* [dts] [PATCH V1] add tests/metering_and_policing script
@ 2019-01-12 8:31 Wenjie Li
2019-01-14 3:17 ` Zhu, ShuaiX
2019-01-16 8:09 ` Peng, Yuan
0 siblings, 2 replies; 3+ messages in thread
From: Wenjie Li @ 2019-01-12 8:31 UTC (permalink / raw)
To: dts; +Cc: Wenjie Li
Add tests/metering_and_policing script.
The test plan has been submitted.
Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
---
tests/TestSuite_metering_and_policing.py | 993 +++++++++++++++++++++++
1 file changed, 993 insertions(+)
create mode 100644 tests/TestSuite_metering_and_policing.py
diff --git a/tests/TestSuite_metering_and_policing.py b/tests/TestSuite_metering_and_policing.py
new file mode 100644
index 0000000..3ee66c2
--- /dev/null
+++ b/tests/TestSuite_metering_and_policing.py
@@ -0,0 +1,993 @@
+#BSD LICENSE
+#
+# Copyright(c) 2010-2016 Intel Corporation. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in
+# the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Intel Corporation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+
+
+
+"""
+DPDK Test suite.
+Test metering_and_policing.
+"""
+import utils
+import string
+import time
+import re
+from test_case import TestCase
+from plotting import Plotting
+from settings import HEADER_SIZE
+from dut import Dut
+
+
+class TestMeteringAndPolicing(TestCase):
+
+ def copy_config_files_to_dut(self):
+ """
+ Copy firmware.cli, dscp_*.sh from tester to DUT.
+ """
+ file = 'meter_and_policy_config.tar.gz'
+ src_file = r'./conf/%s' % file
+ dst1 = '/tmp'
+ dst2 = '/root/dpdk/drivers/net/softnic'
+ self.dut.session.copy_file_to(src_file, dst1)
+ self.dut.send_expect("tar xf %s/%s -C %s" % (dst1, file, dst2), "#", 30)
+
+ def update_firmware_cli(self, caseID):
+ """
+ Update firmware.cli.
+ """
+ self.ori_firmware_cli = "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware.cli"
+ if len(self.dut_ports) == 4:
+ self.ori_firmware_cli = "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware_4ports.cli"
+ self.new_firmware_cli = "%s-%s" % (self.ori_firmware_cli, caseID)
+ self.dut.send_expect("rm -f %s" % self.new_firmware_cli, "#")
+ self.dut.send_expect("cp %s %s" % (self.ori_firmware_cli, self.new_firmware_cli), "#")
+
+ # link dev
+ self.dut.send_expect("sed -i -e 's/^.*link LINK0 dev.*$/link LINK0 dev %s/g' %s"
+ % (self.dut_p0_pci, self.new_firmware_cli), "#")
+ self.dut.send_expect("sed -i -e 's/^.*link LINK1 dev.*$/link LINK1 dev %s/g' %s"
+ % (self.dut_p1_pci, self.new_firmware_cli), "#")
+ if len(self.dut_ports) == 4:
+ self.dut.send_expect("sed -i -e 's/^.*link LINK2 dev.*$/link LINK2 dev %s/g' %s"
+ % (self.dut_p2_pci, self.new_firmware_cli), "#")
+ self.dut.send_expect("sed -i -e 's/^.*link LINK3 dev.*$/link LINK3 dev %s/g' %s"
+ % (self.dut_p3_pci, self.new_firmware_cli), "#")
+
+ # table action
+ temp = "table action profile AP0"
+ if caseID == 8:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv6 offset 270 fwd meter trtcm tc 1 stats pkts/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ else:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv4 offset 270 fwd meter trtcm tc 1 stats pkts/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+
+ # pipeline RX table
+ temp = "pipeline RX table match"
+ if caseID == 7:
+ target = "hash ext key 16 mask 00FF0000FFFFFFFFFFFFFFFFFFFFFFFF offset 278 buckets 16K size 65K action AP0"
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s %s/g' %s"
+ % (temp, temp, target, self.new_firmware_cli), "#")
+ elif caseID == 8:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv6 offset 270 size 4K action AP0/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ else:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv4 offset 270 size 4K action AP0/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+
+ # use .sh file as RX table
+ temp = "pipeline RX table 0 dscp"
+ if caseID == 10:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_red.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ elif caseID == 11:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_yellow.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ elif caseID == 12:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_green.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ elif caseID == 13:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_default.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+
+
+ def start_testpmd(self, filename):
+ """
+ Start testpmd.
+ """
+ if len(self.dut_ports) == 2:
+ portmask = "0x4"
+ if len(self.dut_ports) == 4:
+ portmask = "0x10"
+ self.path = "./%s/app/testpmd" % self.target
+ cmd = self.path + " -l 3-5 -n %d --vdev 'net_softnic0,firmware=%s,cpu_id=0,conn_port=8086' \
+ -- -i --forward-mode=softnic --rxq=%d --txq=%d --portmask=%s" \
+ % (self.dut.get_memory_channels(), filename, self.port_id, self.port_id, portmask)
+ self.dut.send_expect(cmd, "testpmd>", 60)
+
+ def add_port_meter_profile(self, profile_id, cbs=400, pbs=500):
+ """
+ Add port meter profile (trTCM rfc2968).
+ """
+ cir = 3125000000
+ pir = 3125000000
+ self.dut.send_expect("add port meter profile trtcm_rfc2698 %d %d %d %d %d %d"
+ % (self.port_id, profile_id, cir, pir, cbs, pbs), "testpmd>")
+
+ def create_port_meter(self, mtr_id, profile_id, gyrd_action):
+ """
+ Create new meter object for the ethernet device.
+ """
+ self.dut.send_expect("create port meter %d %d %d yes %s"
+ % (self.port_id, mtr_id, profile_id, gyrd_action), "testpmd>")
+
+ def create_flow_rule(self, ret_id, ip_ver, protocol, spec_id, mtr_id, queue_index_id):
+ """
+ Create flow rule based on port meter.
