From 8651926b2492dbd18837725af87ca3fa935cd784 Mon Sep 17 00:00:00 2001 From: Shaik Abdulla Date: Wed, 24 May 2023 23:14:43 +0530 Subject: [PATCH] Adding support for ping flood and to get device_IPI names of network interface. 1.ping flood: starts ping flood to a remote machine with with live ICMP packet validation and enables detect error during ping flood process. 2.device_IPI: takes interface name according system and convert to device_IPI names with respective to "/proc/interrupts" context of linux system. Signed-off-by: Shaik Abdulla --- avocado/utils/network/interfaces.py | 65 +++++++++++++++++++++++++++++ 1 file changed, 65 insertions(+) diff --git a/avocado/utils/network/interfaces.py b/avocado/utils/network/interfaces.py index 0f0eb536fa..d62015fe9b 100644 --- a/avocado/utils/network/interfaces.py +++ b/avocado/utils/network/interfaces.py @@ -19,9 +19,12 @@ import json import logging import os +import re import shutil +import subprocess from ipaddress import IPv4Address, ip_interface +from avocado.utils import process from avocado.utils.distro import detect as distro_detect from avocado.utils.network.common import run_command from avocado.utils.network.exceptions import NWException @@ -781,3 +784,65 @@ def validate_ipv4_netmask_format(self, netmask): return False first_bit = False return True + + def ping_flood(self, int_name, peer_ip, ping_count): + """ + Function to start ping to remote machine with "-f" [ flood ] option, + on given interface. + + Also this function enables to track the live data to determine the + ping flood failure, in case of failure the program will exit. + + :param int_name: source interface name. + :param peer_ip: Peer IP address (IPv4 or IPv6) + :param ping_count: How many ICMP echo packets to send. + :return : returns True on sucessful ping flood. + returns False on ping flood failure. + :rtype : boolean + """ + cmd = f"ping -I {int_name} {peer_ip} -c {ping_count} -f " + process1 = subprocess.Popen( + cmd, + shell=True, + stdout=subprocess.PIPE, + stderr=subprocess.STDOUT, + universal_newlines=True, + ) + pattern = r"\.{10}" + while True: + char = process1.stdout.read(100) + match = re.search(pattern, char) + if match: + process1.terminate() + msg = "ping flood failed to remote machine, Please check the logs" + LOG.debug(msg) + return False + return True + process1.stdout.close() + process1.wait() + + def get_device_IPI_name(self): + """ + Function to convert IO device name to device_ipi names according to + "/proc/interrupts" context. + Ex: vnic@30000009 to vnic-30000009 + + :return : A converted Network device according to device_ipi name. + :rtype : string + """ + + if self.is_vnic(): + cmd = ( + f"cat /sys/class/net/{self.name}/device/devspec | " + f"awk -F/ '{{print $3}}'" + ) + interface_type = process.run(cmd, shell=True, ignore_status=True).decode( + "utf-8" + ) + cmd = f"echo {interface_type} | sed 's/@/-/' " + interface_type = process.system_output( + cmd, shell=True, ignore_status=True + ).decode("utf-8") + return interface_type + elif self.is_veth(): + return self.name