test suite reviews and discussions
 help / color / mirror / Atom feed
From: "Liu, Yong" <yong.liu@intel.com>
To: "Zhang, XiaonanX" <xiaonanx.zhang@intel.com>,
	"dts@dpdk.org" <dts@dpdk.org>
Subject: Re: [dts] [PATCH] Support IP reassembly
Date: Mon, 1 Jun 2015 09:15:14 +0000	[thread overview]
Message-ID: <86228AFD5BCD8E4EBFD2B90117B5E81E10E3675B@SHSMSX103.ccr.corp.intel.com> (raw)
In-Reply-To: <1432778472-24669-1-git-send-email-xiaonanx.zhang@intel.com>

Thanks, applied in 1.1 branch.

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Xiaonan Zhang
> Sent: Thursday, May 28, 2015 10:01 AM
> To: dts@dpdk.org
> Subject: [dts] [PATCH] Support IP reassembly
> 
> From: Zhangxiaonan <xiaonanx.zhang@intel.com>
> 
> Add IPV4 reassembly test case and test plan
> 
> Signed-off-by: TangHaifeng <haifengx.tang@intel.com>
> ---
>  test_plans/ipv4_reassembly_test_plan.rst |  233 ++++++++++++
>  tests/TestSuite_ipv4_reassembly.py       |  579
> ++++++++++++++++++++++++++++++
>  2 files changed, 812 insertions(+), 0 deletions(-)
>  create mode 100644 test_plans/ipv4_reassembly_test_plan.rst
>  create mode 100644 tests/TestSuite_ipv4_reassembly.py
> 
> diff --git a/test_plans/ipv4_reassembly_test_plan.rst
> b/test_plans/ipv4_reassembly_test_plan.rst
> new file mode 100644
> index 0000000..91ba792
> --- /dev/null
> +++ b/test_plans/ipv4_reassembly_test_plan.rst
> @@ -0,0 +1,233 @@
> +.. Copyright (c) <2013>, Intel Corporation
> +   All rights reserved.
> +
> +   Redistribution and use in source and binary forms, with or without
> +   modification, are permitted provided that the following conditions
> +   are met:
> +
> +   - Redistributions of source code must retain the above copyright
> +     notice, this list of conditions and the following disclaimer.
> +
> +   - Redistributions in binary form must reproduce the above copyright
> +     notice, this list of conditions and the following disclaimer in
> +     the documentation and/or other materials provided with the
> +     distribution.
> +
> +   - Neither the name of Intel Corporation nor the names of its
> +     contributors may be used to endorse or promote products derived
> +     from this software without specific prior written permission.
> +
> +   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> +   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> +   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> +   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> +   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> +   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
> +   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> +   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
> +   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> +   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
> +   OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +
> +
> +=============
> +IP Reassembly
> +=============
> +
> +This document provides a test plan for benchmarking of the IP Reassembly
> +sample application. This is a simple example app featuring packet
> processing
> +using Intel® Data Plane Development Kit (Intel® DPDK) that show-cases the
> use
> +of IP fragmented packets reassembly.
> +
> +
> +
> +Prerequisites
> +-------------
> +
> +Support igb_uio and vfio driver, if used vfio, kernel need 3.6+ and
> enable vt-d in bios.
> +When used vfio , used "modprobe vfio" and "modprobe vfio-pci" insmod
> vfiod driver, then used
> +"./tools/dpdk_nic_bind.py --bind=vfio-pci device_bus_id" to bind vfio
> driver to test driver.
> +
> +1x Intel® 82599 (Niantic) NICs (1x 10GbE full duplex optical ports per
> NIC)
> +plugged into the available PCIe Gen2 8-lane slots.
> +
> +
> +Test Case: Send 1K packets, 4 fragments each and 1K maxflows
> +============================================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=10s
> +
> +Sends 1K packets split in 4 fragments each with a ``maxflows`` of 1K.
> +
> +It expects:
> +
> +  - 4K IP packets to be sent to the DUT.
