From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by dpdk.org (Postfix) with ESMTP id 2F3C21B3B9 for ; Mon, 14 Jan 2019 04:17:07 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Jan 2019 19:17:06 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,476,1539673200"; d="scan'208";a="311544719" Received: from fmsmsx108.amr.corp.intel.com ([10.18.124.206]) by fmsmga005.fm.intel.com with ESMTP; 13 Jan 2019 19:17:05 -0800 Received: from fmsmsx112.amr.corp.intel.com (10.18.116.6) by FMSMSX108.amr.corp.intel.com (10.18.124.206) with Microsoft SMTP Server (TLS) id 14.3.408.0; Sun, 13 Jan 2019 19:17:05 -0800 Received: from shsmsx103.ccr.corp.intel.com (10.239.4.69) by FMSMSX112.amr.corp.intel.com (10.18.116.6) with Microsoft SMTP Server (TLS) id 14.3.408.0; Sun, 13 Jan 2019 19:17:04 -0800 Received: from shsmsx101.ccr.corp.intel.com ([169.254.1.196]) by SHSMSX103.ccr.corp.intel.com ([169.254.4.150]) with mapi id 14.03.0415.000; Mon, 14 Jan 2019 11:17:03 +0800 From: "Zhu, ShuaiX" To: "Li, WenjieX A" , "dts@dpdk.org" CC: "Li, WenjieX A" , "Zhu, ShuaiX" Thread-Topic: [dts] [PATCH V1] add tests/metering_and_policing script Thread-Index: AQHUqlDLg61oAiSkeUGjb0Walf1O8aWuGoXQ Date: Mon, 14 Jan 2019 03:17:02 +0000 Message-ID: <4DC48DF9BDA3E54A836D2D3C057DEC6F0B128FA8@SHSMSX101.ccr.corp.intel.com> References: <1547281899-29836-1-git-send-email-wenjiex.a.li@intel.com> In-Reply-To: <1547281899-29836-1-git-send-email-wenjiex.a.li@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.0.400.15 dlp-reaction: no-action x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH V1] add tests/metering_and_policing script X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Jan 2019 03:17:08 -0000 Tested-by: Zhu, ShuaiX > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li > Sent: Saturday, January 12, 2019 4:32 PM > To: dts@dpdk.org > Cc: Li, WenjieX A > Subject: [dts] [PATCH V1] add tests/metering_and_policing script >=20 > Add tests/metering_and_policing script. > The test plan has been submitted. >=20 > Signed-off-by: Wenjie Li > --- > tests/TestSuite_metering_and_policing.py | 993 +++++++++++++++++++++++ > 1 file changed, 993 insertions(+) > create mode 100644 tests/TestSuite_metering_and_policing.py >=20 > diff --git a/tests/TestSuite_metering_and_policing.py > b/tests/TestSuite_metering_and_policing.py > new file mode 100644 > index 0000000..3ee66c2 > --- /dev/null > +++ b/tests/TestSuite_metering_and_policing.py > @@ -0,0 +1,993 @@ > +#BSD LICENSE > +# > +# Copyright(c) 2010-2016 Intel Corporation. All rights reserved. > +# All rights reserved. > +# > +# Redistribution and use in source and binary forms, with or without > +# modification, are permitted provided that the following conditions > +# are met: > +# > +# * Redistributions of source code must retain the above copyright > +# notice, this list of conditions and the following disclaimer. > +# * Redistributions in binary form must reproduce the above copyright > +# notice, this list of conditions and the following disclaimer in > +# the documentation and/or other materials provided with the > +# distribution. > +# * Neither the name of Intel Corporation nor the names of its > +# contributors may be used to endorse or promote products derived > +# from this software without specific prior written permission. > +# > +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS > +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND > FITNESS FOR > +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > COPYRIGHT > +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, > INCIDENTAL, > +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > NOT > +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF > USE, > +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND > ON ANY > +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR > TORT > +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF > THE USE > +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH > DAMAGE. > + > + > + > + > +""" > +DPDK Test suite. > +Test metering_and_policing. > +""" > +import utils > +import string > +import time > +import re > +from