blob: f725587d7d74a5aaa92f49a1b886f9a0ff8b8801 [file] [log] [blame]
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +01001# osmo_gsm_tester: specifics for running an SRS UE process
2#
3# Copyright (C) 2020 by sysmocom - s.f.m.c. GmbH
4#
5# Author: Pau Espin Pedrol <pespin@sysmocom.de>
6#
7# This program is free software: you can redistribute it and/or modify
8# it under the terms of the GNU General Public License as
9# published by the Free Software Foundation, either version 3 of the
10# License, or (at your option) any later version.
11#
12# This program is distributed in the hope that it will be useful,
13# but WITHOUT ANY WARRANTY; without even the implied warranty of
14# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15# GNU General Public License for more details.
16#
17# You should have received a copy of the GNU General Public License
18# along with this program. If not, see <http://www.gnu.org/licenses/>.
19
20import os
21import pprint
22
23from . import log, util, config, template, process, remote
24from .run_node import RunNode
Pau Espin Pedrol151b08a2020-03-02 14:14:27 +010025from .event_loop import MainLoop
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010026from .ms import MS
27
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +010028def rf_type_valid(rf_type_str):
29 return rf_type_str in ('zmq', 'UHD', 'soapy', 'bladeRF')
30
Pau Espin Pedrol2aeadeb2020-03-02 11:50:23 +010031#reference: srsLTE.git srslte_symbol_sz()
32def num_prb2symbol_sz(num_prb):
33 if num_prb <= 6:
34 return 128
35 if num_prb <= 15:
36 return 256
37 if num_prb <= 25:
38 return 384
39 if num_prb <= 50:
40 return 768
41 if num_prb <= 75:
42 return 1024
43 if num_prb <= 110:
44 return 1536
45 raise log.Error('invalid num_prb %r', num_prb)
46
47def num_prb2base_srate(num_prb):
48 return num_prb2symbol_sz(num_prb) * 15 * 1000
49
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010050class srsUE(MS):
51
52 REMOTE_DIR = '/osmo-gsm-tester-srsue'
53 BINFILE = 'srsue'
54 CFGFILE = 'srsue.conf'
55 PCAPFILE = 'srsue.pcap'
56 LOGFILE = 'srsue.log'
Pau Espin Pedrola0319952020-03-02 11:06:51 +010057 METRICSFILE = 'srsue_metrics.csv'
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010058
59 def __init__(self, suite_run, conf):
60 self._addr = conf.get('addr', None)
61 if self._addr is None:
62 raise log.Error('addr not set')
63 super().__init__('srsue_%s' % self._addr, conf)
64 self.enb = None
65 self.run_dir = None
66 self.config_file = None
67 self.log_file = None
68 self.pcap_file = None
Pau Espin Pedrola0319952020-03-02 11:06:51 +010069 self.metrics_file = None
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010070 self.process = None
71 self.rem_host = None
72 self.remote_config_file = None
73 self.remote_log_file = None
74 self.remote_pcap_file = None
Pau Espin Pedrola0319952020-03-02 11:06:51 +010075 self.remote_metrics_file = None
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +010076 self.enable_pcap = False
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010077 self.suite_run = suite_run
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010078 self.remote_user = conf.get('remote_user', None)
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +010079 if not rf_type_valid(conf.get('rf_dev_type', None)):
80 raise log.Error('Invalid rf_dev_type=%s' % conf.get('rf_dev_type', None))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010081
82 def cleanup(self):
83 if self.process is None:
84 return
85 if self.setup_runs_locally():
86 return
Pau Espin Pedrol5b31cc32020-03-09 16:34:45 +010087 # When using zmq, srsUE is known to hang for a few seconds before
88 # exiting (3 seconds after alarm() watchdog kicks in). We hence need to
89 # wait to make sure the remote process terminated and the file was
90 # flushed, since cleanup() triggered means only the local ssh client was killed.
