blob: 388fbf17b2194ed6a0f3912ac051700f276bd907 [file] [log] [blame]
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +01001# osmo_gsm_tester: specifics for running an SRS UE process
2#
3# Copyright (C) 2020 by sysmocom - s.f.m.c. GmbH
4#
5# Author: Pau Espin Pedrol <pespin@sysmocom.de>
6#
7# This program is free software: you can redistribute it and/or modify
8# it under the terms of the GNU General Public License as
9# published by the Free Software Foundation, either version 3 of the
10# License, or (at your option) any later version.
11#
12# This program is distributed in the hope that it will be useful,
13# but WITHOUT ANY WARRANTY; without even the implied warranty of
14# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15# GNU General Public License for more details.
16#
17# You should have received a copy of the GNU General Public License
18# along with this program. If not, see <http://www.gnu.org/licenses/>.
19
20import os
21import pprint
22
23from . import log, util, config, template, process, remote
24from .run_node import RunNode
Pau Espin Pedrol151b08a2020-03-02 14:14:27 +010025from .event_loop import MainLoop
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010026from .ms import MS
27
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +010028def rf_type_valid(rf_type_str):
29 return rf_type_str in ('zmq', 'UHD', 'soapy', 'bladeRF')
30
Pau Espin Pedrol2aeadeb2020-03-02 11:50:23 +010031#reference: srsLTE.git srslte_symbol_sz()
32def num_prb2symbol_sz(num_prb):
33 if num_prb <= 6:
34 return 128
35 if num_prb <= 15:
36 return 256
37 if num_prb <= 25:
38 return 384
39 if num_prb <= 50:
40 return 768
41 if num_prb <= 75:
42 return 1024
43 if num_prb <= 110:
44 return 1536
45 raise log.Error('invalid num_prb %r', num_prb)
46
47def num_prb2base_srate(num_prb):
48 return num_prb2symbol_sz(num_prb) * 15 * 1000
49
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010050class srsUE(MS):
51
52 REMOTE_DIR = '/osmo-gsm-tester-srsue'
53 BINFILE = 'srsue'
54 CFGFILE = 'srsue.conf'
55 PCAPFILE = 'srsue.pcap'
56 LOGFILE = 'srsue.log'
Pau Espin Pedrola0319952020-03-02 11:06:51 +010057 METRICSFILE = 'srsue_metrics.csv'
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010058
59 def __init__(self, suite_run, conf):
60 self._addr = conf.get('addr', None)
61 if self._addr is None:
62 raise log.Error('addr not set')
63 super().__init__('srsue_%s' % self._addr, conf)
64 self.enb = None
65 self.run_dir = None
66 self.config_file = None
67 self.log_file = None
68 self.pcap_file = None
Pau Espin Pedrola0319952020-03-02 11:06:51 +010069 self.metrics_file = None
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010070 self.process = None
71 self.rem_host = None
72 self.remote_config_file = None
73 self.remote_log_file = None
74 self.remote_pcap_file = None
Pau Espin Pedrola0319952020-03-02 11:06:51 +010075 self.remote_metrics_file = None
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +010076 self.enable_pcap = False
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010077 self.suite_run = suite_run
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010078 self.remote_user = conf.get('remote_user', None)
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +010079 if not rf_type_valid(conf.get('rf_dev_type', None)):
80 raise log.Error('Invalid rf_dev_type=%s' % conf.get('rf_dev_type', None))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010081
82 def cleanup(self):
83 if self.process is None:
84 return
85 if self.setup_runs_locally():
86 return
Pau Espin Pedrol5b31cc32020-03-09 16:34:45 +010087 # When using zmq, srsUE is known to hang for a few seconds before
88 # exiting (3 seconds after alarm() watchdog kicks in). We hence need to
89 # wait to make sure the remote process terminated and the file was
90 # flushed, since cleanup() triggered means only the local ssh client was killed.
