From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by dpdk.org (Postfix) with ESMTP id 370111B129 for ; Wed, 12 Dec 2018 05:48:48 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Dec 2018 20:48:47 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,343,1539673200"; d="scan'208";a="118075257" Received: from unknown (HELO localhost.localdomain.sh.intel.com) ([10.240.176.135]) by orsmga001.jf.intel.com with ESMTP; 11 Dec 2018 20:48:45 -0800 From: Wenjie Li To: dts@dpdk.org Cc: Wenjie Li Date: Wed, 12 Dec 2018 12:51:58 +0800 Message-Id: <1544590319-24926-1-git-send-email-wenjiex.a.li@intel.com> X-Mailer: git-send-email 1.9.3 Subject: [dts] [PATCH V1 1/2] Add a new testsuite TestSuite_metering_and_policing.py to tests X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Dec 2018 04:48:49 -0000 Add a new testsuite "TestSuite_metering_and_policing.py" to tests. Signed-off-by: Wenjie Li --- tests/TestSuite_metering_and_policing.py | 978 +++++++++++++++++++++++ 1 file changed, 978 insertions(+) create mode 100644 tests/TestSuite_metering_and_policing.py diff --git a/tests/TestSuite_metering_and_policing.py b/tests/TestSuite_metering_and_policing.py new file mode 100644 index 0000000..174ccde --- /dev/null +++ b/tests/TestSuite_metering_and_policing.py @@ -0,0 +1,978 @@ +#BSD LICENSE +# +# Copyright(c) 2010-2016 Intel Corporation. All rights reserved. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# +# * Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# * Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# * Neither the name of Intel Corporation nor the names of its +# contributors may be used to endorse or promote products derived +# from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + + + +""" +DPDK Test suite. +Test metering_and_policing. +""" +import utils +import string +import time +import re +from test_case import TestCase +from plotting import Plotting +from settings import HEADER_SIZE +from dut import Dut + + +class TestMeteringAndPolicing(TestCase): + + def copy_config_files_to_dut(self): + """ + Copy firmware.cli, dscp_*.sh from tester to DUT. + """ + pass + + + def update_firmware_cli(self, caseID): + """ + Update firmware.cli. + """ + self.ori_firmware_cli = "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware.cli" + if len(self.dut_ports) == 4: + self.ori_firmware_cli = "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware_4ports.cli" + self.new_firmware_cli = "%s-%s" % (self.ori_firmware_cli, caseID) + self.dut.send_expect("rm -f %s" % (self.new_firmware_cli), "#", 5) + self.dut.send_expect("cp %s %s" % (self.ori_firmware_cli, self.new_firmware_cli), "#", 5) + thread_id = 5 + + self.dut.send_expect("sed -i -e 's/^.*link LINK0 dev.*$/link LINK0 dev %s/g' %s" %(self.dut_p0_pci, self.new_firmware_cli), "#", 5) + self.dut.send_expect("sed -i -e 's/^.*link LINK1 dev.*$/link LINK1 dev %s/g' %s" %(self.dut_p1_pci, self.new_firmware_cli), "#", 5) + if len(self.dut_ports) == 4: + self.dut.send_expect("sed -i -e 's/^.*link LINK2 dev.*$/link LINK2 dev %s/g' %s" %(self.dut_p2_pci, self.new_firmware_cli), "#", 5) + self.dut.send_expect("sed -i -e 's/^.*link LINK3 dev.*$/link LINK3 dev %s/g' %s" %(self.dut_p3_pci, self.new_firmware_cli), "#", 5) + + # table action + if caseID == 8: + self.dut.send_expect("sed -i -e 's/^.*table action profile AP0.*$/table action profile AP0 ipv6 offset 270 fwd meter trtcm tc 1 stats pkts/g' %s" % self.new_firmware_cli, "#", 5) + else: + self.dut.send_expect("sed -i -e 's/^.*table action profile AP0.*$/table action profile AP0 ipv4 offset 270 fwd meter trtcm tc 1 stats pkts/g' %s" % self.new_firmware_cli, "#", 5) + + # pipeline RX table + if caseID == 7: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table match.*$/pipeline RX table match hash ext key 16 mask 00FF0000FFFFFFFFFFFFFFFFFFFFFFFF offset 278 buckets 16K size 65K action AP0/g' %s" % self.new_firmware_cli, "#", 5) + elif caseID == 8: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table match.*$/pipeline RX table match acl ipv6 offset 270 size 4K action AP0/g' %s" % self.new_firmware_cli, "#", 5) + else: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table match.*$/pipeline RX table match acl ipv4 offset 270 size 4K action AP0/g' %s" % self.new_firmware_cli, "#", 5) + + # use .sh file as RX table + if caseID == 10: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table 0 dscp.