+ """
+ if ip_ver == "ipv4":
+ src_mask = "255.255.255.255"
+ dst_mask = "255.255.255.255"
+ src_ip = "1.10.11.12"
+ dst_ip = "2.20.21.22"
+ if ip_ver == "ipv6":
+ src_mask = "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"
+ dst_mask = "0:0:0:0:0:0:0:0"
+ src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789"
+ dst_ip = "0:0:0:0:0:0:0:0"
+ protocol = protocol.lower()
+ if protocol == "tcp":
+ proto_id = 6
+ if protocol == "udp":
+ proto_id = 17
+ if protocol == "sctp":
+ proto_id = 132
+
+ out = self.dut.send_expect("flow create %d group 0 ingress pattern eth / %s proto mask 255 src mask %s dst mask"
+ " %s src spec %s dst spec %s proto spec %d / %s src mask 65535 dst mask 65535 src "
+ "spec %d dst spec %d / end actions meter mtr_id %d / queue index %d / end"
+ % (self.port_id, ip_ver, src_mask, dst_mask, src_ip, dst_ip, proto_id, protocol,
+ spec_id, spec_id, mtr_id, queue_index_id), "testpmd>")
+ if ret_id == 1:
+ self.verify("Flow rule #" in out, "flow create fail")
+ else:
+ self.verify("METER: Meter already attached to a flow: Invalid argument" in out,
+ "flow create should fail, but NOT failed")
+
+ def scapy_send_packet(self, ip_ver, protocol, fwd_port, pktsize):
+ """
+ Send a packet to port
+ """
+ source_port = self.tester.get_interface(self.tester.get_local_port(self.dut_ports[0]))
+ protocol = protocol.upper()
+ if ip_ver == "ipv4":
+ src_ip = "1.10.11.12"
+ dst_ip = "2.20.21.22"
+ tag = "IP"
+ if protocol == "TCP":
+ proto_str = "proto=6"
+ if protocol == "UDP":
+ proto_str = "proto=17"
+ if protocol == "SCTP":
+ proto_str = "proto=132"
+
+ if ip_ver == "ipv6":
+ src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789"
+ dst_ip = "2001::1"
+ tag = "IPv6"
+ if protocol == "TCP":
+ proto_str = "nh=6"
+ if protocol == "UDP":
+ proto_str = "nh=17"
+
+ self.tester.scapy_append(
+ 'sendp([Ether(dst="%s")/%s(src="%s",dst="%s",%s)/%s(sport=%d,dport=%d)/Raw(load="P"*%d)], iface="%s")'
+ % (self.dut_p0_mac, tag, src_ip, dst_ip, proto_str, protocol, fwd_port, fwd_port, pktsize, source_port))
+ self.tester.scapy_execute()
+
+ def send_packet_and_check(self, ip_ver, protocol, fwd_port, pktsize, expect_port):
+ """
+ Send packet and check the stats
+ """
+ time.sleep(3)
+ rx_before = []
+ tx_before = []
+ for i in range(0, len(self.dut_ports)):
+ output = self.dut.send_expect("show port stats %d" %(i),"testpmd>")
+ rx_before.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S))
+ tx_before.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S))
+
+ self.scapy_send_packet(ip_ver, protocol, fwd_port, pktsize)
+
+ rx_after = []
+ tx_after = []
+ for i in range(0, len(self.dut_ports)):
+ output = self.dut.send_expect("show port stats %d" %(i),"testpmd>")
+ rx_after.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S))
+ tx_after.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S))
+
+ rx_packets_port = []
+ tx_packets_port = []
+ for i in range(0, len(self.dut_ports)):
+ temp1 = int(rx_after[i][0]) - int(rx_before[i][0])
+ temp2 = int(tx_after[i][0]) - int(tx_before[i][0])
+ rx_packets_port.append(temp1)
+ tx_packets_port.append(temp2)
+ print("-"*80)
+ if expect_port == -1:
+ print("expect: Dropped")
+ else:
+ print("expect: port %d" % expect_port)
+ print rx_packets_port
+ print tx_packets_port
+ print("-"*80)
+
+ if expect_port == i:
+ self.verify(int(rx_packets_port[0]) == int(tx_packets_port[i]) == 1,
+ "Wrong: can't forward package to port %d " % expect_port)
+ if expect_port == -1:
+ for i in range(0, len(self.dut_ports)):
+ self.verify(int(rx_packets_port[0]) == 1 and int(tx_packets_port[i]) == 0,
+ "Wrong: the packet is not dropped")
+
+ def set_up_all(self):
+ """
+ Run at the start of each test suite.
+ """
+ self.dut_ports = self.dut.get_ports()
+ self.port_nums = 2
+ self.verify(len(self.dut_ports) >= self.port_nums,
+ "Insufficient ports for speed testing")
+
+ self.dut_p0_pci = self.dut.get_port_pci(self.dut_ports[0])
+ self.dut_p1_pci = self.dut.get_port_pci(self.dut_ports[1])
+
+ self.dut_p0_mac = self.dut.get_mac_address(self.dut_ports[0])
+ self.dut_p1_mac = self.dut.get_mac_address(self.dut_ports[1])
+
+ self.pf0_interface = self.dut.ports_info[self.dut_ports[0]]['intf']
+ self.pf1_interface = self.dut.ports_info[self.dut_ports[1]]['intf']
+
+ if len(self.dut_ports) == 4:
+ self.dut_p2_pci = self.dut.get_port_pci(self.dut_ports[2])
+ self.dut_p3_pci = self.dut.get_port_pci(self.dut_ports[3])
+
+ self.dut_p2_mac = self.dut.get_mac_address(self.dut_ports[2])
+ self.dut_p3_mac = self.dut.get_mac_address(self.dut_ports[3])
+
+ self.pf2_interface = self.dut.ports_info[self.dut_ports[2]]['intf']
+ self.pf3_interface = self.dut.ports_info[self.dut_ports[3]]['intf']
+
+ self.port_id = len(self.dut_ports)
+ self.copy_config_files_to_dut()
+
+ def set_up(self):
+ """
+ Run before each test case.
+ """
+ pass
+
+ def test_ipv4_ACL_table_RFC2698_GYR(self):
+ """
+ Test Case 1: ipv4 ACL table RFC2698 GYR
+ """
+ self.update_firmware_cli(caseID=1)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_ACL_table_RFC2698_GYD(self):
+ """
+ Test Case 2: ipv4 ACL table RFC2698 GYD
+ """
+ self.update_firmware_cli(caseID=2)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_ACL_table_RFC2698_GDR(self):
+ """
+ Test Case 3: ipv4 ACL table RFC2698 GDR
+ """
+ self.update_firmware_cli(caseID=3)
+
+ cbs = 400
+ pbs = 500
+ protocol = "SCTP"
+ head = 32
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=1)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt4, expect_port=1)
+
+ def test_ipv4_ACL_table_RFC2698_DYR(self):
+ """
+ Test Case 4: ipv4 ACL table RFC2698 DYR
+ """
+ self.update_firmware_cli(caseID=4)
+
+ cbs = 400
+ pbs = 500
+ protocol = "UDP"
+ head = 28
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_ACL_table_RFC2698_DDD(self):
+ """
+ Test Case 5: ipv4 ACL table RFC2698 DDD
+ """
+ self.update_firmware_cli(caseID=5)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_with_same_cbs_and_pbs_GDR(self):
+ """
+ Test Case 6: ipv4 with same cbs and pbs GDR
+ """
+ self.update_firmware_cli(caseID=6)
+
+ cbs = 500
+ pbs = 500
+ protocol = "SCTP"
+ head = 32
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=0)
+
+ def test_ipv4_HASH_table_RFC2698(self):
+ """
+ Test Case 7: ipv4 HASH table RFC2698
+ """
+ self.update_firmware_cli(caseID=7)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # test 1 'g y r 0 0 0'
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 2 'g y d 0 0 0'
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 5 'd d d 0 0 0'
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 3 'g d r 0 0 0'
+ protocol = "SCTP"
+ head = 32
+
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=1)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt4, expect_port=1)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 4 'd y r 0 0 0'
+ protocol = "UDP"
+ head = 28
+
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+ self.dut.send_expect("quit", "#", 30)
+
+ def test_ipv6_ACL_table_RFC2698(self):
+ """
+ Test Case 8: ipv6 ACL table RFC2698
+ """
+ self.update_firmware_cli(caseID=8)
+
+ cbs = 400
+ pbs = 500
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="udp", spec_id=2, mtr_id=1, queue_index_id=1)
+ self.dut.send_expect("start","testpmd>")
+
+ protocol = "TCP"
+ head = 60
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ protocol = "UDP"
+ head = 48
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_multiple_meter_and_profile(self):
+ """
+ Test Case 9: multiple meter and profile
+ """
+ self.update_firmware_cli(caseID=9)
+
+ if len(self.dut_ports) == 4:
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500)
+ self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=128, profile_id=1, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=0, mtr_id=0, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=1, mtr_id=1, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=2)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=3, mtr_id=3, queue_index_id=3)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=4, mtr_id=4, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=5, mtr_id=5, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=6, mtr_id=6, queue_index_id=2)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=7, mtr_id=128, queue_index_id=3)
+ self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp", spec_id=8, mtr_id=128, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+ output = self.dut.send_expect("flow list %d" % (self.port_id), "testpmd>")
+ print(output)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 0
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt4, expect_port=0)
+ # group 1
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt4, expect_port=1)
+ # group 2
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=2)
+ # group 3
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt1, expect_port=3)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt2, expect_port=3)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt3, expect_port=3)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt4, expect_port=-1)
+
+ cbs = 300
+ pbs = 400
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 4
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt4, expect_port=0)
+ # group 5
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt4, expect_port=1)
+ # group 6
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt1, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt2, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt3, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt4, expect_port=-1)
+ # group 7
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt4, expect_port=-1)
+
+ if len(self.dut_ports) == 2:
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500)
+ self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=128, profile_id=1, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=0, mtr_id=0, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=1, mtr_id=1, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=3, mtr_id=3, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=4, mtr_id=4, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=5, mtr_id=5, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=6, mtr_id=6, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=7, mtr_id=128, queue_index_id=1)
+ self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp", spec_id=8, mtr_id=128, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+ output = self.dut.send_expect("flow list %d" % (self.port_id), "testpmd>")
+ print(output)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 0
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt4, expect_port=0)
+ # group 1
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt4, expect_port=1)
+ # group 2
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+ # group 3
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt4, expect_port=-1)
+
+ cbs = 300
+ pbs = 400
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 4
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt4, expect_port=0)
+ # group 5
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt4, expect_port=1)
+ # group 6
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt4, expect_port=-1)
+ # group 7
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_RFC2698_pre_colored_red_by_DSCP_table(self):
+ """
+ Test Case 10: ipv4 RFC2698 pre-colored red by DSCP table
+ """
+ self.update_firmware_cli(caseID=10)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_RFC2698_pre_colored_yellow_by_DSCP_table(self):
+ """
+ Test Case 11: ipv4 RFC2698 pre-colored yellow by DSCP table
+ """
+ self.update_firmware_cli(caseID=11)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_RFC2698_pre_colored_green_by_DSCP_table(self):
+ """
+ Test Case 12: ipv4 RFC2698 pre-colored green by DSCP table
+ """
+ self.update_firmware_cli(caseID=12)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_RFC2698_pre_colored_default_by_DSCP_table(self):
+ """
+ Test Case 13: ipv4 RFC2698 pre-colored by default DSCP table
+ """
+ self.update_firmware_cli(caseID=13)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def tear_down(self):
+ """
+ Run after each test case.