91 if self._conf and self._conf.get('rf_dev_type', '') == 'zmq':
92 MainLoop.sleep(self, 3)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010093 # copy back files (may not exist, for instance if there was an early error of process):
94 try:
95 self.rem_host.scpfrom('scp-back-log', self.remote_log_file, self.log_file)
96 except Exception as e:
97 self.log(repr(e))
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +010098 if self.enable_pcap:
99 try:
100 self.rem_host.scpfrom('scp-back-pcap', self.remote_pcap_file, self.pcap_file)
101 except Exception as e:
102 self.log(repr(e))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100103
104 def setup_runs_locally(self):
105 return self.remote_user is None
106
107 def netns(self):
108 return "srsue1"
109
Pau Espin Pedrol151b08a2020-03-02 14:14:27 +0100110 def stop(self):
111 self.suite_run.stop_process(self.process)
112
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100113 def connect(self, enb):
114 self.log('Starting srsue')
115 self.enb = enb
116 self.run_dir = util.Dir(self.suite_run.get_test_run_dir().new_dir(self.name()))
117 self.configure()
118 if self.setup_runs_locally():
119 self.start_locally()
120 else:
121 self.start_remotely()
122
Andre Puschmann2e8626f2020-03-21 21:18:39 +0100123 # send t+Enter to enable console trace
124 self.dbg('Enabling console trace')
125 self.process.stdin_write('t\n')
126
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100127 def start_remotely(self):
128 self.inst = util.Dir(os.path.abspath(self.suite_run.trial.get_inst('srslte')))
129 lib = self.inst.child('lib')
130 if not os.path.isdir(lib):
131 raise log.Error('No lib/ in', self.inst)
132 if not self.inst.isfile('bin', srsUE.BINFILE):
133 raise log.Error('No %s binary in' % srsUE.BINFILE, self.inst)
134
135 self.rem_host = remote.RemoteHost(self.run_dir, self.remote_user, self._addr)
136 remote_prefix_dir = util.Dir(srsUE.REMOTE_DIR)
137 remote_inst = util.Dir(remote_prefix_dir.child(os.path.basename(str(self.inst))))
138 remote_run_dir = util.Dir(remote_prefix_dir.child(srsUE.BINFILE))
139 self.remote_config_file = remote_run_dir.child(srsUE.CFGFILE)
140 self.remote_log_file = remote_run_dir.child(srsUE.LOGFILE)
141 self.remote_pcap_file = remote_run_dir.child(srsUE.PCAPFILE)
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100142 self.remote_metrics_file = remote_run_dir.child(srsUE.METRICSFILE)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100143
144 self.rem_host.recreate_remote_dir(remote_inst)
145 self.rem_host.scp('scp-inst-to-remote', str(self.inst), remote_prefix_dir)
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100146 self.rem_host.recreate_remote_dir(remote_run_dir)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100147 self.rem_host.scp('scp-cfg-to-remote', self.config_file, self.remote_config_file)
148
149 remote_lib = remote_inst.child('lib')
150 remote_binary = remote_inst.child('bin', srsUE.BINFILE)
151 # setting capabilities will later disable use of LD_LIBRARY_PATH from ELF loader -> modify RPATH instead.
152 self.log('Setting RPATH for srsue')
153 # srsue binary needs patchelf >= 0.9+52 to avoid failing during patch. OS#4389, patchelf-GH#192.
154 self.rem_host.set_remote_env({'PATCHELF_BIN': '/opt/bin/patchelf-v0.10' })
155 self.rem_host.change_elf_rpath(remote_binary, remote_lib)
156
157 # srsue requires CAP_SYS_ADMIN to cjump to net network namespace: netns(CLONE_NEWNET):
158 # srsue requires CAP_NET_ADMIN to create tunnel devices: ioctl(TUNSETIFF):
159 self.log('Applying CAP_SYS_ADMIN+CAP_NET_ADMIN capability to srsue')
160 self.rem_host.setcap_netsys_admin(remote_binary)
161
Pau Espin Pedrol69b2cf32020-02-24 10:58:59 +0100162 self.log('Creating netns %s' % self.netns())
163 self.rem_host.create_netns(self.netns())
164
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100165 #'strace', '-ff',
166 args = (remote_binary, self.remote_config_file,
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100167 '--phy.nof_phy_threads=1',
168 '--gw.netns=' + self.netns(),
Pau Espin Pedrol5b31cc32020-03-09 16:34:45 +0100169 '--log.filename=' + self.remote_log_file,
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100170 '--pcap.filename=' + self.remote_pcap_file,
171 '--general.metrics_csv_filename=' + self.remote_metrics_file)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100172
173 self.process = self.rem_host.RemoteProcessFixIgnoreSIGHUP(srsUE.BINFILE, util.Dir(srsUE.REMOTE_DIR), args)
174 #self.process = self.rem_host.RemoteProcessFixIgnoreSIGHUP(srsUE.BINFILE, remote_run_dir, args, remote_lib)
175 self.suite_run.remember_to_stop(self.process)
176 self.process.launch()
177
178 def start_locally(self):
179 inst = util.Dir(os.path.abspath(self.suite_run.trial.get_inst('srslte')))
180
181 binary = inst.child('bin', BINFILE)
182 if not os.path.isfile(binary):
183 raise log.Error('Binary missing:', binary)
184 lib = inst.child('lib')
185 if not os.path.isdir(lib):
186 raise log.Error('No lib/ in', inst)
187
188 env = {}
189
190 # setting capabilities will later disable use of LD_LIBRARY_PATH from ELF loader -> modify RPATH instead.
