dpdk: Support of DPDK16.07-rc5 and newer
[vswitchperf.git] / vnfs / qemu / qemu.py
index 338ca77..02ada4b 100644 (file)
@@ -1,4 +1,4 @@
-# Copyright 2015 Intel Corporation.
+# Copyright 2015-2016 Intel Corporation.
 #
 # Licensed under the Apache License, Version 2.0 (the "License");
 # you may not use this file except in compliance with the License.
@@ -20,8 +20,11 @@ import logging
 import locale
 import re
 import subprocess
+import time
+import pexpect
 
 from conf import settings as S
+from conf import get_test_param
 from vnfs.vnf.vnf import IVnf
 
 class IVnfQemu(IVnf):
@@ -41,21 +44,38 @@ class IVnfQemu(IVnf):
 
     def __init__(self):
         """
-        :param timeout: Time to wait for login prompt. If set to
-            0 do not wait.
-        :param number: Number of QEMU instance, used when multiple QEMU
-            instances are started at once.
-        :param args: Arguments to pass to QEMU.
-
-        :returns: None
+        Initialisation function.
         """
         super(IVnfQemu, self).__init__()
         self._logger = logging.getLogger(__name__)
         self._logfile = os.path.join(
             S.getValue('LOG_DIR'),
             S.getValue('LOG_FILE_QEMU')) + str(self._number)
-        self._timeout = 120
+        self._timeout = S.getValue('GUEST_TIMEOUT')[self._number]
         self._monitor = '%s/vm%dmonitor' % ('/tmp', self._number)
+        self._net1 = get_test_param('guest_nic1_name', None)
+        if self._net1 == None:
+            self._net1 = S.getValue('GUEST_NIC1_NAME')[self._number]
+        else:
+            self._net1 = self._net1.split(',')[self._number]
+        self._net2 = get_test_param('guest_nic2_name', None)
+        if self._net2 == None:
+            self._net2 = S.getValue('GUEST_NIC2_NAME')[self._number]
+        else:
+            self._net2 = self._net2.split(',')[self._number]
+
+        # set guest loopback application based on VNF configuration
+        # cli option take precedence to config file values
+        self._guest_loopback = S.getValue('GUEST_LOOPBACK')[self._number]
+
+        self._testpmd_fwd_mode = S.getValue('GUEST_TESTPMD_FWD_MODE')
+        # in case of SRIOV we must ensure, that MAC addresses are not swapped
+        if S.getValue('SRIOV_ENABLED') and self._testpmd_fwd_mode.startswith('mac') and \
+           not S.getValue('VNF').endswith('PciPassthrough'):
+
+            self._logger.info("SRIOV detected, forwarding mode of testpmd was changed from '%s' to '%s'",
+                              self._testpmd_fwd_mode, 'io')
+            self._testpmd_fwd_mode = 'io'
 
         name = 'Client%d' % self._number
         vnc = ':%d' % self._number
@@ -64,12 +84,9 @@ class IVnfQemu(IVnf):
         self._cmd = ['sudo', '-E', S.getValue('QEMU_BIN'),
                      '-m', S.getValue('GUEST_MEMORY')[self._number],
                      '-smp', str(S.getValue('GUEST_SMP')[self._number]),
-                     '-cpu', 'host',
+                     '-cpu', 'host,migratable=off',
                      '-drive', 'if=scsi,file=' +
                      S.getValue('GUEST_IMAGE')[self._number],
-                     '-drive',
-                     'if=scsi,file=fat:rw:%s,snapshot=off' %
-                     S.getValue('GUEST_SHARE_DIR')[self._number],
                      '-boot', 'c', '--enable-kvm',
                      '-monitor', 'unix:%s,server,nowait' % self._monitor,
                      '-object',
@@ -79,6 +96,9 @@ class IVnfQemu(IVnf):
                      '-numa', 'node,memdev=mem -mem-prealloc',
                      '-nographic', '-vnc', str(vnc), '-name', name,
                      '-snapshot', '-net none', '-no-reboot',
+                     '-drive',
+                     'if=scsi,format=raw,file=fat:rw:%s,snapshot=off' %
+                     S.getValue('GUEST_SHARE_DIR')[self._number],
                     ]
         self._configure_logging()
 