test_case import TestCase > +from plotting import Plotting > +from settings import HEADER_SIZE > +from dut import Dut > + > + > +class TestMeteringAndPolicing(TestCase): > + > + def copy_config_files_to_dut(self): > + """ > + Copy firmware.cli, dscp_*.sh from tester to DUT. > + """ > + file =3D 'meter_and_policy_config.tar.gz' > + src_file =3D r'./conf/%s' % file > + dst1 =3D '/tmp' > + dst2 =3D '/root/dpdk/drivers/net/softnic' > + self.dut.session.copy_file_to(src_file, dst1) > + self.dut.send_expect("tar xf %s/%s -C %s" % (dst1, file, dst2), = "#", > 30) > + > + def update_firmware_cli(self, caseID): > + """ > + Update firmware.cli. > + """ > + self.ori_firmware_cli =3D > "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware.cli" > + if len(self.dut_ports) =3D=3D 4: > + self.ori_firmware_cli =3D > "/root/dpdk/drivers/net/softnic/meter_and_policing_firmware_4ports.cli" > + self.new_firmware_cli =3D "%s-%s" % (self.ori_firmware_cli, case= ID) > + self.dut.send_expect("rm -f %s" % self.new_firmware_cli, "#") > + self.dut.send_expect("cp %s %s" % (self.ori_firmware_cli, > self.new_firmware_cli), "#") > + > + # link dev > + self.dut.send_expect("sed -i -e 's/^.*link LINK0 dev.*$/link LIN= K0 > dev %s/g' %s" > + % (self.dut_p0_pci, > self.new_firmware_cli), "#") > + self.dut.send_expect("sed -i -e 's/^.*link LINK1 dev.*$/link LIN= K1 > dev %s/g' %s" > + % (self.dut_p1_pci, > self.new_firmware_cli), "#") > + if len(self.dut_ports) =3D=3D 4: > + self.dut.send_expect("sed -i -e 's/^.*link LINK2 dev.*$/link > LINK2 dev %s/g' %s" > + % (self.dut_p2_pci, > self.new_firmware_cli), "#") > + self.dut.send_expect("sed -i -e 's/^.*link LINK3 dev.*$/link > LINK3 dev %s/g' %s" > + % (self.dut_p3_pci, > self.new_firmware_cli), "#") > + > + # table action > + temp =3D "table action profile AP0" > + if caseID =3D=3D 8: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv6 offset 2= 70 > fwd meter trtcm tc 1 stats pkts/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + else: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s ipv4 offset 2= 70 > fwd meter trtcm tc 1 stats pkts/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + > + # pipeline RX table > + temp =3D "pipeline RX table match" > + if caseID =3D=3D 7: > + target =3D "hash ext key 16 mask > 00FF0000FFFFFFFFFFFFFFFFFFFFFFFF offset 278 buckets 16K size 65K action A= P0" > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s %s/g' %s" > + % (temp, temp, target, > self.new_firmware_cli), "#") > + elif caseID =3D=3D 8: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv6 offs= et > 270 size 4K action AP0/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + else: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s acl ipv4 offs= et > 270 size 4K action AP0/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + > + # use .sh file as RX table > + temp =3D "pipeline RX table 0 dscp" > + if caseID =3D=3D 10: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s > \/root\/dpdk\/drivers\/net\/softnic\/dscp_red.sh/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + elif caseID =3D=3D 11: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s > \/root\/dpdk\/drivers\/net\/softnic\/dscp_yellow.sh/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + elif caseID =3D=3D 12: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s > \/root\/dpdk\/drivers\/net\/softnic\/dscp_green.sh/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + elif caseID =3D=3D 13: > + self.dut.send_expect("sed -i -e 's/^.*%s.*$/%s > \/root\/dpdk\/drivers\/net\/softnic\/dscp_default.sh/g' %s" > + % (temp, temp, > self.new_firmware_cli), "#") > + > + > + def start_testpmd(self, filename): > + """ > + Start testpmd. > + """ > + if len(self.dut_ports) =3D=3D 2: > + portmask =3D "0x4" > + if len(self.dut_ports) =3D=3D 4: > + portmask =3D "0x10" > + self.path =3D "./%s/app/testpmd" % self.target > + cmd =3D self.path + " -l 3-5 -n %d --vdev > 'net_softnic0,firmware=3D%s,cpu_id=3D0,conn_port=3D8086' \ > + -- -i --forward-mode=3Dsoftnic --rxq=3D%d --txq=3D%d --portmask= =3D%s" \ > + % (self.dut.get_memory_channels(), filename, self.port_id, > self.port_id, portmask) > + self.dut.send_expect(cmd, "testpmd>", 