor_config(af=vaf.ADDRESS_IP4, max_number=200, max_age=0, recycle=False) self.vapi.cli("sh ip neighbor-config") # add the 198 neighbours that should pass (-1 for one created in setup) for ii in range(200): VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[ii].mac, self.pg0.remote_hosts[ii].ip4).add_vpp_config() # one more neighbor over the limit should fail with self.vapi.assert_negative_api_retval(): VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[200].mac, self.pg0.remote_hosts[200].ip4).add_vpp_config() # # change the config to allow recycling the old neighbors # self.vapi.ip_neighbor_config(af=vaf.ADDRESS_IP4, max_number=200, max_age=0, recycle=True) # now new additions are allowed VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[200].mac, self.pg0.remote_hosts[200].ip4).add_vpp_config() # add the first neighbor we configured has been re-used self.assertFalse(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[0].ip4)) self.assertTrue(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[200].ip4)) # # change the config to age old neighbors # self.vapi.ip_neighbor_config(af=vaf.ADDRESS_IP4, max_number=200, max_age=2, recycle=True) self.vapi.cli("sh ip4 neighbor-sorted") # # expect probes from all these ARP entries as they age # 3 probes for each neighbor 3*200 = 600 rxs = self.pg0.get_capture(600, timeout=8) for ii in range(3): for jj in range(200): rx = rxs[ii*200 + jj] # rx.show() # # 3 probes sent then 1 more second to see if a reply comes, before # they age out # for jj in range(1, 201): self.wait_for_no_nbr(self.pg0.sw_if_index, self.pg0.remote_hosts[jj].ip4) self.assertFalse(self.vapi.ip_neighbor_dump(sw_if_index=0xffffffff, af=vaf.ADDRESS_IP4)) # # load up some neighbours again with 2s aging enabled # they should be removed after 10s (2s age + 4s for probes + gap) # for ii in range(10): VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[ii].mac, self.pg0.remote_hosts[ii].ip4).add_vpp_config() self.sleep(10) self.assertFalse(self.vapi.ip_neighbor_dump(sw_if_index=0xffffffff, af=vaf.ADDRESS_IP4)) # # check if we can set age and recycle with empty neighbor list # self.vapi.ip_neighbor_config(af=vaf.ADDRESS_IP4, max_number=200, max_age=1000, recycle=True) # # load up some neighbours again, then disable the aging # they should still be there in 10 seconds time # for ii in range(10): VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[ii].mac, self.pg0.remote_hosts[ii].ip4).add_vpp_config() self.vapi.ip_neighbor_config(af=vaf.ADDRESS_IP4, max_number=200, max_age=0, recycle=False) self.sleep(10) self.assertTrue(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[0].ip4)) class NeighborReplaceTestCase(VppTestCase): """ ARP/ND Replacement """ @classmethod def setUpClass(cls): super(NeighborReplaceTestCase, cls).setUpClass() @classmethod def tearDownClass(cls): super(NeighborReplaceTestCase, cls).tearDownClass() def setUp(self): super(NeighborReplaceTestCase, self).setUp() self.create_pg_interfaces(range(4)) # pg0 configured with ip4 and 6 addresses used for input # pg1 configured with ip4 and 6 addresses used for output # pg2 is unnumbered to pg0 for i in self.pg_interfaces: i.admin_up() i.config_ip4() i.config_ip6() i.resolve_arp() i.resolve_ndp() def tearDown(self): super(NeighborReplaceTestCase, self).tearDown() for i in self.pg_interfaces: i.unconfig_ip4() i.unconfig_ip6() i.admin_down() def test_replace(self): """ replace """ N_HOSTS = 16 for i in self.pg_interfaces: i.generate_remote_hosts(N_HOSTS) i.configure_ipv4_neighbors() i.configure_ipv6_neighbors() # replace them all self.vapi.ip_neighbor_replace_begin() self.vapi.ip_neighbor_replace_end() for i in self.pg_interfaces: for h in range(N_HOSTS): self.assertFalse(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[h].ip4)) self.assertFalse(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[h].ip6)) # # and them all back via the API # for i in self.pg_interfaces: for h in range(N_HOSTS): VppNeighbor(self, i.sw_if_index, i.remote_hosts[h].mac, i.remote_hosts[h].ip4).add_vpp_config() VppNeighbor(self, i.sw_if_index, i.remote_hosts[h].mac, i.remote_hosts[h].ip6).add_vpp_config() # # begin the replacement again, this time touch some # the neighbours on pg1 so they are not deleted # self.vapi.ip_neighbor_replace_begin() # update from the API all neighbours on pg1 for h in range(N_HOSTS): VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[h].mac, self.pg1.remote_hosts[h].ip4).add_vpp_config() VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[h].mac, self.pg1.remote_hosts[h].ip6).add_vpp_config() # update from the data-plane all neighbours on pg3 self.pg3.configure_ipv4_neighbors() self.pg3.configure_ipv6_neighbors() # complete the replacement self.logger.info(self.vapi.cli("sh ip neighbors")) self.vapi.ip_neighbor_replace_end() for i in self.pg_interfaces: if i == self.pg1 or i == self.pg3: # neighbours on pg1 and pg3 are still present for h in range(N_HOSTS): self.assertTrue(find_nbr(self, i.sw_if_index, i.remote_hosts[h].ip4)) self.assertTrue(find_nbr(self, i.sw_if_index, i.remote_hosts[h].ip6)) else: # all other neighbours are toast for h in range(N_HOSTS): self.assertFalse(find_nbr(self, i.sw_if_index, i.remote_hosts[h].ip4)) self.assertFalse(find_nbr(self, i.sw_if_index, i.remote_hosts[h].ip6)) class NeighborFlush(VppTestCase): """ Neighbor Flush """ @classmethod def setUpClass(cls): super(NeighborFlush, cls).setUpClass() @classmethod def tearDownClass(cls): super(NeighborFlush, cls).tearDownClass() def setUp(self): super(NeighborFlush, self).setUp() self.create_pg_interfaces(range(2)) for i in self.pg_interfaces: i.admin_up() i.config_ip4() i.config_ip6() i.resolve_arp() i.resolve_ndp() def tearDown(self): super(NeighborFlush, self).tearDown() for i in self.pg_interfaces: i.unconfig_ip4() i.unconfig_ip6() i.admin_down() def test_flush(self): """ Neighbour Flush """ e = VppEnum nf = e.vl_api_ip_neighbor_flags_t af = e.vl_api_address_family_t N_HOSTS = 16 static = [False, True] self.pg0.generate_remote_hosts(N_HOSTS) self.pg1.generate_remote_hosts(N_HOSTS) for s in static: # a few v4 and v6 dynamic neoghbors for n in range(N_HOSTS): VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[n].mac, self.pg0.remote_hosts[n].ip4, is_static=s).add_vpp_config() VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[n].mac, self.pg1.remote_hosts[n].ip6, is_static=s).add_vpp_config() # flush the interfaces individually self.vapi.ip_neighbor_flush(af.ADDRESS_IP4, self.pg0.sw_if_index) # check we haven't flushed that which we shouldn't for n in range(N_HOSTS): self.assertTrue(find_nbr(self, self.pg1.sw_if_index, self.pg1.remote_hosts[n].ip6, is_static=s)) self.vapi.ip_neighbor_flush(af.ADDRESS_IP6, self.pg1.sw_if_index) for n in range(N_HOSTS): self.assertFalse(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[n].ip4)) self.assertFalse(find_nbr(self, self.pg1.sw_if_index, self.pg1.remote_hosts[n].ip6)) # add the nieghbours back for n in range(N_HOSTS): VppNeighbor(self, self.pg0.sw_if_index, self.pg0.remote_hosts[n].mac, self.pg0.remote_hosts[n].ip4, is_static=s).add_vpp_config() VppNeighbor(self, self.pg1.sw_if_index, self.pg1.remote_hosts[n].mac, self.pg1.remote_hosts[n].ip6, is_static=s).add_vpp_config() self.logger.info(self.vapi.cli("sh ip neighbor")) # flush both interfaces at the same time self.vapi.ip_neighbor_flush(af.ADDRESS_IP6, 0xffffffff) # check we haven't flushed that which we shouldn't for n in range(N_HOSTS): self.assertTrue(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[n].ip4, is_static=s)) self.vapi.ip_neighbor_flush(af.ADDRESS_IP4, 0xffffffff) for n in range(N_HOSTS): self.assertFalse(find_nbr(self, self.pg0.sw_if_index, self.pg0.remote_hosts[n].ip4)) self.assertFalse(find_nbr(self, self.pg1.sw_if_index, self.pg1.remote_hosts[n].ip6)) if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)