*$/pipeline RX table 0 dscp \/root\/dpdk\/drivers\/net\/softnic\/dscp_red.sh/g' %s" % self.new_firmware_cli, "#", 5) + elif caseID == 11: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table 0 dscp.*$/pipeline RX table 0 dscp \/root\/dpdk\/drivers\/net\/softnic\/dscp_yellow.sh/g' %s" % self.new_firmware_cli, "#", 5) + elif caseID == 12: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table 0 dscp.*$/pipeline RX table 0 dscp \/root\/dpdk\/drivers\/net\/softnic\/dscp_green.sh/g' %s" % self.new_firmware_cli, "#", 5) + elif caseID == 13: + self.dut.send_expect("sed -i -e 's/^.*pipeline RX table 0 dscp.*$/pipeline RX table 0 dscp \/root\/dpdk\/drivers\/net\/softnic\/dscp_default.sh/g' %s" % self.new_firmware_cli, "#", 5) + self.dut.send_expect("sed -i -e 's/thread 25/thread %s/g' %s" % (thread_id, self.new_firmware_cli), "#", 5) + + + def start_testpmd(self, filename): + """ + Start testpmd. + """ + if len(self.dut_ports) == 2: + portmask = "0x4" + if len(self.dut_ports) == 4: + portmask = "0x10" + self.path = "./%s/app/testpmd" %(self.target) + cmd = self.path + " -l 3-5 -n %d --vdev 'net_softnic0,firmware=%s,cpu_id=0,conn_port=8086' -- -i --forward-mode=softnic --rxq=%d --txq=%d --portmask=%s" % (self.dut.get_memory_channels(), filename, self.port_id, self.port_id, portmask) + self.dut.send_expect(cmd, "testpmd>", 60) + + + def add_port_meter_profile(self, profile_id, cbs=400, pbs=500): + """ + Add port meter profile (trTCM rfc2968). + """ + cir = 3125000000 + pir = 3125000000 + self.dut.send_expect("add port meter profile trtcm_rfc2698 %d %d %d %d %d %d" %(self.port_id, profile_id, cir, pir, cbs, pbs),"testpmd>",60) + + + def create_port_meter(self, mtr_id, profile_id, gyrd_action): + """ + Create new meter object for the ethernet device. + """ + self.dut.send_expect("create port meter %d %d %d yes %s" %(self.port_id, mtr_id, profile_id, gyrd_action),"testpmd>",60) + + + def create_flow_rule(self, ret_id, ip_ver, protocol, spec_id, mtr_id, queue_index_id): + """ + Create flow rule based on port meter. + """ + if ip_ver == "ipv4": + src_mask = "255.255.255.255" + dst_mask = "255.255.255.255" + src_ip = "1.10.11.12" + dst_ip = "2.20.21.22" + if ip_ver == "ipv6": + src_mask = "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff" + dst_mask = "0:0:0:0:0:0:0:0" + src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789" + dst_ip = "0:0:0:0:0:0:0:0" + protocol = protocol.lower() + if protocol == "tcp": + proto_id = 6 + if protocol == "udp": + proto_id = 17 + if protocol == "sctp": + proto_id = 132 + + out = self.dut.send_expect("flow create %d group 0 ingress pattern eth / %s proto mask 255 src mask %s dst mask %s src spec %s dst spec %s proto spec %d / %s src mask 65535 dst mask 65535 src spec %d dst spec %d / end actions meter mtr_id %d / queue index %d / end" %(self.port_id, ip_ver, src_mask, dst_mask, src_ip, dst_ip, proto_id, protocol, spec_id, spec_id, mtr_id, queue_index_id), "testpmd>", 60) + if ret_id == 1: + self.verify("Flow rule #" in out, "flow create fail") + else: + self.verify("METER: Meter already attached to a flow: Invalid argument" in out, "flow create fail") + + + def set_up_all(self): + """ + Run at the start of each test suite. + """ + self.dut_ports = self.dut.get_ports() + self.port_nums = 2 + self.verify(len(self.dut_ports) >= self.port_nums, + "Insufficient ports for speed testing") + + self.dut_p0_pci = self.dut.get_port_pci(self.dut_ports[0]) + self.dut_p1_pci = self.dut.get_port_pci(self.dut_ports[1]) + + self.dut_p0_mac = self.dut.get_mac_address(self.dut_ports[0]) + self.dut_p1_mac = self.dut.get_mac_address(self.dut_ports[1]) + + self.pf0_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] + self.pf1_interface = self.dut.ports_info[self.dut_ports[1]]['intf'] + + if len(self.dut_ports) == 4: + self.dut_p2_pci = self.dut.get_port_pci(self.dut_ports[2]) + self.dut_p3_pci = self.dut.get_port_pci(self.dut_ports[3]) + + self.dut_p2_mac = self.dut.get_mac_address(self.dut_ports[2]) + self.dut_p3_mac = self.dut.get_mac_address(self.dut_ports[3]) + + self.pf2_interface = self.dut.ports_info[self.dut_ports[2]]['intf'] + self.pf3_interface = self.dut.ports_info[self.dut_ports[3]]['intf'] + + self.port_id = len(self.dut_ports) + self.copy_config_files_to_dut() + + + def set_up(self): + """ + Run before each test case. + """ + pass + + + def scapy_send_packet(self, ip_ver, protocol, fwd_port, pktsize): + """ + Send a packet to port + """ + time.sleep(1) + source_port = self.tester.get_interface(self.tester.get_local_port(self.dut_ports[0])) + protocol = protocol.upper() + if ip_ver == "ipv4": + src_ip = "1.10.11.12" + dst_ip = "2.20.21.22" + tag = "IP" + if protocol == "TCP": + proto_str = "proto=6" + if protocol == "UDP": + proto_str = "proto=17" + if protocol == "SCTP": + proto_str = "proto=132" + + if ip_ver == "ipv6": + src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789" + dst_ip = "2001::1" + tag = "IPv6" + if protocol == "TCP": + proto_str = "nh=6" + if protocol == "UDP": + proto_str = "nh=17" + + self.tester.scapy_append('sendp([Ether(dst="%s")/%s(src="%s",dst="%s",%s)/%s(sport=%d,dport=%d)/Raw(load="P"*%d)], iface="%s")' % (self.dut_p0_mac, tag, src_ip, dst_ip, proto_str, protocol, fwd_port, fwd_port, pktsize, source_port)) + self.tester.scapy_execute() + time.sleep(1) + + + def send_packet_and_check(self, ip_ver, protocol, fwd_port, pktsize, expect_port): + """ + Send packet and check the stats + """ + rx_before = [] + tx_before = [] + for i in range (0, len(self.dut_ports)): + output = self.dut.send_expect("show port stats %d" %(i),"testpmd>",60) + rx_before.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S)) + tx_before.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S)) + + print("="*150) + print(rx_before, tx_before) + self.scapy_send_packet(ip_ver, protocol, fwd_port, pktsize) + + rx_after = [] + tx_after = [] + for i in range (0, len(self.dut_ports)): + output = self.dut.send_expect("show port stats %d" %(i),"testpmd>",60) + rx_after.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S)) + tx_after.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S)) + + print(rx_after, tx_after) + rx_packets_port = [] + tx_packets_port = [] + for i in range (0, len(self.dut_ports)): + temp1 = int(rx_after[i][0]) - int(rx_before[i][0]) + temp2 = int(tx_after[i][0]) - int(tx_before[i][0]) + rx_packets_port.append(temp1) + tx_packets_port.append(temp2) + + if expect_port == i: + self.verify(int(rx_packets_port[0]) == int(tx_packets_port[i]) == 1, "Wrong: can't forward package to port %d " % expect_port) + if expect_port == -1: + for i in range (0, len(self.dut_ports)): + self.verify(int(rx_packets_port[0]) == 1 and int(tx_packets_port[i]) == 0, "Wrong: the packet is not dropped") + + + def test_ipv4_ACL_table_RFC2698_GYR(self): + """ + Test Case 1: ipv4 ACL table RFC2698 GYR + """ + self.update_firmware_cli(caseID=1) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + + def test_ipv4_ACL_table_RFC2698_GYD(self): + """ + Test Case 2: ipv4 ACL table RFC2698 GYD + """ + self.update_firmware_cli(caseID=2) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + + def test_ipv4_ACL_table_RFC2698_GDR(self): + """ + Test Case 3: ipv4 ACL table RFC2698 GDR + """ + self.update_firmware_cli(caseID=3) + + cbs = 400 + pbs = 500 + protocol = "SCTP" + head = 32 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=1) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt4, expect_port=1) + + + def test_ipv4_ACL_table_RFC2698_DYR(self): + """ + Test Case 4: ipv4 ACL table RFC2698 DYR + """ + self.update_firmware_cli(caseID=4) + + cbs = 400 + pbs = 500 + protocol = "UDP" + head = 28 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + + def test_ipv4_ACL_table_RFC2698_DDD(self): + """ + Test Case 5: ipv4 ACL table RFC2698 DDD + """ + self.update_firmware_cli(caseID=5) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + + def test_ipv4_with_same_cbs_and_pbs_GDR(self): + """ + Test Case 6: ipv4 with same cbs and pbs GDR + """ + self.update_firmware_cli(caseID=6) + + cbs = 500 + pbs = 500 + protocol = "SCTP" + head = 32 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=0) + + + def test_ipv4_HASH_table_RFC2698(self): + """ + Test Case 7: ipv4 HASH table RFC2698 + """ + self.update_firmware_cli(caseID=7) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + # test 1 'g y r 0 0 0' + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + self.dut.send_expect("quit", "#", 30) + + # test 2 'g y d 0 0 0' + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + self.dut.send_expect("quit", "#", 30) + + # test 5 'd d d 0 0 0' + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1) + self.dut.send_expect("quit", "#", 30) + + # test 3 'g d r 0 0 0' + protocol = "SCTP" + head = 32 + + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=1) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt4, expect_port=1) + self.dut.send_expect("quit", "#", 