60) > + > + def add_port_meter_profile(self, profile_id, cbs=3D400, pbs=3D500): > + """ > + Add port meter profile (trTCM rfc2968). > + """ > + cir =3D 3125000000 > + pir =3D 3125000000 > + self.dut.send_expect("add port meter profile > trtcm_rfc2698 %d %d %d %d %d %d" > + % (self.port_id, profile_id, cir, pir, cbs, > pbs), "testpmd>") > + > + def create_port_meter(self, mtr_id, profile_id, gyrd_action): > + """ > + Create new meter object for the ethernet device. > + """ > + self.dut.send_expect("create port meter %d %d %d yes %s" > + % (self.port_id, mtr_id, profile_id, > gyrd_action), "testpmd>") > + > + def create_flow_rule(self, ret_id, ip_ver, protocol, spec_id, mtr_i= d, > queue_index_id): > + """ > + Create flow rule based on port meter. > + """ > + if ip_ver =3D=3D "ipv4": > + src_mask =3D "255.255.255.255" > + dst_mask =3D "255.255.255.255" > + src_ip =3D "1.10.11.12" > + dst_ip =3D "2.20.21.22" > + if ip_ver =3D=3D "ipv6": > + src_mask =3D "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff" > + dst_mask =3D "0:0:0:0:0:0:0:0" > + src_ip =3D "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789" > + dst_ip =3D "0:0:0:0:0:0:0:0" > + protocol =3D protocol.lower() > + if protocol =3D=3D "tcp": > + proto_id =3D 6 > + if protocol =3D=3D "udp": > + proto_id =3D 17 > + if protocol =3D=3D "sctp": > + proto_id =3D 132 > + > + out =3D self.dut.send_expect("flow create %d group 0 ingress pat= tern > eth / %s proto mask 255 src mask %s dst mask" > + " %s src spec %s dst spec %s proto > spec %d / %s src mask 65535 dst mask 65535 src " > + "spec %d dst spec %d / end > actions meter mtr_id %d / queue index %d / end" > + % (self.port_id, ip_ver, src_mask, > dst_mask, src_ip, dst_ip, proto_id, protocol, > + spec_id, spec_id, mtr_id, > queue_index_id), "testpmd>") > + if ret_id =3D=3D 1: > + self.verify("Flow rule #" in out, "flow create fail") > + else: > + self.verify("METER: Meter already attached to a flow: Invali= d > argument" in out, > + "flow create should fail, but NOT failed") > + > + def scapy_send_packet(self, ip_ver, protocol, fwd_port, pktsize): > + """ > + Send a packet to port > + """ > + source_port =3D > self.tester.get_interface(self.tester.get_local_port(self.dut_ports[0])) > + protocol =3D protocol.upper() > + if ip_ver =3D=3D "ipv4": > + src_ip =3D "1.10.11.12" > + dst_ip =3D "2.20.21.22" > + tag =3D "IP" > + if protocol =3D=3D "TCP": > + proto_str =3D "proto=3D6" > + if protocol =3D=3D "UDP": > + proto_str =3D "proto=3D17" > + if protocol =3D=3D "SCTP": > + proto_str =3D "proto=3D132" > + > + if ip_ver =3D=3D "ipv6": > + src_ip =3D "ABCD:EF01:2345:6789:ABCD:EF01:2345:5789" > + dst_ip =3D "2001::1" > + tag =3D "IPv6" > + if protocol =3D=3D "TCP": > + proto_str =3D "nh=3D6" > + if protocol =3D=3D "UDP": > + proto_str =3D "nh=3D17" > + > + self.tester.scapy_append( > + > 'sendp([Ether(dst=3D"%s")/%s(src=3D"%s",dst=3D"%s",%s)/%s(sport=3D%d,dpor= t=3D%d)/ > Raw(load=3D"P"*%d)], iface=3D"%s")' > + % (self.dut_p0_mac, tag, src_ip, dst_ip, proto_str, protocol= , > fwd_port, fwd_port, pktsize, source_port)) > + self.tester.scapy_execute() > + > + def send_packet_and_check(self, ip_ver, protocol, fwd_port, pktsize, > expect_port): > + """ > + Send packet and check the stats > + """ > + time.sleep(3) > + rx_before =3D [] > + tx_before =3D [] > + for i in range(0, len(self.dut_ports)): > + output =3D self.dut.send_expect("show port > stats %d" %(i),"testpmd>") > + > rx_before.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re= .S)) > + > tx_before.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re= .S)) > + > + self.scapy_send_packet(ip_ver, protocol, fwd_port, pktsize) > + > + rx_after =3D [] > + tx_after =3D [] > + for i in range(0, len(self.dut_ports)): > + output =3D self.dut.send_expect("show port > stats %d" %(i),"testpmd>") > + > rx_after.append(re.compile('RX-packets:\s+(.*?)\s+?').findall(output, re.= S)) > + > tx_after.append(re.compile('TX-packets:\s+(.*?)\s+?').findall(output, re.