> +  - 1K TCP packets being forwarded back to the TESTER.
> +  - 1K packets with a valid TCP checksum.
> +
> +
> +Test Case: Send 2K packets, 4 fragments each and 1K maxflows
> +============================================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=10s
> +
> +Sends 2K packets split in 4 fragments each with a ``maxflows`` of 1K.
> +
> +It expects:
> +
> +  - 8K IP packets to be sent to the DUT.
> +  - 1K TCP packets being forwarded back to the TESTER.
> +  - 1K packets with a valid TCP checksum.
> +
> +
> +Test Case: Send 4K packets, 7 fragments each and 4K maxflows
> +============================================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=4096 --flowttl=10s
> +
> +Modifies the sample app source code to enable up to 7 fragments per
> packet.
> +Sends 4K packets split in 7 fragments each with a ``maxflows`` of 4K.
> +
> +It expects:
> +
> +  - 28K IP packets to be sent to the DUT.
> +  - 4K TCP packets being forwarded back to the TESTER.
> +  - 4K packets with a valid TCP checksum.
> +
> +
> +Test Case: Send +1K packets and ttl 3s; wait +ttl; send 1K packets
> +==================================================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=3s
> +
> +Sends 1100 packets split in 4 fragments each.
> +
> +It expects:
> +
> +  - 4400 IP packets to be sent to the DUT.
> +  - 1K TCP packets being forwarded back to the TESTER.
> +  - 1K packets with a valid TCP checksum.
> +
> +
> +Then waits until the ``flowttl`` timeout and sends 1K packets.
> +
> +It expects:
> +
> +  - 4K IP packets to be sent to the DUT.
> +  - 1K TCP packets being forwarded back to the TESTER.
> +  - 1K packets with a valid TCP checksum.
> +
> +
> +Test Case: Send more packets than maxflows; only maxflows packets are
> forwarded back
> +=========================================================================
> ===========
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1023 --flowttl=5s
> +
> +Sends 1K packets with ``maxflows`` equal to 1023.
> +
> +It expects:
> +
> +  - 4092 IP packets to be sent to the DUT.
> +  - 1023 TCP packets being forwarded back to the TESTER.
> +  - 1023 packets with a valid TCP checksum.
> +
> +Then sends 1023 packets.
> +
> +It expects:
> +
> +  - 4092 IP packets to be sent to the DUT.
> +  - 1023 TCP packets being forwarded back to the TESTER.
> +  - 1023 packets with a valid TCP checksum.
> +
> +Finally waits until the ``flowttl`` timeout and re-send 1K packets.
> +
> +It expects:
> +
> +  - 4092 IP packets to be sent to the DUT.
> +  - 1023 TCP packets being forwarded back to the TESTER.
> +  - 1023 packets with a valid TCP checksum.
> +
> +
> +Test Case: Send more fragments than supported
> +=============================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=10s
> +
> +Sends 1 packet split in 5 fragments while the maximum number of supported
> +fragments per packet is 4.
> +
> +It expects:
> +
> +  - 5 IP packets to be sent to the DUT.
> +  - 0 TCP packets being forwarded back to the TESTER.
> +  - 0 packets with a valid TCP checksum.
> +
> +
> +
> +Test Case: Send 3 frames and delay the 4th; no frames are forwarded back
> +========================================================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=3s
> +
> +Creates 1 packet split in 4 fragments. Sends the first 3 fragments and
> waits
> +until the ``flowttl`` timeout. Then sends the 4th fragment.
> +
> +It expects:
> +
> +  - 4 IP packets to be sent to the DUT.
> +  - 0 TCP packets being forwarded back to the TESTER.
> +  - 0 packets with a valid TCP checksum.
> +
> +
> +
> +Test Case: Send jumbo frames
> +============================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=10s --enable-jumbo --max-pkt-
> len=9500
> +
> +Sets the NIC MTU to 9000 and sends 1K packets of 8900B split in 4
> fragments of
> +2500B at the most. The reassembled packet size will not be bigger than
> the
> +MTU previously defined.
