From: Aaron Conole <aconole@redhat.com>
To: dev@dpdk.org
Cc: Konstantin Ananyev <konstantin.ananyev@intel.com>,
Sunil Kumar Kori <skori@marvell.com>,
Allain Legacy <allain.legacy@windriver.com>,
Anatoly Burakov <anatoly.burakov@intel.com>,
Chas Williams <chas3@att.com>,
Piotr Azarewicz <piotrx.t.azarewicz@intel.com>,
Bruce Richardson <bruce.richardson@intel.com>,
David Marchand <david.marchand@redhat.com>
Subject: [dpdk-dev] [PATCH 4/4] ipfrag: add unit test case
Date: Tue, 31 Mar 2020 12:07:14 -0400 [thread overview]
Message-ID: <20200331160714.697790-5-aconole@redhat.com> (raw)
In-Reply-To: <20200331160714.697790-1-aconole@redhat.com>
Initial IP fragmentation unit test.
Signed-off-by: Aaron Conole <aconole@redhat.com>
---
MAINTAINERS | 1 +
app/test/meson.build | 2 +
app/test/test_ipfrag.c | 276 +++++++++++++++++++++++++++++++++++++++++
3 files changed, 279 insertions(+)
create mode 100644 app/test/test_ipfrag.c
diff --git a/MAINTAINERS b/MAINTAINERS
index 4800f6884a..c81f07ac9c 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -1230,6 +1230,7 @@ F: app/test/test_crc.c
IP fragmentation & reassembly
M: Konstantin Ananyev <konstantin.ananyev@intel.com>
F: lib/librte_ip_frag/
+F: app/test/test_ipfrag.c
F: doc/guides/prog_guide/ip_fragment_reassembly_lib.rst
F: examples/ip_fragmentation/
F: doc/guides/sample_app_ug/ip_frag.rst
diff --git a/app/test/meson.build b/app/test/meson.build
index 351d29cb65..c2b07fa62f 100644
--- a/app/test/meson.build
+++ b/app/test/meson.build
@@ -58,6 +58,7 @@ test_sources = files('commands.c',
'test_hash_perf.c',
'test_hash_readwrite_lf_perf.c',
'test_interrupts.c',
+ 'test_ipfrag.c',
'test_ipsec.c',
'test_ipsec_sad.c',
'test_kni.c',
@@ -187,6 +188,7 @@ fast_tests = [
['flow_classify_autotest', false],
['hash_autotest', true],
['interrupt_autotest', true],
+ ['ipfrag_autotest', false],
['logs_autotest', true],
['lpm_autotest', true],
['lpm6_autotest', true],
diff --git a/app/test/test_ipfrag.c b/app/test/test_ipfrag.c
new file mode 100644
index 0000000000..c881effe8b
--- /dev/null
+++ b/app/test/test_ipfrag.c
@@ -0,0 +1,276 @@
+/* SPDX-License-Identifier: BSD-3-Clause
+ * Copyright(c) 2020 Red Hat, Inc.
+ */
+
+#include <time.h>
+
+#include <rte_common.h>
+#include <rte_cycles.h>
+#include <rte_hexdump.h>
+#include <rte_ip.h>
+#include <rte_ip_frag.h>
+#include <rte_mbuf.h>
+#include <rte_memcpy.h>
+#include <rte_random.h>
+
+#include "test.h"
+
+#ifndef ARRAY_SIZE
+#define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
+#endif
+
+static struct rte_mempool *pkt_pool,
+ *direct_pool,
+ *indirect_pool;
+
+static int
+setup_buf_pool(void)
+{
+#define NUM_MBUFS (128)
+#define BURST 32
+
+ if (!pkt_pool)
+ pkt_pool = rte_pktmbuf_pool_create("FRAG_MBUF_POOL",
+ NUM_MBUFS, BURST, 0,
+ RTE_MBUF_DEFAULT_BUF_SIZE,
+ SOCKET_ID_ANY);
+ if (pkt_pool == NULL) {
+ printf("%s: Error creating pkt mempool\n", __func__);
+ goto bad_setup;
+ }
+
+ if (!direct_pool)
+ direct_pool = rte_pktmbuf_pool_create("FRAG_D_MBUF_POOL",
+ NUM_MBUFS, BURST, 0,
+ RTE_MBUF_DEFAULT_BUF_SIZE,
+ SOCKET_ID_ANY);
+ if (!direct_pool) {
+ printf("%s: Error creating direct mempool\n", __func__);