= S)) > + > + rx_packets_port =3D [] > + tx_packets_port =3D [] > + for i in range(0, len(self.dut_ports)): > + temp1 =3D int(rx_after[i][0]) - int(rx_before[i][0]) > + temp2 =3D int(tx_after[i][0]) - int(tx_before[i][0]) > + rx_packets_port.append(temp1) > + tx_packets_port.append(temp2) > + print("-"*80) > + if expect_port =3D=3D -1: > + print("expect: Dropped") > + else: > + print("expect: port %d" % expect_port) > + print rx_packets_port > + print tx_packets_port > + print("-"*80) > + > + if expect_port =3D=3D i: > + self.verify(int(rx_packets_port[0]) =3D=3D int(tx_packets_po= rt[i]) =3D=3D > 1, > + "Wrong: can't forward package to port %d " % > expect_port) > + if expect_port =3D=3D -1: > + for i in range(0, len(self.dut_ports)): > + self.verify(int(rx_packets_port[0]) =3D=3D 1 and > int(tx_packets_port[i]) =3D=3D 0, > + "Wrong: the packet is not dropped") > + > + def set_up_all(self): > + """ > + Run at the start of each test suite. > + """ > + self.dut_ports =3D self.dut.get_ports() > + self.port_nums =3D 2 > + self.verify(len(self.dut_ports) >=3D self.port_nums, > + "Insufficient ports for speed testing") > + > + self.dut_p0_pci =3D self.dut.get_port_pci(self.dut_ports[0]) > + self.dut_p1_pci =3D self.dut.get_port_pci(self.dut_ports[1]) > + > + self.dut_p0_mac =3D self.dut.get_mac_address(self.dut_ports[0]) > + self.dut_p1_mac =3D self.dut.get_mac_address(self.dut_ports[1]) > + > + self.pf0_interface =3D self.dut.ports_info[self.dut_ports[0]]['i= ntf'] > + self.pf1_interface =3D self.dut.ports_info[self.dut_ports[1]]['i= ntf'] > + > + if len(self.dut_ports) =3D=3D 4: > + self.dut_p2_pci =3D self.dut.get_port_pci(self.dut_ports[2]) > + self.dut_p3_pci =3D self.dut.get_port_pci(self.dut_ports[3]) > + > + self.dut_p2_mac =3D > self.dut.get_mac_address(self.dut_ports[2]) > + self.dut_p3_mac =3D > self.dut.get_mac_address(self.dut_ports[3]) > + > + self.pf2_interface =3D self.dut.ports_info[self.dut_ports[2]= ]['intf'] > + self.pf3_interface =3D self.dut.ports_info[self.dut_ports[3]= ]['intf'] > + > + self.port_id =3D len(self.dut_ports) > + self.copy_config_files_to_dut() > + > + def set_up(self): > + """ > + Run before each test case. > + """ > + pass > + > + def test_ipv4_ACL_table_RFC2698_GYR(self): > + """ > + Test Case 1: ipv4 ACL table RFC2698 GYR > + """ > + self.update_firmware_cli(caseID=3D1) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + def test_ipv4_ACL_table_RFC2698_GYD(self): > + """ > + Test Case 2: ipv4 ACL table RFC2698 GYD > + """ > + self.update_firmware_cli(caseID=3D2) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + def test_ipv4_ACL_table_RFC2698_GDR(self): > + """ > + Test Case 3: ipv4 ACL table RFC2698 GDR > + """ > + self.update_firmware_cli(caseID=3D3) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "SCTP" > + head =3D 32 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"s= ctp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D1) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D1) > + > + def test_ipv4_ACL_table_RFC2698_DYR(self): > + """ > + Test Case 4: ipv4 ACL table RFC2698 DYR > + """ > + self.update_firmware_cli(caseID=3D4) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "UDP" > + head =3D 28 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"u= dp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + def test_ipv4_ACL_table_RFC2698_DDD(self): > + """ > + Test Case 5: ipv4 ACL table RFC2698 DDD > + """ > + self.update_firmware_cli(caseID=3D5) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"d d d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + def test_ipv4_with_same_cbs_and_pbs_GDR(self): > + """ > + Test Case 6: ipv4 with same cbs and pbs GDR > + """ > + self.update_firmware_cli(caseID=3D6) > + > + cbs =3D 500 > + pbs =3D 500 > + protocol =3D "SCTP" > + head =3D 32 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"s= ctp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + > + def test_ipv4_HASH_table_RFC2698(self): > + """ > + Test Case 7: ipv4 HASH table RFC2698 > + """ > + self.update_firmware_cli(caseID=3D7) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + # test 1 'g y r 0 0 0' > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + self.dut.send_expect("quit", "#", 