> +
> +It expects:
> +
> +  - 4K IP packets to be sent to the DUT.
> +  - 1K TCP packets being forwarded back to the TESTER.
> +  - 1K packets with a valid TCP checksum.
> +
> +
> +Test Case: Send jumbo frames without enable them in the app
> +===========================================================
> +
> +Sample command::
> +
> +  ./examples/ip_reassembly/build/ip_reassembly -c 0x2 -n 4 -- -P -p 0x2 -
> -config "(1,0,1)" --maxflows=1024 --flowttl=10s
> +
> +Sends jumbo packets in the same way the previous test case does but
> without
> +enabling support within the sample app.
> +
> +It expects:
> +
> +  - 4K IP packets to be sent to the DUT.
> +  - 0 TCP packets being forwarded back to the TESTER.
> +  - 0 packets with a valid TCP checksum.
> +
> +
> diff --git a/tests/TestSuite_ipv4_reassembly.py
> b/tests/TestSuite_ipv4_reassembly.py
> new file mode 100644
> index 0000000..e24576c
> --- /dev/null
> +++ b/tests/TestSuite_ipv4_reassembly.py
> @@ -0,0 +1,579 @@
> +# <COPYRIGHT_TAG>
> +
> +"""
> +DPDK Test suite.
> +
> +Test the IP reassembly feature
> +
> +"""
> +
> +import os
> +import time
> +from scapy.utils import struct, socket, PcapWriter
> +from scapy.layers.inet import Ether, IP, TCP, fragment
> +from scapy.route import *
> +
> +import dts
> +from test_case import TestCase
> +
> +
> +class IpReassemblyTestConfig(object):
> +
> +    """
> +    Helper class that encapsulates all the parameters used by the
> different
> +    test cases components.
> +    """
> +
> +    #
> +    #
> +    # Utility methods and other non-test code.
> +    #
> +
> +    def __init__(self, test_case, **kwargs):
> +        self.test_case = test_case
> +        self.init()
> +        for name in kwargs:
> +            setattr(self, name, kwargs[name])
> +
> +    def init(self):
> +        self.cpu_config()
> +        self.ports_config()
> +        self.example_app_config()
> +        self.packets_config()
> +
> +    def cpu_config(self):
> +        self.core_list = self.test_case.dut.get_core_list('1S/1C/1T')
> +        self.core_mask = dts.create_mask(self.core_list)
> +        self.memory_channels = self.test_case.dut.get_memory_channels()
> +
> +    def ports_config(self):
> +        dut_ports = self.test_case.dut.get_ports(self.test_case.nic)
> +        dut_port = dut_ports[0]
> +        tester_port = self.test_case.tester.get_local_port(dut_port)
> +        self.tester_iface =
> self.test_case.tester.get_interface(tester_port)
> +        self.dut_port_mask = dts.create_mask([dut_port])
> +        self.queue_config = '({},{},{})'.format(dut_port, '0',
> self.core_list[0])
> +
> +    def example_app_config(self):
> +        self.maxflows = 1024
> +        self.flowttl = '10s'
> +        self.extra_args = ''
> +
> +    def packets_config(self):
> +        self.pcap_file = 'file.pcap'
> +        self.number_of_frames = 1024
> +        self.frags_per_frame = 4
> +        self.src_ip = '2.1.1.0'
> +        self.dst_ip = '1.1.1.111'
> +        self.payload_size = 140
> +        self.fragment_size = 40
> +        self.mac_src = 'DE:AD:BE:EF:02:01'
> +        self.mac_dst = 'DE:AD:BE:EF:01:02'
> +        self.tcp_src_port = 1234
> +        self.tcp_dst_port = 4321
> +        self.identification = 1
> +
> +#
> +#
> +# Test class.
> +#
> +
> +
> +class TestIpReassembly(TestCase):
> +
> +    #
> +    #
> +    #
> +    # Test cases.