+ """
+ self.dut.kill_all()
+ time.sleep(2)
+
+ def tear_down_all(self):
+ """
+ Run after each test suite.
+ """
+ pass
--
2.17.2
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [dts] [PATCH V1] add tests/metering_and_policing script
2019-01-12 8:31 [dts] [PATCH V1] add tests/metering_and_policing script Wenjie Li
@ 2019-01-14 3:17 ` Zhu, ShuaiX
2019-01-16 8:09 ` Peng, Yuan
1 sibling, 0 replies; 3+ messages in thread
From: Zhu, ShuaiX @ 2019-01-14 3:17 UTC (permalink / raw)
To: Li, WenjieX A, dts; +Cc: Li, WenjieX A, Zhu, ShuaiX
Tested-by: Zhu, ShuaiX <shuaix.zhu@intel.com>
> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li
> Sent: Saturday, January 12, 2019 4:32 PM
> To: dts@dpdk.org
> Cc: Li, WenjieX A <wenjiex.a.li@intel.com>
> Subject: [dts] [PATCH V1] add tests/metering_and_policing script
>
> Add tests/metering_and_policing script.
> The test plan has been submitted.
>
> Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
> ---
> tests/TestSuite_metering_and_policing.py | 993 +++++++++++++++++++++++
> 1 file changed, 993 insertions(+)
> create mode 100644 tests/TestSuite_metering_and_policing.py
>
> diff --git a/tests/TestSuite_metering_and_policing.py
> b/tests/TestSuite_metering_and_policing.py
> new file mode 100644
> index 0000000..3ee66c2
> --- /dev/null
> +++ b/tests/TestSuite_metering_and_policing.py
> @@ -0,0 +1,993 @@
> +#BSD LICENSE
> +#
> +# Copyright(c) 2010-2016 Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without
> +# modification, are permitted provided that the following conditions
> +# are met:
> +#
> +# * Redistributions of source code must retain the above copyright
> +# notice, this list of conditions and the following disclaimer.
> +# * Redistributions in binary form must reproduce the above copyright
> +# notice, this list of conditions and the following disclaimer in
> +# the documentation and/or other materials provided with the
> +# distribution.
> +# * Neither the name of Intel Corporation nor the names of its
> +# contributors may be used to endorse or promote products derived
> +# from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS
> +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
> FITNESS FOR
> +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> COPYRIGHT
> +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> INCIDENTAL,
> +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
> NOT
> +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
> USE,
> +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY
> +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
> TORT
> +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
> THE USE
> +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
> DAMAGE.
> +
> +
> +
> +
> +"""
> +DPDK Test suite.
> +Test metering_and_policing.
> +"""
> +import utils
> +import string
> +import time
> +import re
> +from test_case import TestCase
> +from plotting import Plotting
> +from settings import HEADER_SIZE
> +from dut import Dut
> +
> +
> +class TestMeteringAndPolicing(TestCase):
> +
> + def copy_config_files_to_dut(self):
> + """
> + Copy firmware.cli, dscp_*.sh from tester to DUT.
> + """
> + file = 'meter_and_policy_config.tar.gz'
> + src_file = r'./conf/%s' % file
> + dst1 = '/tmp'
> + dst2 = '/root/dpdk/drivers/net/softnic'
> + self.dut.session.copy_file_to(src_file, dst1)
> + self.dut.send_expect("tar xf %s/%s -C %s" % (dst1, file, dst2), "#",
> 30)
> +
> + def update_firmware_cli(self, caseID):
> + """
> + Update firmware.cli.
> + """
> + self.ori_firmware_cli =
> "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware.cli"
> + if len(self.dut_ports) == 4:
> + self.ori_firmware_cli =
> "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware_4ports.cli"
> + self.new_firmware_cli = "%s-%s" % (self.ori_firmware_cli, caseID)
> + self.dut.send_expect("rm -f %s" % self.new_firmware_cli, "#")
> + self.dut.send_expect("cp %s %s" % (self.ori_firmware_cli,
> self.new_firmware_cli), "#")
> +
> + # link dev
> + self.dut.send_expect("sed -i -e 's/^.*link LINK0 dev.*$/link LINK0
> dev %s/g' %s"
> + % (self.dut_p0_pci,
> self.new_firmware_cli), "#")
> + self.dut.send_expect("sed -i -e 's/^.*link LINK1 dev.*$/link LINK1
> dev %s/g' %s"
> + % (self.dut_p1_pci,
> self.new_firmware_cli), "#")
> + if len(self.dut_ports) == 4:
> + self.dut.send_expect("sed -i -e 's/^.*link LINK2 dev.*$/link
> LINK2 dev %s/g' %s"
> + % (self.dut_p2_pci,
> self.new_firmware_cli), "#")
> + self.dut.send_expect("sed -i -e 's/^.*link LINK3 dev.*$/link
> LINK3 dev %s/g' %s"
> + % (self.dut_p3_pci,
> self.new_firmware_cli), "#")
> +
> + # table action
> + temp = "table action profile AP0"
> + if caseID == 8:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv6 offset 270
> fwd meter trtcm tc 1 stats pkts/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> + else:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv4 offset 270
> fwd meter trtcm tc 1 stats pkts/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> +
> + # pipeline RX table
> + temp = "pipeline RX table match"
> + if caseID == 7:
> + target = "hash ext key 16 mask
> 00FF0000FFFFFFFFFFFFFFFFFFFFFFFF offset 278 buckets 16K size 65K action AP0"
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s %s/g' %s"
> + % (temp, temp, target,
> self.new_firmware_cli), "#")
> + elif caseID == 8:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv6 offset
> 270 size 4K action AP0/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> + else:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv4 offset
> 270 size 4K action AP0/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> +
> + # use .sh file as RX table
> + temp = "pipeline RX table 0 dscp"
> + if caseID == 10:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s
> \/root\/dpdk\/drivers\/net\/softnic\/dscp_red.sh/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> + elif caseID == 11:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s
> \/root\/dpdk\/drivers\/net\/softnic\/dscp_yellow.sh/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> + elif caseID == 12:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s
> \/root\/dpdk\/drivers\/net\/softnic\/dscp_green.sh/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> + elif caseID == 13:
> + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s
> \/root\/dpdk\/drivers\/net\/softnic\/dscp_default.sh/g' %s"
> + % (temp, temp,
> self.new_firmware_cli), "#")
> +
> +
> + def start_testpmd(self, filename):
> + """
> + Start testpmd.