91 if self._conf and self._conf.get('rf_dev_type', '') == 'zmq':
92 MainLoop.sleep(self, 3)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +010093 # copy back files (may not exist, for instance if there was an early error of process):
94 try:
95 self.rem_host.scpfrom('scp-back-log', self.remote_log_file, self.log_file)
96 except Exception as e:
97 self.log(repr(e))
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +010098 if self.enable_pcap:
99 try:
100 self.rem_host.scpfrom('scp-back-pcap', self.remote_pcap_file, self.pcap_file)
101 except Exception as e:
102 self.log(repr(e))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100103
104 def setup_runs_locally(self):
105 return self.remote_user is None
106
107 def netns(self):
108 return "srsue1"
109
Pau Espin Pedrol151b08a2020-03-02 14:14:27 +0100110 def stop(self):
111 self.suite_run.stop_process(self.process)
112
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100113 def connect(self, enb):
114 self.log('Starting srsue')
115 self.enb = enb
116 self.run_dir = util.Dir(self.suite_run.get_test_run_dir().new_dir(self.name()))
117 self.configure()
118 if self.setup_runs_locally():
119 self.start_locally()
120 else:
121 self.start_remotely()
122
123 def start_remotely(self):
124 self.inst = util.Dir(os.path.abspath(self.suite_run.trial.get_inst('srslte')))
125 lib = self.inst.child('lib')
126 if not os.path.isdir(lib):
127 raise log.Error('No lib/ in', self.inst)
128 if not self.inst.isfile('bin', srsUE.BINFILE):
129 raise log.Error('No %s binary in' % srsUE.BINFILE, self.inst)
130
131 self.rem_host = remote.RemoteHost(self.run_dir, self.remote_user, self._addr)
132 remote_prefix_dir = util.Dir(srsUE.REMOTE_DIR)
133 remote_inst = util.Dir(remote_prefix_dir.child(os.path.basename(str(self.inst))))
134 remote_run_dir = util.Dir(remote_prefix_dir.child(srsUE.BINFILE))
135 self.remote_config_file = remote_run_dir.child(srsUE.CFGFILE)
136 self.remote_log_file = remote_run_dir.child(srsUE.LOGFILE)
137 self.remote_pcap_file = remote_run_dir.child(srsUE.PCAPFILE)
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100138 self.remote_metrics_file = remote_run_dir.child(srsUE.METRICSFILE)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100139
140 self.rem_host.recreate_remote_dir(remote_inst)
141 self.rem_host.scp('scp-inst-to-remote', str(self.inst), remote_prefix_dir)
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100142 self.rem_host.recreate_remote_dir(remote_run_dir)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100143 self.rem_host.scp('scp-cfg-to-remote', self.config_file, self.remote_config_file)
144
145 remote_lib = remote_inst.child('lib')
146 remote_binary = remote_inst.child('bin', srsUE.BINFILE)
147 # setting capabilities will later disable use of LD_LIBRARY_PATH from ELF loader -> modify RPATH instead.
148 self.log('Setting RPATH for srsue')
149 # srsue binary needs patchelf >= 0.9+52 to avoid failing during patch. OS#4389, patchelf-GH#192.
150 self.rem_host.set_remote_env({'PATCHELF_BIN': '/opt/bin/patchelf-v0.10' })
151 self.rem_host.change_elf_rpath(remote_binary, remote_lib)
152
153 # srsue requires CAP_SYS_ADMIN to cjump to net network namespace: netns(CLONE_NEWNET):
154 # srsue requires CAP_NET_ADMIN to create tunnel devices: ioctl(TUNSETIFF):
155 self.log('Applying CAP_SYS_ADMIN+CAP_NET_ADMIN capability to srsue')
156 self.rem_host.setcap_netsys_admin(remote_binary)
157
Pau Espin Pedrol69b2cf32020-02-24 10:58:59 +0100158 self.log('Creating netns %s' % self.netns())
159 self.rem_host.create_netns(self.netns())
160
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100161 #'strace', '-ff',
162 args = (remote_binary, self.remote_config_file,
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100163 '--phy.nof_phy_threads=1',
164 '--gw.netns=' + self.netns(),
Pau Espin Pedrol5b31cc32020-03-09 16:34:45 +0100165 '--log.filename=' + self.remote_log_file,
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100166 '--pcap.filename=' + self.remote_pcap_file,
167 '--general.metrics_csv_filename=' + self.remote_metrics_file)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100168
169 self.process = self.rem_host.RemoteProcessFixIgnoreSIGHUP(srsUE.BINFILE, util.Dir(srsUE.REMOTE_DIR), args)
170 #self.process = self.rem_host.RemoteProcessFixIgnoreSIGHUP(srsUE.BINFILE, remote_run_dir, args, remote_lib)
171 self.suite_run.remember_to_stop(self.process)
172 self.process.launch()
173
174 def start_locally(self):
175 inst = util.Dir(os.path.abspath(self.suite_run.trial.get_inst('srslte')))
176
177 binary = inst.child('bin', BINFILE)
178 if not os.path.isfile(binary):
179 raise log.Error('Binary missing:', binary)
180 lib = inst.child('lib')
181 if not os.path.isdir(lib):
182 raise log.Error('No lib/ in', inst)
183
184 env = {}
185
186 # setting capabilities will later disable use of LD_LIBRARY_PATH from ELF loader -> modify RPATH instead.