> +    #
> +
> +    def set_max_num_of_fragments(self, num_of_fragments=4):
> +        """
> +        Changes the maximum number of frames by modifying the example app
> code.
> +        """
> +
> +        # sed_command = (r"sed -i
> 's/\(\s*MAX_FRAG_NUM\s*=\)\s*[[:digit:]]*/\1 %d/' " +
> +        #               r"examples/ip_reassembly/ipv4_rsmbl.h")
> +        # self.dut.send_expect("sed -i
> 's/CONFIG_RTE_LIBRTE_IP_FRAG_MAX_FRAG=.*$/CONFIG_RTE_LIBRTE_IP_FRAG_MAX_FR
> AG=%s/' ./config/common_linuxapp" %int(num_of_fragments), "# ")
> +        # self.dut.send_expect(sed_command % int(num_of_fragments), '#',
> 60)
> +
> +        self.dut.send_expect("sed -i
> 's/CONFIG_RTE_LIBRTE_IP_FRAG_MAX_FRAG=.*$/CONFIG_RTE_LIBRTE_IP_FRAG_MAX_FR
> AG=%s/' ./config/common_linuxapp" % int(num_of_fragments), "# ")
> +        self.dut.send_expect("export RTE_TARGET=" + self.target, "#")
> +        self.dut.send_expect("export RTE_SDK=`pwd`", "#")
> +        self.dut.send_expect("rm -rf %s" % self.target, "# ", 5)
> +        self.dut.build_install_dpdk(self.target)
> +
> +    def set_tester_iface_mtu(self, iface, mtu=1500):
> +        """
> +        Set the interface MTU value.
> +        """
> +
> +        command = 'ip link set mtu {mtu} dev {iface}'
> +        self.tester.send_expect(command.format(**locals()), '#')
> +
> +    def compile_example_app(self):
> +        """
> +        Builds the example app and checks for errors.
> +        """
> +
> +        self.dut.send_expect('rm -rf examples/ip_reassembly/build', '#')
> +        out = self.dut.build_dpdk_apps('examples/ip_reassembly')
> +#        self.verify('Error' not in out and 'No such file' not in out,
> +#                    'Compilation error')
> +
> +    def execute_example_app(self):
> +        """
> +        Execute the example app and checks for errors.
> +        """
> +
> +        command = ('./examples/ip_reassembly/build/ip_reassembly -c
> {core_mask} ' +
> +                   '-n {memory_channels} --  -p {dut_port_mask} ' +
> +                   '--maxflows={maxflows} --flowttl={flowttl}
> {extra_args}')
> +        self.dut.send_expect(command.format(**self.test_config.__dict__),
> 'IP_RSMBL: ')
> +
> +    def tcp_ipv4_fragments(self, src_ip, identifier):
> +        """
> +        Using the Scapy API generates a packet with the given
> configuration
> +        and returns a list containing fragmented packets.
> +        """
> +
> +        packet = Ether() / IP() / TCP() / ("X" *
> self.test_config.payload_size)
> +        packet[Ether].src = self.test_config.mac_src
> +        packet[Ether].dst = self.test_config.mac_dst
> +        packet[IP].src = src_ip
> +        packet[IP].dst = self.test_config.dst_ip
> +        packet[IP].id = identifier
> +        packet[TCP].sport = self.test_config.tcp_src_port
> +        packet[TCP].dport = self.test_config.tcp_dst_port
> +        return fragment(packet, fragsize=self.test_config.fragment_size)
> +
> +    def increment_ip_address(self, addr, val):
> +        """
> +        Returns the next valid IP address from a given one, like
> +        10.1.1.254 -> 10.1.1.255 -> 10.1.2.0 -> 10.1.2.1
> +        """
> +
> +        ip2int = lambda ipstr: struct.unpack('!I',
> socket.inet_aton(ipstr))[0]
> +        x = ip2int(addr)
> +        int2ip = lambda n: socket.inet_ntoa(struct.pack('!I', n))
> +        return int2ip(x + 1)
> +
> +    def create_fragments(self):
> +        """
> +        Returns a list of fragmented IP packets by creating one packet at
> the
> +        time, fragmenting it and adding it to a list.