> + """
> + if len(self.dut_ports) == 2:
> + portmask = "0x4"
> + if len(self.dut_ports) == 4:
> + portmask = "0x10"
> + self.path = "./%s/app/testpmd" % self.target
> + cmd = self.path + " -l 3-5 -n %d --vdev
> 'net_softnic0,firmware=%s,cpu_id=0,conn_port=8086' \
> + -- -i --forward-mode=softnic --rxq=%d --txq=%d --portmask=%s" \
> + % (self.dut.get_memory_channels(), filename, self.port_id,
> self.port_id, portmask)
> + self.dut.send_expect(cmd, "testpmd>", 60)
> +
> + def add_port_meter_profile(self, profile_id, cbs=400, pbs=500):
> + """
> + Add port meter profile (trTCM rfc2968).
> + """
> + cir = 3125000000
> + pir = 3125000000
> + self.dut.send_expect("add port meter profile
> trtcm_rfc2698 %d %d %d %d %d %d"
> + % (self.port_id, profile_id, cir, pir, cbs,
> pbs), "testpmd>")
> +
> + def create_port_meter(self, mtr_id, profile_id, gyrd_action):
> + """
> + Create new meter object for the ethernet device.
> + """
> + self.dut.send_expect("create port meter %d %d %d yes %s"
> + % (self.port_id, mtr_id, profile_id,
> gyrd_action), "testpmd>")
> +
> + def create_flow_rule(self, ret_id, ip_ver, protocol, spec_id, mtr_id,
> queue_index_id):
> + """
> + Create flow rule based on port meter.
> + """
> + if ip_ver == "ipv4":
> + src_mask = "255.255.255.255"
> + dst_mask = "255.255.255.255"
> + src_ip = "1.10.11.12"
> + dst_ip = "2.20.21.22"
> + if ip_ver == "ipv6":
> + src_mask = "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"
> + dst_mask = "0:0:0:0:0:0:0:0"
> + src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789"
> + dst_ip = "0:0:0:0:0:0:0:0"
> + protocol = protocol.lower()
> + if protocol == "tcp":
> + proto_id = 6
> + if protocol == "udp":
> + proto_id = 17
> + if protocol == "sctp":
> + proto_id = 132
> +
> + out = self.dut.send_expect("flow create %d group 0 ingress pattern
> eth / %s proto mask 255 src mask %s dst mask"
> + " %s src spec %s dst spec %s proto
> spec %d / %s src mask 65535 dst mask 65535 src "
> + "spec %d dst spec %d / end
> actions meter mtr_id %d / queue index %d / end"
> + % (self.port_id, ip_ver, src_mask,
> dst_mask, src_ip, dst_ip, proto_id, protocol,
> + spec_id, spec_id, mtr_id,
> queue_index_id), "testpmd>")
> + if ret_id == 1:
> + self.verify("Flow rule #" in out, "flow create fail")
> + else:
> + self.verify("METER: Meter already attached to a flow: Invalid
> argument" in out,
> + "flow create should fail, but NOT failed")
> +
> + def scapy_send_packet(self, ip_ver, protocol, fwd_port, pktsize):
> + """
> + Send a packet to port
> + """
> + source_port =
> self.tester.get_interface(self.tester.get_local_port(self.dut_ports[0]))
> + protocol = protocol.upper()
> + if ip_ver == "ipv4":
> + src_ip = "1.10.11.12"
> + dst_ip = "2.20.21.22"
> + tag = "IP"
> + if protocol == "TCP":
> + proto_str = "proto=6"
> + if protocol == "UDP":
> + proto_str = "proto=17"
> + if protocol == "SCTP":
> + proto_str = "proto=132"
> +
> + if ip_ver == "ipv6":
> + src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789"
> + dst_ip = "2001::1"
> + tag = "IPv6"
> + if protocol == "TCP":
> + proto_str = "nh=6"
> + if protocol == "UDP":
> + proto_str = "nh=17"
> +
> + self.tester.scapy_append(
> +
> 'sendp([Ether(dst="%s")/%s(src="%s",dst="%s",%s)/%s(sport=%d,dport=%d)/
> Raw(load="P"*%d)], iface="%s")'
> + % (self.dut_p0_mac, tag, src_ip, dst_ip, proto_str, protocol,
> fwd_port, fwd_port, pktsize, source_port))
> + self.tester.scapy_execute()
> +
> + def send_packet_and_check(self, ip_ver, protocol, fwd_port, pktsize,
> expect_port):
> + """
> + Send packet and check the stats
> + """
> + time.sleep(3)
> + rx_before = []
> + tx_before = []
> + for i in range(0, len(self.dut_ports)):
> + output = self.dut.send_expect("show port
> stats %d" %(i),"testpmd>")
> +
> rx_before.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S))
> +
> tx_before.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S))
> +
> + self.scapy_send_packet(ip_ver, protocol, fwd_port, pktsize)
> +
> + rx_after = []
> + tx_after = []
> + for i in range(0, len(self.dut_ports)):
> + output = self.dut.send_expect("show port
> stats %d" %(i),"testpmd>")
> +
> rx_after.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S))
> +
> tx_after.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S))
> +
> + rx_packets_port = []
> + tx_packets_port = []
> + for i in range(0, len(self.dut_ports)):
> + temp1 = int(rx_after[i][0]) - int(rx_before[i][0])
> + temp2 = int(tx_after[i][0]) - int(tx_before[i][0])
> + rx_packets_port.append(temp1)
> + tx_packets_port.append(temp2)
> + print("-"*80)
> + if expect_port == -1:
> + print("expect: Dropped")
> + else:
> + print("expect: port %d" % expect_port)
> + print rx_packets_port
> + print tx_packets_port
> + print("-"*80)
> +
> + if expect_port == i:
> + self.verify(int(rx_packets_port[0]) == int(tx_packets_port[i]) ==
> 1,
> + "Wrong: can't forward package to port %d " %
> expect_port)
> + if expect_port == -1:
> + for i in range(0, len(self.dut_ports)):
> + self.verify(int(rx_packets_port[0]) == 1 and
> int(tx_packets_port[i]) == 0,
> + "Wrong: the packet is not dropped")
> +
> + def set_up_all(self):
> + """
> + Run at the start of each test suite.
> + """
> + self.dut_ports = self.dut.get_ports()
> + self.port_nums = 2
> + self.verify(len(self.dut_ports) >= self.port_nums,
> + "Insufficient ports for speed testing")
> +
> + self.dut_p0_pci = self.dut.get_port_pci(self.dut_ports[0])
> + self.dut_p1_pci = self.dut.get_port_pci(self.dut_ports[1])
> +
> + self.dut_p0_mac = self.dut.get_mac_address(self.dut_ports[0])
> + self.dut_p1_mac = self.dut.get_mac_address(self.dut_ports[1])
> +
> + self.pf0_interface = self.dut.ports_info[self.dut_ports[0]]['intf']
> + self.pf1_interface = self.dut.ports_info[self.dut_ports[1]]['intf']
> +
> + if len(self.dut_ports) == 4:
> + self.dut_p2_pci = self.dut.get_port_pci(self.dut_ports[2])
> + self.dut_p3_pci = self.dut.get_port_pci(self.dut_ports[3])
> +
> + self.dut_p2_mac =
> self.dut.get_mac_address(self.dut_ports[2])
> + self.dut_p3_mac =
> self.dut.get_mac_address(self.dut_ports[3])
> +
> + self.pf2_interface = self.dut.ports_info[self.dut_ports[2]]['intf']
> + self.pf3_interface = self.dut.ports_info[self.dut_ports[3]]['intf']
> +
> + self.port_id = len(self.dut_ports)
> + self.copy_config_files_to_dut()
> +
> + def set_up(self):
> + """
> + Run before each test case.