@@ -104,12 +124,38 @@ class IVnfQemu(IVnf):
         Start QEMU instance, login and prepare for commands.
         """
         super(IVnfQemu, self).start()
-        self._affinitize()
+        if S.getValue('VNF_AFFINITIZATION_ON'):
+            self._affinitize()
 
         if self._timeout:
-            self._login()
             self._config_guest_loopback()
 
+    def stop(self):
+        """
+        Stops VNF instance gracefully first.
+        """
+        try:
+            # exit testpmd if needed
+            if self._guest_loopback == 'testpmd':
+                self.execute_and_wait('stop', 120, "Done")
+                self.execute_and_wait('quit', 120, "[bB]ye")
+
+            # turn off VM
+            self.execute_and_wait('poweroff', 120, "Power down")
+
+        except pexpect.TIMEOUT:
+            self.kill()
+
+        # wait until qemu shutdowns
+        self._logger.debug('Wait for QEMU to terminate')
+        for dummy in range(30):
+            time.sleep(1)
+            if not self.is_running():
+                break
+
+        # just for case that graceful shutdown failed
+        super(IVnfQemu, self).stop()
+
     # helper functions
 
     def _login(self, timeout=120):
@@ -166,7 +212,7 @@ class IVnfQemu(IVnf):
 
         self._logger.info('Affinitizing guest...')
 
-        cur_locale = locale.getlocale()[1]
+        cur_locale = locale.getdefaultlocale()[1]
         proc = subprocess.Popen(
             ('echo', 'info cpus'), stdout=subprocess.PIPE)
         output = subprocess.check_output(
@@ -190,9 +236,20 @@ class IVnfQemu(IVnf):
 
     def _config_guest_loopback(self):
         """
-        Configure VM to run VNF (e.g. port forwarding application)
+        Configure VM to run VNF, e.g. port forwarding application based on the configuration
         """
-        pass
+        if self._guest_loopback == 'testpmd':
+            self._login()
+            self._configure_testpmd()
+        elif self._guest_loopback == 'l2fwd':
+            self._login()
+            self._configure_l2fwd()
+        elif self._guest_loopback == 'linux_bridge':
+            self._login()
+            self._configure_linux_bridge()
+        elif self._guest_loopback != 'buildin':
+            self._logger.error('Unsupported guest loopback method "%s" was specified. Option'
+                               ' "buildin" will be used as a fallback.', self._guest_loopback)
 