+ goto bad_setup;
+ }
+
+ if (!indirect_pool)
+ indirect_pool = rte_pktmbuf_pool_create("FRAG_I_MBUF_POOL",
+ NUM_MBUFS, BURST, 0,
+ 0, SOCKET_ID_ANY);
+ if (!indirect_pool) {
+ printf("%s: Error creating indirect mempool\n", __func__);
+ goto bad_setup;
+ }
+
+ return 0;
+
+bad_setup:
+ if (pkt_pool)
+ rte_mempool_free(pkt_pool);
+
+ if (direct_pool)
+ rte_mempool_free(direct_pool);
+
+ return TEST_FAILED;
+}
+
+static int testsuite_setup(void)
+{
+ if (setup_buf_pool())
+ return TEST_FAILED;
+ return TEST_SUCCESS;
+}
+
+static void testsuite_teardown(void)
+{
+ if (pkt_pool)
+ rte_mempool_free(pkt_pool);
+
+ if (direct_pool)
+ rte_mempool_free(direct_pool);
+
+ if (indirect_pool)
+ rte_mempool_free(indirect_pool);
+
+ pkt_pool = NULL;
+}
+
+static int ut_setup(void)
+{
+ return TEST_SUCCESS;
+}
+
+static void ut_teardown(void)
+{
+}
+
+static int
+v4_allocate_packet_of(struct rte_mbuf *b, int fill, size_t s, int df,
+ uint8_t ttl, uint8_t proto, uint16_t pktid)
+{
+ /* Create a packet, 2k bytes long */
+ b->data_off = 0;
+ char *data = rte_pktmbuf_mtod(b, char *);
+
+ memset(data, fill, sizeof(struct rte_ipv4_hdr) + s);
+
+ struct rte_ipv4_hdr *hdr = (struct rte_ipv4_hdr *)data;
+
+ hdr->version_ihl = 0x45; /* standard IP header... */
+ hdr->type_of_service = 0;
+ b->pkt_len = s + sizeof(struct rte_ipv4_hdr);
+ b->data_len = b->pkt_len;
+ hdr->total_length = htonl(b->pkt_len);
+ hdr->packet_id = htons(pktid);
+ hdr->fragment_offset = 0;
+ if (df)
+ hdr->fragment_offset = htons(0x4000);
+
+ if (!ttl)
+ ttl = 64; /* default to 64 */
+
+ if (!proto)
+ proto = 1; /* icmp */
+
+ hdr->time_to_live = ttl;
+ hdr->next_proto_id = proto;
+ hdr->hdr_checksum = 0;
+ hdr->src_addr = htonl(0x8080808);
+ hdr->dst_addr = htonl(0x8080404);
+
+ return 0;
+}
+
+static int
+v6_allocate_packet_of(struct rte_mbuf *b, int fill, size_t s, uint8_t ttl,
+ uint8_t proto, uint16_t pktid)
+{
+ /* Create a packet, 2k bytes long */
+ b->data_off = 0;
+ char *data = rte_pktmbuf_mtod(b, char *);
+
+ memset(data, fill, sizeof(struct rte_ipv6_hdr) + s);
+
+ struct rte_ipv6_hdr *hdr = (struct rte_ipv6_hdr *)data;
+ b->pkt_len = s + sizeof(struct rte_ipv6_hdr);
+ b->data_len = b->pkt_len;
+
+ /* basic v6 header */
+ hdr->vtc_flow = htonl(0x60 << 24 | pktid);
+ hdr->payload_len = htons(b->pkt_len);
+ hdr->proto = proto;
+ hdr->hop_limits = ttl;
+
+ memset(hdr->src_addr, 0x08, sizeof(hdr->src_addr));
+ memset(hdr->dst_addr, 0x04, sizeof(hdr->src_addr));
+
+ return 0;
+}
+
+static inline void
+test_free_fragments(struct rte_mbuf *mb[], uint32_t num)
+{
+ uint32_t i;
+ for (i = 0; i < num; i++)
+ rte_pktmbuf_free(mb[i]);
+}
+
+static int
+test_ip_frag(void)
+{
+ int result = TEST_SUCCESS;
+
+ struct test_ip_frags {
+ int ipv;
+ size_t mtu_size;
+ size_t pkt_size;
+ int set_df;
+ int ttl;
+ uint8_t proto;
+ int pkt_id;
+ int expected_frags;
+ } tests[] = {
+ {4, 1280, 1400, 0, 64, IPPROTO_ICMP, -1, 2},
+ {4, 1280, 1400, 0, 64, IPPROTO_ICMP, 0, 2},
+ {4, 600, 1400, 0, 64, IPPROTO_ICMP, -1, 3},
+ {4, 4, 1400, 0, 64, IPPROTO_ICMP, -1, -EINVAL},
+ {4, 600, 1400, 1, 64, IPPROTO_ICMP, -1, -ENOTSUP},
+ {4, 600, 1400, 0, 0, IPPROTO_ICMP, -1, 3},