> + """
> + pass
> +
> + def test_ipv4_ACL_table_RFC2698_GYR(self):
> + """
> + Test Case 1: ipv4 ACL table RFC2698 GYR
> + """
> + self.update_firmware_cli(caseID=1)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + def test_ipv4_ACL_table_RFC2698_GYD(self):
> + """
> + Test Case 2: ipv4 ACL table RFC2698 GYD
> + """
> + self.update_firmware_cli(caseID=2)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + def test_ipv4_ACL_table_RFC2698_GDR(self):
> + """
> + Test Case 3: ipv4 ACL table RFC2698 GDR
> + """
> + self.update_firmware_cli(caseID=3)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "SCTP"
> + head = 32
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp",
> spec_id=2, mtr_id=0, queue_index_id=1)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt1, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt4, expect_port=1)
> +
> + def test_ipv4_ACL_table_RFC2698_DYR(self):
> + """
> + Test Case 4: ipv4 ACL table RFC2698 DYR
> + """
> + self.update_firmware_cli(caseID=4)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "UDP"
> + head = 28
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + def test_ipv4_ACL_table_RFC2698_DDD(self):
> + """
> + Test Case 5: ipv4 ACL table RFC2698 DDD
> + """
> + self.update_firmware_cli(caseID=5)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + def test_ipv4_with_same_cbs_and_pbs_GDR(self):
> + """
> + Test Case 6: ipv4 with same cbs and pbs GDR
> + """
> + self.update_firmware_cli(caseID=6)
> +
> + cbs = 500
> + pbs = 500
> + protocol = "SCTP"
> + head = 32
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> +
> + def test_ipv4_HASH_table_RFC2698(self):
> + """
> + Test Case 7: ipv4 HASH table RFC2698
> + """
> + self.update_firmware_cli(caseID=7)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + # test 1 'g y r 0 0 0'
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> + self.dut.send_expect("quit", "#", 30)
> +
> + # test 2 'g y d 0 0 0'
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> + self.dut.send_expect("quit", "#", 30)
> +
> + # test 5 'd d d 0 0 0'
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> + self.dut.send_expect("quit", "#", 30)
> +
> + # test 3 'g d r 0 0 0'
> + protocol = "SCTP"
> + head = 32
> +
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp",
> spec_id=2, mtr_id=0, queue_index_id=1)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt1, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="sctp",
> fwd_port=2, pktsize=pkt4, expect_port=1)
> + self.dut.send_expect("quit", "#", 30)
> +
> + # test 4 'd y r 0 0 0'
> + protocol = "UDP"
> + head = 28
> +
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="udp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> + self.dut.send_expect("quit", "#", 30)
> +
> + def test_ipv6_ACL_table_RFC2698(self):
> + """
> + Test Case 8: ipv6 ACL table RFC2698
> + """
> + self.update_firmware_cli(caseID=8)
> +
> + cbs = 400
> + pbs = 500
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="udp",
> spec_id=2, mtr_id=1, queue_index_id=1)
> + self.dut.send_expect("start","testpmd>")
> +
> + protocol = "TCP"
> + head = 60
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv6", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + protocol = "UDP"
> + head = 48
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.send_packet_and_check(ip_ver="ipv6", protocol="udp",
> fwd_port=2, pktsize=pkt1, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv6", protocol="udp",
> fwd_port=2, pktsize=pkt2, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv6", protocol="udp",
> fwd_port=2, pktsize=pkt3, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv6", protocol="udp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + def test_ipv4_multiple_meter_and_profile(self):
> + """
> + Test Case 9: multiple meter and profile
> + """
> + self.update_firmware_cli(caseID=9)
> +
> + if len(self.dut_ports) == 4:
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500)
> + self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g
> y r 0 0 0")
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g
> y d 0 0 0")
> + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g
> d r 0 0 0")
> + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d
> y r 0 0 0")
> + self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g
> y d 0 0 0")
> + self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g
> d r 0 0 0")
> + self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d
> y r 0 0 0")
> + self.create_port_meter(mtr_id=128, profile_id=1,
> gyrd_action="d d d 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=0, mtr_id=0, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=1, mtr_id=1, queue_index_id=1)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=2, queue_index_id=2)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=3, mtr_id=3, queue_index_id=3)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=4, mtr_id=4, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=5, mtr_id=5, queue_index_id=1)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=6, mtr_id=6, queue_index_id=2)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=7, mtr_id=128, queue_index_id=3)
> + self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp",
> spec_id=8, mtr_id=128, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> + output = self.dut.send_expect("flow list %d" % (self.port_id),
> "testpmd>")
> + print(output)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + # group 0
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt4, expect_port=0)
> + # group 1
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt2, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt3, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt4, expect_port=1)
> + # group 2
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=2)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=2)
> + # group 3
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt1, expect_port=3)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt2, expect_port=3)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt3, expect_port=3)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt4, expect_port=-1)
> +
> + cbs = 300
> + pbs = 400
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + # group 4
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt4, expect_port=0)
> + # group 5
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt1, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt4, expect_port=1)
> + # group 6
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt1, expect_port=2)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt2, expect_port=2)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt3, expect_port=2)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt4, expect_port=-1)
> + # group 7
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt4, expect_port=-1)
> +
> + if len(self.dut_ports) == 2:
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500)
> + self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400)
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g
> y r 0 0 0")
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g
> y d 0 0 0")
> + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g
> d r 0 0 0")
> + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d
> y r 0 0 0")
> + self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g
> y d 0 0 0")
> + self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g
> d r 0 0 0")
> + self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d
> y r 0 0 0")
> + self.create_port_meter(mtr_id=128, profile_id=1,
> gyrd_action="d d d 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=0, mtr_id=0, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=1, mtr_id=1, queue_index_id=1)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=2, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=3, mtr_id=3, queue_index_id=1)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=4, mtr_id=4, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=5, mtr_id=5, queue_index_id=1)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=6, mtr_id=6, queue_index_id=0)
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=7, mtr_id=128, queue_index_id=1)
> + self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp",
> spec_id=8, mtr_id=128, queue_index_id=0)
> + self.dut.send_expect("start", "testpmd>")
> + output = self.dut.send_expect("flow list %d" % (self.port_id),
> "testpmd>")
> + print(output)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + # group 0
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=0, pktsize=pkt4, expect_port=0)
> + # group 1
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt2, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt3, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=1, pktsize=pkt4, expect_port=1)
> + # group 2
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> + # group 3
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt1, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt2, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt3, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=3, pktsize=pkt4, expect_port=-1)
> +
> + cbs = 300
> + pbs = 400
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + # group 4
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=4, pktsize=pkt4, expect_port=0)
> + # group 5
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt1, expect_port=1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=5, pktsize=pkt4, expect_port=1)
> + # group 6
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=6, pktsize=pkt4, expect_port=-1)
> + # group 7
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=7, pktsize=pkt4, expect_port=-1)
> +
> + def test_ipv4_RFC2698_pre_colored_red_by_DSCP_table(self):
> + """
> + Test Case 10: ipv4 RFC2698 pre-colored red by DSCP table
> + """
> + self.update_firmware_cli(caseID=10)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.dut.send_expect("start", "testpmd>")
> +
> + # test 0: GYR
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 1: GYD
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=1, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + # test 2: GDR
> + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=2, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 3: DYR
> + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=3, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + def test_ipv4_RFC2698_pre_colored_yellow_by_DSCP_table(self):
> + """
> + Test Case 11: ipv4 RFC2698 pre-colored yellow by DSCP table
> + """
> + self.update_firmware_cli(caseID=11)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.dut.send_expect("start", "testpmd>")
> +
> + # test 0: GYR
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 1: GYD
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=1, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 2: GDR
> + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=2, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + # test 3: DYR
> + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=3, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + def test_ipv4_RFC2698_pre_colored_green_by_DSCP_table(self):
> + """
> + Test Case 12: ipv4 RFC2698 pre-colored green by DSCP table
> + """
> + self.update_firmware_cli(caseID=12)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.dut.send_expect("start", "testpmd>")
> +
> + # test 0: GYR
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 1: GYD
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=1, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 2: GDR
> + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=2, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 3: DYR
> + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=3, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + def test_ipv4_RFC2698_pre_colored_default_by_DSCP_table(self):
> + """
> + Test Case 13: ipv4 RFC2698 pre-colored by default DSCP table
> + """
> + self.update_firmware_cli(caseID=13)
> +
> + cbs = 400
> + pbs = 500
> + protocol = "TCP"
> + head = 40
> + pkt1 = pbs - head + 1
> + pkt2 = pbs - head
> + pkt3 = cbs - head + 1
> + pkt4 = cbs - head
> +
> + self.start_testpmd(self.new_firmware_cli)
> + self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
> + self.dut.send_expect("start", "testpmd>")
> +
> + # test 0: GYR
> + self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=0, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 1: GYD
> + self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d
> 0 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=1, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 2: GDR
> + self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=2, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=-1)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=0)
> +
> + # test 3: DYR
> + self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0
> 0 0")
> + self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp",
> spec_id=2, mtr_id=3, queue_index_id=0)
> +
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt1, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt2, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt3, expect_port=0)
> + self.send_packet_and_check(ip_ver="ipv4", protocol="tcp",
> fwd_port=2, pktsize=pkt4, expect_port=-1)
> +
> + def tear_down(self):
> + """
> + Run after each test case.