191 self.log('Setting RPATH for srsue')
192 util.change_elf_rpath(binary, util.prepend_library_path(lib), self.run_dir.new_dir('patchelf'))
193
194 # srsue requires CAP_SYS_ADMIN to cjump to net network namespace: netns(CLONE_NEWNET):
195 # srsue requires CAP_NET_ADMIN to create tunnel devices: ioctl(TUNSETIFF):
196 self.log('Applying CAP_SYS_ADMIN+CAP_NET_ADMIN capability to srsue')
197 util.setcap_netsys_admin(binary, self.run_dir.new_dir('setcap_netsys_admin'))
198
Pau Espin Pedrol69b2cf32020-02-24 10:58:59 +0100199 self.log('Creating netns %s' % self.netns())
200 util.create_netns(self.netns(), self.run_dir.new_dir('create_netns'))
201
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100202 args = (binary, os.path.abspath(self.config_file),
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100203 '--phy.nof_phy_threads=1',
204 '--gw.netns=' + self.netns(),
205 '--log.filename=' + self.log_file,
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100206 '--pcap.filename=' + self.pcap_file,
207 '--general.metrics_csv_filename=' + self.metrics_file)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100208
209 self.dbg(run_dir=self.run_dir, binary=binary, env=env)
210 self.process = process.Process(self.name(), self.run_dir, args, env=env)
211 self.suite_run.remember_to_stop(self.process)
212 self.process.launch()
213
214 def configure(self):
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100215 self.config_file = self.run_dir.child(srsUE.CFGFILE)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100216 self.log_file = self.run_dir.child(srsUE.LOGFILE)
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100217 self.pcap_file = self.run_dir.child(srsUE.PCAPFILE)
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100218 self.metrics_file = self.run_dir.child(srsUE.METRICSFILE)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100219 self.dbg(config_file=self.config_file)
220
221 values = dict(ue=config.get_defaults('srsue'))
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100222 config.overlay(values, dict(ue=self.suite_run.config().get('modem', {})))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100223 config.overlay(values, dict(ue=self._conf))
Pau Espin Pedrolf796ad02020-03-09 15:50:57 +0100224 config.overlay(values, dict(ue=dict(num_antennas = self.enb.num_ports())))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100225
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100226 # Convert parsed boolean string to Python boolean:
227 self.enable_pcap = util.str2bool(values['ue'].get('enable_pcap', 'false'))
228 config.overlay(values, dict(ue={'enable_pcap': self.enable_pcap}))
229
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +0100230 # We need to set some specific variables programatically here to match IP addresses:
231 if self._conf.get('rf_dev_type') == 'zmq':
Pau Espin Pedrol2aeadeb2020-03-02 11:50:23 +0100232 base_srate = num_prb2base_srate(self.enb.num_prb())
Pau Espin Pedrolf796ad02020-03-09 15:50:57 +0100233 config.overlay(values, dict(ue=dict(rf_dev_args = 'tx_port=tcp://' + self.addr() + ':2001' \
234 + ',tx_port2=tcp://' + self.addr() + ':2003' \
235 + ',rx_port=tcp://' + self.enb.addr() + ':2000' \
236 + ',rx_port2=tcp://' + self.enb.addr() + ':2002' \
237 + ',id=ue,base_srate='+ str(base_srate)
Pau Espin Pedrol2aeadeb2020-03-02 11:50:23 +0100238 )))
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +0100239
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100240 self.dbg('SRSUE CONFIG:\n' + pprint.pformat(values))
241
242 with open(self.config_file, 'w') as f:
243 r = template.render(srsUE.CFGFILE, values)
244 self.dbg(r)
245 f.write(r)
246
247 def is_connected(self, mcc_mnc=None):
248 return 'Network attach successful.' in (self.process.get_stdout() or '')
249
250 def is_attached(self):
251 return self.is_connected()
252
253 def running(self):
254 return not self.process.terminated()
255
256 def addr(self):
257 return self._addr
258
259 def run_node(self):
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100260 return RunNode(RunNode.T_REM_SSH, self._addr, self.remote_user, self._addr)
261
262 def run_netns_wait(self, name, popen_args):
263 if self.setup_runs_locally():
264 proc = process.NetNSProcess(name, self.run_dir.new_dir(name), self.netns(), popen_args, env={})
265 else:
266 proc = self.rem_host.RemoteNetNSProcess(name, self.netns(), popen_args, env={})
267 proc.launch_sync()
Pau Espin Pedrol2bcd3462020-03-05 18:30:37 +0100268 return proc
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100269
Pau Espin Pedrol151b08a2020-03-02 14:14:27 +0100270 def verify_metric(self, value, operation='avg', metric='dl_brate', criterion='gt'):
271 # file is not properly flushed until the process has stopped.