187 self.log('Setting RPATH for srsue')
188 util.change_elf_rpath(binary, util.prepend_library_path(lib), self.run_dir.new_dir('patchelf'))
189
190 # srsue requires CAP_SYS_ADMIN to cjump to net network namespace: netns(CLONE_NEWNET):
191 # srsue requires CAP_NET_ADMIN to create tunnel devices: ioctl(TUNSETIFF):
192 self.log('Applying CAP_SYS_ADMIN+CAP_NET_ADMIN capability to srsue')
193 util.setcap_netsys_admin(binary, self.run_dir.new_dir('setcap_netsys_admin'))
194
Pau Espin Pedrol69b2cf32020-02-24 10:58:59 +0100195 self.log('Creating netns %s' % self.netns())
196 util.create_netns(self.netns(), self.run_dir.new_dir('create_netns'))
197
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100198 args = (binary, os.path.abspath(self.config_file),
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100199 '--phy.nof_phy_threads=1',
200 '--gw.netns=' + self.netns(),
201 '--log.filename=' + self.log_file,
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100202 '--pcap.filename=' + self.pcap_file,
203 '--general.metrics_csv_filename=' + self.metrics_file)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100204
205 self.dbg(run_dir=self.run_dir, binary=binary, env=env)
206 self.process = process.Process(self.name(), self.run_dir, args, env=env)
207 self.suite_run.remember_to_stop(self.process)
208 self.process.launch()
209
210 def configure(self):
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100211 self.config_file = self.run_dir.child(srsUE.CFGFILE)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100212 self.log_file = self.run_dir.child(srsUE.LOGFILE)
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100213 self.pcap_file = self.run_dir.child(srsUE.PCAPFILE)
Pau Espin Pedrola0319952020-03-02 11:06:51 +0100214 self.metrics_file = self.run_dir.child(srsUE.METRICSFILE)
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100215 self.dbg(config_file=self.config_file)
216
217 values = dict(ue=config.get_defaults('srsue'))
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100218 config.overlay(values, dict(ue=self.suite_run.config().get('modem', {})))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100219 config.overlay(values, dict(ue=self._conf))
Pau Espin Pedrolf796ad02020-03-09 15:50:57 +0100220 config.overlay(values, dict(ue=dict(num_antennas = self.enb.num_ports())))
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100221
Pau Espin Pedrol1e81b5a2020-03-16 12:42:17 +0100222 # Convert parsed boolean string to Python boolean:
223 self.enable_pcap = util.str2bool(values['ue'].get('enable_pcap', 'false'))
224 config.overlay(values, dict(ue={'enable_pcap': self.enable_pcap}))
225
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +0100226 # We need to set some specific variables programatically here to match IP addresses:
227 if self._conf.get('rf_dev_type') == 'zmq':
Pau Espin Pedrol2aeadeb2020-03-02 11:50:23 +0100228 base_srate = num_prb2base_srate(self.enb.num_prb())
Pau Espin Pedrolf796ad02020-03-09 15:50:57 +0100229 config.overlay(values, dict(ue=dict(rf_dev_args = 'tx_port=tcp://' + self.addr() + ':2001' \
230 + ',tx_port2=tcp://' + self.addr() + ':2003' \
231 + ',rx_port=tcp://' + self.enb.addr() + ':2000' \
232 + ',rx_port2=tcp://' + self.enb.addr() + ':2002' \
233 + ',id=ue,base_srate='+ str(base_srate)
Pau Espin Pedrol2aeadeb2020-03-02 11:50:23 +0100234 )))
Pau Espin Pedrola9a2fe22020-02-13 19:29:55 +0100235
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100236 self.dbg('SRSUE CONFIG:\n' + pprint.pformat(values))
237
238 with open(self.config_file, 'w') as f:
239 r = template.render(srsUE.CFGFILE, values)
240 self.dbg(r)
241 f.write(r)
242
243 def is_connected(self, mcc_mnc=None):
244 return 'Network attach successful.' in (self.process.get_stdout() or '')
245
246 def is_attached(self):
247 return self.is_connected()
248
249 def running(self):
250 return not self.process.terminated()
251
252 def addr(self):
253 return self._addr
254
255 def run_node(self):
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100256 return RunNode(RunNode.T_REM_SSH, self._addr, self.remote_user, self._addr)
257
258 def run_netns_wait(self, name, popen_args):
259 if self.setup_runs_locally():
260 proc = process.NetNSProcess(name, self.run_dir.new_dir(name), self.netns(), popen_args, env={})
261 else:
262 proc = self.rem_host.RemoteNetNSProcess(name, self.netns(), popen_args, env={})
263 proc.launch_sync()
Pau Espin Pedrol2bcd3462020-03-05 18:30:37 +0100264 return proc
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100265
Pau Espin Pedrol151b08a2020-03-02 14:14:27 +0100266 def verify_metric(self, value, operation='avg', metric='dl_brate', criterion='gt'):
267 # file is not properly flushed until the process has stopped.