> + """
> + self.dut.kill_all()
> + time.sleep(2)
> +
> + def tear_down_all(self):
> + """
> + Run after each test suite.
> + """
> + pass
> --
> 2.17.2
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [dts] [PATCH V1] add tests/metering_and_policing script
2019-01-12 8:31 [dts] [PATCH V1] add tests/metering_and_policing script Wenjie Li
2019-01-14 3:17 ` Zhu, ShuaiX
@ 2019-01-16 8:09 ` Peng, Yuan
1 sibling, 0 replies; 3+ messages in thread
From: Peng, Yuan @ 2019-01-16 8:09 UTC (permalink / raw)
To: Li, WenjieX A, dts; +Cc: Li, WenjieX A
Comments inline.
Thanks.
Yuan.
-----Original Message-----
From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li
Sent: Saturday, January 12, 2019 4:32 PM
To: dts@dpdk.org
Cc: Li, WenjieX A <wenjiex.a.li@intel.com>
Subject: [dts] [PATCH V1] add tests/metering_and_policing script
Add tests/metering_and_policing script.
The test plan has been submitted.
Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
---
tests/TestSuite_metering_and_policing.py | 993 +++++++++++++++++++++++
1 file changed, 993 insertions(+)
create mode 100644 tests/TestSuite_metering_and_policing.py
diff --git a/tests/TestSuite_metering_and_policing.py b/tests/TestSuite_metering_and_policing.py
new file mode 100644
index 0000000..3ee66c2
--- /dev/null
+++ b/tests/TestSuite_metering_and_policing.py
@@ -0,0 +1,993 @@
+#BSD LICENSE
+#
+# Copyright(c) 2010-2016 Intel Corporation. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in
+# the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Intel Corporation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+
+
+
+"""
+DPDK Test suite.
+Test metering_and_policing.
+"""
+import utils
+import string
+import time
+import re
+from test_case import TestCase
+from plotting import Plotting
+from settings import HEADER_SIZE
+from dut import Dut
+
+
+class TestMeteringAndPolicing(TestCase):
+
+ def copy_config_files_to_dut(self):
+ """
+ Copy firmware.cli, dscp_*.sh from tester to DUT.
+ """
+ file = 'meter_and_policy_config.tar.gz'
+ src_file = r'./conf/%s' % file
+ dst1 = '/tmp'
+ dst2 = '/root/dpdk/drivers/net/softnic'
+ self.dut.session.copy_file_to(src_file, dst1)
+ self.dut.send_expect("tar xf %s/%s -C %s" % (dst1, file, dst2), "#", 30)
+
+ def update_firmware_cli(self, caseID):
+ """
+ Update firmware.cli.
+ """
+ self.ori_firmware_cli = "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware.cli"
+ if len(self.dut_ports) == 4:
+ self.ori_firmware_cli = "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware_4ports.cli"
+ self.new_firmware_cli = "%s-%s" % (self.ori_firmware_cli, caseID)
+ self.dut.send_expect("rm -f %s" % self.new_firmware_cli, "#")
+ self.dut.send_expect("cp %s %s" % (self.ori_firmware_cli, self.new_firmware_cli), "#")
+
+ # link dev
+ self.dut.send_expect("sed -i -e 's/^.*link LINK0 dev.*$/link LINK0 dev %s/g' %s"
+ % (self.dut_p0_pci, self.new_firmware_cli), "#")
+ self.dut.send_expect("sed -i -e 's/^.*link LINK1 dev.*$/link LINK1 dev %s/g' %s"
+ % (self.dut_p1_pci, self.new_firmware_cli), "#")
+ if len(self.dut_ports) == 4:
+ self.dut.send_expect("sed -i -e 's/^.*link LINK2 dev.*$/link LINK2 dev %s/g' %s"
+ % (self.dut_p2_pci, self.new_firmware_cli), "#")
+ self.dut.send_expect("sed -i -e 's/^.*link LINK3 dev.*$/link LINK3 dev %s/g' %s"
+ % (self.dut_p3_pci, self.new_firmware_cli), "#")
+
+ # table action
+ temp = "table action profile AP0"
+ if caseID == 8:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv6 offset 270 fwd meter trtcm tc 1 stats pkts/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ else:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv4 offset 270 fwd meter trtcm tc 1 stats pkts/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+
+ # pipeline RX table
+ temp = "pipeline RX table match"
+ if caseID == 7:
+ target = "hash ext key 16 mask 00FF0000FFFFFFFFFFFFFFFFFFFFFFFF offset 278 buckets 16K size 65K action AP0"
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s %s/g' %s"
+ % (temp, temp, target, self.new_firmware_cli), "#")
+ elif caseID == 8:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv6 offset 270 size 4K action AP0/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ else:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv4 offset 270 size 4K action AP0/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+
+ # use .sh file as RX table
+ temp = "pipeline RX table 0 dscp"
+ if caseID == 10:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_red.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ elif caseID == 11:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_yellow.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ elif caseID == 12:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_green.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+ elif caseID == 13:
+ self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s \/root\/dpdk\/drivers\/net\/softnic\/dscp_default.sh/g' %s"
+ % (temp, temp, self.new_firmware_cli), "#")
+
+
+ def start_testpmd(self, filename):
+ """
+ Start testpmd.
+ """
+ if len(self.dut_ports) == 2:
+ portmask = "0x4"
+ if len(self.dut_ports) == 4:
+ portmask = "0x10"
+ self.path = "./%s/app/testpmd" % self.target
+ cmd = self.path + " -l 3-5 -n %d --vdev 'net_softnic0,firmware=%s,cpu_id=0,conn_port=8086' \
+ -- -i --forward-mode=softnic --rxq=%d --txq=%d --portmask=%s" \
+ % (self.dut.get_memory_channels(), filename, self.port_id, self.port_id, portmask)
######################
different port number need different core number
And there is some changes in dpdk-19.02
1/ Add service core "-s" in testpmd cmdline to run the softnic.
2/ discard the param: "--forward-mode=softnic"
The the cmd should be:
if len(self.dut_ports) == 2:
portmask = "0x4"
Corelist = "0x7"
Servicecorelist = "0x4"
elif len(self.dut_ports) == 4:
portmask = "0x10"
Corelist = "0x1f"
Servicecorelist = "0x10"
cmd = self.path + " -c %s -s %s -n %d --vdev 'net_softnic0,firmware=%s,cpu_id=0,conn_port=8086' \
-- -i --rxq=%d --txq=%d --portmask=%s" \
% (Corelist, Servicecorelist, self.dut.get_memory_channels(), filename, self.port_id, self.port_id, portmask)
######################
And you need also modify the firmware.cli:
thread 25 pipeline RX enable
thread 25 pipeline TX enable
to:
thread 2 pipeline RX enable
thread 2 pipeline TX enable
or:
thread 4 pipeline RX enable
thread 4 pipeline TX enable
due to different port number.