30) + + # test 4 'd y r 0 0 0' + protocol = "UDP" + head = 28 + + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp", spec_id=2, mtr_id=0, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 5) + + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1) + self.dut.send_expect("quit", "#", 30) + + + def test_ipv6_ACL_table_RFC2698(self): + """ + Test Case 8: ipv6 ACL table RFC2698 + """ + self.update_firmware_cli(caseID=8) + + cbs = 400 + pbs = 500 + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="udp", spec_id=2, mtr_id=1, queue_index_id=1) + self.dut.send_expect("start","testpmd>",60) + + protocol = "TCP" + head = 60 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + protocol = "UDP" + head = 48 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=1) + self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=1) + self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=1) + self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + + def test_ipv4_multiple_meter_and_profile(self): + """ + Test Case 9: multiple meter and profile + """ + self.update_firmware_cli(caseID=9) + + if len(self.dut_ports) == 4: + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500) + self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g y d 0 0 0") + self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g d r 0 0 0") + self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d y r 0 0 0") + self.create_port_meter(mtr_id=128, profile_id=1, gyrd_action="d d d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=0, mtr_id=0, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=1, mtr_id=1, queue_index_id=1) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=2) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=3, mtr_id=3, queue_index_id=3) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=4, mtr_id=4, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=5, mtr_id=5, queue_index_id=1) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=6, mtr_id=6, queue_index_id=2) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=7, mtr_id=128, queue_index_id=3) + self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp", spec_id=8, mtr_id=128, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 120) + output = self.dut.send_expect("flow list %d" % (self.port_id), "testpmd>", 120) + print(output) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + # group 0 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt4, expect_port=0) + # group 1 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt2, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt3, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt4, expect_port=1) + # group 2 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=2) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=2) + # group 3 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt1, expect_port=3) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt2, expect_port=3) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt3, expect_port=3) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt4, expect_port=-1) + + cbs = 300 + pbs = 400 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + # group 4 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt4, expect_port=0) + # group 5 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt1, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt4, expect_port=1) + # group 6 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt1, expect_port=2) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt2, expect_port=2) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt3, expect_port=2) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt4, expect_port=-1) + # group 7 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt4, expect_port=-1) + + if len(self.dut_ports) == 2: + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500) + self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400) + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g y d 0 0 0") + self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g d r 0 0 0") + self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d y r 0 0 0") + self.create_port_meter(mtr_id=128, profile_id=1, gyrd_action="d d