+
+ {6, 1280, 1400, 0, 64, IPPROTO_ICMP, -1, 2},
+ {6, 1300, 1400, 0, 64, IPPROTO_ICMP, -1, 2},
+ {6, 4, 1400, 0, 64, IPPROTO_ICMP, -1, -EINVAL},
+ {6, 1300, 1400, 0, 0, IPPROTO_ICMP, -1, 2},
+ {6, 1280, 1400, 0, 64, IPPROTO_FRAGMENT, -1, -ENOTSUP},
+ };
+
+ for (size_t i = 0; i < ARRAY_SIZE(tests); i++) {
+ int32_t len;
+ uint16_t pktid;
+ struct rte_mbuf *pkts_out[BURST];
+ struct rte_mbuf *b = rte_pktmbuf_alloc(pkt_pool);
+
+ if (!b)
+ return TEST_FAILED; /* Serious error.. abort here */
+
+ if (tests[i].pkt_id == -1)
+ pktid = rte_rand_max(UINT16_MAX);
+
+ if (tests[i].ipv == 4) {
+ if (v4_allocate_packet_of(b, 0x41414141,
+ tests[i].pkt_size,
+ tests[i].set_df,
+ tests[i].ttl,
+ tests[i].proto,
+ pktid))
+ result = TEST_FAILED;
+ } else if (tests[i].ipv == 6) {
+ if (v6_allocate_packet_of(b, 0x41414141,
+ tests[i].pkt_size,
+ tests[i].ttl,
+ tests[i].proto,
+ pktid))
+ result = TEST_FAILED;
+ }
+
+ if (tests[i].ipv == 4)
+ len = rte_ipv4_fragment_packet(b, pkts_out, BURST,
+ tests[i].mtu_size,
+ direct_pool,
+ indirect_pool);
+ else
+ len = rte_ipv6_fragment_packet(b, pkts_out, BURST,
+ tests[i].mtu_size,
+ direct_pool,
+ indirect_pool);
+
+ rte_pktmbuf_free(b);
+
+ if (len > 0)
+ test_free_fragments(pkts_out, len);
+
+ printf("%d: checking %d with %d\n", (int)i, len,
+ (int)tests[i].expected_frags);
+ RTE_TEST_ASSERT_EQUAL(len, tests[i].expected_frags,
+ "Failed case %u\n", (unsigned int)i);
+
+ }
+
+ return result;
+}
+
+static struct unit_test_suite ipfrag_testsuite = {
+ .suite_name = "IP Frag Unit Test Suite",
+ .setup = testsuite_setup,
+ .teardown = testsuite_teardown,
+ .unit_test_cases = {
+ TEST_CASE_ST(ut_setup, ut_teardown,
+ test_ip_frag),
+
+ TEST_CASES_END() /**< NULL terminate unit test array */
+ }
+};
+
+static int
+test_ipfrag(void)
+{
+ return unit_test_suite_runner(&ipfrag_testsuite);
+}
+
+REGISTER_TEST_COMMAND(ipfrag_autotest, test_ipfrag);
--
2.25.1
next prev parent reply other threads:[~2020-03-31 16:08 UTC|newest]
Thread overview: 55+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-31 16:07 [dpdk-dev] [PATCH 0/4] ip_frag: add a unit test for fragmentation Aaron Conole
2020-03-31 16:07 ` [dpdk-dev] [PATCH 1/4] ip_frag: ensure minimum v4 fragmentation length Aaron Conole
2020-03-31 16:07 ` [dpdk-dev] [PATCH 2/4] ip_frag: ensure minimum v6 " Aaron Conole
2020-03-31 16:07 ` [dpdk-dev] [PATCH 3/4] ip_frag: ipv6 fragments must not be resubmitted to fragmentation Aaron Conole
2020-03-31 16:07 ` Aaron Conole [this message]
[not found] ` <20200331200715.13751-1-robot@bytheb.org>
2020-03-31 21:12 ` [dpdk-dev] |WARNING| pw67494 ipfrag: add unit test case Aaron Conole
2020-04-01 13:18 ` [dpdk-dev] [PATCH v2 0/4] ip_frag: add a unit test for fragmentation Aaron Conole
2020-04-01 13:18 ` [dpdk-dev] [PATCH v2 1/4] ip_frag: ensure minimum v4 fragmentation length Aaron Conole
2020-04-01 13:18 ` [dpdk-dev] [PATCH v2 2/4] ip_frag: ensure minimum v6 " Aaron Conole
2020-04-01 13:18 ` [dpdk-dev] [PATCH v2 3/4] ip_frag: ipv6 fragments must not be resubmitted to fragmentation Aaron Conole
2020-04-01 13:18 ` [dpdk-dev] [PATCH v2 4/4] ipfrag: add unit test case Aaron Conole