############################
+ self.dut.send_expect(cmd, "testpmd>", 60)
+
+ def add_port_meter_profile(self, profile_id, cbs=400, pbs=500):
+ """
+ Add port meter profile (trTCM rfc2968).
+ """
+ cir = 3125000000
+ pir = 3125000000
+ self.dut.send_expect("add port meter profile trtcm_rfc2698 %d %d %d %d %d %d"
+ % (self.port_id, profile_id, cir, pir, cbs, pbs), "testpmd>")
+
+ def create_port_meter(self, mtr_id, profile_id, gyrd_action):
+ """
+ Create new meter object for the ethernet device.
+ """
+ self.dut.send_expect("create port meter %d %d %d yes %s"
+ % (self.port_id, mtr_id, profile_id, gyrd_action), "testpmd>")
+
+ def create_flow_rule(self, ret_id, ip_ver, protocol, spec_id, mtr_id, queue_index_id):
+ """
+ Create flow rule based on port meter.
+ """
+ if ip_ver == "ipv4":
+ src_mask = "255.255.255.255"
+ dst_mask = "255.255.255.255"
+ src_ip = "1.10.11.12"
+ dst_ip = "2.20.21.22"
+ if ip_ver == "ipv6":
+ src_mask = "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"
+ dst_mask = "0:0:0:0:0:0:0:0"
+ src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789"
+ dst_ip = "0:0:0:0:0:0:0:0"
+ protocol = protocol.lower()
+ if protocol == "tcp":
+ proto_id = 6
+ if protocol == "udp":
+ proto_id = 17
+ if protocol == "sctp":
+ proto_id = 132
+
+ out = self.dut.send_expect("flow create %d group 0 ingress pattern eth / %s proto mask 255 src mask %s dst mask"
+ " %s src spec %s dst spec %s proto spec %d / %s src mask 65535 dst mask 65535 src "
+ "spec %d dst spec %d / end actions meter mtr_id %d / queue index %d / end"
+ % (self.port_id, ip_ver, src_mask, dst_mask, src_ip, dst_ip, proto_id, protocol,
+ spec_id, spec_id, mtr_id, queue_index_id), "testpmd>")
+ if ret_id == 1:
+ self.verify("Flow rule #" in out, "flow create fail")
+ else:
+ self.verify("METER: Meter already attached to a flow: Invalid argument" in out,
+ "flow create should fail, but NOT failed")
+
+ def scapy_send_packet(self, ip_ver, protocol, fwd_port, pktsize):
+ """
+ Send a packet to port
+ """
+ source_port = self.tester.get_interface(self.tester.get_local_port(self.dut_ports[0]))
+ protocol = protocol.upper()
+ if ip_ver == "ipv4":
+ src_ip = "1.10.11.12"
+ dst_ip = "2.20.21.22"
+ tag = "IP"
+ if protocol == "TCP":
+ proto_str = "proto=6"
+ if protocol == "UDP":
+ proto_str = "proto=17"
+ if protocol == "SCTP":
+ proto_str = "proto=132"
+
+ if ip_ver == "ipv6":
+ src_ip = "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789"
+ dst_ip = "2001::1"
+ tag = "IPv6"
+ if protocol == "TCP":
+ proto_str = "nh=6"
+ if protocol == "UDP":
+ proto_str = "nh=17"
+
+ self.tester.scapy_append(
+ 'sendp([Ether(dst="%s")/%s(src="%s",dst="%s",%s)/%s(sport=%d,dport=%d)/Raw(load="P"*%d)], iface="%s")'
+ % (self.dut_p0_mac, tag, src_ip, dst_ip, proto_str, protocol, fwd_port, fwd_port, pktsize, source_port))
+ self.tester.scapy_execute()
+
+ def send_packet_and_check(self, ip_ver, protocol, fwd_port, pktsize, expect_port):
+ """
+ Send packet and check the stats
+ """
+ time.sleep(3)
+ rx_before = []
+ tx_before = []
+ for i in range(0, len(self.dut_ports)):
+ output = self.dut.send_expect("show port stats %d" %(i),"testpmd>")
+ rx_before.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S))
+ tx_before.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S))
+
+ self.scapy_send_packet(ip_ver, protocol, fwd_port, pktsize)
+
+ rx_after = []
+ tx_after = []
+ for i in range(0, len(self.dut_ports)):
+ output = self.dut.send_expect("show port stats %d" %(i),"testpmd>")
+ rx_after.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.S))
+ tx_after.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.S))
+
+ rx_packets_port = []
+ tx_packets_port = []
+ for i in range(0, len(self.dut_ports)):
+ temp1 = int(rx_after[i][0]) - int(rx_before[i][0])
+ temp2 = int(tx_after[i][0]) - int(tx_before[i][0])
+ rx_packets_port.append(temp1)
+ tx_packets_port.append(temp2)
+ print("-"*80)
+ if expect_port == -1:
+ print("expect: Dropped")
+ else:
+ print("expect: port %d" % expect_port)
+ print rx_packets_port
+ print tx_packets_port
+ print("-"*80)
+
+ if expect_port == i:
+ self.verify(int(rx_packets_port[0]) == int(tx_packets_port[i]) == 1,
+ "Wrong: can't forward package to port %d " % expect_port)
+ if expect_port == -1:
+ for i in range(0, len(self.dut_ports)):
+ self.verify(int(rx_packets_port[0]) == 1 and int(tx_packets_port[i]) == 0,
+ "Wrong: the packet is not dropped")
########################
I don't understand your check method
if expect_port == i: ??
#########################
+
+ def set_up_all(self):
+ """
+ Run at the start of each test suite.
+ """
+ self.dut_ports = self.dut.get_ports()
+ self.port_nums = 2
+ self.verify(len(self.dut_ports) >= self.port_nums,
+ "Insufficient ports for speed testing")
+
+ self.dut_p0_pci = self.dut.get_port_pci(self.dut_ports[0])
+ self.dut_p1_pci = self.dut.get_port_pci(self.dut_ports[1])
+
+ self.dut_p0_mac = self.dut.get_mac_address(self.dut_ports[0])
+ self.dut_p1_mac = self.dut.get_mac_address(self.dut_ports[1])
+
+ self.pf0_interface = self.dut.ports_info[self.dut_ports[0]]['intf']
+ self.pf1_interface = self.dut.ports_info[self.dut_ports[1]]['intf']
+
+ if len(self.dut_ports) == 4:
+ self.dut_p2_pci = self.dut.get_port_pci(self.dut_ports[2])
+ self.dut_p3_pci = self.dut.get_port_pci(self.dut_ports[3])
+
+ self.dut_p2_mac = self.dut.get_mac_address(self.dut_ports[2])
+ self.dut_p3_mac = self.dut.get_mac_address(self.dut_ports[3])
+
+ self.pf2_interface = self.dut.ports_info[self.dut_ports[2]]['intf']
+ self.pf3_interface = self.dut.ports_info[self.dut_ports[3]]['intf']
+
+ self.port_id = len(self.dut_ports)
+ self.copy_config_files_to_dut()
+
+ def set_up(self):
+ """
+ Run before each test case.