> +        It takes the packet information from the given configuration.
> +        """
> +
> +        all_fragments = []
> +        src_ip = self.test_config.src_ip
> +        for _ in range(self.test_config.number_of_frames):
> +            src_ip = self.increment_ip_address(src_ip, 1)
> +            identifier = self.test_config.identification % 0x10000
> +            fragments = self.tcp_ipv4_fragments(src_ip, identifier)
> +            all_fragments.extend(fragments)
> +            self.test_config.identification += 1
> +        return all_fragments
> +
> +    def write_shuffled_pcap(self, fragments):
> +        """
> +        Receives a list of fragmented packets and writes them into a PCAP
> file
> +        using the Scapy API.
> +        Before saving the frames to a file it will reorder them like this:
> +
> +        pkt0-frag3 -> pkt1-frag3 -> pkt2-frag3 -> ... -> pktN-frag3 ->
> +        pkt0-frag2 -> pkt1-frag2 -> pkt2-frag2 -> ... -> pktN-frag2 ->
> +        pkt0-frag1 -> pkt1-frag1 -> pkt2-frag1 -> ... -> pktN-frag1 ->
> +        pkt0-frag0 -> pkt1-frag0 -> pkt2-frag0 -> ... -> pktN-frag0.
> +        """
> +
> +        writer = PcapWriter(self.test_config.pcap_file)
> +        rounds = self.test_config.frags_per_frame
> +        while rounds > 0:
> +            index = rounds - 1
> +            rounds -= 1
> +            while index < len(fragments):
> +                writer.write(fragments[index])
> +                index += self.test_config.frags_per_frame
> +        writer.close()
> +
> +    def create_pcap_file(self):
> +        """
> +        Generates a valid PCAP file with the given configuration.
> +        """
> +
> +        fragments = self.create_fragments()
> +        self.write_shuffled_pcap(fragments)
> +
> +    def scapy_send_packets(self):
> +        """
> +        Calling scapy from the tester board sends the generated PCAP file
> to
> +        the DUT
> +        """
> +
> +        self.tester.scapy_append('pcap = rdpcap("%s")' %
> self.test_config.pcap_file)
> +        self.tester.scapy_append('sendp(pcap, iface="%s")' %
> self.test_config.tester_iface)
> +        self.tester.scapy_execute()
> +        time.sleep(5)
> +
> +    def send_packets(self):
> +        """
> +        Goes trhough all the steps to send packets from the tester to the
> self.dut.
> +        Generates the PCAP file, place it into the tester board, calls
> scapy and
> +        finally removes the PCAP file.
> +        """
> +
> +        self.create_pcap_file()
> +        self.tester.session.copy_file_to(self.test_config.pcap_file)
> +        self.scapy_send_packets()
> +        os.remove(self.test_config.pcap_file)
> +        time.sleep(5)
> +
> +    def tcpdump_start_sniffing(self):
> +        """
> +        Starts tcpdump in the background to sniff the tester interface
> where
> +        the packets are transmitted to and from the self.dut.
> +        All the captured packets are going to be stored in a file for a
> +        post-analysis.
> +        """
> +
> +        command = ('tcpdump -w tcpdump.pcap -i %s 2>tcpdump.out &' %
> +                   self.test_config.tester_iface)
> +        self.tester.send_expect('rm -f tcpdump.pcap', '#')
> +        self.tester.send_expect(command, '#')
> +
> +    def tcpdump_stop_sniff(self):
> +        """
> +        Stops the tcpdump process running in the background.