272 if self.running():
273 self.stop()
274 # metrics file is not flushed immediatelly by the OS during process
275 # tear down, we need to wait some extra time:
276 MainLoop.sleep(self, 2)
277 if not self.setup_runs_locally():
278 try:
279 self.rem_host.scpfrom('scp-back-metrics', self.remote_metrics_file, self.metrics_file)
280 except Exception as e:
281 self.err('Failed copying back metrics file from remote host')
282 raise e
283 metrics = srsUEMetrics(self.metrics_file)
284 return metrics.verify(value, operation, metric, criterion)
285
286import numpy
287
288class srsUEMetrics(log.Origin):
289
290 VALID_OPERATIONS = ['avg', 'sum']
291 VALID_CRITERION = ['eq','gt','lt']
292 CRITERION_TO_SYM = { 'eq' : '==', 'gt' : '>', 'lt' : '<' }
293 CRYTERION_TO_SYM_OPPOSITE = { 'eq' : '!=', 'gt' : '<=', 'lt' : '>=' }
294
295
296 def __init__(self, metrics_file):
297 super().__init__(log.C_RUN, 'srsue_metrics')
298 self.raw_data = None
299 self.metrics_file = metrics_file
300 # read CSV, guessing data type with first row being the legend
301 try:
302 self.raw_data = numpy.genfromtxt(self.metrics_file, names=True, delimiter=';', dtype=None)
303 except (ValueError, IndexError, IOError) as error:
304 self.err("Error parsing metrics CSV file %s" % self.metrics_file)
305 raise error
306
307 def verify(self, value, operation='avg', metric='dl_brate', criterion='gt'):
308 if operation not in self.VALID_OPERATIONS:
309 raise log.Error('Unknown operation %s not in %r' % (operation, self.VALID_OPERATIONS))
310 if criterion not in self.VALID_CRITERION:
311 raise log.Error('Unknown operation %s not in %r' % (operation, self.VALID_CRITERION))
312 # check if given metric exists in data
313 try:
314 sel_data = self.raw_data[metric]
315 except ValueError as err:
316 print('metric %s not available' % metric)
317 raise err
318
319 if operation == 'avg':
320 result = numpy.average(sel_data)
321 elif operation == 'sum':
322 result = numpy.sum(sel_data)
323 self.dbg(result=result, value=value)
324
325 success = False
326 if criterion == 'eq' and result == value or \
327 criterion == 'gt' and result > value or \
328 criterion == 'lt' and result < value:
329 success = True
330
331 # Convert bitrate in Mbit/s:
332 if metric.find('brate') > 0:
333 result /= 1e6
334 value /= 1e6
335 mbit_str = ' Mbit/s'
336 else:
337 mbit_str = ''
338
339 if not success:
340 result_msg = "{:.2f}{} {} {:.2f}{}".format(result, mbit_str, self.CRYTERION_TO_SYM_OPPOSITE[criterion], value, mbit_str)
341 raise log.Error(result_msg)
342 result_msg = "{:.2f}{} {} {:.2f}{}".format(result, mbit_str, self.CRITERION_TO_SYM[criterion], value, mbit_str)
343 # TODO: overwrite test system-out with this text.
344 return result_msg
345
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100346# vim: expandtab tabstop=4 shiftwidth=4