268 if self.running():
269 self.stop()
270 # metrics file is not flushed immediatelly by the OS during process
271 # tear down, we need to wait some extra time:
272 MainLoop.sleep(self, 2)
273 if not self.setup_runs_locally():
274 try:
275 self.rem_host.scpfrom('scp-back-metrics', self.remote_metrics_file, self.metrics_file)
276 except Exception as e:
277 self.err('Failed copying back metrics file from remote host')
278 raise e
279 metrics = srsUEMetrics(self.metrics_file)
280 return metrics.verify(value, operation, metric, criterion)
281
282import numpy
283
284class srsUEMetrics(log.Origin):
285
286 VALID_OPERATIONS = ['avg', 'sum']
287 VALID_CRITERION = ['eq','gt','lt']
288 CRITERION_TO_SYM = { 'eq' : '==', 'gt' : '>', 'lt' : '<' }
289 CRYTERION_TO_SYM_OPPOSITE = { 'eq' : '!=', 'gt' : '<=', 'lt' : '>=' }
290
291
292 def __init__(self, metrics_file):
293 super().__init__(log.C_RUN, 'srsue_metrics')
294 self.raw_data = None
295 self.metrics_file = metrics_file
296 # read CSV, guessing data type with first row being the legend
297 try:
298 self.raw_data = numpy.genfromtxt(self.metrics_file, names=True, delimiter=';', dtype=None)
299 except (ValueError, IndexError, IOError) as error:
300 self.err("Error parsing metrics CSV file %s" % self.metrics_file)
301 raise error
302
303 def verify(self, value, operation='avg', metric='dl_brate', criterion='gt'):
304 if operation not in self.VALID_OPERATIONS:
305 raise log.Error('Unknown operation %s not in %r' % (operation, self.VALID_OPERATIONS))
306 if criterion not in self.VALID_CRITERION:
307 raise log.Error('Unknown operation %s not in %r' % (operation, self.VALID_CRITERION))
308 # check if given metric exists in data
309 try:
310 sel_data = self.raw_data[metric]
311 except ValueError as err:
312 print('metric %s not available' % metric)
313 raise err
314
315 if operation == 'avg':
316 result = numpy.average(sel_data)
317 elif operation == 'sum':
318 result = numpy.sum(sel_data)
319 self.dbg(result=result, value=value)
320
321 success = False
322 if criterion == 'eq' and result == value or \
323 criterion == 'gt' and result > value or \
324 criterion == 'lt' and result < value:
325 success = True
326
327 # Convert bitrate in Mbit/s:
328 if metric.find('brate') > 0:
329 result /= 1e6
330 value /= 1e6
331 mbit_str = ' Mbit/s'
332 else:
333 mbit_str = ''
334
335 if not success:
336 result_msg = "{:.2f}{} {} {:.2f}{}".format(result, mbit_str, self.CRYTERION_TO_SYM_OPPOSITE[criterion], value, mbit_str)
337 raise log.Error(result_msg)
338 result_msg = "{:.2f}{} {} {:.2f}{}".format(result, mbit_str, self.CRITERION_TO_SYM[criterion], value, mbit_str)
339 # TODO: overwrite test system-out with this text.
340 return result_msg
341
Pau Espin Pedrolc8b0f932020-02-11 17:45:26 +0100342# vim: expandtab tabstop=4 shiftwidth=4