> +        """
> +
> +        self.tester.send_expect('killall tcpdump', '#')
> +        # For the [pid]+ Done tcpdump... message after killing the
> process
> +        self.tester.send_expect('cat tcpdump.out', '#')
> +        time.sleep(3)
> +
> +    def tcpdump_command(self, command):
> +        """
> +        Sends a tcpdump related command and returns an integer from the
> output
> +        """
> +
> +        result = self.tester.send_expect(command, '#')
> +        return int(result.strip())
> +
> +    def number_of_received_packets(self, tcp_port):
> +        """
> +        By reading the file generated by tcpdump it counts how many
> packets were
> +        forwarded by the sample app and received in the self.tester. The
> sample app
> +        will add a known MAC address for the test to look for.
> +        """
> +
> +        command = ('tcpdump -nn -e -v -r tcpdump.pcap tcp dst port
> {tcp_port} 2>/dev/null | ' +
> +                   'grep -c 02:00:00:00:00')  # MAC address used by the
> example app
> +        return self.tcpdump_command(command.format(**locals()))
> +
> +    def number_of_sent_packets(self, mac_src):
> +        """
> +        By reading the file generated by tcpdump it counts how many
> packets were
> +        sent to the DUT searching for a given MAC address.
> +        """
> +
> +        command = ('tcpdump -nn -e -v -r tcpdump.pcap 2>/dev/null | ' +
> +                   'grep -c -i {mac_src}')
> +        return self.tcpdump_command(command.format(**locals()))
> +
> +    def number_of_tcp_valid_checksum(self, tcp_port):
> +        """
> +        By reading the file generated by tcpdump it counts how many
> packets have
> +        a valid TCP checksum or how many packets were correctly assembled.
> +        """
> +
> +        command = ('tcpdump -nn -e -v -r tcpdump.pcap tcp dst port
> {tcp_port} 2>/dev/null | ' +
> +                   'grep -c -E "cksum.*correct"')
> +        return self.tcpdump_command(command.format(**locals()))
> +
> +    def send_n_siff_packets(self):
> +        """
> +        Sends the packets while tcpdump is sniffing on the background.
> +        """
> +
> +        self.tcpdump_start_sniffing()
> +        self.send_packets()
> +        self.tcpdump_stop_sniff()
> +
> +    def verify_sent_packets(self, expected):
> +        """
> +        Verifies if the number of sent packets is the expected.
> +        """
> +
> +        sent_packets =
> self.number_of_sent_packets(self.test_config.mac_src)
> +        print 'sent packets: %d - expected: %d' % (sent_packets, expected)
> +        self.verify(sent_packets == expected, 'Not all fragments have
> been sent')
> +
> +    def verify_received_packets(self, expected):
> +        """
> +        Verifies if the number of received packets is the expected.
> +        """
> +
> +        received_packets =
> self.number_of_received_packets(self.test_config.tcp_dst_port)
> +        print 'received packets: %d - expected: %d' % (received_packets,
> expected)
> +        self.verify(received_packets == expected,
> +                    'Not all frames have been forwarded')
> +
> +    def verify_tcp_valid_checksum(self, expected):
> +        """
> +        Verifies if the number of packets with a valid TCP checksum is
> the expected.
> +        """
> +
> +        tcp_valid_checksum =
> self.number_of_tcp_valid_checksum(self.test_config.tcp_dst_port)
> +        print 'tcp valid: %d - expected: %d' % (tcp_valid_checksum,
> expected)
> +        self.verify(tcp_valid_checksum == expected,
> +                    'Not all TCP packets have valid checksum')
> +
> +    def verify_all_with_maxflows(self):
> +        """
> +        Runs a common verification among different test cases were the
> number
> +        of sent packets is bigger than the maxflows value which means
> that
> +        only maxflows packets are expected to be received and valid.
> +        """
> +
> +        self.verify_sent_packets(self.test_config.number_of_frames *
> +                                 self.test_config.frags_per_frame)
> +        self.verify_received_packets(self.test_config.maxflows)
> +        self.verify_tcp_valid_checksum(self.test_config.maxflows)
> +
> +    def verify_all(self):
> +        """
> +        Runs a common verification among different test cases were the
> number
> +        of sent packets is equal to the maxflows value. It expects to
> receive
> +        the same number of frames that were sent.