d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=0, mtr_id=0, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=1, mtr_id=1, queue_index_id=1) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=3, mtr_id=3, queue_index_id=1) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=4, mtr_id=4, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=5, mtr_id=5, queue_index_id=1) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=6, mtr_id=6, queue_index_id=0) + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=7, mtr_id=128, queue_index_id=1) + self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp", spec_id=8, mtr_id=128, queue_index_id=0) + self.dut.send_expect("start", "testpmd>", 120) + output = self.dut.send_expect("flow list %d" % (self.port_id), "testpmd>", 120) + print(output) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + # group 0 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt4, expect_port=0) + # group 1 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt2, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt3, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt4, expect_port=1) + # group 2 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + # group 3 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt1, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt2, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt3, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt4, expect_port=-1) + + cbs = 300 + pbs = 400 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + # group 4 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt4, expect_port=0) + # group 5 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt1, expect_port=1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt4, expect_port=1) + # group 6 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt4, expect_port=-1) + # group 7 + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt4, expect_port=-1) + + + def test_ipv4_RFC2698_pre_colored_red_by_DSCP_table(self): + """ + Test Case 10: ipv4 RFC2698 pre-colored red by DSCP table + """ + self.update_firmware_cli(caseID=10) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.dut.send_expect("start", "testpmd>", 5) + + # test 0: GYR + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 1: GYD + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + # test 2: GDR + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 3: DYR + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + + def test_ipv4_RFC2698_pre_colored_yellow_by_DSCP_table(self): + """ + Test Case 11: ipv4 RFC2698 pre-colored yellow by DSCP table + """ + self.update_firmware_cli(caseID=11) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.dut.send_expect("start", "testpmd>", 5) + + # test 0: GYR + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 1: GYD + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 2: GDR + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + # test 3: DYR + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + + def test_ipv4_RFC2698_pre_colored_green_by_DSCP_table(self): + """ + Test Case 12: ipv4 RFC2698 pre-colored green by DSCP table + """ + self.update_firmware_cli(caseID=12) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.dut.send_expect("start", "testpmd>", 5) + + # test 0: GYR + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 1: GYD + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 2: GDR + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 3: DYR + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + + def test_ipv4_RFC2698_pre_colored_default_by_DSCP_table(self): + """ + Test Case 13: ipv4 RFC2698 pre-colored by default DSCP table + """ + self.update_firmware_cli(caseID=13) + + cbs = 400 + pbs = 500 + protocol = "TCP" + head = 40 + pkt1 = pbs - head + 1 + pkt2 = pbs - head + pkt3 = cbs - head + 1 + pkt4 = cbs - head + + self.start_testpmd(self.new_firmware_cli) + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs) + self.dut.send_expect("start", "testpmd>", 5) + + # test 0: GYR + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 1: GYD + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 2: GDR + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0) + + # test 3: DYR + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0") + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0) + + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0) + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1) + + def tear_down(self): + """ + Run after each test case. + """ + self.dut.kill_all() + time.sleep(2) + + + def tear_down_all(self): + """ + Run after each test suite. + """ + pass + -- 2.17.2