+ """
+ pass
+
+ def test_ipv4_ACL_table_RFC2698_GYR(self):
+ """
+ Test Case 1: ipv4 ACL table RFC2698 GYR
+ """
+ self.update_firmware_cli(caseID=1)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_ACL_table_RFC2698_GYD(self):
+ """
+ Test Case 2: ipv4 ACL table RFC2698 GYD
+ """
+ self.update_firmware_cli(caseID=2)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_ACL_table_RFC2698_GDR(self):
+ """
+ Test Case 3: ipv4 ACL table RFC2698 GDR
+ """
+ self.update_firmware_cli(caseID=3)
+
+ cbs = 400
+ pbs = 500
+ protocol = "SCTP"
+ head = 32
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=1)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt4, expect_port=1)
+
+ def test_ipv4_ACL_table_RFC2698_DYR(self):
+ """
+ Test Case 4: ipv4 ACL table RFC2698 DYR
+ """
+ self.update_firmware_cli(caseID=4)
+
+ cbs = 400
+ pbs = 500
+ protocol = "UDP"
+ head = 28
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_ACL_table_RFC2698_DDD(self):
+ """
+ Test Case 5: ipv4 ACL table RFC2698 DDD
+ """
+ self.update_firmware_cli(caseID=5)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_with_same_cbs_and_pbs_GDR(self):
+ """
+ Test Case 6: ipv4 with same cbs and pbs GDR
+ """
+ self.update_firmware_cli(caseID=6)
+
+ cbs = 500
+ pbs = 500
+ protocol = "SCTP"
+ head = 32
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=0)
+
+ def test_ipv4_HASH_table_RFC2698(self):
+ """
+ Test Case 7: ipv4 HASH table RFC2698
+ """
+ self.update_firmware_cli(caseID=7)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # test 1 'g y r 0 0 0'
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 2 'g y d 0 0 0'
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 5 'd d d 0 0 0'
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 3 'g d r 0 0 0'
+ protocol = "SCTP"
+ head = 32
+
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="sctp", spec_id=2, mtr_id=0, queue_index_id=1)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="sctp", fwd_port=2, pktsize=pkt4, expect_port=1)
+ self.dut.send_expect("quit", "#", 30)
+
+ # test 4 'd y r 0 0 0'
+ protocol = "UDP"
+ head = 28
+
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="udp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+ self.dut.send_expect("quit", "#", 30)
+
+ def test_ipv6_ACL_table_RFC2698(self):
+ """
+ Test Case 8: ipv6 ACL table RFC2698
+ """
+ self.update_firmware_cli(caseID=8)
+
+ cbs = 400
+ pbs = 500
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv6", protocol="udp", spec_id=2, mtr_id=1, queue_index_id=1)
+ self.dut.send_expect("start","testpmd>")
+
+ protocol = "TCP"
+ head = 60
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ protocol = "UDP"
+ head = 48
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv6", protocol="udp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_multiple_meter_and_profile(self):
+ """
+ Test Case 9: multiple meter and profile
+ """
###############################
The only difference between two switches is the "queue_index_id" and "expect_port".
I think you can use the mode value of port num to set them.
###################################
+ self.update_firmware_cli(caseID=9)
+
+ if len(self.dut_ports) == 4:
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500)
+ self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=128, profile_id=1, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=0, mtr_id=0, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=1, mtr_id=1, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=2)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=3, mtr_id=3, queue_index_id=3)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=4, mtr_id=4, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=5, mtr_id=5, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=6, mtr_id=6, queue_index_id=2)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=7, mtr_id=128, queue_index_id=3)
+ self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp", spec_id=8, mtr_id=128, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+ output = self.dut.send_expect("flow list %d" % (self.port_id), "testpmd>")
+ print(output)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 0
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt4, expect_port=0)
+ # group 1
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt4, expect_port=1)
+ # group 2
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=2)
+ # group 3
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt1, expect_port=3)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt2, expect_port=3)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt3, expect_port=3)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt4, expect_port=-1)
+
+ cbs = 300
+ pbs = 400
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 4
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt4, expect_port=0)
+ # group 5
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt4, expect_port=1)
+ # group 6
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt1, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt2, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt3, expect_port=2)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt4, expect_port=-1)
+ # group 7
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt4, expect_port=-1)
+
+ if len(self.dut_ports) == 2:
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=400, pbs=500)
+ self.add_port_meter_profile(profile_id=1, cbs=300, pbs=400)
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=4, profile_id=1, gyrd_action="g y d 0 0 0")
+ self.create_port_meter(mtr_id=5, profile_id=1, gyrd_action="g d r 0 0 0")
+ self.create_port_meter(mtr_id=6, profile_id=1, gyrd_action="d y r 0 0 0")
+ self.create_port_meter(mtr_id=128, profile_id=1, gyrd_action="d d d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=0, mtr_id=0, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=1, mtr_id=1, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=3, mtr_id=3, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=4, mtr_id=4, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=5, mtr_id=5, queue_index_id=1)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=6, mtr_id=6, queue_index_id=0)
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=7, mtr_id=128, queue_index_id=1)
+ self.create_flow_rule(ret_id=0, ip_ver="ipv4", protocol="tcp", spec_id=8, mtr_id=128, queue_index_id=0)
+ self.dut.send_expect("start", "testpmd>")
+ output = self.dut.send_expect("flow list %d" % (self.port_id), "testpmd>")
+ print(output)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 0
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=0, pktsize=pkt4, expect_port=0)
+ # group 1
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=1, pktsize=pkt4, expect_port=1)
+ # group 2
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+ # group 3
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt2, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt3, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=3, pktsize=pkt4, expect_port=-1)
+
+ cbs = 300
+ pbs = 400
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ # group 4
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=4, pktsize=pkt4, expect_port=0)
+ # group 5
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt1, expect_port=1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=5, pktsize=pkt4, expect_port=1)
+ # group 6
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=6, pktsize=pkt4, expect_port=-1)
+ # group 7
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=7, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_RFC2698_pre_colored_red_by_DSCP_table(self):
+ """
+ Test Case 10: ipv4 RFC2698 pre-colored red by DSCP table
+ """
+ self.update_firmware_cli(caseID=10)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_RFC2698_pre_colored_yellow_by_DSCP_table(self):
+ """
+ Test Case 11: ipv4 RFC2698 pre-colored yellow by DSCP table
+ """
+ self.update_firmware_cli(caseID=11)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ def test_ipv4_RFC2698_pre_colored_green_by_DSCP_table(self):
+ """
+ Test Case 12: ipv4 RFC2698 pre-colored green by DSCP table
+ """
+ self.update_firmware_cli(caseID=12)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def test_ipv4_RFC2698_pre_colored_default_by_DSCP_table(self):
+ """
+ Test Case 13: ipv4 RFC2698 pre-colored by default DSCP table
+ """
+ self.update_firmware_cli(caseID=13)
+
+ cbs = 400
+ pbs = 500
+ protocol = "TCP"
+ head = 40
+ pkt1 = pbs - head + 1
+ pkt2 = pbs - head
+ pkt3 = cbs - head + 1
+ pkt4 = cbs - head
+
+ self.start_testpmd(self.new_firmware_cli)
+ self.add_port_meter_profile(profile_id=0, cbs=cbs, pbs=pbs)
+ self.dut.send_expect("start", "testpmd>")
+
+ # test 0: GYR
+ self.create_port_meter(mtr_id=0, profile_id=0, gyrd_action="g y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=0, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 1: GYD
+ self.create_port_meter(mtr_id=1, profile_id=0, gyrd_action="g y d 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=1, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 2: GDR
+ self.create_port_meter(mtr_id=2, profile_id=0, gyrd_action="g d r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=2, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=-1)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=0)
+
+ # test 3: DYR
+ self.create_port_meter(mtr_id=3, profile_id=0, gyrd_action="d y r 0 0 0")
+ self.create_flow_rule(ret_id=1, ip_ver="ipv4", protocol="tcp", spec_id=2, mtr_id=3, queue_index_id=0)
+
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt1, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt2, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt3, expect_port=0)
+ self.send_packet_and_check(ip_ver="ipv4", protocol="tcp", fwd_port=2, pktsize=pkt4, expect_port=-1)
+
+ def tear_down(self):
+ """
+ Run after each test case.
+ """
+ self.dut.kill_all()
+ time.sleep(2)
+
+ def tear_down_all(self):
+ """
+ Run after each test suite.
+ """
+ pass
--
2.17.2
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2019-01-16 8:09 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-01-12 8:31 [dts] [PATCH V1] add tests/metering_and_policing script Wenjie Li
2019-01-14 3:17 ` Zhu, ShuaiX
2019-01-16 8:09 ` Peng, Yuan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).