From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id EF9D945B3C; Mon, 14 Oct 2024 23:08:48 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A1B4C4065D; Mon, 14 Oct 2024 23:08:39 +0200 (CEST) Received: from mail-qv1-f50.google.com (mail-qv1-f50.google.com [209.85.219.50]) by mails.dpdk.org (Postfix) with ESMTP id 4023E402F1 for ; Mon, 14 Oct 2024 23:08:36 +0200 (CEST) Received: by mail-qv1-f50.google.com with SMTP id 6a1803df08f44-6cbce8d830dso37063746d6.1 for ; Mon, 14 Oct 2024 14:08:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iol.unh.edu; s=unh-iol; t=1728940115; x=1729544915; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=zETe05Kmd/EFseLMyZ3M7SHYhzu3vTEZsIIXkqkrtQ4=; b=GeXjcHE9rBya1BkbHVwzqYN8v2oEveEz27T3m58Yp/+V7IRdflUh+PFqfkF03UddK1 02gvYNbQikXqgw6SH0snb62jlACPjWBFHQe8lJax7AErIjCVuKH/kNz4mHHbsMDBcNVe OkrhVqwnRuXm7gk7nMPnT2UgF6B84YmF8U3B0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1728940115; x=1729544915; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zETe05Kmd/EFseLMyZ3M7SHYhzu3vTEZsIIXkqkrtQ4=; b=cmAhlvoMrvK4AZJKkbScNPgmFWW/nQ5Oo5j+72HRN6myTIXke0CN4Jk8w91ntioTMn Q1nmhvGVmaW8yg/QFWcBKFmL38cutYAx2yJ7aQRmnMpumeirfTuwidKfEa8haeMSUbbv tJOnZmtnjtkkPVHrlB9v7+L2y+WjmCHicse24vQZ9sR/TsvI7t2D6iXn0FX7Q7FNkWDZ IQ9K+LfTb11E1ojZclmf1Z+VQ4rg9d34ZCLQ6RFisGAkkvNhzyj41e7P2BGez2WnEj8x WVqtgS1yHvl7VhP3iKJtkn9WHQXyudb3GNMRHY2IR9l6ww2/vNKwcLM1XJgkwU22Kqw6 G3aQ== X-Gm-Message-State: AOJu0YyiRmS48KM/SvAmtxvdqSSGuaiaUZoyeUsgNAjxZ0FBszdSpuXV EpPHPfklHgOED96eAhQv3Y84Xg3J1EuyvvRWM4AsLF3kmLy4nDl6KZm6n5CMKAc= X-Google-Smtp-Source: AGHT+IGuJWhIlontI0EruPRv1NlXmZzaDvDnTLWnwuL/GCUyn6rcQ6/48+EVNZdNPHEjoqsOuxR0hg== X-Received: by 2002:a05:6214:3c85:b0:6cb:e979:9d4a with SMTP id 6a1803df08f44-6cbf9e76955mr116760746d6.35.1728940115548; Mon, 14 Oct 2024 14:08:35 -0700 (PDT) Received: from dean-laptop.iol.unh.edu ([2606:4100:3880:1271:f9bd:24da:464d:6294]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-6cbe85b7a70sm49488956d6.53.2024.10.14.14.08.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 14 Oct 2024 14:08:35 -0700 (PDT) From: Dean Marx To: probb@iol.unh.edu, npratte@iol.unh.edu, luca.vizzarro@arm.com, yoan.picchi@foss.arm.com, Honnappa.Nagarahalli@arm.com, paul.szczepanek@arm.com Cc: dev@dpdk.org, Dean Marx , Jeremy Spewock Subject: [PATCH v3 2/2] dts: port over unified packet suite Date: Mon, 14 Oct 2024 17:08:57 -0400 Message-ID: <20241014210857.31436-3-dmarx@iol.unh.edu> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20241014210857.31436-1-dmarx@iol.unh.edu> References: <20240823202244.9184-1-dmarx@iol.unh.edu> <20241014210857.31436-1-dmarx@iol.unh.edu> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Port over unified packet testing suite from old DTS. This suite tests the ability of the PMD to recognize valid or invalid packet flags. Signed-off-by: Dean Marx Reviewed-by: Jeremy Spewock --- dts/framework/config/conf_yaml_schema.json | 3 +- dts/tests/TestSuite_uni_pkt.py | 229 +++++++++++++++++++++ 2 files changed, 231 insertions(+), 1 deletion(-) create mode 100644 dts/tests/TestSuite_uni_pkt.py diff --git a/dts/framework/config/conf_yaml_schema.json b/dts/framework/config/conf_yaml_schema.json index df390e8ae2..156fa47e94 100644 --- a/dts/framework/config/conf_yaml_schema.json +++ b/dts/framework/config/conf_yaml_schema.json @@ -187,7 +187,8 @@ "enum": [ "hello_world", "os_udp", - "pmd_buffer_scatter" + "pmd_buffer_scatter", + "uni_pkt" ] }, "test_target": { diff --git a/dts/tests/TestSuite_uni_pkt.py b/dts/tests/TestSuite_uni_pkt.py new file mode 100644 index 0000000000..e7a8e36f79 --- /dev/null +++ b/dts/tests/TestSuite_uni_pkt.py @@ -0,0 +1,229 @@ +# SPDX-License-Identifier: BSD-3-Clause +# Copyright(c) 2024 University of New Hampshire + +"""Unified packet type flag testing suite. + +According to DPDK documentation, each Poll Mode Driver should reserve 32 bits +of packet headers for unified packet type flags. These flags serve as an +identifier for user applications, and are divided into subcategories: +L2, L3, L4, tunnel, inner L2, inner L3, and inner L4 types. +This suite verifies the ability of the driver to recognize these types. + +""" + +from scapy.contrib.nsh import NSH # type: ignore[import-untyped] +from scapy.layers.inet import GRE, ICMP, IP, TCP, UDP # type: ignore[import-untyped] +from scapy.layers.inet6 import IPv6, IPv6ExtHdrFragment # type: ignore[import-untyped] +from scapy.layers.l2 import ARP, Ether # type: ignore[import-untyped] +from scapy.layers.sctp import SCTP, SCTPChunkData # type: ignore[import-untyped] +from scapy.layers.vxlan import VXLAN # type: ignore[import-untyped] +from scapy.packet import Packet, Raw # type: ignore[import-untyped] + +from framework.remote_session.testpmd_shell import ( + RtePTypes, + SimpleForwardingModes, + TestPmdShell, + TestPmdVerbosePacket, +) +from framework.test_suite import TestSuite, func_test +from framework.testbed_model.capability import TopologyType, requires + + +@requires(topology_type=TopologyType.two_links) +class TestUniPkt(TestSuite): + """DPDK Unified packet test suite. + + This testing suite uses testpmd's verbose output hardware/software + packet type field to verify the ability of the driver to recognize + unified packet types when receiving different packets. + + """ + + def check_for_matching_packet( + self, output: list[TestPmdVerbosePacket], flags: RtePTypes + ) -> bool: + """Returns :data:`True` if the packet in verbose output contains all specified flags.""" + for packet in output: + if packet.dst_mac == "00:00:00:00:00:01": + if flags not in packet.hw_ptype and flags not in packet.sw_ptype: + return False + return True + + def send_packet_and_verify_flags( + self, expected_flag: RtePTypes, packet: Packet, testpmd: TestPmdShell + ) -> None: + """Sends a packet to the DUT and verifies the verbose ptype flags.""" + testpmd.start() + self.send_packet_and_capture(packet=packet) + verbose_output = testpmd.extract_verbose_output(testpmd.stop()) + valid = self.check_for_matching_packet(output=verbose_output, flags=expected_flag) + self.verify(valid, f"Packet type flag did not match the expected flag: {expected_flag}.") + + def setup_session( + self, testpmd: TestPmdShell, expected_flags: list[RtePTypes], packet_list=list[Packet] + ) -> None: + """Sets the forwarding and verbose mode of each test case interactive shell session.""" + testpmd.set_forward_mode(SimpleForwardingModes.rxonly) + testpmd.set_verbose(level=1) + for i in range(0, len(packet_list)): + self.send_packet_and_verify_flags( + expected_flag=expected_flags[i], packet=packet_list[i], testpmd=testpmd + ) + + @func_test + def test_l2_packet_detect(self) -> None: + """Verify the correct flags are shown in verbose output when sending L2 packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [Ether(dst=mac_id, type=0x88F7) / Raw(), Ether(dst=mac_id) / ARP() / Raw()] + flag_list = [RtePTypes.L2_ETHER_TIMESYNC, RtePTypes.L2_ETHER_ARP] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) + + @func_test + def test_l3_l4_packet_detect(self) -> None: + """Verify correct flags are shown in the verbose output when sending IP/L4 packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [ + Ether(dst=mac_id) / IP() / Raw(), + Ether(dst=mac_id) / IP() / UDP() / Raw(), + Ether(dst=mac_id) / IP() / TCP() / Raw(), + Ether(dst=mac_id) / IP() / SCTP() / Raw(), + Ether(dst=mac_id) / IP() / ICMP() / Raw(), + Ether(dst=mac_id) / IP(frag=5) / TCP() / Raw(), + ] + flag_list = [ + RtePTypes.L3_IPV4 | RtePTypes.L2_ETHER, + RtePTypes.L4_UDP, + RtePTypes.L4_TCP, + RtePTypes.L4_SCTP, + RtePTypes.L4_ICMP, + RtePTypes.L4_FRAG | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L2_ETHER, + ] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) + + @func_test + def test_ipv6_l4_packet_detect(self) -> None: + """Verify correct flags are shown in the verbose output when sending IPv6/L4 packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [ + Ether(dst=mac_id) / IPv6() / Raw(), + Ether(dst=mac_id) / IPv6() / UDP() / Raw(), + Ether(dst=mac_id) / IPv6() / TCP() / Raw(), + Ether(dst=mac_id) / IPv6() / IPv6ExtHdrFragment() / Raw(), + ] + flag_list = [ + RtePTypes.L2_ETHER | RtePTypes.L3_IPV6, + RtePTypes.L4_UDP, + RtePTypes.L4_TCP, + RtePTypes.L3_IPV6_EXT_UNKNOWN, + ] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) + + @func_test + def test_l3_tunnel_packet_detect(self) -> None: + """Verify correct flags are shown in the verbose output when sending IPv6/L4 packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [ + Ether(dst=mac_id) / IP() / IP(frag=5) / UDP() / Raw(), + Ether(dst=mac_id) / IP() / IP() / Raw(), + Ether(dst=mac_id) / IP() / IP() / UDP() / Raw(), + Ether(dst=mac_id) / IP() / IP() / TCP() / Raw(), + Ether(dst=mac_id) / IP() / IP() / SCTP() / Raw(), + Ether(dst=mac_id) / IP() / IP() / ICMP() / Raw(), + Ether(dst=mac_id) / IP() / IPv6() / IPv6ExtHdrFragment() / Raw(), + ] + flag_list = [ + RtePTypes.TUNNEL_IP | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.INNER_L4_FRAG, + RtePTypes.TUNNEL_IP | RtePTypes.INNER_L4_NONFRAG, + RtePTypes.TUNNEL_IP | RtePTypes.INNER_L4_UDP, + RtePTypes.TUNNEL_IP | RtePTypes.INNER_L4_TCP, + RtePTypes.TUNNEL_IP | RtePTypes.INNER_L4_SCTP, + RtePTypes.TUNNEL_IP | RtePTypes.INNER_L4_ICMP, + RtePTypes.TUNNEL_IP | RtePTypes.INNER_L3_IPV6_EXT_UNKNOWN | RtePTypes.INNER_L4_FRAG, + ] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) + + @func_test + def test_gre_tunnel_packet_detect(self) -> None: + """Verify the correct flags are shown in the verbose output when sending GRE packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [ + Ether(dst=mac_id) / IP() / GRE() / IP(frag=5) / Raw(), + Ether(dst=mac_id) / IP() / GRE() / IP() / Raw(), + Ether(dst=mac_id) / IP() / GRE() / IP() / UDP() / Raw(), + Ether(dst=mac_id) / IP() / GRE() / IP() / TCP() / Raw(), + Ether(dst=mac_id) / IP() / GRE() / IP() / SCTP() / Raw(), + Ether(dst=mac_id) / IP() / GRE() / IP() / ICMP() / Raw(), + ] + flag_list = [ + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_FRAG | RtePTypes.INNER_L3_IPV4_EXT_UNKNOWN, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_NONFRAG, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_UDP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_TCP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_SCTP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_ICMP, + ] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) + + @func_test + def test_vxlan_tunnel_packet_detect(self) -> None: + """Verify the correct flags are shown in the verbose output when sending VXLAN packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [ + Ether(dst=mac_id) / IP() / UDP() / VXLAN() / Ether() / IP(frag=5) / Raw(), + Ether(dst=mac_id) / IP() / UDP() / VXLAN() / Ether() / IP() / Raw(), + Ether(dst=mac_id) / IP() / UDP() / VXLAN() / Ether() / IP() / UDP() / Raw(), + Ether(dst=mac_id) / IP() / UDP() / VXLAN() / Ether() / IP() / TCP() / Raw(), + Ether(dst=mac_id) / IP() / UDP() / VXLAN() / Ether() / IP() / SCTP() / Raw(), + Ether(dst=mac_id) / IP() / UDP() / VXLAN() / Ether() / IP() / ICMP() / Raw(), + ( + Ether(dst=mac_id) + / IP() + / UDP() + / VXLAN() + / Ether() + / IPv6() + / IPv6ExtHdrFragment() + / Raw() + ), + ] + flag_list = [ + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_FRAG | RtePTypes.INNER_L3_IPV4_EXT_UNKNOWN, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_NONFRAG, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_UDP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_TCP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_SCTP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L4_ICMP, + RtePTypes.TUNNEL_GRENAT | RtePTypes.INNER_L3_IPV6_EXT_UNKNOWN | RtePTypes.INNER_L4_FRAG, + ] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) + + @func_test + def test_nsh_packet_detect(self) -> None: + """Verify the correct flags are shown in the verbose output when sending NSH packets.""" + mac_id = "00:00:00:00:00:01" + packet_list = [ + Ether(dst=mac_id, type=0x894F) / NSH() / IP(), + Ether(dst=mac_id, type=0x894F) / NSH() / IP() / ICMP(), + Ether(dst=mac_id, type=0x894F) / NSH() / IP(frag=1, flags="MF"), + Ether(dst=mac_id, type=0x894F) / NSH() / IP() / TCP(), + Ether(dst=mac_id, type=0x894F) / NSH() / IP() / UDP(), + Ether(dst=mac_id, type=0x894F) / NSH() / IP() / SCTP(tag=1) / SCTPChunkData(data="x"), + Ether(dst=mac_id, type=0x894F) / NSH() / IPv6(), + ] + flag_list = [ + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L4_NONFRAG, + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L4_ICMP, + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L4_FRAG, + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L4_TCP, + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L4_UDP, + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV4_EXT_UNKNOWN | RtePTypes.L4_SCTP, + RtePTypes.L2_ETHER_NSH | RtePTypes.L3_IPV6_EXT_UNKNOWN | RtePTypes.L4_NONFRAG, + ] + with TestPmdShell(node=self.sut_node) as testpmd: + self.setup_session(testpmd=testpmd, expected_flags=flag_list, packet_list=packet_list) -- 2.44.0