     def wait(self, prompt=S.getValue('GUEST_PROMPT'), timeout=30):
         super(IVnfQemu, self).wait(prompt=prompt, timeout=timeout)
@@ -201,3 +258,184 @@ class IVnfQemu(IVnf):
                          prompt=S.getValue('GUEST_PROMPT')):
         super(IVnfQemu, self).execute_and_wait(cmd, timeout=timeout,
                                                prompt=prompt)
+
+    def _modify_dpdk_makefile(self):
+        """
+        Modifies DPDK makefile in Guest before compilation if needed
+        """
+        pass
+
+    def _configure_copy_sources(self, dirname):
+        """
+        Mount shared directory and copy DPDK and l2fwd sources
+        """
+        # mount shared directory
+        self.execute_and_wait('umount /dev/sdb1')
+        self.execute_and_wait('rm -rf ' + S.getValue('GUEST_OVS_DPDK_DIR'))
+        self.execute_and_wait('mkdir -p ' + S.getValue('OVS_DPDK_SHARE'))
+        self.execute_and_wait('mount -o ro,iocharset=utf8 /dev/sdb1 ' +
+                              S.getValue('OVS_DPDK_SHARE'))
+        self.execute_and_wait('mkdir -p ' + S.getValue('GUEST_OVS_DPDK_DIR'))
+        self.execute_and_wait('cp -r ' + os.path.join(S.getValue('OVS_DPDK_SHARE'), dirname) +
+                              ' ' + S.getValue('GUEST_OVS_DPDK_DIR'))
+        self.execute_and_wait('umount /dev/sdb1')
+
+    def _configure_disable_firewall(self):
+        """
+        Disable firewall in VM
+        """
+        for iptables in ['iptables', 'ip6tables']:
+            # filter table
+            for chain in ['INPUT', 'FORWARD', 'OUTPUT']:
+                self.execute_and_wait("{} -t filter -P {} ACCEPT".format(iptables, chain))
+            # mangle table
+            for chain in ['PREROUTING', 'INPUT', 'FORWARD', 'OUTPUT', 'POSTROUTING']:
+                self.execute_and_wait("{} -t mangle -P {} ACCEPT".format(iptables, chain))
+            # nat table
+            for chain in ['PREROUTING', 'INPUT', 'OUTPUT', 'POSTROUTING']:
+                self.execute_and_wait("{} -t nat -P {} ACCEPT".format(iptables, chain))
+
+            # flush rules and delete chains created by user
+            for table in ['filter', 'mangle', 'nat']:
+                self.execute_and_wait("{} -t {} -F".format(iptables, table))
+                self.execute_and_wait("{} -t {} -X".format(iptables, table))
+
+
+    def _configure_testpmd(self):
+        """
+        Configure VM to perform L2 forwarding between NICs by DPDK's testpmd
+        """
+        self._configure_copy_sources('DPDK')
+        self._configure_disable_firewall()
+
+        # Guest images _should_ have 1024 hugepages by default,
+        # but just in case:'''
+        self.execute_and_wait('sysctl vm.nr_hugepages=1024')
+
+        # Mount hugepages
+        self.execute_and_wait('mkdir -p /dev/hugepages')
+        self.execute_and_wait(
+            'mount -t hugetlbfs hugetlbfs /dev/hugepages')
+
+        # build and configure system for dpdk
+        self.execute_and_wait('cd ' + S.getValue('GUEST_OVS_DPDK_DIR') +
+                              '/DPDK')
+        self.execute_and_wait('export CC=gcc')
+        self.execute_and_wait('export RTE_SDK=' +
+                              S.getValue('GUEST_OVS_DPDK_DIR') + '/DPDK')
+        self.execute_and_wait('export RTE_TARGET=%s' % S.getValue('RTE_TARGET'))
+
+        # modify makefile if needed
+        self._modify_dpdk_makefile()
+
+        # disable network interfaces, so DPDK can take care of them
+        self.execute_and_wait('ifdown ' + self._net1)
+        self.execute_and_wait('ifdown ' + self._net2)
+
+        # build and insert igb_uio and rebind interfaces to it
+        self.execute_and_wait('make RTE_OUTPUT=$RTE_SDK/$RTE_TARGET -C '
+                              '$RTE_SDK/lib/librte_eal/linuxapp/igb_uio')
+        self.execute_and_wait('modprobe uio')
+        self.execute_and_wait('insmod %s/kmod/igb_uio.ko' %
+                              S.getValue('RTE_TARGET'))
+        self.execute_and_wait('./tools/dpdk*bind.py --status')
+        self.execute_and_wait(
+            './tools/dpdk*bind.py -u' ' ' +
+            S.getValue('GUEST_NET1_PCI_ADDRESS')[self._number] + ' ' +
+            S.getValue('GUEST_NET2_PCI_ADDRESS')[self._number])
+        self.execute_and_wait(
+            './tools/dpdk*bind.py -b igb_uio' ' ' +