30) > + > + # test 2 'g y d 0 0 0' > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + self.dut.send_expect("quit", "#", 30) > + > + # test 5 'd d d 0 0 0' > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"d d d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + self.dut.send_expect("quit", "#", 30) > + > + # test 3 'g d r 0 0 0' > + protocol =3D "SCTP" > + head =3D 32 > + > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"s= ctp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D1) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"sctp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D1) > + self.dut.send_expect("quit", "#", 30) > + > + # test 4 'd y r 0 0 0' > + protocol =3D "UDP" > + head =3D 28 > + > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"u= dp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + self.dut.send_expect("quit", "#", 30) > + > + def test_ipv6_ACL_table_RFC2698(self): > + """ > + Test Case 8: ipv6 ACL table RFC2698 > + """ > + self.update_firmware_cli(caseID=3D8) > + > + cbs =3D 400 > + pbs =3D 500 > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv6", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv6", protocol=3D"u= dp", > spec_id=3D2, mtr_id=3D1, queue_index_id=3D1) > + self.dut.send_expect("start","testpmd>") > + > + protocol =3D "TCP" > + head =3D 60 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + protocol =3D "UDP" > + head =3D 48 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv6", protocol=3D"udp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + def test_ipv4_multiple_meter_and_profile(self): > + """ > + Test Case 9: multiple meter and profile > + """ > + self.update_firmware_cli(caseID=3D9) > + > + if len(self.dut_ports) =3D=3D 4: > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3D400, pbs= =3D500) > + self.add_port_meter_profile(profile_id=3D1, cbs=3D300, pbs= =3D400) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_acti= on=3D"g > y r 0 0 0") > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_acti= on=3D"g > y d 0 0 0") > + self.create_port_meter(mtr_id=3D2, profile_id=3D0, gyrd_acti= on=3D"g > d r 0 0 0") > + self.create_port_meter(mtr_id=3D3, profile_id=3D0, gyrd_acti= on=3D"d > y r 0 0 0") > + self.create_port_meter(mtr_id=3D4, profile_id=3D1, gyrd_acti= on=3D"g > y d 0 0 0") > + self.create_port_meter(mtr_id=3D5, profile_id=3D1, gyrd_acti= on=3D"g > d r 0 0 0") > + self.create_port_meter(mtr_id=3D6, profile_id=3D1, gyrd_acti= on=3D"d > y r 0 0 0") > + self.create_port_meter(mtr_id=3D128, profile_id=3D1, > gyrd_action=3D"d d d 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D0, mtr_id=3D0, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D1, mtr_id=3D1, queue_index_id=3D1) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D2, mtr_id=3D2, queue_index_id=3D2) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D3, mtr_id=3D3, queue_index_id=3D3) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D4, mtr_id=3D4, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D5, mtr_id=3D5, queue_index_id=3D1) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D6, mtr_id=3D6, queue_index_id=3D2) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D7, mtr_id=3D128, queue_index_id=3D3) > + self.create_flow_rule(ret_id=3D0, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D8, mtr_id=3D128, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + output =3D self.dut.send_expect("flow list %d" % (self.port_= id), > "testpmd>") > + print(output) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + # group 0 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt4, expect_port=3D0) > + # group 1 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt2, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt3, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt4, expect_port=3D1) > + # group 2 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D2) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D2) > + # group 3 