2020-04-01 18:39 ` [dpdk-dev] [PATCH v3 0/4] ip_frag: add a unit test for fragmentation Aaron Conole
2020-04-01 18:39 ` [dpdk-dev] [PATCH v3 1/4] ip_frag: ensure minimum v4 fragmentation length Aaron Conole
2020-04-07 11:10 ` Ananyev, Konstantin
2020-04-07 12:52 ` Aaron Conole
2020-04-07 14:14 ` Ananyev, Konstantin
2020-04-07 18:41 ` Aaron Conole
2020-04-08 12:37 ` Ananyev, Konstantin
2020-04-08 15:45 ` Aaron Conole
2020-04-01 18:39 ` [dpdk-dev] [PATCH v3 2/4] ip_frag: ensure minimum v6 " Aaron Conole
2020-04-07 10:48 ` Ananyev, Konstantin
2020-04-01 18:39 ` [dpdk-dev] [PATCH v3 3/4] ip_frag: ipv6 fragments must not be resubmitted to fragmentation Aaron Conole
2020-04-07 10:43 ` Ananyev, Konstantin
2020-04-07 12:40 ` Aaron Conole
2020-04-01 18:39 ` [dpdk-dev] [PATCH v3 4/4] ipfrag: add unit test case Aaron Conole
2020-04-04 15:58 ` Pavan Nikhilesh Bhagavatula
2020-04-15 17:25 ` [dpdk-dev] [PATCH v4 0/3] ip_frag: add a unit test for fragmentation Aaron Conole
2020-04-15 17:25 ` [dpdk-dev] [PATCH v4 1/3] ip_frag: ensure minimum v4 fragmentation length Aaron Conole
2020-04-17 11:52 ` Lukasz Wojciechowski
2020-04-15 17:25 ` [dpdk-dev] [PATCH v4 2/3] ip_frag: ensure minimum v6 " Aaron Conole
2020-04-17 11:52 ` Lukasz Wojciechowski
2020-04-15 17:25 ` [dpdk-dev] [PATCH v4 3/3] ipfrag: add unit test case Aaron Conole
2020-04-16 15:30 ` Lukasz Wojciechowski
2020-04-16 18:52 ` Aaron Conole
2020-04-17 13:14 ` [dpdk-dev] [PATCH v5 0/3] ip_frag: add a unit test for fragmentation Aaron Conole
2020-04-17 13:14 ` [dpdk-dev] [PATCH v5 1/3] ip_frag: ensure minimum v4 fragmentation length Aaron Conole
2020-04-20 12:50 ` Ananyev, Konstantin
2020-04-20 15:24 ` Aaron Conole
2020-04-17 13:14 ` [dpdk-dev] [PATCH v5 2/3] ip_frag: ensure minimum v6 " Aaron Conole
2020-04-20 12:53 ` Ananyev, Konstantin
2020-04-20 15:26 ` Aaron Conole
2020-04-20 15:43 ` Ananyev, Konstantin
2020-04-17 13:14 ` [dpdk-dev] [PATCH v5 3/3] ipfrag: add unit test case Aaron Conole
2020-04-17 14:14 ` Lukasz Wojciechowski
2020-04-20 16:03 ` Burakov, Anatoly
2020-04-20 17:34 ` Aaron Conole
2020-04-25 12:18 ` Thomas Monjalon
2020-04-20 19:25 ` [dpdk-dev] [PATCH v6 0/3] ip_frag: add a unit test for fragmentation Aaron Conole
2020-04-20 19:25 ` [dpdk-dev] [PATCH v6 1/3] ip_frag: ensure minimum v4 fragmentation length Aaron Conole
2020-04-21 11:04 ` Lukasz Wojciechowski
2020-04-20 19:25 ` [dpdk-dev] [PATCH v6 2/3] ip_frag: ensure minimum v6 " Aaron Conole
2020-04-21 11:04 ` Lukasz Wojciechowski
2020-04-20 19:25 ` [dpdk-dev] [PATCH v6 3/3] ipfrag: add unit test case Aaron Conole
2020-04-21 11:03 ` Lukasz Wojciechowski
2020-04-25 13:16 ` [dpdk-dev] [PATCH v6 0/3] ip_frag: add a unit test for fragmentation Thomas Monjalon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200331160714.697790-5-aconole@redhat.com \
--to=aconole@redhat.com \
--cc=allain.legacy@windriver.com \
--cc=anatoly.burakov@intel.com \
--cc=bruce.richardson@intel.com \
--cc=chas3@att.com \
--cc=david.marchand@redhat.com \
--cc=dev@dpdk.org \
--cc=konstantin.ananyev@intel.com \
--cc=piotrx.t.azarewicz@intel.com \
--cc=skori@marvell.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).