+            S.getValue('GUEST_NET1_PCI_ADDRESS')[self._number] + ' ' +
+            S.getValue('GUEST_NET2_PCI_ADDRESS')[self._number])
+        self.execute_and_wait('./tools/dpdk*bind.py --status')
+
+        # build and run 'test-pmd'
+        self.execute_and_wait('cd ' + S.getValue('GUEST_OVS_DPDK_DIR') +
+                              '/DPDK/app/test-pmd')
+        self.execute_and_wait('make clean')
+        self.execute_and_wait('make')
+        if int(S.getValue('GUEST_NIC_QUEUES')):
+            self.execute_and_wait(
+                './testpmd {} -n4 --socket-mem 512 --'.format(
+                    S.getValue('GUEST_TESTPMD_CPU_MASK')) +
+                ' --burst=64 -i --txqflags=0xf00 ' +
+                '--nb-cores={} --rxq={} --txq={} '.format(
+                    S.getValue('GUEST_TESTPMD_NB_CORES'),
+                    S.getValue('GUEST_TESTPMD_TXQ'),
+                    S.getValue('GUEST_TESTPMD_RXQ')) +
+                '--disable-hw-vlan', 60, "Done")
+        else:
+            self.execute_and_wait(
+                './testpmd {} -n 4 --socket-mem 512 --'.format(
+                    S.getValue('GUEST_TESTPMD_CPU_MASK')) +
+                ' --burst=64 -i --txqflags=0xf00 ' +
+                '--disable-hw-vlan', 60, "Done")
+        self.execute('set fwd ' + self._testpmd_fwd_mode, 1)
+        self.execute_and_wait('start', 20,
+                              'TX RS bit threshold=.+ - TXQ flags=0xf00')
+
+    def _configure_l2fwd(self):
+        """
+        Configure VM to perform L2 forwarding between NICs by l2fwd module
+        """
+        self._configure_copy_sources('l2fwd')
+        self._configure_disable_firewall()
+
+        # build and configure system for l2fwd
+        self.execute_and_wait('cd ' + S.getValue('GUEST_OVS_DPDK_DIR') +
+                              '/l2fwd')
+        self.execute_and_wait('export CC=gcc')
+
+        self.execute_and_wait('make')
+        self.execute_and_wait('insmod ' + S.getValue('GUEST_OVS_DPDK_DIR') +
+                              '/l2fwd' + '/l2fwd.ko net1=' + self._net1 +
+                              ' net2=' + self._net2)
+
+    def _configure_linux_bridge(self):
+        """
+        Configure VM to perform L2 forwarding between NICs by linux bridge
+        """
+        self._configure_disable_firewall()
+
+        self.execute('ip addr add ' +
+                     S.getValue('VANILLA_NIC1_IP_CIDR')[self._number] +
+                     ' dev ' + self._net1)
+        self.execute('ip link set dev ' + self._net1 + ' up')
+
+        self.execute('ip addr add ' +
+                     S.getValue('VANILLA_NIC2_IP_CIDR')[self._number] +
+                     ' dev ' + self._net2)
+        self.execute('ip link set dev ' + self._net2 + ' up')
+
+        # configure linux bridge
+        self.execute('brctl addbr br0')
+        self.execute('brctl addif br0 ' + self._net1 + ' ' + self._net2)
+        self.execute('ip addr add ' +
+                     S.getValue('VANILLA_BRIDGE_IP')[self._number] +
+                     ' dev br0')
+        self.execute('ip link set dev br0 up')
+
+        # Add the arp entries for the IXIA ports and the bridge you are using.
+        # Use command line values if provided.
+        trafficgen_mac = get_test_param('vanilla_tgen_port1_mac',
+                                        S.getValue('VANILLA_TGEN_PORT1_MAC'))
+        trafficgen_ip = get_test_param('vanilla_tgen_port1_ip',
+                                       S.getValue('VANILLA_TGEN_PORT1_IP'))
+
+        self.execute('arp -s ' + trafficgen_ip + ' ' + trafficgen_mac)
+
+        trafficgen_mac = get_test_param('vanilla_tgen_port2_mac',
+                                        S.getValue('VANILLA_TGEN_PORT2_MAC'))
+        trafficgen_ip = get_test_param('vanilla_tgen_port2_ip',
+                                       S.getValue('VANILLA_TGEN_PORT2_IP'))
+
+        self.execute('arp -s ' + trafficgen_ip + ' ' + trafficgen_mac)
+
+        # Enable forwarding
+        self.execute('sysctl -w net.ipv4.ip_forward=1')
+
+        # Controls source route verification
+        # 0 means no source validation
+        self.execute('sysctl -w net.ipv4.conf.all.rp_filter=0')
+        self.execute('sysctl -w net.ipv4.conf.' + self._net1 + '.rp_filter=0')
+        self.execute('sysctl -w net.ipv4.conf.' + self._net2 + '.rp_filter=0')