map gbp papi: match endianess of f64
[vpp.git] / test / test_mtu.py
1 #!/usr/bin/env python
2 """IP4 and IP6 MTU functional tests"""
3
4 #
5 # Add tests for:
6 # - sub interfaces
7 # - Verify that adjacencies inherit MTU correctly
8 # - Verify that sub-interfaces inherit MTU correctly
9 # - Different types of interfaces?
10 #
11 import unittest
12 from scapy.layers.inet6 import IPv6, Ether, IP, UDP, ICMPv6PacketTooBig
13 from scapy.layers.inet import ICMP
14 from framework import VppTestCase, VppTestRunner
15 from vpp_ip import DpoProto
16 from vpp_ip_route import VppIpRoute, VppRoutePath, FibPathProto
17 from socket import AF_INET, AF_INET6, inet_pton
18 from util import reassemble4
19
20
21 """ Test_mtu is a subclass of VPPTestCase classes.
22     MTU tests.
23 """
24
25
26 class TestMTU(VppTestCase):
27     """ MTU Test Case """
28     maxDiff = None
29
30     @classmethod
31     def setUpClass(cls):
32         super(TestMTU, cls).setUpClass()
33         cls.create_pg_interfaces(range(2))
34         cls.interfaces = list(cls.pg_interfaces)
35
36     @classmethod
37     def tearDownClass(cls):
38         super(TestMTU, cls).tearDownClass()
39
40     def setUp(self):
41         super(TestMTU, self).setUp()
42         for i in self.interfaces:
43             i.admin_up()
44             i.config_ip4()
45             i.config_ip6()
46             i.disable_ipv6_ra()
47             i.resolve_arp()
48             i.resolve_ndp()
49
50     def tearDown(self):
51         super(TestMTU, self).tearDown()
52         if not self.vpp_dead:
53             for i in self.pg_interfaces:
54                 i.unconfig_ip4()
55                 i.unconfig_ip6()
56                 i.admin_down()
57
58     def validate(self, rx, expected):
59         self.assertEqual(rx, expected.__class__(expected))
60
61     def validate_bytes(self, rx, expected):
62         self.assertEqual(rx, expected)
63
64     def payload(self, len):
65         return 'x' * len
66
67     def get_mtu(self, sw_if_index):
68         rv = self.vapi.sw_interface_dump(sw_if_index=sw_if_index)
69         for i in rv:
70             if i.sw_if_index == sw_if_index:
71                 return i.mtu[0]
72         return 0
73
74     def test_ip4_mtu(self):
75         """ IP4 MTU test """
76
77         p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
78         p_ip4 = IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4,
79                    flags='DF')
80
81         current_mtu = self.get_mtu(self.pg1.sw_if_index)
82
83         p_payload = UDP(sport=1234, dport=1234) / self.payload(
84             current_mtu - 20 - 8)
85
86         p4 = p_ether / p_ip4 / p_payload
87         p4_reply = p_ip4 / p_payload
88         p4_reply.ttl -= 1
89         rx = self.send_and_expect(self.pg0, p4*11, self.pg1)
90         for p in rx:
91             self.validate(p[1], p4_reply)
92
93         # MTU
94         self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [576, 0, 0, 0])
95         self.assertEqual(576, self.get_mtu(self.pg1.sw_if_index))
96
97         # Should fail. Too large MTU
98         p_icmp4 = ICMP(type='dest-unreach', code='fragmentation-needed',
99                        nexthopmtu=576, chksum=0x2dbb)
100         icmp4_reply = (IP(src=self.pg0.local_ip4,
101                           dst=self.pg0.remote_ip4,
102                           ttl=254, len=576, id=0) /
103                        p_icmp4 / p_ip4 / p_payload)
104         icmp4_reply[1].ttl -= 1
105         n = icmp4_reply.__class__(icmp4_reply)
106         s = bytes(icmp4_reply)
107         icmp4_reply = s[0:576]
108         rx = self.send_and_expect(self.pg0, p4*11, self.pg0)
109         for p in rx:
110             # p.show2()
111             # n.show2()
112             self.validate_bytes(bytes(p[1]), icmp4_reply)
113
114         # Now with DF off. Expect fragments.
115         # First go with 1500 byte packets.
116         p_payload = UDP(sport=1234, dport=1234) / self.payload(
117             1500 - 20 - 8)
118         p4 = p_ether / p_ip4 / p_payload
119         p4.flags = 0
120         p4_reply = p_ip4 / p_payload
121         p4_reply.ttl = 62  # check this
122         p4_reply.flags = 0
123         p4_reply.id = 256
124         self.pg_enable_capture()
125         self.pg0.add_stream(p4*1)
126         self.pg_start()
127         rx = self.pg1.get_capture(3)
128         reass_pkt = reassemble4(rx)
129         self.validate(reass_pkt, p4_reply)
130
131         '''
132         # Now what happens with a 9K frame
133         p_payload = UDP(sport=1234, dport=1234) / self.payload(
134             current_mtu - 20 - 8)
135         p4 = p_ether / p_ip4 / p_payload
136         p4.flags = 0
137         p4_reply = p_ip4 / p_payload
138         p4_reply.ttl = 62 # check this
139         p4_reply.flags = 0
140         p4_reply.id = 512
141
142         self.pg_enable_capture()
143         self.pg0.add_stream(p4*1)
144         self.pg_start()
145         rx = self.pg1.get_capture(16)
146         reass_pkt = reassemble4(rx)
147         reass_pkt.show2()
148         p4_reply.show2()
149         self.validate(reass_pkt, p4_reply)
150         '''
151
152         # Reset MTU
153         self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index,
154                                        [current_mtu, 0, 0, 0])
155
156     def test_ip6_mtu(self):
157         """ IP6 MTU test """
158
159         current_mtu = self.get_mtu(self.pg1.sw_if_index)
160
161         p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
162         p_ip6 = IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
163
164         p_payload = UDP(sport=1234, dport=1234) / self.payload(
165             current_mtu - 40 - 8)
166
167         p6 = p_ether / p_ip6 / p_payload
168         p6_reply = p_ip6 / p_payload
169         p6_reply.hlim -= 1
170         rx = self.send_and_expect(self.pg0, p6*9, self.pg1)
171         for p in rx:
172             self.validate(p[1], p6_reply)
173
174         # MTU (only checked on encap)
175         self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [1280, 0, 0, 0])
176         self.assertEqual(1280, self.get_mtu(self.pg1.sw_if_index))
177
178         # Should fail. Too large MTU
179         p_icmp6 = ICMPv6PacketTooBig(mtu=1280, cksum=0x4c7a)
180         icmp6_reply = (IPv6(src=self.pg0.local_ip6,
181                             dst=self.pg0.remote_ip6,
182                             hlim=255, plen=1240) /
183                        p_icmp6 / p_ip6 / p_payload)
184         icmp6_reply[2].hlim -= 1
185         n = icmp6_reply.__class__(icmp6_reply)
186         s = bytes(icmp6_reply)
187         icmp6_reply_str = s[0:1280]
188
189         rx = self.send_and_expect(self.pg0, p6*9, self.pg0)
190         for p in rx:
191             self.validate_bytes(bytes(p[1]), icmp6_reply_str)
192
193         # Reset MTU
194         self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index,
195                                        [current_mtu, 0, 0, 0])
196
197
198 if __name__ == '__main__':
199     unittest.main(testRunner=VppTestRunner)