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt1, expect_port=3D3) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt2, expect_port=3D3) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt3, expect_port=3D3) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt4, expect_port=3D-1) > + > + cbs =3D 300 > + pbs =3D 400 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + # group 4 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt4, expect_port=3D0) > + # group 5 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt1, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt4, expect_port=3D1) > + # group 6 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt1, expect_port=3D2) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt2, expect_port=3D2) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt3, expect_port=3D2) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt4, expect_port=3D-1) > + # group 7 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt4, expect_port=3D-1) > + > + if len(self.dut_ports) =3D=3D 2: > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3D400, pbs= =3D500) > + self.add_port_meter_profile(profile_id=3D1, cbs=3D300, pbs= =3D400) > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_acti= on=3D"g > y r 0 0 0") > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_acti= on=3D"g > y d 0 0 0") > + self.create_port_meter(mtr_id=3D2, profile_id=3D0, gyrd_acti= on=3D"g > d r 0 0 0") > + self.create_port_meter(mtr_id=3D3, profile_id=3D0, gyrd_acti= on=3D"d > y r 0 0 0") > + self.create_port_meter(mtr_id=3D4, profile_id=3D1, gyrd_acti= on=3D"g > y d 0 0 0") > + self.create_port_meter(mtr_id=3D5, profile_id=3D1, gyrd_acti= on=3D"g > d r 0 0 0") > + self.create_port_meter(mtr_id=3D6, profile_id=3D1, gyrd_acti= on=3D"d > y r 0 0 0") > + self.create_port_meter(mtr_id=3D128, profile_id=3D1, > gyrd_action=3D"d d d 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D0, mtr_id=3D0, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D1, mtr_id=3D1, queue_index_id=3D1) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D2, mtr_id=3D2, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D3, mtr_id=3D3, queue_index_id=3D1) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D4, mtr_id=3D4, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D5, mtr_id=3D5, queue_index_id=3D1) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D6, mtr_id=3D6, queue_index_id=3D0) > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D7, mtr_id=3D128, queue_index_id=3D1) > + self.create_flow_rule(ret_id=3D0, ip_ver=3D"ipv4", protocol= =3D"tcp", > spec_id=3D8, mtr_id=3D128, queue_index_id=3D0) > + self.dut.send_expect("start", "testpmd>") > + output =3D self.dut.send_expect("flow list %d" % (self.port_= id), > "testpmd>") > + print(output) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + # group 0 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D0, pktsize=3Dpkt4, expect_port=3D0) > + # group 1 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt2, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt3, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D1, pktsize=3Dpkt4, expect_port=3D1) > + # group 2 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + # group 3 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt1, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt2, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt3, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D3, pktsize=3Dpkt4, expect_port=3D-1) > + > + cbs =3D 300 > + pbs =3D 400 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + # group 4 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D4, pktsize=3Dpkt4, expect_port=3D0) > + # group 5 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt1, expect_port=3D1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D5, pktsize=3Dpkt4, expect_port=3D1) > + # group 6 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D6, pktsize=3Dpkt4, expect_port=3D-1) > + # group 7 > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp"= , > fwd_port=3D7, pktsize=3Dpkt4, expect_port=3D-1) > + > + def test_ipv4_RFC2698_pre_colored_red_by_DSCP_table(self): > + """ > + Test Case 10: ipv4 RFC2698 pre-colored red by DSCP table > + """ > + self.update_firmware_cli(caseID=3D10) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.dut.send_expect("start", "testpmd>") > + > + # test 0: GYR > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 1: GYD > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D1, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + # test 2: GDR > + self.create_port_meter(mtr_id=3D2, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D2, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 3: DYR > + self.create_port_meter(mtr_id=3D3, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D3, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + def test_ipv4_RFC2698_pre_colored_yellow_by_DSCP_table(self): > + """ > + Test Case 11: ipv4 RFC2698 pre-colored yellow by DSCP table > + """ > + self.update_firmware_cli(caseID=3D11) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.dut.send_expect("start", "testpmd>") > + > + # test 0: GYR > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 1: GYD > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D1, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 2: GDR > + self.create_port_meter(mtr_id=3D2, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D2, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + # test 3: DYR > + self.create_port_meter(mtr_id=3D3, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D3, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + def test_ipv4_RFC2698_pre_colored_green_by_DSCP_table(self): > + """ > + Test Case 12: ipv4 RFC2698 pre-colored green by DSCP table > + """ > + self.update_firmware_cli(caseID=3D12) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.dut.send_expect("start", "testpmd>") > + > + # test 0: GYR > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 1: GYD > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D1, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 2: GDR > + self.create_port_meter(mtr_id=3D2, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D2, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 3: DYR > + self.create_port_meter(mtr_id=3D3, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D3, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + def test_ipv4_RFC2698_pre_colored_default_by_DSCP_table(self): > + """ > + Test Case 13: ipv4 RFC2698 pre-colored by default DSCP table > + """ > + self.update_firmware_cli(caseID=3D13) > + > + cbs =3D 400 > + pbs =3D 500 > + protocol =3D "TCP" > + head =3D 40 > + pkt1 =3D pbs - head + 1 > + pkt2 =3D pbs - head > + pkt3 =3D cbs - head + 1 > + pkt4 =3D cbs - head > + > + self.start_testpmd(self.new_firmware_cli) > + self.add_port_meter_profile(profile_id=3D0, cbs=3Dcbs, pbs=3Dpbs= ) > + self.dut.send_expect("start", "testpmd>") > + > + # test 0: GYR > + self.create_port_meter(mtr_id=3D0, profile_id=3D0, gyrd_action= =3D"g y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D0, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 1: GYD > + self.create_port_meter(mtr_id=3D1, profile_id=3D0, gyrd_action= =3D"g y d > 0 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D1, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 2: GDR > + self.create_port_meter(mtr_id=3D2, profile_id=3D0, gyrd_action= =3D"g d r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D2, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D-1) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D0) > + > + # test 3: DYR > + self.create_port_meter(mtr_id=3D3, profile_id=3D0, gyrd_action= =3D"d y r 0 > 0 0") > + self.create_flow_rule(ret_id=3D1, ip_ver=3D"ipv4", protocol=3D"t= cp", > spec_id=3D2, mtr_id=3D3, queue_index_id=3D0) > + > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt1, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt2, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt3, expect_port=3D0) > + self.send_packet_and_check(ip_ver=3D"ipv4", protocol=3D"tcp", > fwd_port=3D2, pktsize=3Dpkt4, expect_port=3D-1) > + > + def tear_down(self): > + """ > + Run after each test case. > + """ > + self.dut.kill_all() > + time.sleep(2) > + > + def tear_down_all(self): > + """ > + Run after each test suite. > + """ > + pass > -- > 2.17.2