> +        """
> +
> +        self.verify_sent_packets(self.test_config.number_of_frames *
> +                                 self.test_config.frags_per_frame)
> +        self.verify_received_packets(self.test_config.number_of_frames)
> +        self.verify_tcp_valid_checksum(self.test_config.number_of_frames)
> +
> +    def set_up_all(self):
> +        """
> +        Run at the start of each test suite.
> +
> +
> +        Builds the sample app and set the shell prompt to a known and
> value.
> +        """
> +
> +        self.tester.send_expect('export PS1="# "', '#')
> +        self.compile_example_app()
> +
> +    def test_send_1K_frames_split_in_4_and_1K_maxflows(self):
> +        """
> +        Sends 1K frames split in 4 fragments each using
> +        1K maxflows.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self)
> +
> +        self.execute_example_app()
> +        self.send_n_siff_packets()
> +
> +        self.verify_all()
> +
> +    def test_send_2K_frames_split_in_4_and_1K_maxflows(self):
> +        """
> +        Sends 2K frames while the maxflow value is only 1K.
> +        Only 1K frames are expected to be forwarded.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self,
> number_of_frames=2048)
> +
> +        self.execute_example_app()
> +        self.send_n_siff_packets()
> +
> +        self.verify_all_with_maxflows()
> +
> +    def test_send_4K_frames_split_in_7_and_4K_maxflows(self):
> +        """
> +        Sends 4K frames split into 7 fragments each.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  number_of_frames=4096,
> +                                                  frags_per_frame=7,
> +                                                  payload_size=230,
> +                                                  maxflows=4096,
> +                                                  flowttl='40s')
> +
> +        try:
> +            self.set_max_num_of_fragments(7)
> +            self.compile_example_app()
> +            self.execute_example_app()
> +            self.send_n_siff_packets()
> +            self.verify_all()
> +            self.dut.send_expect('^C', '# ')
> +            time.sleep(5)
> +            self.set_max_num_of_fragments(4)
> +            time.sleep(5)
> +
> +        except Exception as e:
> +            self.dut.send_expect('^C', '# ')
> +            time.sleep(2)
> +            self.set_max_num_of_fragments()
> +            self.compile_example_app()
> +            raise e
> +
> +    def test_packets_are_forwarded_after_ttl_timeout(self):
> +        """
> +        Sends +1K frames with 1K maxflwos - expects only
> +        1K frames to be forwarded. Then it waits until flowttl timeout
> and
> +        sends 1K frames. 1K frames must be forwarded back.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  number_of_frames=1100,
> +                                                  flowttl='3s')
> +
> +        self.execute_example_app()
> +
> +        self.send_n_siff_packets()
> +        self.verify_all_with_maxflows()
> +
> +        time.sleep(5)
> +
> +        self.test_config.number_of_frames = 1024
> +        self.send_n_siff_packets()
> +        self.verify_all()
> +
> +    def test_only_maxflows_packets_are_forwarded(self):
> +        """
> +        Using a maxflow of 1023 sends 1K frames expecting 1023 back.
> +        Then sends 1023 frames, expecting 1023 back again. And after the
> flowttl
> +        timeout sends 1K frames expecting all of them to be forwarded
> back.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  maxflows=1023,
> +                                                  flowttl='5s')
> +
> +        self.execute_example_app()
> +
> +        self.send_n_siff_packets()
> +        self.verify_all_with_maxflows()
> +
> +        self.test_config.number_of_frames = 1023
> +        self.send_n_siff_packets()
> +        self.verify_all()
> +
> +        time.sleep(5)
> +
> +        self.test_config.number_of_frames = 1024
> +        self.send_n_siff_packets()
> +        self.verify_all_with_maxflows()
> +
> +    def test_send_more_fragments_than_supported(self):
> +        """
> +        Sends 1 frame split in 5 fragments. Since the max number of
> +        fragments is set to 4 by default, the packet can't be forwarded
> back.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  number_of_frames=1,
> +                                                  frags_per_frame=5,
> +                                                  payload_size=180)
> +        self.execute_example_app()
> +
> +        self.send_n_siff_packets()
> +
> +        self.verify_sent_packets(self.test_config.number_of_frames *
> +                                 self.test_config.frags_per_frame)
> +        self.verify_received_packets(0)
> +        self.verify_tcp_valid_checksum(0)
> +
> +    def test_send_delayed_fragment_packet_is_forwarded(self):
> +        """
> +        Creates 1 frame split in 4. Sends 3 fragments first, waits
> +        for the flowttl to timeout and then sends the 4th. The packet
> can't
> +        be forwarded back.
> +        """
> +
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  number_of_frames=1,
> +                                                  flowttl='3s')
> +
> +        self.execute_example_app()
> +        self.tcpdump_start_sniffing()
> +
> +        fragments = self.create_fragments()
> +        self.write_shuffled_pcap(fragments[:3])
> +        self.tester.session.copy_file_to(self.test_config.pcap_file)
> +        self.scapy_send_packets()
> +        os.remove(self.test_config.pcap_file)
> +
> +        time.sleep(3)
> +
> +        self.write_shuffled_pcap(fragments[3:])
> +        self.tester.session.copy_file_to(self.test_config.pcap_file)
> +        self.scapy_send_packets()
> +        os.remove(self.test_config.pcap_file)
> +
> +        self.tcpdump_stop_sniff()
> +
> +        self.verify_sent_packets(self.test_config.number_of_frames *
> +                                 self.test_config.frags_per_frame)
> +        self.verify_received_packets(0)
> +        self.verify_tcp_valid_checksum(0)
> +
> +    def test_send_jumbo_frames(self):
> +        """
> +        Sends 1K jumbo frames using the right configuration.
> +        Expects all the frames to be forwarded back.
> +        """
> +
> +        mtu = 9000
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  payload_size=mtu - 100,
> +                                                  fragment_size=2500)
> +        try:
> +            self.set_tester_iface_mtu(self.test_config.tester_iface, mtu)
> +            self.execute_example_app()
> +            self.send_n_siff_packets()
> +            self.verify_all()
> +        except Exception as e:
> +            self.set_tester_iface_mtu(self.test_config.tester_iface)
> +            raise e
> +
> +    def test_send_jumbo_frames_with_wrong_arguments(self):
> +        """
> +        Sends 1K jumbo frames without enabling the jumbo frames
> +        within the sample app. Expects zero frames to be forwarded back.
> +        """
> +
> +        mtu = 9000
> +        self.test_config = IpReassemblyTestConfig(self,
> +                                                  payload_size=mtu - 100,
> +                                                  fragment_size=2500)
> +        try:
> +            self.set_tester_iface_mtu(self.test_config.tester_iface, mtu)
> +            self.set_max_num_of_fragments(4)
> +            self.compile_example_app()
> +            self.execute_example_app()
> +            self.send_n_siff_packets()
> +
> +            self.verify_sent_packets(self.test_config.number_of_frames *
> +                                     self.test_config.frags_per_frame)
> +            self.verify_all()
> +        except Exception as e:
> +            self.set_tester_iface_mtu(self.test_config.tester_iface)
> +            raise e
> +
> +    def tear_down(self):
> +        """
> +        Run after each test case.
> +        """
> +
> +        self.dut.send_expect('^C', '# ')
> +
> +    def tear_down_all(self):
> +        """
> +        Run after each test suite.
> +        """
> +
> +        self.dut.kill_all()
> --
> 1.7.7


      reply	other threads:[~2015-06-01  9:15 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-05-28  2:01 Xiaonan Zhang
2015-06-01  9:15 ` Liu, Yong [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=86228AFD5BCD8E4EBFD2B90117B5E81E10E3675B@SHSMSX103.ccr.corp.intel.com \
    --to=yong.liu@intel.com \
    --cc=dts@dpdk.org \
    --cc=xiaonanx.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).